H3C S3610[5510] Series Ethernet Switches Operation Manual-Release 0001-(V1.02)

HomeSupportSwitchesH3C S3610[S5510] Switch SeriesConfigure & DeployConfiguration GuidesH3C S3610[5510] Series Ethernet Switches Operation Manual-Release 0001-(V1.02)
28-System Maintenance and Debugging Operation

Table of Contents

Chapter 1 Basic Configurations. 1-1

1.1 CLI Features. 1-1

1.1.1 CLI Overview. 1-1

1.1.2 Online Help with Command Lines. 1-1

1.1.3 Display Features. 1-3

1.1.4 History Command. 1-3

1.1.5 Command Line Error Information. 1-4

1.1.6 Edit Features. 1-4

1.1.7 CLI Views. 1-5

1.2 Basic Configurations. 1-13

1.2.1 Entering/Exiting System View. 1-13

1.2.2 Switch CLI Language Mode. 1-13

1.2.3 Configuring Device Name. 1-14

1.2.4 Configuring System Clock. 1-14

1.2.5 Configuring Welcome Information. 1-15

1.2.6 Configuring CLI Hotkeys. 1-16

1.2.7 Configuring User Levels and Command Levels. 1-18

1.2.8 Displaying System Configuration Information and Running Information. 1-19

1.2.9 Displaying System Statistics. 1-20

Chapter 2 System Maintaining and Debugging. 2-1

2.1 System Maintaining and Debugging Overview. 2-1

2.1.1 Introduction to System Maintaining and Debugging. 2-1

2.1.2 Introduction to System Debugging. 2-2

2.2 System Maintaining and Debugging. 2-3

2.2.1 System Maintaining. 2-3

2.2.2 System Debugging. 2-4

2.3 System Maintaining and Debugging Example. 2-4

Chapter 3 Device Management 3-1

3.1 Device Management Overview. 3-1

3.2 BootROM and Host Software Loading. 3-1

3.2.1 Introduction to Loading Approaches. 3-2

3.2.2 Local Software Loading. 3-2

3.2.3 Remote Software Loading. 3-12

3.3 Device Management Configuration. 3-18

3.3.1 Rebooting a Device. 3-18

3.3.2 Specifying a BootROM File for the Next Device Boot 3-18

3.3.3 Upgrading a BootROM File. 3-19

3.3.4 Clearing the 16bit Interface Indexes Not Used in the Current System.. 3-19

3.4 Displaying and Maintaining Device Management Configuration. 3-20

3.5 Remote Upgrade Configuration Example. 3-21

 


Chapter 1  Basic Configurations

While configuring the system, go to these sections for information you are interested in:

l           CLI Features

l           Basic Configurations

1.1  CLI Features

This section covers the following topics:

l           Online Help with Command Lines

l           Display Features

l           History Command

l           Command Line Error Information

l           Edit Features

l           CLI Views

1.1.1  CLI Overview

H3C S3610&S5510 Series Ethernet Switches provide a series of configuration commands and command line interface for you to configure and maintain the Ethernet switches. The command line interface is featured by the following:

l           Configure the command levels to make sure that unauthorized users cannot use related commands to configure a switch.

l           You can enter <?> at any time to get the online help.

l           Provide network test commands, such as tracert, and ping, to help you to diagnose the network.

l           Provide plenty of detail debugging information to help you to diagnose and locate the network failures.

l           Provide a function similar to Doskey to execute a history command.

l           Adopt the partial match method to search for the keywords of a command line. You only need to enter a non-conflicting keyword to execute the command correctly.

1.1.2  Online Help with Command Lines

The following are the types of online help available with the CLI:

l           Full help

l           Fuzzy help

To obtain the desired help information, you can:

1)         Enter <?> in any view to access all the commands in this view and brief description about them as well.

<Sysname> ?

User view commands:

  backup             Backup next startup-configuration file to TFTP server

  boot-loader        Set boot loader

  bootrom            Update/read/backup/restore bootrom

  cd                 Change current directory

  clock              Specify the system clock

  cluster            Run cluster command

  copy               Copy from one file to another

  debugging          Enable system debugging functions

  delete             Delete a file

  dir                List files on a file system

  display            Show running system information

  <omitted>

2)         Enter a command and a <?> separated by a space. If <?> is at the position of a keyword, all the keywords are given with a brief description.

<Sysname> language-mode ?

  chinese  Chinese environment

  english  English environment

3)         Enter a command and a <?> separated by a space. If <?> is at the position of a parameter, the description about these parameters is given.

<Sysname> system-view

[Sysname] interface Vlan-interface ?

  <1-4094>  VLAN interface

[Sysname] interface Vlan-interface 1 ?

  <cr>

[Sysname] interface Vlan-interface 1

Where, <cr> indicates that there is no parameter at this position. The command is then repeated in the next command line and executed if <Enter> is input.

4)         Enter a character string followed by a <?>. All the commands starting with this string are displayed.

<Sysname> pi?

   ping

5)         Enter a command followed by a character string and <?>. All the keywords starting with this string are listed.

<Sysname> display ver?

   version

6)         Press <tab> after entering the first several letters of a keyword to display the complete keyword, provided these letters can uniquely identify the keyword in this command.

7)         You can view the help information in Chinese with the language-mode command.

1.1.3  Display Features

CLI offers the following features:

l           It offers both English and Chinese help information. You can toggle between them.

l           When the information displayed exceeds one screen, you can pause using one of the methods shown in Table 1-1

Table 1-1 Display functions

Action

Function

Enter <Space> when information display pauses

Continues to display information of the next screen page

Enter <Enter> when information display pauses

Continues to display information of the next line.

Enter <Ctrl+C> when information display pauses

Stops the display and the command execution.

 

1.1.4  History Command

The CLI can automatically save the commands that have been entered. You can invoke and repeatedly execute them whenever needed. By default, the CLI can save up to ten commands for each user. But you can configure the history command buffer size of the current user interface by using the history-command max-size command. For details about the command, refer to the Login module.

 Table 1-2 lists the operation that you can perform.

Table 1-2 Access history commands

To do…

Use the Key/command…

Result

View the history commands

display history-command

Displays the commands that you have entered

Access the last history command

Up-arrow key or <Ctrl+P>

Displays the earlier history command, if there is any. Otherwise, the system rings alarm.

Access the next history command

Down-arrow key or <Ctrl+N>

Displays the next history command, if there is any. Otherwise, the system clears the commands and rings alarm.

 

&  Note:

You may use arrow keys to access history commands in Windows 2000/XP Terminal or Telnet. However, the up-arrow and down-arrow keys are invalid in Windows 9X HyperTerminal, because they are defined in a different way. You can use <Ctrl+P> and <Ctrl+N> instead.

 

1.1.5  Command Line Error Information

The commands are executed only if they have no syntax error. Otherwise, error information is reported. Table 1-3 lists some common errors.

Table 1-3 Common command line errors

Error information

Cause

Unrecognized command

The command was not found.

The keyword was not found.

Parameter type error

The parameter value is beyond the allowed range.

