HP MSR SERIES User manual

HP MSR Router Series
Network Management and Monitoring
Configuration Guide(V5)
Part number: 5998-8189
Software version: CMW520-R2513
Document version: 6PW106-20150808

i
Legal and notice information
© Copyright 2015 Hewlett-Packard Development Company, L.P.
No part of this documentation may be reproduced or transmitted in any form or by any means without
prior written consent of Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS
MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained
herein or for incidental or consequential damages in connection with the furnishing, performance, or use
of this material.
The only warranties for HP products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

i
Contents
Configuring SNMP······················································································································································· 1
Overview············································································································································································1
SNMP framework·····················································································································································1
MIB and view-based MIB access control ···············································································································1
SNMP operations ·····················································································································································2
SNMP protocol versions ··········································································································································2
SNMP configuration task list············································································································································2
Configuring SNMP basic parameters·····························································································································2
Configuring SNMPv3 basic parameters················································································································2
Configuring SNMPv1 or SNMPv2c basic parameters·························································································4
Configuring SNMP logging ·············································································································································5
Configuring SNMP traps··················································································································································6
Enabling SNMP traps ··············································································································································6
Configuring the SNMP agent to send traps to a host ··························································································7
Displaying and maintaining SNMP ································································································································8
SNMP configuration examples········································································································································8
SNMPv1/SNMPv2c configuration example ·········································································································8
SNMPv3 configuration example·························································································································· 10
SNMP logging configuration example ··············································································································· 11
Configuring RMON ···················································································································································14
Overview········································································································································································· 14
Working mechanism············································································································································· 14
RMON groups ······················································································································································· 14
Configuring the RMON statistics function ··················································································································· 16
Configuring the RMON Ethernet statistics function···························································································· 16
Configuring the RMON history statistics function ······························································································ 16
Configuring the RMON alarm function ······················································································································· 17
Displaying and maintaining RMON ···························································································································· 18
Ethernet statistics group configuration example ········································································································· 18
History group configuration example ·························································································································· 19
Alarm group configuration example···························································································································· 21
Configuring NTP ························································································································································23
Overview········································································································································································· 23
NTP application····················································································································································· 23
NTP advantages ···················································································································································· 23
How NTP works····················································································································································· 23
NTP message format ············································································································································· 24
NTP operation modes ··········································································································································· 26
NTP for VPNs························································································································································· 28
NTP configuration task list············································································································································· 29
Configuring NTP operation modes ······························································································································ 29
Configuring NTP client/server mode ·················································································································· 30
Configuring the NTP symmetric peers mode······································································································ 30
Configuring NTP broadcast mode······················································································································· 31
Configuring NTP multicast mode ························································································································· 31
Configuring the local clock as a reference source ····································································································· 32
Configuring optional parameters for NTP··················································································································· 33
Specifying the source interface for NTP messages···························································································· 33

ii
Disabling an interface from receiving NTP messages······················································································· 33
Configuring the allowed maximum number of dynamic sessions···································································· 34
Configuring access-control rights ································································································································· 34
Configuration prerequisites ·································································································································· 34
Configuration procedure ······································································································································ 35
Configuring NTP authentication ··································································································································· 35
Configuring NTP authentication in client/server mode····················································································· 35
Configuring NTP authentication in symmetric peers mode··············································································· 36
Configuring NTP authentication in broadcast mode ························································································· 37
Configuring NTP authentication in multicast mode ··························································································· 38
Displaying and maintaining NTP ································································································································· 39
NTP configuration examples········································································································································· 40
NTP client/server mode configuration example ································································································ 40
NTP symmetric peers mode configuration example ·························································································· 41
NTP broadcast mode configuration example····································································································· 42
NTP multicast mode configuration example······································································································· 44
Configuration example for NTP client/server mode with authentication ························································ 46
Configuration example for NTP broadcast mode with authentication ···························································· 48
Configuration example for MPLS VPN time synchronization in client/server mode······································ 51
Configuration example for MPLS VPN time synchronization in symmetric peers mode································ 52
Configuring cluster management······························································································································54
Overview········································································································································································· 54
Roles in a cluster···················································································································································· 54
How a cluster works·············································································································································· 55
Configuration restrictions and guidelines ··········································································································· 58
Cluster management configuration task list················································································································· 58
Configuring the management device··························································································································· 59
Enabling NDP globally and for specific ports···································································································· 59
Configuring NDP parameters ······························································································································ 60
Enabling NTDP globally and for specific ports·································································································· 60
Configuring NTDP parameters····························································································································· 60
Manually collecting topology information ·········································································································· 61
Enabling the cluster function ································································································································ 61
Establishing a cluster············································································································································· 62
Enabling management VLAN autonegotiation··································································································· 62
Configuring communication between the management device and the member devices within a cluster · 63
Configuring cluster management protocol packets ··························································································· 63
Cluster member management ······························································································································ 64
Configuring the member devices·································································································································· 65
Enabling NDP ························································································································································ 65
Enabling NTDP ······················································································································································ 65
Manually collecting topology information ·········································································································· 65
Enabling the cluster function ································································································································ 65
Deleting a member device from a cluster ··········································································································· 65
Toggling between the CLIs of the management device and a member device······················································· 65
Adding a candidate device to a cluster ······················································································································ 66
Configuring advanced cluster functions ······················································································································ 66
Configuring topology management ···················································································································· 66
Configuring interaction for a cluster···················································································································· 67
Configuring the SNMP configuration synchronization function······································································· 68
Configuring Web user accounts in batches ······································································································· 68
Displaying and maintaining cluster management ······································································································ 69
Cluster management configuration example ·············································································································· 70

