Management

Transcription

Management
Management
Content
1
SNMP
6
NQA
2
NTP
7
AAA
3
HGMP
8
RMON
4
LLDP
9
Syslog
5
Ping&Tracert
10
For IPV6
1
1: SNMP
Introduction:
The Simple Network Management Protocol (SNMP) is a standard
network management protocol widely used on TCP/IP networks. It
uses a central computer (a network management station) that runs
network management software to manage network elements.
There are three SNMP versions:
SNMPv1 & SNMPv2c & and SNMPv3
(S97 support both depend on configuration. V3 is default.)
2
1: SNMP
Three components are used in SNMP device management:
NM station: sends various query packets to query managed devices and receives alarms from
these devices.(HUAWEI eSight, HP OpenView,IBM Tivoli,…)
Agent: is a network-management process on a managed device. An agent has the following
functions:
– Receives and parses query packets sent from the NM station.
– Reads or writes management variables based on the query type, and generates and sends
response packets to the NM station.
– Sends an alarm to the NM station when triggering conditions defined on each protocol
module corresponding to the alarm are met. For example, the system view is displayed or
closed, or the device is restarted.
Managed device: is managed by an NM station and generates and reports alarms to the NM
station.( Router, Switch Firewall,…)
3
1: SNMP
SNMP
structure
Schematic diagram of
SNMP operations
SNMP packets are encapsulated in UDP packets for transmission and the port used by the SNMP
protocol is 161 & 162
4
1: SNMP
SNMP operations
Operation
Function
GetRequest
Retrieves the value of a variable. The NM station sends the request to
a managed device to obtain the value of an object on the device.
GetNextRequest
Retrieves the value of the next variable. The NM station sends the
request to a managed device to obtain the status of the next object on
the device.
GetResponse
Responds to GetRequest, GetNextRequest, and SetRequest operations.
It is sent from the managed device to the NM station.
GetBulk
Is an NMS-to-agent request, equaling continuous GetNext operations.
SetRequest
Sets the value of a variable. The NM station sends the request to a
managed device to adjust the status of an object on the device.
Trap
Reports an event to the NM station.
5
1: SNMP
Description of features supported by SNMP(1)
Operation
Function
Access control
This function is used to restrict a user's device administration rights. It
gives specific users the rights to manage specified objects on devices and
therefore provides fine management.
Authentication
and encryption
Packets transmitted between the NM station and managed devices are
authenticated and encrypted. This prevents data packets from being
intercepted or modified, improving data sending security.
Error code
Error codes are used to identify particular faults. They help an
administrator quickly locate and rectify faults. The larger the variety of
error codes, the more greatly they help an administrator in device
management.
Trap
Traps are sent from managed devices to the NM station. These traps allow
an administrator to discover device faults immediately.
The managed devices do not require the acknowledgement from the NM
station after sending traps.
6
1: SNMP
Description of features supported by SNMP(2)
Operation
Inform
GetBulk
Function
Informs are sent from managed devices to the NM station.
The managed devices require the acknowledgement from the NM station
after sending informs. If a managed device does not receive an
acknowledgement after sending an inform, it will resend the inform to the NM
station and generate alarm logs. Even if the NM station restarts, it can still
synchronize the informs sent during the restart process.
If the device does not receive an acknowledgement from the NM station after
sending an inform, it will store the inform in its memory. In this regard, using
informs may consume lots of system resources.
GetBulk allows an administrator to perform Get-next operation in batches. In a
large-scale network, GetBulk reduces the administrator's workload and
improves management efficiency.
7
1: SNMP
Different SNMP versions' support for the features
Feature
Access control
SNMPv1
Community-namebased
access control
supported
SNMPv2c
SNMPv3
Community-namebased
access control
supported
User or user-group-based
access control supported
Authentication and
encryption
Not supported
Not supported
Supported, and the supported
authentication and encryption modes are
as follows:
Authentication mode:
 MD5
 SHA
Encryption mode: DES56
Error code
6 error codes
supported
16 error codes
supported
16 error codes
supported
Trap
Supported
Supported
Supported
Inform
Not supported
Supported
Not supported
GetBulk
Not supported
Supported
Supported
8
1: SNMP
Usage scenarios of different SNMP versions
Version
Usage Scenario
SNMPv1
This version is applicable to small-scale networks whose networking is simple and
security requirements are low or whose security and stability are good, such as campus
networks and small enterprise networks.
SNMPv2c
This version is applicable to medium and large-scale networks whose security
requirements are not strict or whose security is good (for example, VPNs) but whose
services are so busy that traffic congestion may occur.
Using informs can ensure that the messages sent from managed devices are received
by the NM station.
SNMPv3
This version is applicable to networks of various scales, especially the networks that
have strict requirements on security and can be managed only by authorized
administrators, such as the scenario where data between the NM station and managed
devices needs to be transmitted over a public network.
9
1: Configuring SNMP
Applicable Environment

SNMP needs to be deployed in a network to allow the NM station to manage network devices.

Pre-configuration Tasks

MP needs to be deployed in a network to allow the NM station to manage network devices.
Data Preparation
No.
Data
1
SNMP version, SNMP community name, destination address of alarm messages,
administrator's contact information and location, and SNMP packet size
2
(Optional) ACL number, IP address of the NM station, and MIB object
3
(Optional) Name of the alarm-sending module, source address of trap messages, queue
length for trap messages, and lifetime of trap messages
4
(Optional) Number of interfaces indexed by fixed numbers
10
1: How to configure SNMP(1)
1 Configuring Basic SNMP Functions
*SNMPv1*
Step1: [Quidway]snmp-agent
Step2: [Quidway]snmp-agent sys-info version v1
* By default, SNMPv3 is enabled. And now, the device supports both SNMPv1 and
SNMPv3 *
Step3: [Quidway]snmp-agent community { read | write } community-name
Step4: [Quidway]snmp-agent target-host trap address udp-domain ip-add
[Quidway]snmp-agent target-host trap ipv6 address udp-domain ip-add
11
1: How to configure SNMP(1)
1 Configuring Basic SNMP Functions
*SNMPv2c*
Step1: [Quidway]snmp-agent
Step2: [Quidway]snmp-agent sys-info version v2c
* By default, SNMPv3 is enabled. And now, the device supports both SNMPv2 and
SNMPv3 *
Step3: [Quidway]snmp-agent community { read | write } community-name
Step4: [Quidway]snmp-agent target-host trap address udp-domain ip-add
[Quidway]snmp-agent target-host trap ipv6 address udp-domain ip-add
12
1: How to configure SNMP(1)
1 Configuring Basic SNMP Functions
*SNMPv3*
Step1: [Quidway]snmp-agent
Step2: [Quidway]snmp-agent sys-info version v3
*optional*
* By default, SNMPv3 is enabled. So this step is optional.
Step3: [Quidway]snmp-agent group v3 group-name [ authentication | privacy ]
Step4: [Quidway]snmp-agent usm-user v3 user-name group-name
Step5: [Quidway]snmp-agent target-host trap address udp-domain ip-add
[Quidway]snmp-agent target-host trap ipv6 address udp-domain ip-add
13
1: How to configure SNMP(2)
2 (Optional) Controlling the NM Station's Access to the Device
Step1: [Quidway]acl acl-number
Step2: [Quidway]rule
Step3: [Quidway]snmp-agent mib-view { excluded | included } view-name oid-tree
Step4: [Quidway]snmp-agent community { read | write } { community-name |
cipher community-name }
14
1: How to configure SNMP(3)
3 (Optional) Enabling the SNMP Extended Error Code Function
Step1: [Quidway]snmp-agent extend error-code enable
*when both the NM station and managed device are Huawei products. After this
function is enabled, more types of error codes are provided to help you locate and
rectify faults more quickly and accurately.*
15
1: How to configure SNMP(4)
4 (Optional) Configuring the Trap Function
Step1: [Quidway]snmp-agent trap enable
Step2: [Quidway]snmp-agent trap enable feature-name feature-name
Step3: [Quidway]snmp-agent trap source interface-type interface-number
Step4: [Quidway]snmp-agent trap queue-size size
Step5: [Quidway]snmp-agent trap life seconds
16
1: How to configure SNMP(5)
5 (Optional) Configuring the Constant Interface Index Feature
Step1: [Quidway]ifindex constant
Step2: [Quidway]set constant-ifindex max-number number
Step3: [Quidway]set constant-ifindex subinterface { dense-mode | sparse-mode
}
17
1: SNMPv1-How to check