Incomplete command

Incomplete command

Too many parameters

Too many parameters are input.

Ambiguous command

Parameter value input is ambiguous.

Wrong parameter

Wrong parameter

 

1.1.6  Edit Features

The CLI provides the basic command edit functions and supports multi-line editing. The maximum length of each command is 256 characters. Table 1-4 lists these functions.

Table 1-4 Edit functions

Key

Function

Common Keys

If the editing buffer is not full, insert the character at the position of the cursor and move the cursor to the right. Otherwise, the alarm rings.

Backspace key

Delete the character to the left of the cursor and move the cursor back one character. If the cursor gets to the beginning of the command line, the alarm rings.

Left-arrow key or <Ctrl+B>

The cursor moves one character space to the left, and the alarm rings when the cursor gets to the beginning of the command line.

Right-arrow key or <Ctrl+F>

The cursor moves one character space to the right, and the alarm rings when the cursor gets to end of the command line.

Up-arrow key or <Ctrl+P>

Display history command

Down-arrow key or <Ctrl+N>

Tab key

Pressing <Tab> after entering part of a keyword enables the fuzzy help function. If finding a unique match, the system will substitute the complete keyword for the incomplete one and display it in the next line. If there are several matches or no match at all, the system will not modify the incomplete keyword and display it again in the next line.

 

1.1.7  CLI Views

CLI views are designed for different configuration tasks. They are interrelated. You will enter user view once you log into a switch successfully, where you can perform operations such as displaying operation status and statistical information. And by executing the system-view command, you can enter system view, where you can enter other views by executing the corresponding commands.

The following CLI views are provided:

l           User view

l           System view

l           Ethernet port view

l           NULL interface view

l           VLAN view

l           VLAN interface view

l           Loopback interface view

l           Tunnel interface view

l           Local user view

l           User interface view

l           FTP client view

l           MST region view

l           IGMP-Snooping view

l           MLD-Snooping view

l           Traffic classifier view

l           Traffic behavior view

l           QoS policy view

l           Cluster view

l           Port group view

l           NQA view

l           HWTACACS scheme view

l           Public key view

l           Public key editing view

l           Routing policy view

l           Basic IPv4 ACL view

l           Advanced IPv4 ACL view

l           Ethernet frame header ACL view

l           User-defined ACL view

l           Basic IPv6 ACL view

l           Advanced IPv6 ACL view

l           QinQ view

l           RADIUS scheme view

l           RIP view

l           RIPng view

l           ISP domain view

l           <omitted>

Table 1-5 lists information about CLI views (including the operations you can performed in these views, how to enter these views, and so on).

Table 1-5 CLI views

View

Available operation

Prompt example

Enter method

Quit method

User view

Display operation status and statistical information

<Sysname>

Enter user view once logging into the switch.

Execute the quit command in user view to log out of the switch.

System view

Configure system parameters

[Sysname]

Execute the system-view command in user view.

Execute the quit or return command to return to user view.

Ethernet port view

Configure Ethernet port parameters

[Sysname- Ethernet1/0/1]

Ethernet port view

Execute the interface Ethernet 1/1/1 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

[Sysname- GigabitEthernet1/0/1]

Gigabit Ethernet port view

Execute the interface GigabitEthernet 1/1/1 command in system view.

NULL interface view

Configure NULL interface parameters

[Sysname- NULL0]

Execute the interface null 0 command in system view

Execute the quit command to return to system view.

Execute the return command to return to user view.

VLAN view

Configure VLAN parameters

[Sysname-vlan1]

Execute the vlan 1 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

VLAN interface view

Configure IP interface parameters for VLANs and aggregated VLANs

[Sysname-Vlan- interface1]

Execute the interface Vlan-interface 1 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

Loopback interface view

Configure Loopback interface parameters

[Sysname- LoopBack0]

Execute the interface Loopback 0 command in system view

Execute the quit command to return to system view.

Execute the return command to return to user view.

Tunnel interface view

Configure Tunnel interface parameters

[Sysname- Tunnel0]

Execute the interface Tunnel 0 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

Local user view

Configure local user parameters

[Sysname-luser-user1]

Execute the local-user user1 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

User interface view

Configure user interface parameters

[Sysname-ui0]

Execute the user-interface 0 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

FTP client view

Configure FTP client parameters

[ftp]

Execute the ftp command in user view.

Execute the quit command to return to user view.

MST region view

Configure MST region parameters

[Sysname-mst- region]

Execute the stp region-configuration command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

IGMP- Snooping view

Configure IGMP– Snooping protocol parameters

[Sysname-igmp-snooping]

Execute the igmp-snooping command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

MLD- Snooping view

Configure MLD-Snooping protocol parameters

[Sysname-mld- snooping]

Execute the mld-snooping command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

Traffic classifier view

Configure traffic classifier related parameters

[Sysname- classifier-test]

Execute the traffic classifier test command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

Traffic behavior view

Configure traffic behavior related parameters

[Sysname- behavior-test]

Execute the traffic behavior test command in system view

Execute the quit command to return to system view.

Execute the return command to return to user view.

QoS policy view

Configure QoS policy related parameters

[Sysname- qospolicy-test]

Execute the qos policy test command in system view

Execute the quit command to return to system view.

Execute the return command to return to user view.

Cluster view

Configure cluster parameters

[Sysname- cluster]

Execute the cluster command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

Port group view

Configure manual port group parameters

[Sysname-port- group-manual- test]

Execute the port-group manual test command in system

Execute the quit command to return to system view.

Execute the return command to return to user view.

Configure aggregate port group parameters

[Sysname-port-group- aggregation-1]

Execute the port-group aggregation 1 command in system view

NQA view

Configure NQA parameters

[Sysname-nqa- admin-test]

Execute the nqa admin test command in system view

Execute the quit command to return to system view.

Execute the return command to return to user view.

HWTACACS scheme view

Configure HWTACACS parameters

[Sysname- hwtacacs-test]

Execute the hwtacacs scheme test command in system view

Execute the quit command to return to system view.

Execute the return command to return to user view.

Public key view

Configure RSA public keys for SSH users

[Sysname-rsa- public-key]

Execute the rsa peer-public-key h3c003 command in system view.

Execute the peer-public-key end command to return to system view.

Public key editing view

Edit RSA public keys of SSH users

[Sysname-rsa- key-code]

Execute the public-key-code begin command in public key view.

Execute the public-key-code end command to return to public key view.

Routing policy view

Configure routing policies

[Sysname-route-policy]

Execute the route-policy policy1 permit node 10 command in system view

Execute the quit command to return to system view.

Execute the return command to return to user view.

Basic IPv4 ACL view

Define rules for a basic IPv4 ACL (ACLs with their IDs ranging from 2000 to 2999 are basic ACLs.)

[Sysname-acl- basic-2000]

Execute the acl number 2000 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

Advanced IPv4 ACL view

Define rules for an advanced IPv4 ACL (ACLs with their IDs ranging from 3000 to 3999 are advanced ACLs.)