iii
Configuring CWMP (TR-069)····································································································································73
Overview········································································································································································· 73
CWMP network framework·································································································································· 73
Basic CWMP functions ········································································································································· 73
CWMP mechanism ··············································································································································· 75
CWMP configuration approaches ······························································································································· 76
Configuring ACS and CPE attributes through ACS ··························································································· 77
Configuring ACS and CPE attributes through DHCP························································································· 77
Configuring CWMP at the CLI····························································································································· 77
Enabling CWMP ···························································································································································· 78
Configuring ACS attributes ··········································································································································· 78
Configuring the ACS URL ····································································································································· 79
Configuring the ACS username and password ································································································· 79
Configuring CPE attributes············································································································································ 79
Configuring the CPE username and password ·································································································· 80
Configuring the CWMP connection interface ···································································································· 80
Sending Inform messages····································································································································· 80
Configuring the maximum number of attempts made to retry a connection··················································· 81
Configuring the close-wait timer of the CPE ······································································································· 81
Configuring the CPE working mode···················································································································· 82
Specifying an SSL client policy for HTTPS connection to ACS ········································································· 82
Displaying and maintaining CWMP···························································································································· 83
Configuring IP accounting·········································································································································84
Configuring IP accounting············································································································································· 84
Displaying and maintaining IP accounting·················································································································· 85
IP accounting configuration example··························································································································· 85
Network requirements··········································································································································· 85
Configuration procedure ······································································································································ 86
Configuring NetStream··············································································································································87
Overview········································································································································································· 87
NetStream basic concepts ············································································································································ 87
Flow ········································································································································································ 87
NetStream operation············································································································································· 87
NetStream key technologies ········································································································································· 88
Flow aging ····························································································································································· 88
NetStream data export ········································································································································· 88
NetStream export formats ···································································································································· 91
NetStream sampling and filtering ································································································································ 91
NetStream sampling·············································································································································· 91
NetStream filtering ················································································································································ 91
NetStream configuration task list·································································································································· 91
Enabling NetStream on an interface···························································································································· 92
Configuring NetStream filtering and sampling··········································································································· 93
Configuring NetStream filtering··························································································································· 93
Configuring NetStream sampling························································································································ 93
Configuring NetStream data export ···························································································································· 94
Configuring NetStream traditional data export································································································· 94
Configuring NetStream aggregation data export ····························································································· 94
Configuring attributes of NetStream export data ······································································································· 95
Configuring NetStream export format················································································································· 95
Configuring the refresh rate for NetStream version 9 templates······································································ 97
Configuring MPLS-aware NetStream ·················································································································· 97
Configuring NetStream flow aging······························································································································ 97

iv
Flow aging approaches········································································································································ 97
Configuration procedure ······································································································································ 98
Displaying and maintaining NetStream ······················································································································ 99
NetStream configuration examples······························································································································ 99
NetStream traditional data export configuration example ··············································································· 99
NetStream aggregation data export configuration example ·········································································100
Configuring NQA ··················································································································································· 102
Overview·······································································································································································102
Collaboration·······················································································································································102
Threshold monitoring ··········································································································································103
NQA configuration task list ········································································································································104
Configuring the NQA server ······································································································································104
Configuring the NQA client········································································································································105
Enabling the NQA client ····································································································································105
Configuring an ICMP echo operation···············································································································105
Configuring a DHCP operation ·························································································································106
Configuring a DNS operation ···························································································································107
Configuring an FTP operation····························································································································107
Configuring an HTTP operation·························································································································108
Configuring a UDP jitter operation····················································································································109
Configuring an SNMP operation·······················································································································111
Configuring a TCP operation·····························································································································111
Configuring a UDP echo operation···················································································································112
Configuring a voice operation···························································································································113
Configuring a DLSw operation ··························································································································115
Configuring optional parameters for an NQA operation···············································································116
Configuring the collaboration function ·············································································································117
Configuring threshold monitoring······················································································································117
Configuring the NQA statistics function ···········································································································120
Configuring NQA history records saving function ··························································································120
Scheduling an NQA operation··························································································································121
Displaying and maintaining NQA·····························································································································122
NQA configuration examples ····································································································································123
ICMP echo operation configuration example ··································································································123
DHCP operation configuration example···········································································································125
DNS operation configuration example·············································································································126
FTP operation configuration example ···············································································································127
HTTP operation configuration example·············································································································128
UDP jitter operation configuration example ·····································································································130
SNMP operation configuration example ··········································································································132
TCP operation configuration example ··············································································································133
UDP echo operation configuration example ····································································································135
Voice operation configuration example ···········································································································136
DLSw operation configuration example············································································································139
NQA collaboration configuration example······································································································140
Configuring IP traffic ordering ······························································································································· 143
Enabling IP traffic ordering ·········································································································································143
Setting the IP traffic ordering interval·························································································································143
Displaying and maintaining IP traffic ordering·········································································································143
IP traffic ordering configuration example··················································································································143
Configuring sFlow··················································································································································· 145
Configuring the sFlow agent and sFlow collector information················································································145
Configuring flow sampling··········································································································································146

