HP 5820X Series User manual

HP 5820X & 5800 Switch Series
Network Management and Monitoring
Configuration Guide
Abstract
This document describes the software features for the HP 5820X & 5800 Series products and guides
you through the software configuration procedures. These configuration guides also provide
configuration examples to help you apply software features to different network scenarios.
This documentation is intended for network planners, field technical support and servicing engineers,
and network administrators working with the HP 5820X & 5800 Series products.
Part number: 5998-1636
Software version: Release 1211
Document version: 6W101-20121123

Legal and notice information
© Copyright 2012 Hewlett-Packard Development Company, L.P.
No part of this documentation may be reproduced or transmitted in any form or by any means without
prior written consent of Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS
MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained
herein or for incidental or consequential damages in connection with the furnishing, performance, or
use of this material.
The only warranties for HP products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. HP shall not be liable for technical or editorial errors or omissions contained
herein.

iii
Contents
System maintenance and debugging ························································································································· 1
Configuring ping·······························································································································································1
Configuring ping example ······································································································································1
Tracert ················································································································································································3
Configuring tracert ···················································································································································4
System debugging ····························································································································································5
Configuring system debugging·······························································································································6
Configuring ping and tracert example ···························································································································7
Configuring NQA························································································································································ 9
NQA benefits····························································································································································9
Basic NQA concepts ············································································································································ 11
NQA probe operation procedure ······················································································································· 12
NQA configuration task list ·········································································································································· 12
Configuring the NQA server ········································································································································ 13
Enabling the NQA client··············································································································································· 14
Creating an NQA test group········································································································································ 14
Configuring an NQA test group ·································································································································· 14
Configuring ICMP echo tests································································································································ 14
Configuring DHCP tests ········································································································································ 15
Configuring DNS tests ·········································································································································· 16
Configuring FTP tests············································································································································· 17
Configuring HTTP tests·········································································································································· 18
Configuring UDP jitter tests ·································································································································· 19
Configuring SNMP tests ······································································································································· 21
Configuring TCP tests············································································································································ 22
Configuring UDP echo tests·································································································································· 23
Configuring voice tests ········································································································································· 24
Configuring DLSw tests ········································································································································· 26
Configuring the collaboration function························································································································ 27
Configuring threshold monitoring ································································································································ 28
Configuring the NQA statistics collection function····································································································· 29
Configuring the history records saving function ········································································································· 30
Configuring optional parameters for an NQA test group························································································· 31
Scheduling an NQA test group···································································································································· 32
Displaying and maintaining NQA······························································································································· 33
Configuring NQA examples········································································································································· 33
Configuring ICMP echo test example ················································································································· 33
Configuring DHCP test example·························································································································· 35
Configuring DNS test example···························································································································· 36
Configuring FTP test example ······························································································································ 37

iv
Configuring HTTP test example···························································································································· 38
Configuring UDP jitter test example ···················································································································· 40
Configuring SNMP test example ························································································································· 43
Configuring TCP test example······························································································································ 44
Configuring UDP echo test example ··················································································································· 45
Configuring voice test example ··························································································································· 47
Configuring DLSw test example··························································································································· 50
Configuring NQA collaboration example·········································································································· 51
Configuring NTP ························································································································································54
NTP applications ··················································································································································· 54
NTP advantages ···················································································································································· 54
How NTP works····················································································································································· 55
NTP message format············································································································································· 56
NTP operation modes ··········································································································································· 57
Multiple instances of NTP····································································································································· 59
NTP configuration task list············································································································································· 60
Configuring the operation modes of NTP ··················································································································· 60
Configuring NTP client/server mode ·················································································································· 60
Configuring the NTP symmetric peers mode······································································································ 61
Configuring NTP broadcast mode ······················································································································ 62
Configuring NTP multicast mode························································································································· 63
Configuring optional parameters of NTP ···················································································································· 63
Specifying the source interface for NTP messages···························································································· 63
Disabling an interface from receiving NTP messages······················································································· 64
Configuring the maximum number of dynamic sessions allowed···································································· 64
Configuring access-control rights ································································································································· 65
Configuration prerequisites ·································································································································· 65
Configuration procedure ······································································································································ 65
Configuring NTP authentication ··································································································································· 65
Configuration prerequisites ·································································································································· 66
Configuration procedure ······································································································································ 66
Displaying and maintaining NTP ································································································································· 67
Configuring NTP examples··········································································································································· 68
Configuring NTP client/server mode example ·································································································· 68
Configuring the NTP symmetric mode example································································································· 69
Configuring NTP broadcast mode example······································································································· 71
Configuring NTP multicast mode example ········································································································· 72
Configuring NTP client/server mode with authentication example································································· 75
Configuring NTP broadcast mode with authentication example ····································································· 76
Configuring MPLS VPN time synchronization in client/server mode example··············································· 78
Configuring MPLS VPN time synchronization in symmetric peers mode example ········································ 80
Configuring IPC··························································································································································82
Enabling IPC performance statistics ····························································································································· 83
Displaying and maintaining IPC··································································································································· 84