[Sysname-acl- adv-3000]

Execute the acl number 3000 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

Ethernet frame header ACL view

Define the sub-rules of Ethernet frame header ACLs, which is numbered from 4000 to 4999.

[Sysname-acl- ethernetframe- 4000]

Execute the acl number 4000 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

User- defined IPv4 ACL view

Define the sub-rules of user-defined IPv4 ACLs, which are in the range of 5000 to 5999

[Sysname-acl- user-5000]

Execute the acl number 5000 command in system view

Execute the quit command to return to system view.

Execute the return command to return to user view.

Basic IPv6 ACL view

Define rules for a basic IPv6 ACL (ACLs with their IDs ranging from 2000 to 2999 are basic ACLs.)

[Sysname-acl6-basic-2000]

Execute the acl ipv6 number 2000 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

Advanced IPv6 ACL view

Define rules for an advanced IPv6 ACL (ACLs with their IDs ranging from 3000 to 3999 are advanced ACLs.)

[Sysname-acl6-adv-3000]

Execute the acl ipv6 number 3000 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

QinQ view

Create a QinQ instance and configure QinQ related parameters.

[Sysname- Ethernet1/0/1- vid-1]

Execute the vlan-vpn vid 1 command in Ethernet view

Execute the quit command to return to system view.

Execute the return command to return to user view.

[Sysname- GigabitEthernet1/1/1-vid-1]

RADIUS scheme view

Configure RADIUS parameters

[Sysname- radius-1]

Execute the radius scheme 1 command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

RIP view

Configure RIP parameters

[Sysname-rip-1]

Execute the rip 1 command in system view

Execute the quit command to return to system view.

Execute the return command to return to user view.

RIPng view

Configure RIPng parameters

[Sysname-ripng-1]

Execute the ripng 1 command in system view

Execute the quit command to return to system view.

Execute the return command to return to user view.

ISP domain view

Configure parameters for an ISP domain

[Sysname-isp- aabbcc.net]

Execute the domain aabbcc.net command in system view.

Execute the quit command to return to system view.

Execute the return command to return to user view.

 

1.2  Basic Configurations

This section covers the following topics:

l           Entering/Exiting System View

l           Switch CLI Language Mode

l           Configuring Device Name

l           Configuring System Clock

l           Configuring Welcome Information

l           Configuring CLI Hotkeys

l           Configuring User Levels and Command Levels

l           Displaying System Configuration Information and Running Information

l           Displaying System Statistics

1.2.1  Entering/Exiting System View

You will enter user view automatically after you log into the device. And a prompt <Sysname> will be displayed on the screen.

Table 1-6 Follow these steps to enter/exit system view

To do…

Use the command…

Remarks

Enter system view from user view

system-view

You enter user view automatically after logging onto the device.

Return to user view from system view

quit

 

&  Note:

With the quit command, you can return to the previous view or exit the system from user view. The hot key <Ctrl+Z> is equivalent to the return command.

 

1.2.2  Switch CLI Language Mode

The device supports two CLI language modes, English and Chinese. You can switch the CLI language mode as needed.

Table 1-7 Follow these steps to switch CLI language mode

To do…

Use the command…

Remarks

Switch CLI language mode

language-mode { chinese | english }

Optional

CLI language is English by default.

 

1.2.3  Configuring Device Name

You can use the sysname command to set the device name. The set device name is correlated to the CLI prompt. For example, if the device name is set to Sysname, the prompt in user view will be <Sysname>.

Table 1-8 Follow these steps to configure the device name

To do…

Use the command…

Remarks

Enter system view

system-view

Configure the device name

sysname sysname

Optional

By default, the device name is H3C.

 

1.2.4  Configuring System Clock

To ensure that the device works with other devices properly, you need to set a correct system clock.

Table 1-9 Follow these steps to configure the system clock

To do…

Use the command…

Remarks

Set the standard time

clock datetime time date

Optional

Set the time zone

clock timezone time-zone-name { add | minus } time

Optional

Set a daylight summer time scheme

clock summer-time zone_name one-off start-time start-date end-time end-date add-time

Optional

clock summer-time zone-name repeating { start-time start-date end-time end-date | start-time start-year start-month start-week start-day end-time end-year end-month end-week end-day } offset-time

 

1.2.5  Configuring Welcome Information

I. Introduction to welcome information

Welcome information is a piece of prompt displayed when a user connects to a device for logging and interoperation. The administrator is allowed to configure the banner as the situation requires.

For the time being, there are five kinds of banners available:

l           Shell welcome information or session banner, displayed when you enter console session.

l           User interface welcome information or incoming banner, displayed when a user interface is enabled by TTY Modem.

l           Logging welcome information or login banner, displayed when the user configures password authentication and scheme authentication,

l           MOTD welcome information, displayed before the authentication is started.

l           Authorization welcome information or legal banner. When a user logins into a device, the system displays some copyright or authorization information and a legal banner and waits for confirmation of the user. If the user enters “Y” or the <Enter> key, the authentication or login process continues; if the user enters “N”, the authentication or login process breaks. "Y” and “N” are case-insensitive.

II. Configuring welcome information

There are two modes to configure welcome information:

The first mode is to enter all the welcome content right after the command keywords in one line. The beginning character and the end character of the entered content must be the same, but the two characters are not part of the welcome information. In this case, the command keywords, the beginning and end characters, and the welcome information altogether must not exceed 510 characters. The second mode is to enter the welcome content in two or more lines, each line ended with an <Enter> key. In this case, the content may be up to 2000 characters.

You can enter contents in multiple lines in three ways:

l           Straight <Enter> in the first line: End the configuration with “%”. The <Enter> and “%” characters are not included in the banner content.

l           One character followed with <Enter> in the first line: End the configuration with the character entered in the first line. The character entered in the first line and the ending character are not included in the banner content.

l           Multiple characters (the leading and ending characters are different) followed with <Enter> in the first line: End the configuration with the first character of the first line. The first character of the first line and the ending character are not included in the banner content.

Table 1-10 Follow these steps to configure welcome information

To do…

Use the command…

Remarks

Enter system view

system-view

Configure the welcome information at entering user view (TTY Modem login mode)

header incoming [ text ]

Optional

Configure the welcome information at login authentication

header login [ text ]

Optional

Configure the authorization information before logging onto the terminal

header legal [ text ]

Optional

Configure the welcome information at entering user view (non-TTY Modem login mode)

header shell [ text ]

Optional

Configure the welcome information before logging onto the terminal

header motd [ text ]

Optional

 

1.2.6  Configuring CLI Hotkeys

The system enables users to customize five hotkeys for some common used commands. After the definition, you can press hotkey to execute the corresponding command.

Table 1-11 Follow these steps to configure CLI hotkeys

To do…

Use the command…

Remarks

Enter system view

system-view

Configure CLI hotkeys

hotkey [ CTRL_G | CTRL_L | CTRL_O | CTRL_T | CTRL_U ] command

Optional

Refer to the note below this table for the default case.