display snmp-agent community *check the configured community name.*

display snmp-agent sys-info version *check the enabled SNMP version*

display acl acl-number *check the rules in the specified ACL*

display snmp-agent mib-view *check the MIB view*

display snmp-agent sys-info contact *check the equipment administrator's contact information.*

display snmp-agent sys-info location *check the location of the device*

display snmp-agent target-host *check the information about the target host*

display snmp-agent extend error-code status *check whether the SNMP extended error code
feature is enabled*

display constant-ifindex configuration *check the constant interface index function and relevant
configuration information*
18
1: SNMPv2c-How to check

display snmp-agent community *check the configured community name.*

display snmp-agent sys-info version *check the enabled SNMP version*

display acl acl-number *check the rules in the specified ACL*

display snmp-agent mib-view *check the MIB view*

display snmp-agent sys-info contact *check the equipment administrator's contact information.*

display snmp-agent sys-info location *check the location of the device*

display snmp-agent target-host *check the information about the target host*

display snmp-agent inform * check inform parameters and device statistics with the NM station being specified or
not *

display snmp-agent notification-log info * check alarm logs stored in the log buffer. *

display snmp-agent extend error-code status * check whether the SNMP extended error code feature is enabled. *

display constant-ifindex configuration *check the constant interface index function and relevant configuration
information*
19
1: SNMPv3-How to check
How to check:

display snmp-agent usm-user
* check user information*

display snmp-agent sys-info version *check the enabled SNMP version*

display acl acl-number *check the rules in the specified ACL*

display snmp-agent mib-view *check the MIB view*

display snmp-agent sys-info contact *check the equipment administrator's contact information.*

display snmp-agent sys-info location *check the location of the device*

display snmp-agent target-host *check the information about the target host*

display snmp-agent extend error-code status *check whether the SNMP extended error code feature is enabled*

display constant-ifindex configuration *check the constant interface index function and relevant configuration
information*

display constant-ifindex configuration *check the constant interface index function and relevant configuration
information*
20
1: SNMPv1 Configuration
21
1: SNMPv2c Configuration
22
1: SNMPv3 Configuration
23
1: SNMP Recommanded parameters

Device: CPU,Memory

Interface: inbound & outbound traffic, frame, packet,
broadcast

Host: the IP & MAC address connect to interface
24
1: SNMP
Reference Document
Protocol
Specification
SNMP v1
RFC 1157
SNMP v2c
RFC1905,RFC1906,RFC1907
SNMP v3
RFC2571,RFC2572,RFC2573,RFC2574,
RFC2575
MIB
RFC1155,RFC2578:RFC2579:RFC2580
25
Content
1
SNMP
6
NQA
2
NTP
7
AAA
3
HGMP
8
RMON
4
LLDP
9
Syslog
5
Ping&Tracert
10
For IPV6
26
2: NTP
Introduction:

NTP(Network Time Protocol)

Aim: synchronizing clocks of all devices in a network. It keeps all the clocks
of these devices consistent, and enables devices to implement various
applications based on the uniform time.

NTP packets are encapsulated in UDP packets for transmission and the port
used by the NTP protocol is 123.
27
2: NTP-Application

Network management: Analysis on logs or debugging information collected from
different switches should be performed based on time.

Charging system: requires the clocks of all devices to be consistent.

Completing certain functions: For example, timing restart of all the switches in a
network requires the clocks of all the switches be consistent.

Several systems working together on the same complicate event: Systems
have to take the same clock for reference to ensure a proper sequence of
implementation.

Incremental backup between the backup server and clients: Clocks on the
backup server and clients should be synchronized.
28
2: NTP
Advantages :

Defining clock accuracy by means of stratum to synchronize the time of
network devices in a short time

Supporting access control and MD5 authentication

Transmitting packets in unicast, peer, multicast, or broadcast mode
29
2: NTP Working mode
Mode
Unicast
Server/Client
Mode
How To Work
the client can be synchronized to the server but the server cannot be
synchronized to the client.
Peer Mode
The symmetric active end and symmetric passive end can be
synchronized with each other. the clock with a lower stratum is
synchronized to the one with a higher stratum.
Broadcast Mode
The server periodically sends clock synchronization packets to the
255.255.255.255. The client exchanging messages with the remote
server and then synchronize the local clock.
Multicast Mode
The server periodically sends clock synchronization packets to the
multicast address 224.0.1.1, The client exchanging messages with the
remote server and then synchronize the local clock.
30
2: NTP Configuration(1)
Pre-configuration Tasks :

Configuring the link layer protocol for the interface

Configuring an IP address and a routing protocol for the interface to ensure
that NTP packets can reach destinations
Pre-configuration Tasks