v
Configuring PoE ·························································································································································85
Protocol specification ············································································································································ 86
PoE configuration task list ············································································································································· 86
Enabling PoE ·································································································································································· 87
Enabling PoE for a PoE interface························································································································· 87
Detecting PDs·································································································································································· 88
Enabling the PSE to detect nonstandard PDs ····································································································· 88
Configuring a PD disconnection detection mode ······························································································ 88
Configuring the PoE power··········································································································································· 89
Configuring the maximum PoE interface power ································································································ 89
Configuring PoE power management·························································································································· 89
Configuring PoE interface power management ································································································· 89
Configuring the PoE monitoring function····················································································································· 90
Configuring PSE power monitoring····················································································································· 90
Monitoring PD························································································································································ 90
Configuring PoE interface through PoE profile ··········································································································· 91
Configuring PoE profile ········································································································································ 91
Applying PoE profile ············································································································································· 91
Upgrading PSE processing software in service ·········································································································· 92
Displaying and maintaining PoE ·································································································································· 93
Configuring PoE example ············································································································································· 93
Troubleshooting PoE ······················································································································································ 94
Configuring SNMP·····················································································································································96
SNMP mechanism ················································································································································· 96
SNMP protocol version········································································································································· 96
MIB overview························································································································································· 97
Configuring SNMP ························································································································································ 97
Configuring network management-specific interface index ····················································································100
Switching the format of an NM-specific ifindex·······························································································100
Configuring SNMP logging ········································································································································101
Enabling SNMP logging·····································································································································101
Configuring SNMP trap ··············································································································································102
Enabling the trap function ··································································································································102
Configuring trap parameters······························································································································103
Displaying and maintaining SNMP ···························································································································104
Configuring SNMPv1/SNMPv2c example···············································································································105
Configuring SNMPv3 example ··································································································································106
Configuring SNMP logging example ························································································································107
Configuring RMON ················································································································································ 109
Working mechanism···········································································································································109
RMON groups·····················································································································································110
Configuring the RMON statistics function ·················································································································111
Configuring the RMON Ethernet statistics function··························································································113
Configuring the RMON history statistics function····························································································113

vi
Configuring the RMON alarm function ·····················································································································114
Configuration prerequisites ································································································································114
Configuration procedure ····································································································································114
Displaying and maintaining RMON··························································································································115
Configuring Ethernet statistics group example··········································································································116
Configuring history group example ···························································································································117
Configuring alarm group example ····························································································································119
Configuring CWMP················································································································································ 121
CWMP network framework ·······························································································································121
CWMP basic functions················································································································································122
Automatic configuration file deployment ··········································································································122
CPE system file management ·····························································································································122
CPE status and performance monitoring···········································································································122
CWMP mechanism ······················································································································································123
Auto-connection between the ACS and a CPE ································································································123
Configuration parameter deployment···············································································································124
RPC methods························································································································································124
Active and standby ACS switchover ·················································································································125
CWMP configuration tasks ·········································································································································126
Configuring the DHCP server·····························································································································126
Configuring the DNS server·······························································································································127
Configuring the ACS server ·······························································································································127
Configuring CPEs ················································································································································127
Enabling CWMP ··························································································································································128
Configuring the ACS server ········································································································································128
Configuring the ACS URL ···································································································································128
Configuring the ACS username and password ·······························································································128
Configuring CPE attributes··········································································································································129
Configuring the CPE username and password ································································································129
Configuring the CWMP connection interface ··································································································130
Sending Inform messages···································································································································130
Configuring the maximum number of attempts made to retry a connection·················································131
Configuring the close-wait timer of the CPE ·····································································································131
Displaying and maintaining CWMP··························································································································132
Configuring CWMP example ·····································································································································132
Network requirements·········································································································································132
Configuration procedure ····································································································································133
Configuring cluster management··························································································································· 141
Roles in a cluster··················································································································································141
How a cluster works············································································································································142
Cluster configuration task list ······································································································································145
Configuring the management device·························································································································147
Enabling NDP globally and for specific ports··································································································147
Configuring NDP parameters ····························································································································147