Display hotkeys

display hotkey

Available in any view. Refer to Table 1-12 for hotkeys reserved by system.

 

&  Note:

By default, the <Ctrl+G>, <Ctrl+L> and <Ctrl+O> hotkeys are associated with command lines as follows and the <Ctrl+T> and <Ctrl+U> commands are NULL.

l      <Ctrl+G> corresponds to the display current-configuration command.

l      <Ctrl+L> corresponds to the display ip routing-table command.

l      <Ctrl+O> corresponds to the undo debugging all command.

 

Table 1-12 Hotkeys reserved by the system

Hotkey

Function

<Ctrl+A>

Move the cursor to the beginning of the current line.

<Ctrl+B>

Move the cursor one character to the left.

<Ctrl+C>

Stop performing a command.

<Ctrl+D>

Delete a character.

<Ctrl+E>

Move the cursor to the end of the current line.

<Ctrl+F>

Move the cursor one character to the right.

<Ctrl+H>

Delete the character to the left of the cursor.

<Ctrl+K>

Break an outward connection.

<Ctrl+N>

Display the next command after history command buffer.

<Ctrl+P>

Display the next command before history command buffer.

<Ctrl+R>

Redisplay the current line information.

<Ctrl+V>

Paste the content in the clipboard.

<Ctrl+W>

Delete all the characters in a continuous string to the left of the cursor.

<Ctrl+X>

Delete all the characters to the left of the cursor.

<Ctrl+Y>

Delete all the characters to the right of the cursor.

<Ctrl+Z>

Return to user view.

<Ctrl+]>

Break an inward connection or redirect connection.

<Esc+B>

Move the cursor to the leading character of the continuous string to the left.

<Esc+D>

Delete all the characters of the continuous string to the left of the cursor.

<Esc+F>

Move the cursor to the front of the next continuous string to the right.

<Esc+N>

Move the cursor down by one line (available before press the Enter key)

<Esc+P>

Move the cursor up by one line (available before press the Enter key)

<Esc+<>

Specify the cursor as the beginning of the clipboard.

<Esc+>>

Specify the cursor as the ending of the clipboard.

 

&  Note:

These hotkeys are defined by the system. When a user interacts with the device from terminal software, they may be defined to perform other operations. If so, the definition of the terminal software will dominate.

 

1.2.7  Configuring User Levels and Command Levels

Corresponding to the command levels, the system categorizes users into 4 levels. A user can perform only the commands that have the command levels equal to or below the user level.

The command levels include visit, monitor, system and management, as the following:

l           Visit: Used for network diagnosing commands (ping, tracert), commands sent to outer devices (including Telnet client, SSH client, RLOGIN), etc. Commands of this level cannot save configuration files.

l           Monitor: Used for system maintaining, service troubleshooting, etc, including commands such as refresh, reset and send. Commands of this level cannot save configuration files.

l           System: Used for service configuration, including commands of routing and different network layers. Commands of this level provide users with direct network services.

l           Management: Used for commands related to system running and system support modules, including file system, FTP, TFTP, Xmodem download, configuration file switching, power control, backup board control, user management, level configuration and interim system parameter configuration (non-protocol and non-RFC).

You need to enhance your user level to obtain privileges to use commands of higher levels. When switching the user level, you are required to enter the corresponding password for the sake of security. The password entered is not displayed on the screen. If it is entered correctly within three times, the user level is switched to a higher level.

You can specify the command level and its view as required. Every command has its own default view and privilege and you don’t have to re-configure it.

Table 1-13 Default command levels

Level

Privilege

Command

0

Visit

ping, tracert, telnet

1

Monitor

display, debugging

2

System

All configuration commands except for those at manage level

3

Manage

FTP, TFTP, Xmodem, and file system operation commands

 

Table 1-14 Follow these steps to configure user level and command level

To do…

Use the command…

Remarks

Switch the user level

super [ level ]

Optional

Enter system view

system-view

Configure the password to switch the user level

super password [ level user-level ] { simple | cipher } password

Optional

Configure the command level in system view

command-privilege level level view view command

Optional

 

&  Note:

l      The commands available depend on the user level when the user login a device. For example, if the user level is 3 and the command level of VTY 0 interface is 1, the user can user command below level 3 (inclusive).

l      When configuring the password for switching user level with the super password command, the user level is defaulted to 3 if no user level is specified.

l      Cipher passwords are recommended, as simple ones are easy getting stolen.

l      Users can switch to a lower user level unconditionally. To switch to a higher user level, however, they need to enter the password needed (The password can be set with the super password command.). If the entered password is incorrect or no password is configured, the switch fails. Therefore, before switching to a higher user level, users should configure the password needed.

 

1.2.8  Displaying System Configuration Information and Running Information

After the above configuration, you can execute the display command in any view to display the corresponding configuration and operation information of the system.

Table 1-15 Follow these steps to display system status information

To do…

Use the command…

Remarks

Display information on system version

display version

Available in any view

Display information on the system clock

display clock

Display information on terminal users

display users [ all ]

Display the current configuration

display current-configuration [ interface interface-type [ interface-number ] | configuration [ configuration-type ] ] | [ by-linenum ] | [ | { begin | include | exclude } text ] ]

Display the valid configuration under current view

display this [ by-linenum ]

Display clipboard information

display clipboard

 

l      The above is just an introduction of the global display command. For the display command related to different protocols and interfaces, refer to the corresponding sections.

l      The display saved-configuration command displays no information if the device starts no configuration file when starting up, namely, the current startup file displayed with the display startup command is null. If you have saved configuration after starting up the device, the configuration file save the last time is displayed. For detailed information of the display saved-configuration command, see the File System Management part.

 

1.2.9  Displaying System Statistics

When the device is faulty, you may need to view operating information to locate the problem. As each functional module has its own operating information display command, you need to execute these commands one by one to view the information of all modules. To collect more information at a time, you can execute the display diagnostic-information command in any view to display the statistics information of each module of the system.

Table 1-16 Follow these steps to display system statistics

To do…

Use the command…

Remarks

Display statistics of each module’s running status in the system

display diagnostic-information

 

Use the display diagnostic-information command to collect at one time the information displayed by each of the following commands:

l           display clock

l           display version

l           display device

l           display current-configuration

l           display saved-configuration

l           display interface

l           display memory

l           display logbuffer

l           display vlan all

l           display history-command

l           display ipv6 statistics

l           display mac-address

l           display link-aggregation summary

l           display stp brief

l           display arp all

l           display ip interface

l           display ip statistics

l           display fib

l           display ip routing-table

l           display multicast forwarding-table

l           <omitted>

 


Chapter 2  System Maintaining and Debugging

When maintaining and debugging the system, go to these sections for information you are interested in:

l           System Maintaining and Debugging Overview

l           System Maintaining and Debugging

l           System Maintaining and Debugging Example

2.1  System Maintaining and Debugging Overview

2.1.1  Introduction to System Maintaining and Debugging

You can use the ping command and the tracert command to verify the current network connectivity.

I. The ping command

Users can use the ping command to verify whether a device with a specified address is reachable, and to examine the network connectivity.