v
Configuring counter sampling ····································································································································147
Displaying and maintaining sFlow·····························································································································147
sFlow configuration example······································································································································147
Troubleshooting sFlow configuration ·························································································································148
The remote sFlow collector cannot receive sFlow packets··············································································148
Configuring samplers·············································································································································· 150
Overview·······································································································································································150
Creating a sampler ······················································································································································150
Displaying and maintaining a sampler ·····················································································································150
Sampler configuration example ·································································································································151
Configuring PoE ······················································································································································ 153
Hardware compatibility···············································································································································153
Overview·······································································································································································153
PoE configuration task list ···········································································································································153
Enabling PoE ································································································································································154
Enabling PoE for a PSE·······································································································································154
Enabling PoE on a PoE interface ·······················································································································155
Detecting PDs································································································································································156
Enabling the PSE to detect nonstandard PDs ···································································································156
Configuring a PD disconnection detection mode ····························································································156
Configuring the PoE power·········································································································································156
Configuring the maximum PSE power ··············································································································156
Configuring the maximum PoE interface power ······························································································157
Configuring PoE power management························································································································157
Configuring PSE power management ···············································································································157
Configuring PoE interface power management ·······························································································158
Configuring the PoE monitoring function···················································································································159
Configuring PSE power monitoring···················································································································159
Monitoring PD······················································································································································159
Configuring a PoE interface by using a PoE profile·································································································159
Configuring a PoE profile···································································································································160
Applying a PoE profile········································································································································160
Upgrading PSE processing software in service ········································································································161
Displaying and maintaining PoE ································································································································161
PoE configuration example ·········································································································································162
Troubleshooting PoE ····················································································································································164
Failure to set the priority of a PoE interface to critical·····················································································164
Failure to apply a PoE profile to a PoE interface·····························································································164
Configuring port mirroring ····································································································································· 165
Overview·······································································································································································165
Terminologies of port mirroring ·························································································································165
Port mirroring classification and implementation·····························································································166
Configuring local port mirroring ································································································································166
Configuring local port mirroring by using the mirror-group command ·························································166
Creating a local mirroring group ······················································································································166
Configuring source ports for the local mirroring group ··················································································167
Configuring the monitor port for the local mirroring group············································································168
Configuring local port mirroring by using the mirror command ····································································168
Configuring remote port mirroring·····························································································································169
Displaying and maintaining port mirroring···············································································································169
Local port mirroring configuration example··············································································································169
Network requirements·········································································································································169
Configuration procedure ····································································································································170