Configuring the link layer protocol for the interface

Configuring an IP address and a routing protocol for the interface to ensure
that NTP packets can reach destinations
31
2: NTP Configuring Information Center
Data Preparation
No.
Data
1
Primary NTP clock and its stratum
2
Interfaces to send and receive NTP packets
3
NTP version
4
Preparing the data according to the operation mode
 Server/client mode: IP address of the server and the VPN instance that the server belongs to
 Peer mode: IP address of the symmetric passive end and the VPN instance that it belongs to
 Broadcast mode: interfaces to send and receive broadcast NTP packets and the maximum
sessions set up dynamically on the client
 Multicast mode: IP address of the multicast group, the TTL value of the multicast packets, the
interfaces to send and receive the multicast packets, and the maximum number of the session
dynamically set up on the client
5
Interface disabled from receiving NTP packets
32
2: How to configure NTP (1)
1 Configuring the NTP Primary Clock
Step1: [Quidway]ntp-service refclock-master [ ip-address ] [ stratum ]
2 Configuring the Mode
(Unicast Server/Client & Peer & Broadcast & Multicast)
3 Disabling the Interface From Receiving NTP Packets
4 (Optional) Setting the Maximum Number of Dynamic NTP Sessions
33
2: How to configure NTP (2)
1 Configuring the NTP Primary Clock
2 Configuring the Unicast Mode
Step1: [Quidway]ntp-service source-interface interface-type interface-number
Step2: [Quidway]ntp-service unicast-server ip-address
-----------------------------------------------------Client---------------------------------------------------Step3: [Quidway]ntp-service source-interface interface-type interface-number
-----------------------------------------------------Server---------------------------------------------------
3 Disabling the Interface From Receiving NTP Packets
4 (Optional) Setting the Maximum Number of Dynamic NTP Sessions
34
2: How to configure NTP (2)
1 Configuring the NTP Primary Clock
2 Configuring the Peer Mode
Step1: [Quidway]ntp-service source-interface interface-type interface-number
Step2: [Quidway]ntp-service unicast-peer ip-address
----------------------------------------- Symmetric Active End ----------------------------------------Step3: [Quidway]ntp-service source-interface interface-type interface-number
---------------------------------------- Symmetric Passive End-----------------------------------------
3 Disabling the Interface From Receiving NTP Packets
4 (Optional) Setting the Maximum Number of Dynamic NTP Sessions
35
2: How to configure NTP (2)
1 Configuring the NTP Primary Clock
2 Configuring the Broadcast Mode
Step1: [Quidway]vlan vlan-id
Step2: [Quidway]interface vlanif vlan-id
Step3: [Quidway] ntp-service broadcast-server
-------------------------------------------- Broadcast Server ----------------------------------------Step4: [Quidway]vlan vlan-id
Step5: [Quidway]interface vlanif vlan-id
Step6: [Quidway]ntp-service broadcast-client [ ip-address ]
--------------------------------------------- Broadcast Client------------------------------------------
3 Disabling the Interface From Receiving NTP Packets
4 (Optional) Setting the Maximum Number of Dynamic NTP Sessions
36
2: How to configure NTP (3)
1 Configuring the NTP Primary Clock
2 Configuring the Multicast Mode
3 Disabling the Interface From Receiving NTP Packets
Step1: [Quidway]vlan vlan-id
Step2: [Quidway]interface vlanif vlan-id
Step3: [Quidway]ntp-service in-interface disable
4 (Optional) Setting the Maximum Number of Dynamic NTP Sessions
37
2: How to configure NTP (4)
1 Configuring the NTP Primary Clock
2 Configuring the Multicast Mode
3 Disabling the Interface From Receiving NTP Packets
4 (Optional) Setting the Maximum Number of Dynamic NTP
Sessions
Step1: [Quidway]ntp-service max-dynamic-sessions number
38
2: NTP-How to check
39
2: NTP
Reference Information
Protocol
Specification
Basic protocol
RFC 1305
NTP Clock
Synchronization accuracy
NTP clock
synchronization time
LAN: 1ms
WAN: XXms
active synchronization of time <= 16s
passive synchronization of time <= 900s
The Version Contain 1—3
S9700 Support Version 3, Compatible version of 1 & 2
NTP Version support
40
Content
1
SNMP
6
NQA
2
NTP
7
AAA
3
HGMP
8
RMON
4
LLDP
9
Syslog
5
Ping&Tracert
10
For IPV6
41
3: HGMP-Introduction
The Huawei Group Management Protocol (HGMP) is developed to manage a group
of Ethernet switches. By running HGMP, you can appoint a switch as the
administrator in a cluster to perform integrated management and configurations
over other switches added to the cluster.
Aim: Simplifies management
Save IP addresses
42
3: HGMP Character
NDP
In HGMP, Neighbor Discovery Protocol
(NDP) packets are used to collect
information about the directly
connected neighbors, including the
device model, software version,
hardware version, connection
interface, member number, private IP
address used for communication
within a cluster, and hardware
platform.
43
NTDP
In HGMP, Network Topology
Discovery Protocol (NTDP) packets
are used to collect
information about topologies.
According to the neighbor
information in the NDP table, the
device sends and forwards
requests for topology collection,
and then collects entries in the
NDP table of each device in a
certain network segment.
3: HGMP-4 rules

administrator switch

member switch

candidate switch: is a device that has the cluster function but does not
join any cluster
44
3: HGMP-Rule transformation
candidate
switch
Specifies the
administrator
switches
Join the
cluster
Cancel the
Administrator
switch
Remove
from cluster
member
switch
administrator
switch
45
3: HGMP-Work processes
Request configuration
HGMP register(30s)
HGMP
Server
HGMP
Client
Registration successful
Registration process
HGMP
Server
Handshake message(2s)
State maintenance process
46
Configuration
Configuration successful
HGMP
Client
Restore Configure process
HGMP
Client
Handshake response
HGMP
Server
HGMP
Server
Configuration cmd
Configuration successful
Cmd issued process
HGMP
Client
3: HGMP-Basic cluster management

Establishment of a cluster management domain

Addition and deletion of a member

Status transition of a member

Communication in the cluster

Switchover between the administrator switch and the candidate switch

Display of the topology

Modification of the cluster management configuration

Automatic configuration of SNMP
* In HGMP, member switches in a cluster can communicate with devices in the public
network through Network Address Transmission (NAT).*
47
3: HGMP-Basic cluster management

Establishment of a cluster management domain

Addition and deletion of a member

Status transition of a member

Communication in the cluster

Switchover between the administrator switch and the candidate switch

Display of the topology

Modification of the cluster management configuration

Automatic configuration of SNMP
* In HGMP, member switches in a cluster can communicate with devices in the public
network through Network Address Transmission (NAT).*
48
3: HGMP-Advantage

Batch Distribution

Batch Restart

Incremental Configuration

Configuration Synchronization(to FTP Server)

