08-Network Management and Monitoring @CG@

HomeSupportWirelessH3C WX3000E Series Wireless SwitchesConfigure & DeployConfiguration GuidesH3C WX3000E Series Wireless Switches Switching Engine Configuration Guides(R3507P26)-6W10208-Network Management and Monitoring @CG@
06-RMON Configuration
Title Size Download
06-RMON Configuration 132.13 KB

This chapter includes these sections:

·          RMON overview

·          Configuring the RMON statistics function

·          Configuring the RMON alarm function

·          Displaying and maintaining RMON

·          Ethernet statistics group configuration example

·          History group configuration example

·          Alarm group configuration example

 

 

NOTE:

·      The term "switch" or "device" in this chapter refers to the switching engine on a WX3000E wireless switch.

·      The WX3000E series comprises WX3024E and WX3010E wireless switches.

·      The port numbers in this chapter are for illustration only.

 

RMON overview

Remote Monitoring (RMON) is an enhancement to SNMP for remote device management and traffic monitoring. An RMON monitor, typically the RMON agent embedded in a network device, periodically or continuously collects traffic statistics for the network attached to a port, and when a statistic crosses a threshold, logs the crossing event and sends a trap to the management station.

RMON uses SNMP traps to notify NMSs of exceptional conditions. RMON SNMP traps report various events, including traffic events such as broadcast traffic threshold exceeded. In contrast, SNMP standard traps report device operating status changes such as link up, link down, and module failure.

RMON enables proactive monitoring and management of remote network devices and subnets. The managed device can automatically send a trap when a statistic crosses an alarm threshold, and the NMS does not need to constantly poll MIB variables and compare the results. As a result, network traffic is reduced.

Working mechanism

RMON monitors typically take one of the following forms:

·          Dedicated RMON probes. NMSs can obtain management information from RMON probes directly and control network resources. In this approach, NMSs can obtain all RMON MIB information.

·          RMON agents embedded in network devices. NMSs exchange data with RMON agents by using basic SNMP operations to gather network management information. This approach consumes the resources of managed network devices, and most RMON agent implementations only provide four groups of MIB information, alarm, event, history, and statistics.

H3C devices provide the embedded RMON agent function. You can configure your device to collect and report traffic statistics, error statistics, and performance statistics.

RMON groups

Among the RMON groups defined by RMON specifications (RFC 2819), the device uses the statistics group, history group, event group, and alarm group supported by the public MIB. H3C also defines and implements a private alarm group, which enhances the functions of the alarm group.

Ethernet statistics group

The statistics group defines that the system collects statistics of various traffic information on an interface (at present, only Ethernet interfaces are supported) and saves the statistics in the Ethernet statistics table (ethernetStatsTable) for query convenience of the management device. It provides statistics about network collisions, CRC alignment errors, undersize/oversize packets, broadcasts, multicasts, bytes received, packets received, and so on.

After the creation of a statistics entry on an interface, the statistics group starts to collect traffic statistics on the interface. The result of the statistics is a cumulative sum.

History group

The history group defines that the system periodically collects statistics of traffic information on an interface and saves the statistics in the history record table (ethernetHistoryTable) for query convenience of the management device. The statistics include bandwidth utilization, number of error packets, and total number of packets.

A history group collects statistics on packets received on the interface during each period, which can be configured at the command line interface (CLI).

Event group

The event group defines event indexes and controls the generation and notifications of the events triggered by the alarms defined in the alarm group and the private alarm group. The events can be handled in one of the following ways:

·          Log: Logging event related information (the occurred events, contents of the event, and so on) in the event log table of the RMON MIB of the device, so the management device can check the logs through the SNMP Get operation.

·          Trap: Sending a trap to notify the occurrence of this event to the network management station (NMS).

·          Log-Trap: Logging event information in the event log table and sending a trap to the NMS.

·          None: No action.

Alarm group

The RMON alarm group monitors alarm variables, such as the count of incoming packets (etherStatsPkts) on an interface. After you define an alarm entry, the system gets the value of the monitored alarm variable at the specified interval. When the value of the monitored variable is greater than or equal to the rising threshold, a rising event is triggered; when the value of the monitored variable is smaller than or equal to the falling threshold, a falling event is triggered. The event is then handled as defined in the event group.

If an alarm entry crosses a threshold multiple times in succession, the RMON agent generates an alarm event only for the first crossing. For example, if the value of a sampled alarm variable crosses the rising threshold multiple times before it crosses the falling threshold, only the first crossing triggers a rising alarm event, as shown in Figure 1.

Figure 1 Rising and falling alarm events

 

Private alarm group

The private alarm group calculates the values of alarm variables and compares the result with the defined threshold, thereby realizing a more comprehensive alarming function.