vi
Verifying the configuration·································································································································170
Configuring traffic mirroring ·································································································································· 171
Overview·······································································································································································171
Traffic mirroring configuration task list ······················································································································171
Configuring traffic mirroring ·······································································································································171
Configuring match criteria ·································································································································171
Mirroring traffic to an interface ·························································································································172
Configuring a QoS policy ··································································································································172
Applying a QoS policy·······································································································································172
Displaying and maintaining traffic mirroring············································································································173
Traffic mirroring configuration example ····················································································································173
Network requirements·········································································································································173
Configuration procedure ····································································································································173
Verifying the configuration·································································································································175
Configuring the information center························································································································ 176
Overview·······································································································································································176
Classification of system information ··················································································································176
System information levels ···································································································································176
Output channels and destinations ·····················································································································177
Default output rules of system information ········································································································178
System information formats ································································································································179
FIPS compliance ···························································································································································181
Information center configuration task list···················································································································182
Outputting system information to the console ···········································································································182
Outputting system information to the monitor terminal ····························································································183
Outputting system information to a log host ·············································································································184
Outputting system information to the trap buffer ······································································································185
Outputting system information to the log buffer········································································································186
Outputting system information to the SNMP module ·······························································································186
Outputting system information to the Web interface································································································187
Saving system information to a log file······················································································································188
Managing security logs···············································································································································189
Saving security logs into the security log file····································································································190
Managing the security log file ···························································································································191
Enabling synchronous information output ·················································································································193
Disabling an interface from generating link up/down logging information ·························································194
Displaying and maintaining information center ·······································································································194
Information center configuration examples ···············································································································195
Outputting log information to the console ········································································································195
Outputting log information to a UNIX log host ································································································196
Outputting log information to a Linux log host·································································································197
Using ping, tracert, and system debugging·········································································································· 200
Ping················································································································································································200
Using a ping command to test network connectivity ·······················································································200
Ping example ·······················································································································································200
Tracert ···········································································································································································202
Prerequisites ·························································································································································203
Using a tracert command to identify failed or all nodes in a path································································204
System debugging ·······················································································································································204
Debugging information control switches···········································································································204
Debugging a feature module ·····························································································································205
Ping and tracert example ············································································································································206

vii
Configuring IPv6 NetStream ·································································································································· 208
Overview·······································································································································································208
IPv6 NetStream basic concepts ··································································································································208
IPv6 flow·······························································································································································208
IPv6 NetStream operation ··································································································································208
IPv6 NetStream key technologies·······························································································································209
Flow aging ···························································································································································209
IPv6 NetStream data export·······························································································································209
IPv6 NetStream export format····························································································································210
IPv6 NetStream configuration task list ·······················································································································211
Enabling IPv6 NetStream ············································································································································211
Configuring IPv6 NetStream data export··················································································································211
Configuring IPv6 NetStream traditional data export·······················································································211
Configuring IPv6 NetStream aggregation data export···················································································212
Configuring attributes of IPv6 NetStream data export·····························································································213
Configuring IPv6 NetStream export format ······································································································213
Configuring the refresh rate for IPv6 NetStream version 9 templates ···························································214
Configuring IPv6 NetStream flow aging ···················································································································214
Flow aging approaches······································································································································214
Configuration procedure ····································································································································215
Displaying and maintaining IPv6 NetStream············································································································216
IPv6 NetStream configuration examples ···················································································································216
IPv6 NetStream traditional data export configuration example·····································································216
IPv6 NetStream aggregation data export configuration example·································································217
Support and other resources ·································································································································· 219
Contacting HP ······························································································································································219
Subscription service ············································································································································219
Related information······················································································································································219
Documents····························································································································································219
Websites·······························································································································································219
Conventions ··································································································································································220
Index ········································································································································································ 222

1
Configuring SNMP
This chapter provides an overview of the Simple Network Management Protocol (SNMP) and guides you
through the configuration procedure.
Overview
SNMP is an Internet standard protocol widely used for a management station to access and operate the
devices on a network, regardless of their vendors, physical characteristics and interconnect technologies.
SNMP enables network administrators to read and set the variables on managed devices for state
monitoring, troubleshooting, statistics collection, and other management purposes.
SNMP framework
The SNMP framework comprises the following elements:
•SNMP manager—Works on an NMS to monitor and manage the SNMP-capable devices in the
network.
•SNMP agent—Works on a managed device to receive and handle requests from the NMS, and
sends traps to the NMS when some events, such as an interface state change, occur.
•Management Information Base (MIB)—Specifies the variables (for example, interface status and
CPU usage) maintained by the SNMP agent for the SNMP manager to read and set.
Figure 1 Relationship between an NMS, agent and MIB
MIB and view-based MIB access control
A MIB stores variables called "nodes" or "objects" in a tree hierarchy and identifies each node with a
unique OID. An OID is a string of numbers that describes the path from the root node to a leaf node. For
example, object B in Figure 2 is uniquely identified by the OID {1.2.1.1}.
Figure 2 MIB tree