Take the following steps when using the ping command:

1)         The source device sends ICMP ECHO-REQUEST packets to the destination device.

2)         If the network is functioning properly, the destination device will respond by sending the source device ICMP ECHO-REPLY packets after receiving the ICMP ECHO-REQUEST packets.

3)         If there is network failure, the source device will display information indicating that the address is unreachable.

4)         Display the relative statistics after execution of the ping command.

Output of the ping command includes:

l           Information on how the destination device responds towards each ICMP ECHO-REQUEST packet: if the source device has received the ICMP ECHO-REPLY packet within the time-out timer, it will display the number of bytes of the ECHO-REPLY packet, the packet sequence number, Time To Live (TTL), and the response time.

l           If within the period set by the time-out timer, the destination device has not received the response packets, it will display the “Request time out.” information.

l           The ping command applies to the name and IP address of a destination device, if the device name is unknown, the “Error:  Ping: Unknown host host-name” information will be displayed.

l           The statistics from execution of the command, which include number of sent packets, number of received ECHO-REPLY packets, percentage of packets that were not received, the minimum, average, and maximum response time.

II. The tracert command

Users can use the tracert command to trace the routers used while forwarding packets from the source to the destination device. In the event of network failure, users can identify the failed node(s) in this way.

Take the following steps when using the tracert command:

1)         The source device sends a packet with a TTL value of 1 to the destination device.

2)         The first hop (the router that has received the packet first) responds by sending a TTL-expired ICMP message with its IP address encapsulated to the source. In this way, the source device can get the address of the first router.

3)         The source device sends a packet with a TTL value of 2 to the destination device.

4)         The second hop responds with a TTL-expired ICMP message, which gives the source device the address of the second router.

5)         The above process continues until the ultimate destination device is reached. In this way, the source device can trace the addresses of all the routers that have been used to get to the destination device.

2.1.2  Introduction to System Debugging

For the majority of protocols and new features provided, the system generally provides the related debugging functions to enable users to diagnose errors.

The following two functions control the debugging information display.

l           Protocol debugging switch, which controls protocol specific debugging information

l           Screen output function, which controls whether the debugging information is output on a certain screen

Figure 2-1 illustrates the relationship between the protocol debugging switch and the screen output switch. Only when both are turned on can debugging information be output on a terminal.

Figure 2-1 The relationship between the protocol and screen debugging switch

2.2  System Maintaining and Debugging

2.2.1  System Maintaining

Table 2-1 Follow these steps to maintain the system

To do…

Use the command…

Remarks

Check whether a specified IP address can be reached

ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t timeout | -tos tos | -v] * { ip-address | hostname }

Available in any view

Display the route between the current device and the destination device.

tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q packet-number | -w timeout ] * { ip-address | hostname }

 

&  Note:

l      For a low-speed network, it is recommended that users set a larger value for the time-out timer (indicated by the -t parameter in the command) when configuring the ping command.

l      If you specify the packet sending interface by providing the -i keyword when configuring the ping command, you can ping only the addresses in a directly connected network segment.

 

2.2.2  System Debugging

Table 2-2 Follow these steps to debug the system

To do…

Use the command…

Remarks

Enable debugging for a specified module

debugging { all [ timeout time ] | module-name [ option ] }

Available in user view.

Enable the terminal debugging

terminal debugging

Display the enabled debugging function

display debugging [ interface interface-type interface-number ] [ module-name ]

Available in any view

 

&  Note:

l      The debugging commands are normally used when the administrator is diagnosing network failure.

l      Output of the debugging information may reduce system efficiency, especially during execution of the debugging all command.

l      After the debugging is completed, users may use the undo debugging all command to disable all the debugging functions simultaneously.

l      The debugging information can be displayed on the terminal only when the debugging command and the terminal debugging command are both executed successfully.

 

2.3  System Maintaining and Debugging Example

I. Network requirements

l           The IP address of the destination device is 10.1.1.4.

l           Display the routers used while forwarding packets from the current device to the destination device.

II. Network diagram (omitted here)

III. Configuration Procedure

<Sysname> tracert 10.1.1.4

traceroute to 10.1.1.4 (10.1.1.4) 30 hops max, 40 bytes packet, press CTRL_C to break

1  128.3.112.1  19 ms  19 ms  0 ms

2  128.32.216.1  39 ms  39 ms  19 ms

3  128.32.136.23  39 ms  40 ms  39 ms

4  128.32.168.22  39 ms  39 ms  39 ms

5  128.32.197.4  40 ms  59 ms  59 ms

6  131.119.2.5  59 ms  59 ms  59 ms

7  129.140.70.13  99 ms  99 ms  80 ms

8  129.140.71.6  139 ms  239 ms  319 ms

9  129.140.81.7  220 ms  199 ms  199 ms

10  10.1.1.4  239 ms  239 ms  239 ms

The above output shows that nine routers are used from the source to the destination device.

 


Chapter 3  Device Management

 

&  Note:

You can express the path to and the names of the BootROM upgrade file, boot application, and configuration file in the Flash in the following formats:

l      "Path + file name": That is, the full file name is used to indicate a file under the specified path. A full file name can contain up to 63 characters.

l      "File name": That is, only the file name, without path name, is used to indicate a file under the current working path. A file name can contain up to 56 characters.

l      BootROM upgrade file, boot file, and configuration file can be stored under the root directory flash:/ only.

 

When configuring device management, go to these sections for information you are interested in:

l           Device Management Overview

l           BootROM and Host Software Loading

l           Device Management Configuration

l           Displaying and Maintaining Device Management Configuration

l           Remote Upgrade Configuration Example

3.1  Device Management Overview

Through the device management function, you can view the current working state of devices, configure operation parameters, and perform daily device maintenance and management.

Currently, the following device management functions are available:

l           Rebooting a device

l           Specifying a scheduled device reboot.

l           Specifying a BootROM file for the next device reboot

l           Upgrading a BootROM file.

3.2  BootROM and Host Software Loading

Traditionally, the loading of switch software is accomplished through a serial port. This approach is slow, inconvenient, and cannot be used for remote loading. To resolve these problems, the TFTP and FTP modules are introduced into the switch. With these modules, you can load/download software/files conveniently to the switch through an Ethernet port.

This chapter introduces how to load BootROM and host software to a switch locally and how to do this remotely.

3.2.1  Introduction to Loading Approaches

I. You can load software locally by using:

l           XMODEM through Console port

l           TFTP through Ethernet port

l           FTP through Ethernet port

II. You can load software remotely by using:

l           FTP

l           TFTP

 

&  Note:

The BootROM software version should be compatible with the host software version when you load the BootROM and host software.

 

3.2.2  Local Software Loading

If your terminal is directly connected to the switch, you can load the BootROM and host software locally.

Before loading the software, make sure that your terminal is correctly connected to the switch to insure successful loading.

 

&  Note:

The loading process of the BootROM software is the same as that of the host software, except that during the former process, you should press <Ctrl+U> and <Enter> after entering the Boot Menu and the system gives different prompts. The following text mainly describes the BootROM loading process.