Security Features

Plug and Play
49
3: HGMP-Configuration
Pre-configuration Tasks

Ensuring that the device is correctly powered on and operates normally

Configuring basic attributes of interfaces on the device
Data Preparation
No.
Data
1
Range of private IP addresses used in the cluster
2
Cluster name
3
Medium access control (MAC) address of the member switch
4
(Optional) Aging time of NDP packets and interval for sending NDP packets
5
(Optional) Range of topology collection, hop delay and interface delay in forwarding NTDP
topology request packets, interval for topology collection
6
(Optional) ID of the management VLAN, aging time of NDP packets, interval for sending
handshake packets, address of the SNMP host, and IP addresses of the FTP server and the SFTP
server
50
3: How to configure HGMP(1)
1 Configuring NDP & NTDP
Step1: [Quidway] ndp enable
Step2: [Quidway] ndp enable interface
Step3: [Quidway-if] ndp enable
Step4: [Quidway] ndp timer hello interval
Step5: [Quidway] ntdp enable
Step6: [Quidway-if] ntdp enable
2 Creating a Cluster
3 Adding a Member Switch
4 (Optional) Deleting or Quitting a Cluster
5 (Optional) Deleting a Member Switch
51
*optional*
3: How to configure HGMP(2)
2 Creating a Cluster
Step1:
Step2:
Step3:
Step4:
[Quidway]
[Quidway]
[Quidway]
[Quidway]
vlan vlan-id
interface vlanif vlan-id
cluster
mngvlanid vlan-id
------------------------------------Configuring a management VLAN--------------------------------Step1: [Quidway] cluster enable
----------------------------------------Enabling the cluster function------------------------------------
Step1: [Quidway] cluster
Step2: [Quidway] ip-pool
administrator-ip-address
Step3: [Quidway] build cluster-name
Manually create
Step1: [Quidway] cluster
Step2: [Quidway] ip-pool
administrator-ip-address
Step3: [Quidway] auto-build
Automatically create
-----------------------------------------------Creating a cluster------------------------------------------52
3: How to configure HGMP(3)
1 Configuring NDP & NTDP
2 Creating a Cluster
3 Adding a Member Switch
Step1: [Quidway] cluster
Step2: [Quidway] add-member
[ member-number ] mac-address
mac-address
Manually add
Step1: [Quidway] cluster
Step2: [Quidway] auto-build
[ recover ]
Automatically add
4 (Optional) Deleting or Quitting a Cluster
5 (Optional) Deleting a Member Switch
53
3: HGMP-check configuration

display cluster-increment-result

display cluster-license

display cluster-topology-info

display increment-command

display increment-synchronization-result

display member-getfile-state

display member-interface-state { ndp | ntdp }

display member-reboot-state

display member-save-state

display synchronization-result
54
3: HGMP-Configuration example
55
3: HGMP-Configuration example
56
Content
1
SNMP
6
NQA
2
NTP
7
AAA
3
HGMP
8
RMON
4
LLDP
9
Syslog
5
Ping&Tracert
10
For IPV6
57
4: LLDP
The Link Layer Discovery Protocol (LLDP) is a Layer 2 discovery
protocol defined in the IEEE 802.1ab standard
The Layer 2 discovery protocol precisely discovers the interfaces on
Each device and obtains connection information between devices. In
addition, it displays the paths between clients, switches, routers,
application servers, and network servers. The Layer 2 information
helps you:
quickly know the device topology, detect configuration conflicts
between devices, and locate network faults.
58
4: LLDP-Diagram
59
4: LLDP-Mib
LLDP Local System MIB
LLDP Remote System MIB
stores information about the local
stores information about neighbor
device, including the device ID, port
devices, including the device ID,
ID, system name, system description,
port ID, system name, system
port description, system capability,
description, port description,
and management address.
system capability,and management
address.
60
4: LLDP-Agent
manages LLDP operations for an interface

Maintains information in the LLDP local system MIB.

Obtains and sends LLDP local system MIB information to neighbor devices
when the status of the local device status changes. If the local device status
keeps unchanged, the LLDP agent also obtains and sends LLDP local system
MIB information to neighbor devices at intervals.

Identifies and processes received LLDP packets.

Maintains information in the LLDP remote system MIB.

Sends LLDP traps to the NMS when information in the LLDP local system MIB
or the LLDP remote system MIB changes.
61
4: LLDP-Packet format

DA: indicates the destination address of the LLDP packet. It is the multicast
address 01-80-C2-00-00-0E.


SA: indicates the bridge MAC address of the neighbor device.
LLDP Ethertype: indicates the LLDP packet type. If a packet contains this field, it
is an LLDP packet and it is sent to the LLDP module. The value of this field is
0x88CC.

LLDPDU: indicates the LLDP data unit. It is the major content of an LLDP packet.

FCS: indicates the Frame Check Sequence.
62
4: LLDP-Application
three types of networks:
The network where
an interface has
only one neighbor
an interface has
multiple neighbors
The network where
link aggregation is
configured
63
4: LLDP-Configuration
Pre-configuration Tasks

Configuring a reachable route between the switch and the NMS and setting the SNMP

Configuring an LLDP management address
Data Preparation
No.
Data
1
IP address to be set as the LLDP management address
2
(Optional) Interval for sending LLDP packets
3
(Optional) Delay to send LLDP packets
4
(Optional) Hold time multiplier of device information stored on neighbors
5
(Optional) Delay to re-enable the LLDP function on an interface
6
(Optional) Delay to send neighbor change traps to the NMS
64
4: LLDP-Configuration
Step1: [Quidway] lldp enable
Step3: Disabling LLDP on an Interface
* Optional*
Step4: Configuring an LLDP Management Address
* Optional*
Step5: Configuring the TLV in the LLDPDU
* Optional*
Step6: Configuring LLDP Timers
* Optional*
Step7: Enabling the LLDP Trap Function
* Optional*
Check : display lldp local
display lldp neighbor
display lldp neighbor brief
display lldp tlv-config
display lldp statistics
65
4: LLDP-Configuration example(1)
66
4: LLDP-Configuration example(2)
67
4: LLDP-Configuration example(3)
68
Content
1
SNMP
6
NQA
2
NTP
7
AAA
3
HGMP
8
RMON
4
LLDP
9
Syslog
5
Ping&Tracert
10
For IPV6
69
5: Ping
Principle of the ping operation
Format of ICMP Echo Request and Echo Reply messages
The ping command is used to check network connectivity and host reach ability.
Ping tests IP reach ability and status of the link between the source and the destination by checking
whether the destination sends back an ICMP Echo Reply message and measuring the interval
between sending the ICMP Echo Request message and receiving the ICMP Echo Reply message.
70
5: Tracert
Tracert (Trace Route), is used to check the IP addresses and the number of
gateways between the source and the destination. Tracert is helpful in testing
network reach ability And locating the fault on the network.
The S9700 implements tracert based on ICMP. Tracert records the gateways that
the ICMP message passes along the path between a source host and a
destination. In this manner, you can check network connectivity and locate the
fault.
71
5: Tracert & Ping Test

ping [ ip ] [ -a source-ip-address | -c count | -d | -f | -h ttl-value | -I
interface-type interface-number | -m time | -n | -p pattern | -q | -r | -s
packetsize | -t timeout | -tos tos-value | -v ] * host

tracert [ -a source-ip-address | -f first-ttl | -m max-ttl | -p port | -q nqueries | -w timeout
]* host
72
5: Ping ICMP Reference Document
ICMP
ICMPv6
(ICMPv3)
Name
Doc
ICMP Packet for error
RFC 792,RFC 950,RFC 1256
ICMP Packet for request
RFC 792,RFC 950,RFC 1256
ICMP Packet for redirect
RFC 792,RFC 950,RFC 1256
Network Management MIB
RFC 1213
Support ICMP Echo Message
RFC 2463
Process Neighbor Discovery
RFC 2463
Support IPv6 Redirect
RFC 2461
73
Content
1
SNMP
6
NQA
2
NTP
7
AAA
3
HGMP
8
RMON
4
LLDP
9
Syslog
5
Ping&Tracert
10
For IPV6
74
6: NQA-Introduction

NQA - Network Quality Analysis

NQA measures the performance of each protocol running on the network
and helps network operators collect network operation statistics, such as
the total HTTP delay, TCP connection delay, file transfer rate, FTP
connection delay, Domain Name System (DNS) resolution delay, and DNS
resolution error ratio. By collecting these statistics, network operators
provide users with network services of various grades.