The system handles the prialarm alarm table entry (as defined by the user) in the following ways:

·          Periodically samples the prialarm alarm variables defined in the prialarm formula.

·          Calculates the sampled values based on the prialarm formula.

·          Compares the result with the defined threshold and generates an appropriate event if the threshold value is reached.

 

 

NOTE:

If an alarm entry crosses a threshold multiple times in succession, the RMON agent generates an alarm event only for the first crossing. For example, if the value of a sampled alarm variable crosses the rising threshold multiple times before it crosses the falling threshold, only the first crossing triggers a rising alarm event.

 

Configuring the RMON statistics function

RMON statistics function can be implemented by either the Ethernet statistics group or the history group, but the objects of the statistics are different, you can configure a statistics group or a history group accordingly.

·          A statistics object of the Ethernet statistics group is a variable defined in the Ethernet statistics table, and the recorded content is a cumulative sum of the variable from the time the statistics entry is created to the current time. For more information, seeConfiguring the RMON Ethernet statistics function.

·          A statistics object of the history group is the variable defined in the history record table, and the recorded content is a cumulative sum of the variable in each period. For more information, seeConfiguring the RMON history statistics function.

Configuring the RMON Ethernet statistics function

Follow these steps to configure the RMON Ethernet statistics function:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter Ethernet interface view

interface interface-type interface-number

Create an entry in the RMON statistics table

rmon statistics entry-number [ owner text ]

Required

 

 

NOTE:

You can create one statistics entry per interface and up to 100 statistics entries on the device. When the number of statistics entries exceeds 100, you cannot add new entries.

 

Configuring the RMON history statistics function

Follow these steps to configure the RMON history statistics function:

To do…

Use the command…

Remarks

Enter system view

system-view

Enter Ethernet interface view

interface interface-type interface-number

Create an entry in the RMON history control table

rmon history entry-number buckets number interval sampling-interval [ owner text ]

Required

 

 

NOTE:

·      The entry-number must be globally unique and cannot be used on another interface; otherwise, the operation fails.

·      You can configure multiple history entries on one interface, but the values of the entry-number arguments must be different, and the values of the sampling-interval arguments must be different too; otherwise, the operation fails.

·      Up to 100 history entries can be created for the device.

·      When you create an entry in the history table, if the specified buckets number argument exceeds the history table size supported by the device, the entry is created. However, the validated value of the buckets number argument that corresponds to the entry is the history table size supported by the device.

 

Configuring the RMON alarm function

Configuration prerequisites

·          To enable the managed devices to send traps to the NMS when the NMS triggers an alarm event, configure the SNMP agent as described in the chapter SNMP configuration before configuring the RMON alarm function.

·          If the alarm variable is the MIB variable defined in the history group or the Ethernet statistics group, make sure that the RMON Ethernet statistics function or the RMON history statistics function is configured on the monitored Ethernet interface; otherwise, the creation of the alarm entry fails, and no alarm event is triggered.

Configuration procedure

Follow these steps to configure the RMON alarm function:

To do…

Use the command…

Remarks

Enter system view

system-view

Create an event entry in the event table

rmon event entry-number [ description string ] { log | log-trap log-trapcommunity | none | trap trap-community } [ owner text ]

Required

Create an entry in the alarm table

rmon alarm entry-number alarm-variable sampling-interval { absolute | delta } rising-threshold threshold-value1 event-entry1 falling-threshold threshold-value2 event-entry2 [ owner text ]

Required

Use at least one command.

Create an entry in the private alarm table

rmon prialarm entry-number prialarm-formula prialarm-des sampling-interval { absolute | changeratio | delta } rising-threshold threshold-value1 event-entry1 falling-threshold threshold-value2 event-entry2 entrytype { forever | cycle cycle-period } [ owner text ]

 

 

NOTE:

·      A new entry cannot be created if its parameters are identical with the corresponding parameters of an existing entry. If the created entry is a history entry, it will be compared with the existing history entries only on the same interface. See Table 1 for the parameters to be compared for different entries.

·      The system limits the total number of each type of entries (See Table 1 for the detailed numbers). When the total number of an entry reaches the maximum number of entries that can be created, the creation fails.