 

I. Boot Menu

Starting......

 

            *************************************************************

            *                                                                       *

            *            H3C S3610-52P BOOTROM, Version 123                  *

            *                                                                       *

            *************************************************************

 

            Copyright(c) 2004-2006 Hangzhou H3C Technologies Co., Ltd.

            Creation date: Aug  3 2006, 11:57:55

            CPU Clock Speed : 200MHz

            BUS Clock Speed : 33MHz

            Memory Size     : 128MB

            Mac Address     : 0016e0bee200

 

 

Press Ctrl-B to enter Boot Menu...

Press <Ctrl+B>. The system displays:

Password :

 

&  Note:

To enter the Boot Menu, you should press <Ctrl+B> within five seconds after the information “Press Ctrl-B to enter Boot Menu...” appears. Otherwise, the system starts to decompress the program; and if you want to enter the Boot Menu at this time, you will have to restart the switch.

 

Input the correct BootROM password (no password is need by default). The system enters the Boot Menu:

         BOOT  MENU

 

1. Download application file to flash

2. Select application file to boot

3. Display all files in flash 

4. Delete file from flash 

5. Modify bootrom password

6. Enter bootrom upgrade menu

7. Skip current configuration file 

8. Set bootrom password recovery

9. Set switch startup mode

0. Reboot     

 

Enter your choice(0-9):

II. Loading Software Using XMODEM through Console Port

XMODEM is a file transfer protocol that is widely used due to its simplicity and good performance. XMODEM transfers files via Console port. It supports two types of data packets (128 bytes and 1 KB), two check methods (checksum and CRC), and multiple attempts of error packet retransmission (generally the maximum number of retransmission attempts is ten).

The XMODEM transmission procedure is completed by a receiving program and a sending program: The receiving program sends negotiation characters to negotiate a packet checking method. After the negotiation, the sending program starts to transmit data packets. When receiving a complete packet, the receiving program checks the packet using the agreed method. If the check succeeds, the receiving program sends an acknowledgement character and the sending program proceeds to send another packet; otherwise, the receiving program sends a negative acknowledgement character and the sending program retransmits the packet.

1)         Loading BootROM software

Follow these steps to load the BootROM software:

Step 1: At the prompt "Enter your choice(0-9):" in the Boot Menu, press <6> or <Ctrl+U>, and then press <Enter> to enter the BootROM update menu shown below:

Bootrom update menu:

1. Set TFTP protocol parameter

2. Set FTP protocol parameter

3. Set XMODEM protocol parameter

0. Return to boot menu 

Enter your choice(0-3):

Step 2: Enter 3 in the above menu to download the BootROM software using XMODEM. The system displays the following download baud rate setting menu:

Please select your download baudrate:

1.* 9600

2. 19200

3. 38400

4. 57600

5. 115200

0. Return

Enter your choice (0-5):

Step 3: Choose an appropriate download baud rate. For example, if you enter 5, the baud rate 115200 bps is chosen and the system displays the following information:

Download baudrate is 115200 bps

Please change the terminal's baudrate to 115200 bps and select XMODEM protocol

Press enter key when ready

 

&  Note:

If you have chosen 9600 bps as the download baud rate, you need not modify the HyperTerminal’s baud rate, and therefore you can skip Step 4 and 5 below and proceed to Step 6 directly. In this case, the system will not display the above information.

 

Following are configurations on PC. Take the Hyperterminal using Windows operating system as example.

Step 4: Choose [File/Properties] in HyperTerminal, click <Configure> in the pop-up dialog box, and then select the baud rate of 115200 bps in the Console port configuration dialog box that appears, as shown in Figure 3-1, Figure 3-2.

Figure 3-1 Properties dialog box

Figure 3-2 Console port configuration dialog box

Step 5: Click the <Disconnect> button to disconnect the HyperTerminal from the switch and then click the <Connect> button to reconnect the HyperTerminal to the switch, as shown in Figure 3-3.

Figure 3-3 Connect and disconnect buttons

 

&  Note:

The new baud rate takes effect only after you disconnect and reconnect the HyperTerminal program.

 

Step 6: Press <Enter> to start downloading the program. The system displays the following information:

Now please start transfer file with XMODEM protocol.

If you want to exit, Press <Ctrl+X>.

Loading ...CCCCCCCCCC

Step 7: Choose [Transfer/Send File] in the HyperTerminal’s window, and click <Browse> in pop-up dialog box, as shown in Figure 3-4. Select the software you need to download, and set the protocol to XMODEM.

Figure 3-4 Send file dialog box

Step 8: Click <Send>. The system displays the page, as shown in Figure 3-5.

Figure 3-5 Sending file page

Step 9: After the download completes, the system displays the following information:

Loading ...CCCCCCCCCC done!

Step 10: Reset HyperTerminal’s baud rate to 9600 bps (refer to Step 4 and 5). Then, press any key as prompted. The system will display the following information when it completes the loading.

Bootrom updating.....................................done!

 

&  Note:

l      If the HyperTerminal’s baud rate is not reset to 9600 bps, the system prompts "Your baudrate should be set to 9600 bps again! Press enter key when ready".

l      You need not reset the HyperTerminal’s baud rate and can skip the last step if you have chosen 9600 bps. In this case, the system upgrades BootROM automatically and prompts “Bootrom updating now.....................................done!”.

 

2)         Loading host software

Follow these steps to load the host software:

Step 1: Select <1> in Boot Menu and press <Enter>. The system displays the following information:

1. Set TFTP protocol parameter

2. Set FTP protocol parameter

3. Set XMODEM protocol parameter

0. Return to boot menu

Enter your choice(0-3):

Step 2: Enter 3 in the above menu to download the host software using XMODEM.

The subsequent steps are the same as those for loading the BootROM software, except that the system gives the prompt for host software loading instead of BootROM loading.

III. Loading Software Using TFTP through Ethernet Port

TFTP, one protocol in TCP/IP protocol suite, is used for trivial file transfer between client and server. It uses UDP to provide unreliable data stream transfer service.

1)         Loading BootROM software

Figure 3-6 Local loading using TFTP

Step 1: As shown in Figure 3-6, connect the switch through an Ethernet port to the TFTP server, and connect the switch through the Console port to the configuration PC.

 

&  Note:

You can use one PC as both the configuration device and the TFTP server.

 

Step2: Run the TFTP server program on the TFTP server, and specify the path of the program to be downloaded.

 

  Caution:

TFTP server program is not provided with the H3C S3610&S5510 Series Ethernet Switches.

 

Step 3: Run the HyperTerminal program on the configuration PC. Start the switch. Then enter the Boot Menu.