2
A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege and
is identified by a view name. The MIB objects included in the MIB view are accessible while those
excluded from the MIB view are inaccessible.
A MIB view can have multiple view records each identified by a view-name oid-tree pair.
You control access to the MIB by assigning MIB views to SNMP groups or communities.
SNMP operations
SNMP provides the following basic operations:
•Get—The NMS retrieves SNMP object nodes in an agent MIB.
•Set—The NMS modifies the value of an object node in an agent MIB.
•Notifications—Includes traps and informs. SNMP agent sends traps or informs to report events to
the NMS. The difference between these two types of notification is that informs require
acknowledgement but traps do not. The device supports only traps.
SNMP protocol versions
HP supports SNMPv1, SNMPv2c, and SNMPv3. An NMS and an SNMP agent must use the same
SNMP version to communicate with each other.
•SNMPv1—Uses community names for authentication. To access an SNMP agent, an NMS must use
the same community name as set on the SNMP agent. If the community name used by the NMS is
different from that set on the agent, the NMS cannot establish an SNMP session to access the agent
or receive traps from the agent.
•SNMPv2c—Uses community names for authentication. SNMPv2c is compatible with SNMPv1, but
supports more operation modes, data types, and error codes.
•SNMPv3—Uses a user-based security model (USM) to secure SNMP communication. You can
configure authentication and privacy mechanisms to authenticate and encrypt SNMP packets for
integrity, authenticity, and confidentiality.
SNMP configuration task list
Task Remarks
Configuring SNMP basic parameters Required.
Configuring SNMP logging Optional.
Configuring SNMP traps Optional.
Configuring SNMP basic parameters
SNMPv3 differs from SNMPv1 and SNMPv2c in many ways. Their configuration procedures are
described in separate sections.
Configuring SNMPv3 basic parameters
Ste
p
Command
Remarks
1. Enter system view. system-view N/A

3
Ste
p
Command
Remarks
2. Enable the SNMP agent. snmp-agent
Optional.
By default, the SNMP agent is
disabled.
You can also enable the SNMP
agent by using any command that
begins with snmp-agent except for
the snmp-agent
calculate-password command.
3. Configure system information
for the SNMP agent.
snmp-agent sys-info { contact
sys-contact | location sys-location
| version { all | { v1 |v2c |
v3 }* } }
Optional.
The defaults are as follows:
•Contact—null.
•Location—null.
•Version—SNMPv3.
4. Configure the local engine ID. snmp-agent local-engineid
engineid
Optional.
The default local engine ID is the
company ID plus the device ID.
After you change the local engine
ID, the existing SNMPv3 users
become invalid, and you must
re-create the SNMPv3 users.
5. Create or update a MIB view.
snmp-agent mib-view { excluded |
included } view-name oid-tree
[ mask mask-value ]
Optional.
By default, the MIB view
ViewDefault is predefined and its
OID is 1.
Each view-name oid-tree pair
represents a view record. If you
specify the same record with
different MIB subtree masks
multiple times, the most recent
configuration takes effect. Except
for the four subtrees in the default
MIB view, you can create up to 16
unique MIB view records.
6. Configure an SNMPv3 group.
snmp-agent group v3 group-name
[authentication |privacy ]
[ read-view read-view ]
[ write-view write-view ]
[ notify-view notify-view ] [ acl
acl-number | acl ipv6
ipv6-acl-number ] *
By default, no SNMP group exists.
7. Convert a plaintext key to a
ciphertext (encrypted) key.
snmp-agent calculate-password
plain-password mode { 3desmd5 |
3dessha | md5 | sha }
{ local-engineid |
specified-engineid engineid }
Optional.

4
Ste
p
Command
Remarks
8. Add a user to the SNMPv3
group.
snmp-agent usm-user v3
user-name group-name [ [ cipher ]
authentication-mode { md5 | sha }
auth-password [ privacy-mode
{ 3des | aes128 | des56 }
priv-password ] ] [ acl acl-number |
acl ipv6 ipv6-acl-number ] *
N/A
9. Configure the maximum
SNMP packet size (in bytes)
that the SNMP agent can
handle.
snmp-agent packet max-size
byte-count
Optional.
By default, the SNMP agent can
receive and send SNMP packets
up to 1500 bytes.
Configuring SNMPv1 or SNMPv2c basic parameters
Ste
p
Command
Remarks
10. Enter system view. system-view N/A
11. Enable the SNMP
agent. snmp-agent
Optional.
By default, the SNMP agent is
disabled.
You can also enable the SNMP
agent service by using any
command that begins with
snmp-agent except for the
snmp-agent
calculate-password command.
12. Configure system
information for the
SNMP agent.
snmp-agent sys-info { contact sys-contact |
location sys-location | version { all |{ v1 |v2c
|v3 }* } }
The defaults are as follows:
•Contact—null.
•Location—null.
•Version—SNMPv3.
13. Configure the local
engine ID. snmp-agent local-engineid engineid
Optional.
The default local engine ID is
the company ID plus the device
ID.
14. Create or update a
MIB view.
snmp-agent mib-view { excluded |included }
view-name oid-tree [ mask mask-value ]
Optional.
By default, the MIB view
ViewDefault is predefined and
its OID is 1.
Each view-name oid-tree pair
represents a view record. If you
specify the same record with
different MIB subtree masks
multiple times, the most recent
configuration takes effect.
Except for the four subtrees in
the default MIB view, you can
create up to 16 unique MIB
view records.