vii
Enabling NTDP globally and for specific ports································································································148
Configuring NTDP parameters···························································································································148
Manually collecting topology information ········································································································149
Enabling the cluster function ······························································································································149
Establishing a cluster···········································································································································149
Enabling management VLAN auto-negotiation································································································150
Configuring communication between the management device and the member devices within a cluster151
Configuring cluster management protocol packets ·························································································151
Cluster member management ····························································································································152
Configuring the member devices ·······························································································································153
Enabling NDP ······················································································································································153
Enabling NTDP ····················································································································································153
Manually collecting topology information ········································································································153
Enabling the cluster function ······························································································································153
Deleting a member device from a cluster ·········································································································153
Configuring access between the management device and its member devices···················································154
Adding a candidate device to a cluster ····················································································································155
Configuring advanced cluster functions ····················································································································155
Configuring topology management ··················································································································155
Configuring interaction for a cluster··················································································································156
SNMP configuration synchronization function·································································································157
Configuring web user accounts in batches ······································································································158
Displaying and maintaining cluster management ····································································································158
Configuring cluster management example················································································································159
Configuring a sampler············································································································································ 163
Creating a sampler ······················································································································································163
Displaying and maintaining sampler·························································································································163
Configuring sampler examples···································································································································164
Configuring port mirroring ····································································································································· 165
Port mirroring types·············································································································································165
Implementing port mirroring·······························································································································165
Configuring local port mirroring ································································································································168
Local port mirroring configuration task list ·······································································································168
Creating a local mirroring group ······················································································································168
Configuring mirroring ports for the local mirroring group··············································································169
Configuring mirroring CPUs for the local mirroring group·············································································169
Configuring the monitor port for the local mirroring group············································································170
Configuring layer 2 remote port mirroring················································································································170
Layer 2 remote port mirroring configuration task list ······················································································170
Configuration prerequisites ································································································································172
Configuring a remote source mirroring group (on the source device) ··························································172
Configuring a remote destination mirroring group (on the destination device) ···········································174
Using the remote probe VLAN to enable local mirroring to support multiple destination ports ·················176
Configuring layer 3 remote port mirroring················································································································178

viii
Layer 3 remote port mirroring configuration task list ······················································································178
Configuration prerequisites ································································································································179
Configuring local mirroring groups···················································································································179
Configuring mirroring ports for a local mirroring group ················································································179
Configuring mirroring CPUs for a local mirroring group················································································180
Configuring the monitor port for a local mirroring group ··············································································180
Displaying and maintaining port mirroring···············································································································181
Configuring port mirroring examples ························································································································181
Configuring local port mirroring example········································································································181
Configuring Layer 2 remote port mirroring example ······················································································182
Configuring local port mirroring with multiple monitor ports example ·························································184
Configuring Layer 3 remote port mirroring example ······················································································186
Configuring traffic mirroring ·································································································································· 189
Mirroring traffic to an interface ·························································································································189
Mirroring traffic to the CPU································································································································190
Applying a QoS policy·······································································································································191
Displaying and maintaining traffic mirroring············································································································192
Configuring traffic mirroring examples······················································································································192
Mirroring traffic to an interface example ·········································································································192
Configuration procedure ····································································································································192
Configuring NetStream··········································································································································· 194
NetStream basic concepts ··········································································································································194
What is a flow·····················································································································································194
How NetStream works········································································································································194
NetStream key technologies ·······································································································································195
Flow aging ···························································································································································195
NetStream data export ·······································································································································196
NetStream export formats ··································································································································197
Introduction to NetStream sampling and filtering·····································································································198
NetStream sampling ···········································································································································198
NetStream filtering ··············································································································································198
NetStream configuration task list································································································································198
Enabling NetStream·····················································································································································200
Enabling NetStream on an interface·················································································································200
Configuring NetStream filtering and sampling·········································································································200
Configuring NetStream filtering·························································································································200
Configuring NetStream sampling······················································································································202
Configuring NetStream data export ··························································································································202
Configuring NetStream traditional data export·······························································································202
Configuring NetStream aggregation data export ···························································································203
Configuring attributes of NetStream export data ·····································································································204
Configuring NetStream export format ··············································································································204
Configuring refresh rate for NetStream version 9 templates··········································································206
Configuring NetStream flow aging····························································································································207