NQA is an efficient tool for diagnosing and locating faults on a network.
75
6: NQA VS Ping
By sending an Internet Control Message Protocol
(ICMP) Echo-Request packet from the local and
expecting an ICMP Echo-Reply packet from the
specified destination, the Ping program can test
the round-trip time (RTT) of an ICMP packet.
In addition to testing the RRT of an ICMP
packet between the local and the
destination, NQA can detect whether
network services, such as TCP, UDP, FTP,
HTTP and the SNMP, are enabled and test
the response time of each service.
76
6: NQA-Between test instance & server
NQA test instance and NQA Client
NQA can be used to test many items. You must create a test instance
for each item and each of these test instances is a type of NQA test.
You need to create NQA test instances on NQA clients. Each test
instance has an administrator name and an operation tag as unique
identification.
NQA Server
In most types of tests, you need to configure only the NQA clients. In
TCP, UDP, and Jitter tests, however, you must configure the NQA server.
An NQA server processes the test packets received from the clients.
the NQA server responds to the test request packet received from the
client through the monitoring function.
77
6: NQA-How to work

In most types of tests, you need to configure only the NQA clients. In TCP,
UDP, and Jitter tests, however, you must configure the NQA server.

An NQA server processes the test packets received from the clients. the
NQA server responds to the test request packet received from the client
through the monitoring function.
78
6: NQA-Configure instance(ICMP)
Pre-configuration Tasks

Before configuring the ICMP test, configure reachable routes between the NQA
client and the tested device.
Data Preparation
No.
Data
1
Administrator name and test name of the NQA test
2
Destination IP address
3
(Optional) Virtual Private Network (VPN) instance name, source interface that
sends test packets, source IP address, size of the Echo-Request packets, TTL value,
ToS, padding character, interval for sending test packets, and percentage of the
failed NQA tests
4
Start mode and end mode
79
6: NQA-Configure instance(ICMP)
Step1: [Quidway]
Step2: [Quidway]
Step3: [Quidway]
Step4: [Quidway]
Step5: [Quidway]
nqa test-instance admin-name test-name
test-type icmp
destination-address ipv4 ip-address
Perform the other ICMP test parameters
start * Select the mode *
How To Check:
display nqa result
80
* Optional*
6: NQA-Configuration example(ICMP)
81
6: NQA-Configuration example(ICMP)
82
6: NQA-Configuration example(ICMP)
NQA Client Support:

TCP/UDP test

HTTP test

ICMP test

Trace test

SNMP test

DNS test

UDP jitter test

LSP Ping test

LSP Ping jitter test

LSP Trace test

FTP test

NQA Multicast Ping test
83
Content
1
SNMP
6
NQA
2
NTP
7
AAA
3
HGMP
8
RMON
4
LLDP
9
Syslog
5
Ping&Tracert
10
For IPV6
84
7: AAA-Introduction
Authentication: determines the users who can access the
network
Authorization: authorizes the users who can use certain
services
Accounting: records the usage of network resources.
Performing AAA for
access users
* On the S9700, AAA is mainly
used to authenticate and
authorize the users who log in to
the S9700 for system
configuration. does not support
accounting *
85
7: AAA-Authentication
The S9700 provides authentication schemes in the following modes:

Non-authentication: In this mode, the S9700 does not authenticate user validity
when users are trusted. This mode is not adopted in other scenarios.

Local authentication: In this mode, user information such as user names,
passwords, and other attributes is configured on theS9700. The S9700
authenticates users according to the information. In local authentication mode, the
processing speed is fast, but the capacity of information storage is restricted by
the hardware.

Remote authentication: In this mode, user information such as user names,
passwords, and other attributes is configured on an authentication server. The
S9700 functions as the client to communicate with the authentication server
through the RADIUS or HWTACACS protocol.
86
7: AAA-Authorization
The S9700 provides authorization schemes in the following modes :

Non-authorization: completely trusts users and directly authorizes them.

Local authorization: authorizes users according to the configured attributes of
local user accounts on the S9700.

Remote authorization: the S9700 functions as the client to communicate with the
authorization server through HWTACACS.

If-authenticated authorization: authorizes users after the users pass
authentication in local or remote authentication mode.
87
7: AAA-Accounting
The S9700 provides the following accounting modes:

None: Users are not charged.

RADIUS accounting: The S9700 sends the accounting packets to the RADIUS
server. Then the RADIUS server performs accounting.

HWTACACS accounting: The S9700 sends the accounting packets to the
HWTACACS server. Then the HWTACACS server performs accounting.
88
7: Configuring AAA
Applicable Environment
AAA schemes of the S9700 consists of the authentication scheme, authorization scheme, accounting

scheme, and recording scheme
Pre-configuration Tasks
None

Data Preparation
No.
Data
1
Name of the authentication scheme and authentication mode
2
Name of the authorization scheme, authorization mode, (optional) user level in command-line-based
authorization mode on the HWTACACS server, and (optional) timeout interval for command-line-based
authorization
3
Name of the accounting scheme and accounting mode
4
(Optional) Name of the recording scheme, name of the HWTACACS server template associated with the
recording scheme, and recording policy used to record events
89
7: How to configure AAA(1)
1 Configuring an Authentication Scheme
Step1: [Quidway]aaa
Step2: [Quidway]authentication-scheme authentication-scheme-name
Step3: [Quidway]authentication-mode { hwtacacs | radius | local }*[ none ]
Step4: [Quidway]authentication-super { hwtacacs | super }* [ none ]
[Quidway]authentication-super none
2 Configuring an Authorization Scheme
3 Configuring an Accounting Scheme
4 Configuring a Recording Scheme
90
7: How to configure AAA(2)
1 Configuring an Authentication Scheme
2 Configuring an Authorization Scheme
Step1: [Quidway]aaa
Step2: [Quidway]authorization-scheme authorization-scheme-name
Step3: [Quidway]authorization-mode [ hwtacacs ] { if-authenticated | local | none }
Step4: authorization-cmd privilege-level hwtacacs [ local ]
3 Configuring an Accounting Scheme
4 Configuring a Recording Scheme
91
*optional*
7: How to configure AAA(3)
1 Configuring an Authentication Scheme
2 Configuring an Authorization Scheme
3 Configuring an Accounting Scheme
Step1: [Quidway]aaa
Step2: [Quidway]accounting-scheme accounting-scheme-name
Step3: [Quidway]accounting-mode { hwtacacs | radius | none }
Step4: [Quidway]accounting realtime interval
*optional*
Step5: [Quidway]accounting start-fail { online | offline }
*optional*
Step6: [Quidway]accounting interim-fail [ max-times times ] { online | offline }
4 Configuring a Recording Scheme
92
*optional*
7: How to configure AAA(4)
1 Configuring an Authentication Scheme
2 Configuring an Authorization Scheme
3 Configuring an Accounting Scheme
4 Configuring a Recording Scheme
Step1: [Quidway]hwtacacs-server template
Step2: [Quidway]aaa
Step3: [Quidway]recording-scheme recording-scheme-name
Step4: [Quidway]recording-mode hwtacacs template-name
Step5: [Quidway]cmd recording-scheme recording-scheme-name
Step6: [Quidway]outbound recording-scheme recording-scheme-name
Step7: [Quidway]system recording-scheme recording-scheme-name
93
7: AAA-Radius Introduction
In remote authentication and remote authorization, the S9700 serves as
The RADIUS client and transfers information about authentication and
authorization of the user to the RADIUS server.
The RADIUS protocol defines the mode of transferring user information
between the RADIUS client and the RADIUS server. The messages
exchanged between the RADIUS client and the RADIUS server are
encrypted before being sent.
94
7: AAA-Configuring RADIUS
Applicable Environment