5
Ste
p
Command
Remarks
15. Configure the SNMP
access right.
•(Method 1) Create an SNMP community:
snmp-agent community { read | write }
[ cipher ] community-name [ mib-view
view-name ] [ acl acl-number | acl ipv6
ipv6-acl-number ] *
•(Method 2) Create an SNMP group, and
add a user to the SNMP group:
a. snmp-agent group { v1 | v2c }
group-name [ read-view read-view ]
[ write-view write-view ] [ notify-view
notify-view ] [ acl acl-number | acl ipv6
ipv6-acl-number ] *
b. snmp-agent usm-user { v1 | v2c }
user-name group-name [ acl
acl-number | acl ipv6
ipv6-acl-number ] *
Use either method.
By default, no SNMP group
exists.
In method 2, the username is
equivalent to the community
name in method 1, and must be
the same as the community
name configured on the NMS.
16. Configure the
maximum size (in
bytes) of SNMP
packets for the
SNMP agent.
snmp-agent packet max-size byte-count
Optional.
By default, the SNMP agent can
receive and send SNMP
packets up to 1500 bytes.
Configuring SNMP logging
Disable SNMP logging in normal cases to prevent a large amount of SNMP logs from decreasing device
performance.
The SNMP logging function logs Get requests, Set requests, and Set responses, but does not log Get
responses.
•Get operation—The agent logs the IP address of the NMS, name of the accessed node, and node
OID.
•Set operation—The agent logs the NMS' IP address, name of accessed node, node OID, variable
value, and error code and index for the Set operation.
The SNMP module sends these logs to the information center as informational messages. You can
configure the information center to output these messages to certain destinations, for example, the
console and the log buffer. The total output size for the node field (MIB node name) and the value field
(value of the MIB node) in each log entry is 1024 bytes. If this limit is exceeded, the information center
truncates the data in the fields. For more information about the information center, see "Configuring the
information center."
To configure SNMP logging:
Ste
p
Command
Remarks
1. Enter system view. system-view N/A
2. Enable SNMP logging. snmp-agent log { all |
get-operation | set-operation }
By default, SNMP logging is
disabled.

6
Configuring SNMP traps
The SNMP agent sends traps to inform the NMS of important events, such as a reboot.
Traps include generic traps and vendor-specific traps. Available generic traps include authentication,
coldstart, linkdown, linkup and warmstart. All other traps are vendor-defined.
SNMP traps generated by a module are sent to the information center. You can configure the information
center to enable or disable outputting the traps from a module by severity and set output destinations. For
more information about the information center, see "Configuring the information center."
Enabling SNMP traps
Enable SNMP traps only if necessary. SNMP traps are memory-intensive and might affect device
performance.
To generate linkUp or linkDown traps when the link state of an interface changes, enable the linkUp or
linkDown trap function both globally by using the snmp-agent trap enable [ standard [ linkdown |
linkup ] * ] command and on the interface by using the enable snmp trap updown command.
After you enable a trap function for a module, whether the module generates traps also depends on the
configuration of the module. For more information, see the configuration guide for each module.
To enable traps:
Ste
p
Command
Remarks
1. Enter system view. system-view N/A
2. Enable traps
globally.
snmp-agent trap enable [ acfp [ client |policy |rule |
server ] | bfd | bgp | configuration | default-route |
flash | fr | isdn [ call-clear | call-setup | lapd-status ] |
mpls | ospf [ process-id ] [ ifauthfail | ifcfgerror |
ifrxbadpkt | ifstatechange | iftxretransmit |
lsdbapproachoverflow | lsdboverflow | maxagelsa |
nbrstatechange | originatelsa | vifcfgerror | virifauthfail
| virifrxbadpkt | virifstatechange |viriftxretransmit |
virnbrstatechange ] * | pim [ candidatebsrwinelection |
electedbsrlostelection | interfaceelection |
invalidjoinprune | invalidregister | neighborloss |
rpmappingchange ] * | posa | standard [authentication
|coldstart | linkdown | linkup |warmstart ] * | system
| voice dial | vrrp [ authfailure | newmaster ] | wlan ]
By default, the trap
function of the voice
module is disabled
and the trap functions
of all the other modules
are enabled.
3. Enter interface view. •interface interface-type interface-number
•controller { cpos | e1 | e3 | e-cpos | t1 | t3 } number
Use either command
depending on the
interface type.
4. Enable link state
traps. enable snmp trap updown
By default, the link
state traps are
enabled.