ix
Flow aging approaches······································································································································207
Configuring NetStream flow aging···················································································································207
Displaying and maintaining NetStream ····················································································································208
Configuring NetStream examples······························································································································208
Configuring NetStream traditional data export example ···············································································208
Configuring NetStream aggregation data export example ···········································································209
Configuring IPv6 NetStream ·································································································································· 211
IPv6 NetStream basic concepts ··································································································································211
What is an IPv6 flow ··········································································································································211
How IPv6 NetStream works ·······························································································································211
IPv6 NetStream key technologies·······························································································································212
Flow aging ···························································································································································212
IPv6 NetStream data export·······························································································································212
IPv6 NetStream export format····························································································································213
IPv6 NetStream configuration task list ·······················································································································213
Enabling NetStream·····················································································································································214
Enabling NetStream on an interface·················································································································214
Configuring IPv6 NetStream data export··················································································································214
Configuring IPv6 NetStream traditional data export·······················································································214
Configuring IPv6 NetStream aggregation data export···················································································215
Configuring attributes of IPv6 NetStream data export·····························································································217
Configuring IPv6 NetStream export format······································································································217
Configuring refresh rate for IPv6 NetStream version 9 templates ·································································217
Displaying and maintaining IPv6 NetStream············································································································218
Configuring IPv6 NetStream examples······················································································································218
Configuring IPv6 NetStream traditional data export example·······································································218
Configuring IPv6 NetStream aggregation data export example···································································219
Configuring sFlow··················································································································································· 221
sFlow operation ···················································································································································221
Configuring sFlow························································································································································222
Configuring the sFlow agent and sFlow collector····························································································222
Configuring flow sampling·································································································································223
Configuring counter sampling ···························································································································223
Displaying and maintaining sFlow·····························································································································223
Configuring sFlow example ········································································································································224
Troubleshooting sFlow configuration ·························································································································225
The remote sFlow collector cannot receive sFlow packets··············································································225
Configuring information center······························································································································ 226
System information types····································································································································227
Eight levels of system information······················································································································227
Output destinations and channels of system information················································································227
Outputting system information by source module····························································································228
Default output rules of system information ········································································································228
System information format··································································································································229

x
Configuring information center···································································································································232
Information center configuration task list ··········································································································232
Outputting system information to the console ··································································································233
Outputting system information to a monitor terminal ······················································································234
Outputting system information to a log host·····································································································235
Outputting system information to the trap buffer ·····························································································236
Outputting system information to the log buffer·······························································································236
Outputting system information to the SNMP module·······················································································237
Outputting system information to the web interface ························································································238
Saving system information to a log file·············································································································239
Saving security logs into the security log file····································································································240
Configuring synchronous information output ···································································································243
Disabling a port from generating link up/down logging information···························································243
Displaying and maintaining information center ·······································································································244
Configuring information center examples ·················································································································245
Outputting log information to a Unix log host ·································································································245
Outputting log information to a Linux log host·································································································246
Outputting log information to the console ········································································································248
Saving security logs into the security log file····································································································249
Support and other resources ·································································································································· 253
Contacting HP ······························································································································································253
Subscription service ············································································································································253
Related information······················································································································································253
Documents····························································································································································253
Websites ······························································································································································253
Conventions ··································································································································································254
Index ········································································································································································ 256