At the prompt "Enter your choice(0-9):" in the Boot Menu, press <6> or <Ctrl+U>, and then press <Enter> to enter the BootROM update menu shown below:

Bootrom update menu:

1. Set TFTP protocol parameter

2. Set FTP protocol parameter

3. Set XMODEM protocol parameter

0. Return to boot menu

Enter your choice(0-3):

Step 4: Enter 1 to in the above menu to download the BootROM software using TFTP. Then set the following TFTP-related parameters as required:

Load File name           :switch.btm

Switch IP address        :1.1.1.2

Server IP address        :1.1.1.1

Step 5: Press <Enter>. The system displays the following information:

Are you sure you want to update your bootrom? Yes or No(Y/N)

Step 6: Enter Y to start file downloading or N to return to the Bootrom update menu. If you enter Y, the system begins to download and update the BootROM software. Upon completion, the system displays the following information:

Loading........................................done

Bootrom updating..........done!

2)         Loading host software

Follow these steps to load the host software.

Step 1: Select <1> in Boot Menu and press <Enter>. The system displays the following information:

1. Set TFTP protocol parameter

2. Set FTP protocol parameter

3. Set XMODEM protocol parameter

0. Return to boot menu

Enter your choice(0-3):

Step 2: Enter 1 in the above menu to download the host software using TFTP.

The subsequent steps are the same as those for loading the BootROM program, except that the system gives the prompt for host software loading instead of BootROM loading.

 

  Caution:

When loading BootROM and host software using Boot menu, you are recommended to use the PC directly connected to the device as TFTP server to promote upgrading reliability.

 

IV. Loading Software Using FTP through Ethernet Port

FTP is an application-layer protocol in the TCP/IP protocol suite. It is used for file transfer between server and client, and is widely used in IP networks.

You can use the switch as an FTP client or a server, and download software to the switch through an Ethernet port. The following is an example.

1)         Loading BootROM software

Figure 3-7 Local loading using FTP client

Step 1: As shown in Figure 3-7, connect the switch through an Ethernet port to the FTP server, and connect the switch through the Console port to the configuration PC.

 

&  Note:

You can use one computer as both configuration device and FTP server.

 

Step 2: Run the FTP server program on the FTP server, configure an FTP user name and password, and copy the program file to the specified FTP directory.

Step 3: Run the HyperTerminal program on the configuration PC. Start the switch. Then enter the Boot Menu.

At the prompt "Enter your choice(0-9):" in the Boot Menu, press <6> or <Ctrl+U>, and then press <Enter> to enter the BootROM update menu shown below:

Bootrom update menu:

 

1. Set TFTP protocol parameter

2. Set FTP protocol parameter

3. Set XMODEM protocol parameter

0. Return to boot menu

Enter your choice(0-3):

Step 4: Enter 2 in the above menu to download the BootROM software using FTP. Then set the following FTP-related parameters as required:

Load File name           :switch.btm

Switch IP address        :10.1.1.2

Server IP address        :10.1.1.1

FTP User Name            :switch

FTP User Password        :hello

Step 5: Press <Enter>. The system displays the following information:

Are you sure you want to update your bootrom? Yes or No(Y/N)

Step 6: Enter Y to start file downloading or N to return to the Bootrom update menu. If you enter Y, the system begins to download and update the program. Upon completion, the system displays the following information:

Loading........................................done

Bootrom updating..........done!

2)         Loading host software

Follow these steps to load the host software:

Step 1: Select <1> in Boot Menu and press <Enter>. The system displays the following information:

1. Set TFTP protocol parameter

2. Set FTP protocol parameter

3. Set XMODEM protocol parameter

0. Return to boot menu

Enter your choice(0-3):

Enter 2 in the above menu to download the host software using FTP.

The subsequent steps are the same as those for loading the BootROM program, except for that the system gives the prompt for host software loading instead of BootROM loading.

 

  Caution:

When loading BootROM and host software using Boot menu, you are recommended to use the PC directly connected to the device as TFTP server to promote upgrading reliability.

 

3.2.3  Remote Software Loading

If your terminal is not directly connected to the switch, you can telnet to the switch, and use FTP or TFTP to load BootROM and host software remotely.

I. Remote Loading Using FTP

1)         Loading Process Using FTP Client

As shown in Figure 3-8, a PC is used as both the configuration device and the FTP server. You can telnet to the switch, and then execute the FTP commands to download the BootROM program switch.btm from the remote FTP server (with an IP address 10.1.1.1) to the switch.

Figure 3-8 Remote loading using FTP

Step 1: Download the software to the switch using FTP commands.

<Sysname> ftp 10.1.1.1

Trying 10.1.1.1 ...

Press CTRL+K to abort

Connected to 10.1.1.1

220 WFTPD 2.0 service (by Texas Imperial Software) ready for new user

User(192.168.0.144:(none)): switch

331 Give me your password, please

Password:

230 Logged in successfully

[ftp] get switch.btm

227 Entering Passive Mode (10,1,1,1,4,125)

150 "D:\switch.btm" file ready to send (291284 bytes) in ASCII mode

....226 Transfer finished successfully.

FTP: 291284 byte(s) received in 4.393 second(s), 66.00K byte(s)/sec.

[ftp] bye

221 Windows FTP Server (WFTPD, by Texas Imperial Software) says goodbye.

<Sysname>

 

&  Note:

When using different FTP server software on PC, different information will be output to the switch.

 

Step 2: Update the BootROM program on the switch.

<Sysname> bootrom update file switch.btm

  This command will update bootrom file, Continue? [Y/N]y

  Now updating bootrom, please wait...

  BootRom file updating finished!

Step 3: Restart the switch.

<Sysname> reboot

 

&  Note:

Before restarting the switch, make sure you have saved all other configurations that you want, so as to avoid losing configuration information.

 

Loading the host software is the same as loading the BootROM program, except for that the file to be downloaded is the host software file, and that you need to use the boot boot-loader command to select the host software at reboot of the switch.

After the above operations, the BootROM and host software loading is completed.

Pay attention to the following:

l           The loading of BootROM and host software takes effect only after you restart the switch with the reboot command.

l           If the space of the Flash memory is not enough, you can delete the useless files in the Flash memory before software downloading.

l           No power-down is permitted during software loading.

2)         Loading Process Using FTP Server

As shown in Figure 3-9, the switch is used as the FTP server. You can telnet to the switch, and then execute the FTP commands to download the BootROM program switch.btm from the switch.

3)         Loading BootROM

Figure 3-9 Remote loading using FTP server

Step 1: As shown in Figure 3-9, connect the switch through an Ethernet port to the PC (with IP address 10.1.1.1)

Step 2: Configure the IP address of VLAN1 on the switch to 192.168.0.39, and subnet mask to 255.255.255.0.

 

&  Note:

You can configure the IP address for any VLAN on the switch for FTP transmission. However, before configuring the IP address for a VLAN interface, you have to make sure whether the IP addresses of this VLAN and PC are routable.

 

<Sysname> system-view

[Sysname] interface Vlan-interface 1

[Sysname-Vlan-interface1] ip address 192.168.0.39 255.255.255.0

Step 3: Enable FTP service on the switch, configure the FTP user name to test and password to pass.

[Sysname-Vlan-interface1] quit

[Sysname] ftp server enable

% Start FTP server 

[Sysname] local-user test

New local user added.