In remote authentication or authorization mode, you need to configure a server template as
required. You need to configure a RADIUS server template if RADIUS is used in the
authentication scheme.
Pre-configuration Tasks

None
Data Preparation:
No.
Data
1
IP address of the RADIUS authentication server
2
IP address of the RADIUS accounting server
3
(Optional) Shared key of the RADIUS server
4
(Optional) User name format supported by the RADIUS server
5
(Optional) Traffic unit of the RADIUS server
6
(Optional) Timeout interval for a RADIUS server to send response packets and
number of times for retransmitting request packets on a RADIUS server
7
(Optional) Format of the NAS port attribute of the RADIUS server
95
7: AAA-Configuring RADIUS
Step1: [Quidway]radius-server template template-name
Step2: [Quidway]radius-server authentication ip-address port (secondary)
Step3: [Quidway]radius-server accounting ip-address port (secondary)
Step4: [Quidway]radius-server authorization ip-address
-----------------------------------------------following optional-------------------------------------------Step5: [Quidway]radius-server shared-key [ cipher | simple ] key-string *default is huawei*
Step6: [Quidway]radius-server user-name domain-included
Step7: [Quidway]radius-server traffic-unit { byte | kbyte | mbyte | gbyte }
Step8: [Quidway]radius-server timeout timeout
Step9: [Quidway]radius-server retransmit retry-times
Step10: [Quidway]radius-server nas-port-format { new | old } radius-server nas-port-id-format {
new | old }
* For Ethernet access users or ADSL access users *
96
7: AAA-How to check RADIUS
display radius-server configuration
97
7: HWTACACS-Introduction
HWTACACS is a security protocol and an extension of TACACS defined in RFC1492. The process of
transmitting HWTACACS messages is similar to that of transmitting RADIUS messages. The
difference is that the HWTACACS server sends an authentication acknowledgement packet rather
than the user authority after the user passes authentication. The user authority is returned only after
the authorization process is complete. HWTACACS authorizes users using the command line.
(1) Process of command-line-based
(2) Process of upgrading the HWTACACS
authorization supported by HWTACACS
user level
98
7: RADIUS VS HWTACACS
99
7: Configure HWTACACS
Applicable Environment

In remote authentication or authorization mode, you need to configure a server template as
required. You need to configure an HWTACACS server template if HWTACACS is used in an
authentication or an authorization scheme.
Pre-configuration Tasks ------ None
Data Preparation
No.
Data
1
Name of the HWTACACS server template
2
IP addresses of HWTACACS AAA servers
3
(Optional) Source IP address of the HWTACACS server
4
(Optional) Shared key of the HWTACACS server
5
(Optional) User name format supported by the HWTACACS server
6
(Optional) Traffic unit of the HWTACACS server
7
(Optional) Timeout interval for the HWTACACS server to send response packets and time when the
primary HWTACACS server is restored to the active state
100
7: AAA-How to check HWTACACS
display hwtacacs-server template huawei
101
7: RADIUS-Configuration example(1)
102
7: RADIUS-Configuration example(2)
103
7: HWTACACS-Configuration example(1)
104
7: HWTACACS-Configuration example(2)
105
7: AAA-References
Description
Document
Generic AAA Architecture
RFC 2093
AAA Authorization Framework
RFC 2094
AAA Authorization Application Examples
RFC 2095
AAA Authorization Requirements
RFC 2096
Remote Authentication Dial In User Service (RADIUS)
RFC 2058, RFC 2138, RFC 2865
RADIUS Accounting
RFC 2059, RFC 2139, RFC 2866
RADIUS Extensions
RFC 2869
TACACS user identification Telnet option
RFC 0927
An Access Control Protocol, Sometimes Called TACACS
RFC 1492
106
Content
1
SNMP
6
NQA
2
NTP
7
AAA
3
HGMP
8
RMON
4
LLDP
9
Syslog
5
Ping&Tracert
10
For IPV6
107
8: RMON
RMON(Remote Network Monitoring),is a protocol to monitor the
Ethernet interface ,it is implemented based on the SNMP
There are two concepts involved in RMON, namely, the Network
Management Workstation (NM Station) and the agent. A RMON agent
collects statistics of various traffic in a network.
Compared with SNMP, RMON monitors remote network devices more
efficiently and actively. It provides an efficient solution to monitor the
running of sub-networks, which reduces the communication traffic
between the NM Station and the agent. Large-sized networks can thus
be managed in a simple and effective manner.
108
8: RMON
RMON allows multiple monitors. It collects data in the following ways:

Use a dedicated RMON Probe. This ensures that the NM Station can obtain
overall information on the RMON MIB.