1
System maintenance and debugging
You can use the ping command and the tracert command to verify the current network connectivity, and
use the debug command to enable debugging and to diagnose system faults based on the debugging
information.
Configuring ping
The ping command allows you to verify whether a device with a specified address is reachable, and to
examine network connectivity.
The ping function is implemented through the ICMP using the following workflow:
1. The source device sends an ICMP echo request to the destination device.
2. The source device determines whether the destination is reachable based on whether it receives an
ICMP echo reply; if the destination is reachable, the source device determines the link quality
based on the numbers of ICMP echo requests sent and replies received, determines the distance
between the source and destination based on the round trip time of ping packets.
To configure the ping function:
To do… Use the command… Remarks
ping [ ip ] [ -asource-ip | -c count | -f | -
httl | -iinterface-type interface-number | -
minterval | -n | -p pad | -q | -r | -s
packet-size | -t timeout | -tos tos | -v | -
vpn-instance vpn-instance-name ] * host
Check whether a specified
address in an IP network is
reachable. ping ipv6 [ -a source-ipv6 | -c count | -m
interval | -s packet-size | -t timeout ] *
host [ -i interface-type interface-number ]
Required.
Use either approach.
The ping command is
applicable in an IPv4 network;
the ping ipv6 command is
applicable in an IPv6 network.
Available in any view.
NOTE:
•For a low-speed network, set a larger value for the timeout timer—indicated by the -t parameter in
the command—when configuring the ping command.
•Only the directly connected se
g
ment address can be pin
g
ed if the out
g
oin
g
interface is specified with
the -i argument
•For more information about the ping lsp command, see MPLS basics commands
in the
MPLS
Command Reference
.
Configuring ping example
Network requirements
As shown in Figure 1, check whether Device A and Device C can reach each other. If they can reach
each other, get the detailed information of routes from Device A to Device C.

2
Figure 1 Ping network diagram
Configuration procedure
# Use the ping command to display whether Device A and Device C can reach each other.
<DeviceA> ping 1.1.2.2
PING 1.1.2.2: 56 data bytes, press CTRL_C to break
Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=205 ms
Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms
--- 1.1.2.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/41/205 ms
# Get the detailed information of routes from Device A to Device C.
<DeviceA> ping -r 1.1.2.2
PING 1.1.2.2: 56 data bytes, press CTRL_C to break
Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=53 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2

3
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
--- 1.1.2.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/11/53 ms
The principle of ping –r is as shown in Figure 1.
1. The source (Device A) sends an ICMP echo request with the RR option being empty to the
destination (Device C).
2. The intermediate device (Device B) adds the IP address (1.1.2.1) of its outbound interface to the RR
option of the ICMP echo request and forwards the packet.
3. Upon receiving the request, the destination device copies the RR option in the request and adds the
IP address (1.1.2.2) of its outbound interface to the RR option. Then the destination device sends an
ICMP echo reply.
4. The intermediate device adds the IP address (1.1.1.2) of its outbound interface to the RR option in
the ICMP echo reply, and then forwards the reply.
5. Upon receiving the reply, the source device adds the IP address (1.1.1.1) of its inbound interface
to the RR option. Finally, get the detailed information of routes from Device A to Device C: 1.1.1.1
<-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
Tracert
By using the tracert command, you can trace the Layer 3 devices involved in delivering an IP packet from
source to destination to check whether a network is available. This is useful for identification of failed
nodes in the event of network failure.

4
Figure 2 Tracert diagram
The tracert function is implemented through ICMP, as shown in Figure 2:
1. The source (Device A) sends a packet with a TTL value of 1 to the destination (Device D). The UDP
port of the packet is a port number that will not be used by any application of the destination.
2. The first hop (Device B) (the Layer 3 device that first receives the packet) responds by sending a TTL-
expired ICMP error message to the source, with its IP address 1.1.1.2 encapsulated. In this way,
the source device can get the address (1.1.1.2) of the first Layer 3 device.
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the
source device the address (1.1.2.2) of the second Layer 3 device.
5. The process continues until the ultimate destination device is reached. No application of the
destination uses this UDP port. The destination replies a port unreachable ICMP error message with
the destination IP address 1.1.3.2.
6. When the source device receives the port unreachable ICMP error message, it knows that the
packet has reached the destination, and it can get the addresses of all Layer 3 devices involved to
get to the destination device (1.1.1.2, 1.1.2.2, 1.1.3.2).
Configuring tracert
Configuration prerequisites
Before you configure tracert, complete the following tasks:
•Enable sending of ICMP timeout packets on the intermediate device (the device between the source
and destination devices). If the intermediate device is an HP device, execute the ip ttl-expires enable
command on the device. For more information about this command, see IP performance
optimization commands in the Layer 3 - IP Services Command Reference.
•Enable sending of ICMP destination unreachable packets on the destination device. If the
destination device is an HP device, execute the ip unreachables enable command. For more
information about this command, see IP performance optimization commands in the Layer 3 - IP
Services Command Reference.