7
Configuring the SNMP agent to send traps to a host
The SNMP module buffers the traps received from a module in a trap queue. You can set the size of the
queue, the duration that the queue holds a trap, and trap target (destination) hosts, typically the NMS.
To successfully send traps, you must also perform the following tasks:
•Complete the basic SNMP settings and verify that they are the same as on the NMS. If SNMPv1 or
SNMPv2c is used, you must configure a community name. If SNMPv3 is used, you must configure
an SNMPv3 user and MIB view.
•Make sure the device and the NMS can reach each other.
To configure the SNMP agent to send traps to a host:
Ste
p
Command
Remarks
1. Enter system view. system-view N/A
2. Configure a target host.
snmp-agent target-host trap
address udp-domain { ip-address |
ipv6 ipv6-address } [ udp-port
port-number ][vpn-instance
vpn-instance-name ] params
securityname security-string [ v1 |
v2c | v3 [ authentication |
privacy ] ]
If the trap destination is a host. The
ip-address argument must be the IP
address of the host.
The vpn-instance keyword is
applicable in an IPv4 network.
3. Configure the source address
for traps.
snmp-agent trap source
interface-type { interface-number |
interface-number.subnumber }
Optional.
By default, SNMP chooses the IP
address of an interface to be the
source IP address of traps.
4. Extend the standard
linkUp/linkDown traps.
snmp-agent trap if-mib link
extended
Optional.
By default, standard
linkUp/linkDown traps are used.
Extended linkUp/linkDown traps
add interface description and
interface type to standard
linkUp/linkDown traps. If the NMS
does not support extended SNMP
messages, use standard
linkUp/linkDown traps.
5. Configure the trap queue size. snmp-agent trap queue-size size
Optional.
The default trap queue size is 100.
When the trap queue is full, the
oldest traps are automatically
deleted for new traps.
6. Configure the trap holding
time. snmp-agent trap life seconds
Optional.
The default setting is 120 seconds.
A trap is deleted when its holding
time expires.

8
Displaying and maintaining SNMP
Task Command
Remarks
Display SNMP agent system
information, including the contact,
physical location, and SNMP
version.
display snmp-agent sys-info [ contact | location
| version ]* [ |{ begin | exclude | include }
regular-expression ]
Available in any view.
Display SNMP agent statistics. display snmp-agent statistics [ |{ begin |
exclude | include } regular-expression ] Available in any view.
Display the local engine ID. display snmp-agent local-engineid [ |{ begin |
exclude | include } regular-expression ] Available in any view.
Display SNMP group information.
display snmp-agent group [ group-name ] [ |
{ begin | exclude | include }
regular-expression ]
Available in any view.
Display basic information about
the trap queue.
display snmp-agent trap queue [ |{ begin |
exclude | include } regular-expression ] Available in any view.
Display the modules that can send
traps and their trap status (enable
or disable).
display snmp-agent trap-list [ |{ begin |
exclude | include } regular-expression ] Available in any view.
Display SNMPv3 user information.
display snmp-agent usm-user [ engineid
engineid | username user-name | group
group-name ] * [ |{ begin | exclude | include }
regular-expression ]
Available in any view.
Display SNMPv1 or SNMPv2c
community information.
display snmp-agent community [ read | write ]
[ |{ begin | exclude | include }
regular-expression ]
Available in any view.
Display MIB view information.
display snmp-agent mib-view [ exclude |
include | viewname view-name ] [ |{ begin |
exclude | include } regular-expression ]
Available in any view.
SNMP configuration examples
This section gives examples of configuring SNMPv1 or SNMPv2c, SNMPv3, and SNMP logging.
SNMPv1/SNMPv2c configuration example
Network requirements
As shown in Figure 3, the NMS (1.1.1.2/24) uses SNMPv1 or SNMPv2c to manage the SNMP agent
(1.1.1.1/24), and the agent automatically sends traps to report events to the NMS.
Figure 3 Network diagram

9
Configuration procedure
1. Configure the SNMP agent:
# Configure the IP address of the agent, and make sure the agent and the NMS can reach each
other. (Details not shown.)
# Specify SNMPv1 and SNMPv2c, and create a read-only community public and a read and write
community private.
<Agent> system-view
[Agent] snmp-agent sys-info version v1 v2c
[Agent] snmp-agent community read public
[Agent] snmp-agent community write private
# Configure contact and physical location information for the agent.
[Agent] snmp-agent sys-info contact Mr.Wang-Tel:3306
[Agent] snmp-agent sys-info location telephone-closet,3rd-floor
# Enable SNMP traps, set the NMS at 1.1.1.2 as an SNMP trap destination, and use public as the
community name. (To make sure the NMS can receive traps, specify the same SNMP version in the
snmp-agent target-host command as is configured on the NMS.)
[Agent] snmp-agent trap enable
[Agent] snmp-agent target-host trap address udp-domain 1.1.1.2 params securityname
public v1
[Agent] quit
2. Configure the SNMP NMS:
# Configure the SNMP version for the NMS as v1 or v2c, create a read-only community and name
it public, and create a read and write community and name it private. For information about
configuring the NMS, see the NMS manual.
NOTE:
The SNMP settings on the agent and the NMS must match.
3. Verify the configuration:
# Try to get the count of sent traps from the agent. The attempt succeeds.
Send request to 1.1.1.1/161 ...
Protocol version: SNMPv1
Operation: Get
Request binding:
1: 1.3.6.1.2.1.11.29.0
Response binding:
1: Oid=snmpOutTraps.0 Syntax=CNTR32 Value=18
Get finished
# Use a wrong community name to get the value of a MIB node from the agent. You can see an
authentication failure trap on the NMS.
1.1.1.1/2934 V1 Trap = authenticationFailure
SNMP Version = V1
Community = public
Command = Trap
Enterprise = 1.3.6.1.4.1.43.1.16.4.3.50
GenericID = 4
SpecificID = 0