Embed a RMON agent into a network device (a switch for example) to enable the
device to be of the RMON Probe capability. the NM Station collects only
information on four groups (alarm, event, history, and statistics) and not the
complete information on the RMON MIB.
*Currently, the S9700 implements the monitoring and statistics collection function
only on the Ethernet interfaces of network devices.*
109
8: RMON
RMON MIB Includes 9 groups of data (RFC2819)
No.
Group
Function
1
Hosts group
2
Hosts TopN group
3
Matrix group
4
Filter group
5
Capture group
6
Statistic group
Collect the basic statistics of each monitored subnetwork
7
History group
Collects the network state statistics and stores them for
future reference
8
Alarm group
The alarms are re-generated if the smapling value turns
to the noraml threshold.
9
Event group
stores all the events generated by the RMON agent in a
table
10
Performance-MIB
HUAWEI private
110
}
S9700
Support
8: Configuring RMON
Pre-configuration Tasks
Before configuring the ICMP test, configure reachable routes between the NQA client and

the tested device.
Data Preparation
No.
Data
1
Administrator name and test name of the NQA test
2
Destination IP address
3
(Optional) Virtual Private Network (VPN) instance name, source interface that sends
test packets, source IP address, size of the Echo-Request packets, TTL value, ToS,
padding character, interval for sending test packets, and percentage of the failed
NQA tests
4
Start mode and end mode
111
8: Configuring RMON
Applicable Environment

To monitor network status and collect traffic statistics on a network segment, you can
configure RMON
Pre-configuration Tasks

Configuring parameters for Ethernet interfaces

Configuring basic SNMP functions
Data Preparation
No.
Data
1
Interface on which the statistics function is enabled
2
Statistics table to be used and related parameters
3
HistoryControl table to be used and related parameters
4
Event table to be used and related parameters
5
Alarm table to be used and related parameters
6
Prialarm table to be used and related parameters
112
8: Configuring RMON
Procedure:
Step1: [Quidway]snmp-agent trap enable
Step2: [Quidway]snmp-agent target-host trap address udp-domain ip-address params
securityname public
--------------------------------------------------------------------------------------------------------Enable SNMP
Step3: [Switch-if] rmon-statistics enable
--------------------------------------------------------------------------------------------------------Enable RMON
Step4: rmon statistics entry-number [ owner owner-name]
Step5: rmon history entry-number buckets number interval sampling-interval
Step6: rmon event entry-number
Step7: rmon alarm entry-number alarm-OID sampling-time
Step8: rmon prialarm entry-number prialarm-formula description-string samplinginterval
------------------------------------------------------------------------------------------------------Config 5 Groups
113
8: How to check RMON(1)

display rmon statistics

display rmon history
114
8: How to check RMON(2)

display rmon event

display rmon eventlog
115
8: How to check RMON(3)

display rmon alarm

display rmon prialarm
116
8: RMON2 VS RMON
RMON2 is one of the RMON MIB standards. It
OSI
Monitor By
functions as a supplement to RMON and add some
new groups. RMON monitors the traffic only at the
7
MAC layer whereas RMON2 can monitor the traffic at
6
the MAC layer and above it. RMON2 provides the
5
following functions:

Monitors the traffic based on the network layer
RMON2
4
protocols and addresses, including the IP protocol

Records the incoming and outgoing traffic to and from a
3
specific application because it is capable of decoding
2
and monitoring the traffic of applications, such as email,
FTP, and WWW.
117
1
RMON
8: RMON2
RMON2 MIB Includes 9 groups of data
No.
Group
Function
1
Protocol
Directory
It is a simple and interoperable way for an RMON2 application to establish
which protocols a particular RMON2 agent implements. This is especially
important when the application and the agent are from different vendors
2
Network
Layer host
Network host (IP layer) statistics
3
Address mapping
4
Protocol Distribution
5
Network layer matrix
6
Application layer host
7
Application layer matrix
8
User history
9
Probe configuration
118
8: Configuring RMON2
Applicable Environment

By configuring RMON2, you can monitor the traffic on an Ethernet interface that connects to the
network, analyze the hosts the data on the interface comes from and goes to, and collect
statistics of the data passing through the interface from each host on the network.
Pre-configuration Tasks

Configuring parameters for Ethernet interfaces
Data Preparation
No.
1
2
Data
Values of the hlHostControlDataSource and hlHostControlStatus in the
hlHostControlTable
Values of the protocolDirDescr and protocolDirHostConfig in the
protocolDirTable
119
8: Configuring & check RMON2(1)
Procedure:
Step1: [Quidway]rmon2 hlhostcontroltable index ctrl-index
How to check:
<Quidway>display rmon2
hlhostcontroltable
<Quidway>display rmon2
nlhosttable
120
8: Configuring & check RMON2(2)
Procedure:
Step2: rmon2 protocoldirtable protocoldirid protocol-id parameter parameter-value
How to check:
<Quidway>display rmon2 protocoldirtable
121
Content
1
SNMP
6
NQA
2
NTP
7
AAA
3
HGMP
8
RMON
4
LLDP
9
Syslog
5
Ping&Tracert
10
For IPV6
122
9: Syslog
Introduction of Information Center
The information center works as the information hub of the S9700. By classifying and
filtering output information, the information center helps the network administrator and
developers to monitor the network operation and analyze the network fault.
The information center receives and processes the following information types:

Log information

Debugging information

Trap information or alarm information
123
9: Syslog
Functions of the information center
*The information center supports ten channels, among which Channel 0 to Channel
5 have their default channel names. By default, the six information channels are
respectively related to six output directions.*
124
9: Introduce Syslog

when equipment running, Log in host software will record the state of host, it is log
information

Log information is mainly used for viewing operational status of
devices, analysis of network status and orientation of reason, to provide the basis for
diagnosis and maintenance of the system.

1.
2.
The log information is stored in the Cache of host,we can use it in following ways:
Through console&telnet login the host, display logbuffer(CMD)
Send the log information from the host to Syslog Server through syslog protocol
125
9: Syslog


The format of log information:
timestamp
“Mmm dd hh:mm:ss yyyy”
Hostname
Default “Quidway”
Huawei ID
“%%” is HUAWEI company identifier
Version
“dd” Identifies the version of the log format,start from “01”
Module name
Indicates that a log is generated by the module
Severity
Log level is divided into 8 levels, from 0~7
Brief
represents the contents of the information summary
Log Flag
“(1)” Used to identify the information to log information
Description
describes in detail the specific contents of the log
* The syslog protocol use the UDP port 514
126
9: Syslog
Information has eight severity levels
Log level
Define
Description
0
Emergency
System is unusable.
1
Alert
Action must be taken immediately.
2
Critical
Critical conditions.
3
Errors
Error conditions.
4
Warnings
Warning conditions.
5
Notifications
Normal but significant condition.
6
Informational
Informational messages.
7*When the information
Debug
is filteredDebug-level
based on itsmessages.
severity level, only the information
whose severity level threshold is lower than or equal to the configured threshold, is
output.*
127
9: Configuring Information Center
Applicable Environment

To collect debugging, log, or trap information during the running of the S9700, and to output the
information to the terminal for display or to the buffer or host for storage, you need configure the
information center.
Pre-configuration Tasks

None
Data Preparation
No.
Data
1
(Optional) Numbers and names of information channels
2
(Optional) Format of the timestamp
3
(Optional) Severity level
4
(Optional) Language used in log information and the address of the
log host
5
(Optional) Size of the log buffer and the trap buffer
128
9: Configuring Information Center
Procedure:
Step1: [Quidway]info-center enable
---------------------------------------------------------------------------------------------Enable the info center
Step2: [Quidway]info-center channel channel-number name channel-name
--------------------------------------------------------------((Optional))Naming the information channel
Step3: [Switch-if] info-center source { module-name | default } channel
--------------------------------------------------------------Add information to the information channel
Step4: info-center timestamp { { debugging | trap } { boot | date | none | short-date } | { log | { boot |
date | format-date | none | short-date } }
-----------------------------------------------------------------(Optional) Setting the Timestamp Format
129
9: Configuring Information Output Modes
Applicable Environment