5
Tracert configuration
To configure tracert:
To do… Use the command… Remarks
1. Enter system view. system-view —
tracert [ -a source-ip | -f first-ttl |-m
max-ttl | -p port | -q packet-number | -
vpn-instance vpn-instance-name |-w
timeout ] * host
2. Display the routes from
source to destination.
tracert ipv6 [ -f first-ttl | -m max-ttl | -p
port | -q packet-number | -w timeout ]
* host
Required.
Use either approach.
The tracert command is
applicable in an IPv4 network;
the tracert ipv6 command is
applicable in an IPv6 network.
Available in any view.
NOTE:
For more information about the tracert lsp command, see MPLS basics commands
in the
MPLS
Command Reference
.
System debugging
The device provides various debugging functions. For the majority of protocols and features supported,
the system provides debugging information to help users diagnose errors.
The following switches control the display of debugging information:
•Protocol debugging switch, which controls protocol-specific debugging information.
•Screen output switch, which controls whether to display the debugging information on a certain
screen.
As Figure 3 illustrates, assume the device can provide debugging for the three modules 1, 2, and 3. The
debugging information can only be output on a terminal when both the protocol debugging switch and
the screen output switch are turned on.

6
Figure 3 The relationship between the protocol and screen output switch
1
3
Configuring system debugging
Output of the debugging information may reduce system efficiency. Administrators usually use the
debugging commands to diagnose network failure. After completing the debugging, disable the
corresponding debugging function, or use the undo debugging all command to disable all debugging
functions.
Output of debugging information depends on the configurations of the information center and the
debugging commands of each protocol and functional module. Displaying the debugging information on
a terminal—including console or VTY—is a common way to output debugging information. You can also
output debugging information to other destinations. For more information, see Information center
commands in the Network Management and Monitoring Command Reference. By default, you can output
debugging information to a terminal by following these steps:
To do… Use the command… Remarks
1. Enable the terminal
monitoring of system
information.
terminal monitor
Optional.
The terminal monitoring on the
console is enabled by default and
that on the monitoring terminal is
disabled by default.
Available in user view.
2. Enable the terminal display of
debugging information. terminal debugging
Required.
Disabled by default.
Available in user view.
3. Enable debugging for a
specified module.
debugging { all [ timeout time ] |
module-name [ option ] }
Required.
Disabled by default.
Available in user view.

7
To do… Use the command… Remarks
4. Display the enabled
debugging functions.
display debugging [ interface
interface-type interface-number ]
[module-name ] [ | { begin |
exclude | include } regular-
expression ]
Optional.
Available in any view.
NOTE:
To display the detailed debugging information on the terminal, configure the debugging,terminal
debugging and terminal monitor commands. For more information about the terminal debugging
and
terminal monitor commands, see Information center commands
in the
Network Management and
Monitoring Command Reference
.
Configuring ping and tracert example
Network requirements
As shown in Figure 4, Device A failed to Telnet Device C. Determine whether Device A and Device C can
reach each other. If they cannot reach each other, locate the failed nodes in the network.
Figure 4 Ping and tracert network diagram
Configuration procedure
# Use the ping command to display whether Device A and Device C can reach each other.
<DeviceA> ping 1.1.2.2
PING 1.1.2.2: 56 data bytes, press CTRL_C to break
Request time out
Request time out
Request time out
Request time out
Request time out
--- 1.1.2.2 ping statistics ---
5 packet(s) transmitted
0 packet(s) received
100.00% packet loss
# Device A and Device C cannot reach each other. Use the tracert command to determine failed nodes.
<DeviceA> system-view
[DeviceA] ip ttl-expires enable
[DeviceA] ip unreachables enable
[DeviceA] tracert 1.1.2.2
traceroute to 1.1.2.2(1.1.2.2) 30 hops max,40 bytes packet, press CTRL_C to bre
ak
1 1.1.1.2 14 ms 10 ms 20 ms

8
2 * * *
3 * * *
4 * * *
5
<DeviceA>
The output shows that Device A and Device C cannot reach other, Device A and Device B can reach each
other, and an error occurred on the connection between Device B and Device C. Use the debugging ip
icmp command to enable ICMP debugging on Device A and Device C to check whether the devices send
or receive the specified ICMP packets, or use the display ip routing-table command to display whether
Device A and Device C can reach each other.