10
Time Stamp = 8:35:25.68
SNMPv3 configuration example
Network requirements
As shown in Figure 4, t h e N M S (1.1.1. 2 / 24 ) u s e s SN M P v 3 t o m o nitor and manage the interface status of
the agent (1.1.1.1/24), and the agent automatically sends traps to report events to the NMS.
The NMS and the agent perform authentication when they set up an SNMP session. The authentication
algorithm is MD5 and the authentication key is authkey. The NMS and the agent also encrypt the SNMP
packets between them by using the DES algorithm and the privacy key prikey.
Figure 4 Network diagram
Configuration procedure
1. Configure the agent:
# Configure the IP address of the agent and make sure the agent and the NMS can reach each
other. (Details not shown.)
# Assign the NMS read and write access to the objects under the snmp node (OID
1.3.6.1.2.1.11), and deny its access to any other MIB object.
<Agent> system-view
[Agent] undo snmp-agent mib-view ViewDefault
[Agent] snmp-agent mib-view included test snmp
[Agent] snmp-agent group v3 managev3group read-view test write-view test
# Set the username to managev3user, authentication algorithm to MD5, authentication key to
authkey, encryption algorithm to DES56, and privacy key to prikey.
[Agent] snmp-agent usm-user v3 managev3user managev3group authentication-mode md5
authkey privacy-mode des56 prikey
# Configure contact person and physical location information for the agent.
[Agent] snmp-agent sys-info contact Mr.Wang-Tel:3306
[Agent] snmp-agent sys-info location telephone-closet,3rd-floor
# Enable traps, specify the NMS at 1.1.1.2 as a trap destination, and set the username to
managev3user for the traps.
[Agent] snmp-agent trap enable
[Agent] snmp-agent target-host trap address udp-domain 1.1.1.2 params securityname
managev3user v3 privacy
2. Configure the SNMP NMS:
{Specify the SNMP version for the NMS as v3.
{Create two SNMP users: managev3user and public.
{Enable both authentication and privacy functions.
{Use MD5 for authentication and DES for encryption.
{Set the authentication key to authkey and the privacy key to prikey.

11
{Set the timeout time and maximum number of retries.
For information about configuring the NMS, see the NMS manual.
NOTE:
The SNMP settings on the agent and the NMS must match.
3. Verify the configuration:
# Try to get the count of sent traps from the agent. The get attempt succeeds.
Send request to 1.1.1.1/161 ...
Protocol version: SNMPv3
Operation: Get
Request binding:
1: 1.3.6.1.2.1.11.29.0
Response binding:
1: Oid=snmpOutTraps.0 Syntax=CNTR32 Value=18
Get finished
# Try to get the device name from the agent. The get attempt fails because the NMS has no access
right to the node.
Send request to 1.1.1.1/161 ...
Protocol version: SNMPv3
Operation: Get
Request binding:
1: 1.3.6.1.2.1.1.5.0
Response binding:
1: Oid=sysName.0 Syntax=noSuchObject Value=NULL
Get finished
# Execute the shutdown or undo shutdown command on an idle interface on the agent. You can
see the interface state change traps on the NMS:
1.1.1.1/3374 V3 Trap = linkdown
SNMP Version = V3
Community = managev3user
Command = Trap
1.1.1.1/3374 V3 Trap = linkup
SNMP Version = V3
Community = managev3user
Command = Trap
SNMP logging configuration example
Network requirements
C o n f i g u r e t h e S N M P a g e n t (1.1.1.1 / 2 4 ) i n Figure 5 to log the SNMP operations performed by the NMS.
Other manuals for MSR SERIES
14
Table of contents
Other HP Network Router manuals

HP
HP FlexNetwork MSR Series User manual

HP
HP MSR93x Series User manual

HP
HP Deskjet 812c Instruction Manual

HP
HP MSR SERIES User manual

HP
HP A8800 Series Installation manual

HP
HP FlexNetwork HSR6600 User manual

HP
HP A8800 Series User manual

HP
HP ProCurve Secure 7102dl Assembly instructions

HP
HP A-MSR Series User manual

HP
HP FlexNetwork HSR6800 User manual