 

Table 1 Restrictions on the configuration of RMON

Entry

Parameters to be compared

Maximum number of entries that can be created

Event

Event description (description string), event type (log, trap, logtrap or none) and community name (trap-community or log-trapcommunity)

60

Alarm

Alarm variable (alarm-variable), sampling interval (sampling-interval), sampling type (absolute or delta), rising threshold (threshold-value1) and falling threshold (threshold-value2)

60

Prialarm

Alarm variable formula (alarm-variable), sampling interval (sampling-interval), sampling type (absolute, changeratio or delta), rising threshold (threshold-value1) and falling threshold (threshold-value2)

50

 

Displaying and maintaining RMON

To do…

Use the command…

Remarks

Display RMON statistics

display rmon statistics [ interface-type interface-number ] [ | { begin | exclude | include } regular-expression ]

Available in any view

Display the RMON history control entry and history sampling information

display rmon history [ interface-type interface-number ] [ | { begin | exclude | include } regular-expression ]

Available in any view

Display RMON alarm configuration information

display rmon alarm [ entry-number ] [ | { begin | exclude | include } regular-expression ]

Available in any view

Display RMON prialarm configuration information

display rmon prialarm [ entry-number ] [ | { begin | exclude | include } regular-expression ]

Available in any view

Display RMON events configuration information

display rmon event [ entry-number ] [ | { begin | exclude | include } regular-expression ]

Available in any view

Display log information for the specified or all event entries

display rmon eventlog [ entry-number ] [ | { begin | exclude | include } regular-expression ]

Available in any view

 

Ethernet statistics group configuration example

Network requirements

As shown in Figure 2, Agent is connected to a configuration terminal through its console port and to Server through Ethernet cables.

Configure the RMON Ethernet statistics table to gather incoming packet statistics for GigabitEthernet 1/0/1, so the administrator can view the incoming traffic status of the interface at any time.

Figure 2 Network diagram for RMON

 

Configuration procedure

# Configure RMON to gather statistics for interface GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] rmon statistics 1 owner user1

The system gathers incoming packet statistics for GigabitEthernet 1/0/1. To view the statistics:

·          Execute the display command.

<Sysname> display rmon statistics gigabitethernet 1/0/1

EtherStatsEntry 1 owned by user1-rmon is VALID.

  Interface : GigabitEthernet1/0/1<ifIndex.3>

  etherStatsOctets         : 21657     , etherStatsPkts          : 307

  etherStatsBroadcastPkts  : 56        , etherStatsMulticastPkts : 34

  etherStatsUndersizePkts  : 0         , etherStatsOversizePkts  : 0

  etherStatsFragments      : 0         , etherStatsJabbers       : 0

  etherStatsCRCAlignErrors : 0         , etherStatsCollisions    : 0

  etherStatsDropEvents (insufficient resources): 0

  Packets received according to length:

  64     : 235       ,  65-127  : 67        ,  128-255  : 4

  256-511: 1         ,  512-1023: 0         ,  1024-1518: 0

·          Perform SNMP Get operation on the NMS to obtain the value of the MIB node.

History group configuration example

Network requirements

As shown in Figure 3, Agent is connected to a configuration terminal through its console port and to Server through Ethernet cables.

Configure the RMON history statistics table to gather incoming packet statistics for GigabitEthernet 1/0/1 every one minute, so the administrator can view whether traffic bursts have happened on the interface in a short time.

Figure 3 Network diagram for RMON

 

Configuration procedure

# Configure RMON to periodically gather statistics for interface GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] rmon history 1 buckets 8 interval 60 owner user1

After the above configuration, the system periodically gathers statistics on packets received on GigabitEthernet 1/0/1: the statistical interval is 1 minute, and statistics of the last 8 times are saved in the history statistics table. To view the statistics of the interface:

·          Execute the display command.

[Sysname-GigabitEthernet1/0/1] display rmon history

HistoryControlEntry 2 owned by null is VALID

  Samples interface     : GigabitEthernet1/0/1<ifIndex.3>

  Sampled values of record 1 :

    dropevents        : 0         , octets               : 834

    packets           : 8         , broadcast packets    : 1

    multicast packets : 6         , CRC alignment errors : 0

    undersize packets : 0         , oversize packets     : 0

    fragments         : 0         , jabbers              : 0

    collisions        : 0         , utilization          : 0

  Sampled values of record 2 :

    dropevents        : 0         , octets               : 962

    packets           : 10        , broadcast packets    : 3

    multicast packets : 6         , CRC alignment errors : 0

    undersize packets : 0         , oversize packets     : 0

    fragments         : 0         , jabbers              : 0

    collisions        : 0         , utilization          : 0

  Sampled values of record 3 :

    dropevents        : 0         , octets               : 830

    packets           : 8         , broadcast packets    : 0

    multicast packets : 6         , CRC alignment errors : 0

    undersize packets : 0         , oversize packets     : 0

    fragments         : 0         , jabbers              : 0

    collisions        : 0         , utilization          : 0

  Sampled values of record 4 :

    dropevents        : 0         , octets               : 933

    packets           : 8         , broadcast packets    : 0

    multicast packets : 7         , CRC alignment errors : 0

    undersize packets : 0         , oversize packets     : 0

    fragments         : 0         , jabbers              : 0

    collisions        : 0         , utilization          : 0

  Sampled values of record 5 :