9
Configuring NQA
NQA can perform various types of tests and collect network performance and service quality parameters
such as delay jitter, time for establishing a TCP connection, time for establishing an FTP connection, and
file transfer rate.
With the NQA test results, you can diagnose and locate network faults, know network performance in
time and take proper actions.
NQA benefits
Supporting multiple test types
Ping can only use the ICMP to test the reachability of the destination host and the round-trip time. As an
enhancement to Ping, NQA provides more test types and functions.
NQA supports 11 test types: ICMP echo, DHCP, DNS, FTP, HTTP, UDP jitter, SNMP, TCP, UDP echo, voice
and DLSw.
NQA enables the client to send probe packets of different test types to detect the protocol availability and
response time of the peer. The test result helps you understand network performance.
Supporting the collaboration function
Collaboration is implemented by establishing reaction entries to monitor the detection results of NQA
probes. If the number of consecutive probe failures reaches a limit, NQA informs the track module of the
detection result, and the track module triggers other application modules to take predefined.
Figure 5 Implement collaboration
The collaboration comprises the following parts: the application modules, the track module, and the
detection modules.
•A detection module monitors specific objects, such as the link status, and network performance, and
informs the track module of detection results.
•Upon the detection results, the track module changes the status of the track entry and informs the
associated application module. The track module works between the application modules and the
detection modules. It hides the differences among detection modules from application modules.
•The application module takes actions when the tracked object changes its state.
The following describes how a static route is monitored through collaboration.
1. NQA monitors the reachability to 192.168.0.88.
2. When 192.168.0.88 becomes unreachable, NQA notifies it to the track module.

10
3. The track module notifies the state change to the static routing module
4. The static routing module sets the static route as invalid.
NOTE:
For more information about the collaboration and the track module, see
High Availability
Configuration Guide
.
Supporting threshold monitoring
NQA supports threshold monitoring for performance parameters such as average delay jitter and packet
round-trip time. The performance parameters to be monitored are monitored elements. NQA monitors
threshold violations for a monitored element, and reacts to certain measurement conditions, for example,
sending trap messages to the network management server. This helps network administrators understand
the network service quality and network performance.
1. Monitored elements
Table 1 describes the monitored elements and the NQA test types in which the elements can be
monitored.
Table 1 Monitored elements and NQA test types
Monitored elements Test type supported
Probe duration Tests excluding UDP jitter test and voice
test
Count of probe failures Tests excluding UDP jitter test and voice
test
Packet round-trip time UDP jitter test and voice test
Count of discarded packets UDP jitter test and voice test
One-way delay jitter (source-to-destination and destination-to-
source) UDP jitter test and voice test
One-way delay (source-to-destination and destination-to-source)
UDP jitter test and voice test
ICPIF (see “Configuring voice tests”) Voice test
MOS (see “Configuring voice tests”) Voice test
2. Threshold types
The following threshold types are supported:
•average—Monitors the average value of monitored data in a test. If the average value in a test
exceeds the upper threshold or goes below the lower threshold, a threshold violation occurs. For
example, you can monitor the average probe duration in a test.
•accumulate—Monitors total number of times the monitored data violates the threshold in a test. If the
total number of times reaches or exceeds a specified value, a threshold violation occurs.
•consecutive—Monitors the number of consecutive times the monitored data violates the threshold
since the test group starts. If the monitored data violates the threshold consecutively for a specified
number of times, a threshold violation occurs.
Other manuals for 5820X Series
1
This manual suits for next models
1
Table of contents
Other HP Network Router manuals

HP
HP StorageWorks SR2122 User manual

HP
HP 5120 SI Series User manual

HP
HP StorageWorks N1200-320 User manual

HP
HP A-MSR30-16 Installation instructions

HP
HP HP ProCurve Series 6600 User manual

HP
HP StorageWorks SR2122-2 How to use

HP
HP IntelliJack NJ1000G User manual

HP
HP FlexFabric 12900 series User manual

HP
HP ProCurve 7102 User manual

HP
HP MSR2000 Series User manual