After the information center is configured, to output log information, trap information, and
debugging information to the terminal for display or to the buffer or host for storage, you need
configure the information output mode of the information center.
Pre-configuration Tasks

None
Data Preparation
No.
Data
1
(Optional) Numbers and names of information channels
2
(Optional) Language used in log information and the address of the log host
3
(Optional) Size of the log buffer and the trap buffer
130
9: How to configure output modes
1 outputting Information to the console
Step1: [Quidway]info-center console channel
Step2: <Switch> terminal monitor
Step3: <Switch> terminal { debugging | logging | trapping }
2 outputting Information to the Telnet terminal
3 outputting Information to the SNMP Agent
4 outputting Information to the Log Buffer
5 outputting Information to the Trap Buffer
6 outputting Information to the Log Host
131
9: How to configure output modes
1 outputting Information to the console
2 outputting Information to the Telnet terminal
Step1: [Quidway]info-center monitor channel { channel-number | channel-name }
Step2: <Switch> terminal monitor
Step3: <Switch> terminal { debugging | logging | trapping }
3 outputting Information to the SNMP Agent
4 outputting Information to the Log Buffer
5 outputting Information to the Trap Buffer
6 outputting Information to the Log Host
132
9: How to configure output modes
1 outputting Information to the console
2 outputting Information to the Telnet terminal
3 outputting Information to the SNMP Agent
Step1: [Quidway]info-center snmp channel
Step2: [Quidway]snmp-agent
4 outputting Information to the Log Buffer
5 outputting Information to the Trap Buffer
6 outputting Information to the Log Host
133
9: How to configure output modes
1 outputting Information to the console
2 outputting Information to the Telnet terminal
3 outputting Information to the SNMP Agent
4 outputting Information to the Log Buffer
Step1: [Quidway]info-center logbuffer [ channel { channel-number | channel-name } | size buffersize ]
5 outputting Information to the Trap Buffer
6 outputting Information to the Log Host
134
9: How to configure output modes
1 outputting Information to the console
2 outputting Information to the Telnet terminal
3 outputting Information to the SNMP Agent
4 outputting Information to the Log Buffer
5 outputting Information to the Trap Buffer
Step1: [Quidway]info-center trapbuffer [ channel { channel-number | channel-name } | size
buffer-size ]
6 outputting Information to the Log Host
135
9: How to configure output modes
1 outputting Information to the console
2 outputting Information to the Telnet terminal
3 outputting Information to the SNMP Agent
4 outputting Information to the Log Buffer
5 outputting Information to the Trap Buffer
6 outputting Information to the Log Host
Step1: [Quidway]info-center loghost ip-address [ channel { channel-number | channel-name } |
facility local-number | language { chinese | english } ]
Step2: [Quidway]info-center loghost source interface-type interface-number
136
9: Check output modes
How to check:
<Quidway> display info-center statistics
137
9: Example for Outputting Logs to the Log File
138
9: Example for Outputting Logs to Log Hosts
139
9: Example for Outputting Logs to Log Hosts
140
9: Example for Outputting Alarms to the SNMP Agent
141
Content
1
SNMP
6
NQA
2
NTP
7
AAA
3
HGMP
8
RMON
4
LLDP
9
Syslog
5
Ping&Tracert
10
For IPV6
142
10: Why IPV6
IPV4’s deficiencies:
1、IPV4 address space is deficient;
2、The routing table entry number maintained by backbone routers is too large;
3、It is not easy to configure automatically and re-addressing;
4、Can not solve the increasingly prominent security issues.
IPV6’s advantages:
1、Use 128 bit address structure which can provide sufficient address space;
2、Hierarchical network structure to improve routing efficiency;
3、IPV6 packet head is succinct, flexible, more efficiently and expansively;
4、Support auto configuration, plug-and-play;
5、Support end to end security;
6、Support mobile feature;
7、Support flow label feature which is more conducive to support QoS.
143
10: Management feature for IPV6
HUAWEI SX7 series switches support management feature for IPV6, such as:
No.
Feature
1
SNMP for IPV6
2
SSH for IPV6
3
IPV6 MIB
4
Ping6
5
Tracert6
6
FTP for IPV6
7
TFTP for IPV6
8
Telnet for IPV6
144
10: SX7 series support SNMP for IPV6
SNMP for IPV6 consists of the following functions:
Function
Description
Read SNMP packet
Read and dispose the SNMP packets based on IPV4 and IPV6 at
the same time. The two kind of packets work independently of
each others. So our switches can run at the all IPV6 environment or
IPV6 and IPV4 mix environment.
Send IPV6 based trap
Provide command line to configure NM host based on IPV6 to
make the trap can be sent to this NM host based on IPV6 protocol.
Track or record the
SNMP IPV6 packets
Do not provide additional command line to configure SNMP IPV6
packet track. The SNMP IPV6 and SNMP IPV4 use the same
command and the displays adjust the protocol automatically.
Command line for configuring the IPV6 trap
145
10: SX7 series support IPV6 MIB
Principle description:
HUAWEI IPV6 MIB is developed based on the RFC2465.
The IPv6 General group consists of 6 tables:
ipv6IfTable:
The IPv6 Interfaces table contains information on the entity’s IPv6 interfaces.
ipv6IfStatsTable:
This table contains information on the traffic statistics of the entity’s IPv6 interfaces. ipv6AddrPrefixTable:
The IPv6 Address Prefix table contains information on Address Prefixes that are associated with the entity’s
IPv6 interfaces.
ipv6AddrTable:
This table contains the addressing information relevant to the entity’s IPv6 interfaces.
ipv6RouteTable:
The IPv6 routing table contains an entry for each valid IPv6 unicast route that can be used for packet
forwarding determination.
ipv6NetToMediaTable:
The IPv6 address translation table contain the IPv6 Address to ‘physical’ address equivalencies.
146
10: SX7 series support IPV6 features
Other management features:
SX7 series support other management features for IPV6 such as SSH for IPV6, Ping6, Tracert6, FTP for IPV6,
TFTP for IPV6, Telnet for IPV6. All these features are realized according to the way for IPV4, the difference is
that feature for IPV6 is based on IPV6 protocol and the packet uses the IPV6 head.
147
Summary

SNMP(If the NM station and managed device are both Huawei products, follow
the procedure described in Enabling the SNMP Extended Error Code Function to
allow the device to send more types of error codes. This allows more specific error
identification and facilitates your fault location and rectification.)

HGMP (HUAWEI group management protocol)
148
HUAWEI ENTERPRISE ICT SOLUTIONS A BETTER WAY
Copyright©2012 Huawei Technologies Co., Ltd. All Rights Reserved.
The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive
statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time
without notice.