    dropevents        : 0         , octets               : 898

    packets           : 9         , broadcast packets    : 2

    multicast packets : 6         , CRC alignment errors : 0

    undersize packets : 0         , oversize packets     : 0

    fragments         : 0         , jabbers              : 0

    collisions        : 0         , utilization          : 0

  Sampled values of record 6 :

    dropevents        : 0         , octets               : 898

    packets           : 9         , broadcast packets    : 2

    multicast packets : 6         , CRC alignment errors : 0

    undersize packets : 0         , oversize packets     : 0

    fragments         : 0         , jabbers              : 0

    collisions        : 0         , utilization          : 0

  Sampled values of record 7 :

    dropevents        : 0         , octets               : 766

    packets           : 7         , broadcast packets    : 0

    multicast packets : 6         , CRC alignment errors : 0

    undersize packets : 0         , oversize packets     : 0

    fragments         : 0         , jabbers              : 0

    collisions        : 0         , utilization          : 0

  Sampled values of record 8 :

    dropevents        : 0         , octets               : 1154

    packets           : 13        , broadcast packets    : 1

    multicast packets : 6         , CRC alignment errors : 0

    undersize packets : 0         , oversize packets     : 0

    fragments         : 0         , jabbers              : 0

    collisions       

: 0         , utilization          : 0

·          Obtain the value of the MIB node directly by executing the SNMP Get operation on the NMS through software.

Alarm group configuration example

Network requirements

As shown in Figure 4, Agent is connected to a console terminal through its console port and to an NMS across Ethernet.

Do the following:

·          Connect GigabitEthernet 1/0/1 to the FTP server. Gather statistics on traffic of the server on GigabitEthernet 1/0/1 with the sampling interval being five seconds. When traffic is above or below the thresholds, Agent sends the corresponding traps to the NMS.

·          Execute the display rmon statistics command on Agent to display the statistics, and query the statistics on the NMS.

Figure 4 Network diagram for RMON

 

Configuration procedure

# Configure the SNMP agent, and make sure that the SNMP settings are the same as on the NMS. This example sets the SNMP version to SNMPv1, read community to public, write community to private, and the trap destination to 1.1.1.2, the IP address of the NMS.

<Sysname> system-view

[Sysname] snmp-agent

[Sysname] snmp-agent community read public

[Sysname] snmp-agent community write private

[Sysname] snmp-agent sys-info version v1

[Sysname] snmp-agent trap enable

[Sysname] snmp-agent target-host trap address udp-domain 1.1.1.2 params securityname public

# Configure RMON to gather statistics for interface GigabitEthernet 1/0/1.

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] rmon statistics 1 owner user1

[Sysname-GigabitEthernet1/0/1] quit

# Create an RMON alarm entry so when the delta sampling value of node 1.3.6.1.2.1.16.1.1.1.4.1 exceeds 100 or is lower than 50, event 1 is triggered to send traps.

[Sysname] rmon event 1 trap public owner user1

[Sysname] rmon alarm 1 1.3.6.1.2.1.16.1.1.1.4.1 5 delta rising-threshold 100 1 falling-threshold 50 1

# Display the RMON alarm entry configuration.

<Sysname> display rmon alarm 1

AlarmEntry 1 owned by null is Valid.

  Samples type          : delta

  Variable formula      : 1.3.6.1.2.1.16.1.1.1.4.1<etherStatsOctets.1>

  Sampling interval     : 5(sec)

  Rising threshold      : 100(linked with event 1)

  Falling threshold     : 50(linked with event 2)

  When startup enables  : risingOrFallingAlarm

  Latest value          : 0

# Display statistics for interface GigabitEthernet 1/0/1.

<Sysname> display rmon statistics gigabitethernet 1/0/1

EtherStatsEntry 1 owned by user1-rmon is VALID.

  Interface : GigabitEthernet1/0/1<ifIndex.3>

  etherStatsOctets         : 57329     , etherStatsPkts          : 455

  etherStatsBroadcastPkts  : 53        , etherStatsMulticastPkts : 353

  etherStatsUndersizePkts  : 0         , etherStatsOversizePkts  : 0

  etherStatsFragments      : 0         , etherStatsJabbers       : 0

  etherStatsCRCAlignErrors : 0         , etherStatsCollisions    : 0

  etherStatsDropEvents (insufficient resources): 0

  Packets received according to length:

  64     : 7         ,  65-127  : 413       ,  128-255  : 35

  256-511: 0         ,  512-1023: 0         ,  1024-1518: 0

You can now query alarm events on the NMS. On the monitored device, alarm event messages are displayed when events occur. The following is a sample output:

[Sysname]

#Aug 27 16:31:34:12 2005 Sysname RMON/2/ALARMFALL:Trap 1.3.6.1.2.1.16.0.2 Alarm table 1 monitors 1.3.6.1.2.1.16.1.1.1.4.1 with sample type 2,has sampled alarm value 0 less than(or =) 50.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网