[Sysname-luser-test] password simple pass

[Sysname-luser-test] service-type ftp

Step 4: Enable FTP client software on PC. Refer to Figure 3-10 for the command line interface in Windows operating system.

Figure 3-10 Command line interface

Step 5: Enter cd in the interface to switch to the path that the BootROM upgrade file is to be stored, and assume the name of the path is “D:\Bootrom”, as shown in Figure 3-11.

Figure 3-11 Switch to BootROM

Step 6: Enter “ftp 192.168.0.39” and enter the user name test, password pass, as shown in Figure 3-12, to log on the FTP server.

Figure 3-12 Log on the FTP server

Step 7: Use the put command to upload the file switch.btm to the switch, as shown in Figure 3-13.

Figure 3-13 Upload file switch.btm to the switch

Step 8: Configure switch.btm to be the BootROM at reboot, and then restart the switch.

<Sysname> bootrom update file switch.btm

  This command will update bootrom file, Continue? [Y/N]y

  Now updating bootrom, please wait...

  BootRom file updating finished!.

<Sysname> reboot

When rebooting the switch, use the file switch.btm as BootROM to finish BootROM loading.

Loading the host software is the same as loading the BootROM program, except for that the file to be downloaded is the host software file, and that you need to use the boot-loader command to select the host software at reboot of the switch.

 

&  Note:

l      The steps listed above are performed in the Windows operating system, if you use other FTP client software, refer to the corresponding user’s guide before operation.

l      Only the configurations steps concerning loading are illustrated here, for detailed description on the corresponding configuration commands, refer to the chapter “File System Management”.

 

II. Remote Loading Using TFTP

The remote loading using TFTP is similar to that using FTP. The only difference is that TFTP is used instead off FTP to load software to the switch, and the switch can only act as a TFTP client.

3.3  Device Management Configuration

3.3.1  Rebooting a Device

When a fault occurs to a running device, you can remove the fault by rebooting it, depending on the actual situation. You can set a time at which the device can automatically reboot. You can also set a delay so that the device can automatically reboot in the delay.

Table 3-1 Follow these steps to reboot a device

To do…

Use the command…

Remarks

Reboot the whole system

reboot

Optional

Enable the scheduled reboot function and specify a specific reboot time and date.

schedule reboot at hh:mm [ date ]

Optional

By default, the scheduled reboot function is disabled.

Enable the scheduled reboot function and specify a reboot wait time.

schedule reboot delay { hh:mm | mm }

Display the reboot time of a device.

display schedule reboot

Optional

You can carry out the command in any view.

 

&  Note:

The precision of the device timer is 1 minute. One minute before the reboot time, the device will prompt “REBOOT IN ONE MINUTE” and will reboot in one minute.

You can use the reboot, schedule reboot at, and schedule reboot delay commands to reboot a device. As a result, the ongoing services will be interrupted. You must be careful to use these commands.

 

3.3.2  Specifying a BootROM File for the Next Device Boot

A BootROM file is an application file adopted by the device. When multiple BootROM files are available on the storage media, you can specify an APP file for the next device boot by executing the following command.

Table 3-2 Follow these steps to specify an APP file for the next device boot

To do…

Use the command…

Remarks

Specify a BootROM file

boot-loader file file-url

Required

 

3.3.3  Upgrading a BootROM File

During the operation of the device, you can use the BootROM programs in the storage media to upgrade the running BootROM programs.

Table 3-3 Follow these steps to upgrade a BootROM file

To do…

Use the command…

Remarks

Upgrade the BootROM file

bootrom update file file-url

Required

 

&  Note:

You need to reboot the device to make the upgraded BootROM program take effect.

 

3.3.4  Clearing the 16bit Interface Indexes Not Used in the Current System

In practical networks, the network management software requires the device to provide a uniform, stable 16bit interface index. That is, a one-to-one relationship should be kept between the interface name and the interface index in the same device.

For the purpose of the stability of an interface index, the system will save the 16bit interface index when a card or logical interface is removed.

If you repeatedly insert and remove different subcards or interface cards to create or delete a large amount of logical interface, the interface indexes will be used up, which will result in interface creation failures. To avoid such a case, you can clear all 16bit interface indexes saved but not used in the current system in user view.

After the above operation,

l           For a re-created interface, the new interface index shall not be consistent with the original one.

l           For existing interfaces, their interface indexes shall remain unchanged.

Table 3-4 Follow the step below to clear the 16bit interface indexes not used in the current system

To do…

Use the command…

Remarks

Clear the 16bit interface indexes not used in the current system

reset unused porttag

 

  Caution:

 

3.4  Displaying and Maintaining Device Management Configuration

After the above configuration, you can use the display command in any view to display the operation status of the device, so as to verify the configuration effect.

Table 3-5 Display and maintain device management configuration

To do…

Use the command…

Remarks

Display the BootROM file used for the next boot.

display boot-loader

Available in any view

Display the statistics of the CPU usage

display cpu-usage [ number [ offset ] [ verbose ] [ from-device ] ]

Display information about storage media on the device

display device [ manuinfo | subslot subslot-number | verbose ]

Display the operating state of fans in a device

display fan [ fan-id ]

Display the usage of the memory of a device

display memory

Display the power state of a device

display power [ power-id ]

Display the reboot time of a device

display schedule reboot

 

3.5  Remote Upgrade Configuration Example

I. Network requirements

l           The device serves as the FTP client and the remote PC as the FTP server. The switch.bin program and the boot.btm program are both saved under the switch directory of the FTP server.

l           The IP address of a VLAN interface on the device is 1.1.1.1/24, the IP address of the FTP server is 2.2.2.2/24, and the route between the device and the FTP server is reachable.

l           You can log in to the FTP server via Telnet to download the application program and remotely upgrade the device through command lines.

II. Network diagram

Figure 3-14 Network diagram for FTP configuration

III. Configuration procedure

l           Configuration on the FTP server

# Set the FTP username to switch and password to hello.

# Configure the user to have access to the switch directory.

l           Configuration on the device

 

  Caution:

If the size of the FLASH on the device is not large enough, delete the original application programs from the FLASH before downloading.

 

# Enter the following command in user view to log in to the FTP server.

<Sysname> ftp 2.2.2.2

Trying 2.2.2.2 ...

Press CTRL+K to abort

Connected to 2.2.2.2

220 WFTPD 2.0 service (by Texas Imperial Software) ready for new user

User(2.2.2.2:(none)):switch

331 Give me your password, please

Password:

230 Logged in successfully

[ftp]

# Enter the authorization directory of the FTP server.

[ftp] cd switch

# Download the switch.bin and boot.btm programs to the FLASH of the device.

[ftp] get switch.bin

[ftp] get boot.btm

# Clear the FTP connection and return to user view.

[ftp] quit

<Sysname>

# Upgrade the BootROM file.

<Sysname> bootrom update file boot.btm

# Specify the application program for the next boot.

<Sysname> boot-loader file switch.bin

# Reboot the device. The application program is upgraded now.

<Sysname> reboot

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网