01-Fundamentals Configuration Guide

HomeSupportConfigure & DeployConfiguration GuidesH3C SecPath M9000 Configuration Guide(V7)(E9X71)-6W70001-Fundamentals Configuration Guide
08-Device management configuration
Title Size Download
08-Device management configuration 238.59 KB

Contents

Managing the device· 1

About device management 1

vSystem support for features· 1

Device management tasks at a glance· 1

Configuring the device name· 2

Configuring the system ID·· 2

Configuring the system time· 2

About the system time· 2

Restrictions and guidelines for configuring the system time· 3

System time configuration tasks at a glance· 3

Setting the system time at the CLI 3

Obtaining the UTC time through a time protocol 4

Obtaining the UTC time through GNSS· 4

Setting the time zone· 4

Setting the daylight saving time· 5

Enabling displaying the copyright statement 5

Configuring banners· 5

Disabling password recovery capability· 7

Disabling BootWare menu access· 7

Setting the system operating mode· 7

Specifying load sharing modes for a switching fabric or interface module· 8

Setting the port status detection timer 8

Monitoring CPU usage· 9

Monitoring CPU core usage· 10

Monitoring CPU status· 11

Setting memory alarm thresholds· 11

Configuring resource monitoring· 13

Monitoring the total inbound bandwidth usage· 13

Monitoring the aggregate interface usage· 13

Monitoring the inner interface throughput 14

Monitoring the number of contexts· 14

Monitoring the QACL resource usage· 15

Monitoring the number of security policy rules· 15

Monitoring the number of sessions· 16

Monitoring the session establishment rate· 16

Configuring resource monitoring· 16

Setting the temperature alarm thresholds· 18

Verifying and diagnosing transceiver modules· 18

Verifying transceiver modules· 18

Diagnosing transceiver modules· 19

Enabling USB interfaces on service modules from providing power 19

Enabling a switching fabric module to distribute traffic to multiple IRF interface modules· 20

Enabling IRF physical interface splitting· 20

Scheduling a task· 21

About task scheduling· 21

Restrictions and guidelines· 21

Procedure· 21

Locating devices· 22

About device locating· 22

Restrictions and guidelines· 22

Starting LED flashing· 22

Stopping LED flashing· 23

Rebooting the device· 23

About device reboot 23

Restrictions and guidelines for device reboot 23

Rebooting devices immediately at the CLI 23

Scheduling a device reboot 24

Restoring the factory-default configuration· 24

Resetting the health status of a card· 25

Display and maintenance commands for device management configuration· 25


Managing the device

 

 

About device management

This chapter describes how to configure basic device parameters and manage the device.

vSystem support for features

Non-default vSytems support only the display cpu-usage configuration and display memory-threshold commands. For more information about vSystem, see Virtual Technologies Configuration Guide.

Device management tasks at a glance

All device management tasks are optional. You can perform any of the tasks in any order.

·     Configuring basic parameters

¡     Configuring the device name

¡     Configuring the system ID

¡     Configuring the system time

¡     Enabling displaying the copyright statement

¡     Configuring banners

·     Configuring security parameters

¡     Disabling password recovery capability

¡     Disabling BootWare menu access

·     Adjusting device capacities

¡     Setting the system operating mode

¡     Specifying load sharing modes for a switching fabric or interface module

¡     Setting the port status detection timer

·     Monitoring the device

¡     Monitoring CPU usage

¡     Monitoring CPU core usage

¡     Monitoring CPU status

¡     Setting memory alarm thresholds

¡     Configuring resource monitoring

¡     Configuring resource monitoring

¡     Setting the temperature alarm thresholds

·     Managing resources

¡     Verifying and diagnosing transceiver modules

¡     Enabling USB interfaces on service modules from providing power

¡     Enabling a switching fabric module to distribute traffic to multiple IRF interface modules

¡     Enabling IRF physical interface splitting

·     Maintaining the device

¡     Scheduling a task

¡     Locating devices

¡     Rebooting the device

¡     Restoring the factory-default configuration

Configuring the device name

About this task

A device name (also called hostname) identifies a device in a network and is used in CLI view prompts. For example, if the device name is Sysname, the user view prompt is <Sysname>.

Procedure

1.     Enter system view.

system-view

2.     Configure the device name.

sysname sysname

By default, the device name is H3C.

Configuring the system ID

About this task

You can use the system ID to indicate the position or functionality of the device or any other information.

Procedure

1.     Enter system view.

system-view

2.     Configure the system ID.

sysid system-id

By default, the device does not have a system ID.

Configuring the system time

About the system time

Correct system time is essential to network management and communication. Configure the system time correctly before you run the device on the network.

The device can use one of the following methods to obtain the system time:

·     Uses the locally set system time, and then uses the clock signals generated by its built-in crystal oscillator to maintain the system time.

·     Periodically obtains the UTC time from an NTP source, and uses the UTC time, time zone, and daylight saving time to calculate the system time. For more information about NTP, see Network Management and Monitoring Configuration Guide.

The system time calculated by using the UTC time from a time source is more precise.

Restrictions and guidelines for configuring the system time

After you execute the clock protocol none command, the clock datetime command determines the system time, whether or not the time zone or daylight saving time has been configured.

If you configure or change the time zone or daylight saving time after the device obtains the system time, the device recalculates the system time. To view the system time, use the display clock command.

This feature is supported only on the default context. All contexts on the device use the same system time.

System time configuration tasks at a glance

To configure the system time, perform the following tasks:

1.     Configuring the system time

Choose one of the following tasks:

¡     Setting the system time at the CLI

¡     Obtaining the UTC time through a time protocol

¡     Obtaining the UTC time through GNSS

2.     (Optional.) Setting the time zone

Make sure each network device uses the time zone of the place where the device resides.

3.     (Optional.) Setting the daylight saving time

Make sure each network device uses the daylight saving time parameters of the place where the device resides.

Setting the system time at the CLI

1.     Enter system view.

system-view

2.     Configure the device to use the local system time.

clock protocol none

By default, the device uses the NTP time source specified on the default context.

If you execute the clock protocol command multiple times, the most recent configuration takes effect.

3.     Return to user view.

quit

4.     Set the local system time.

clock datetime time date

By default, the system time is UTC time 00:00:00 01/01/2011.

 

CAUTION

CAUTION:

This command changes the system time, which affects the execution of system time-related features (for example, scheduled tasks) and collaborative operations of the device with other devices (for example, log reporting and statistics collection). Before executing this command, make sure you fully understand its impact on your live network.

Obtaining the UTC time through a time protocol

Restrictions and guidelines

If the NTP or PTP signals are lost, the device uses the clock signals generated by its built-in crystal oscillator to maintain the system time. After the NTP or PTP signals recover, the device obtains the UTC time again through NTP or PTP.

Procedure

1.     Enter system view.

system-view

2.     Specify the protocol for obtaining the UTC time.

clock protocol ntp context context-id

By default, the device uses the NTP time source specified on the default context.

If you execute the clock protocol command multiple times, the most recent configuration takes effect.

3.     Configure time protocol parameters.

For more information about NTP configuration, see Network Management and Monitoring Configuration Guide.

Obtaining the UTC time through GNSS

About this task

This feature enables the device to obtain the UTC time through Global Navigation Satellite System (GNSS) periodically.

Restrictions and guidelines

If the GNSS signals are lost, the device uses the clock signals generated by its built-in crystal oscillator to maintain the system time. After the GNSS signals recover, the device obtains the UTC time again through GNSS.

Procedure

1.     Enter system view.

system-view

2.     Specify GNSS for obtaining the UTC time.

clock protocol gnss context context-id

By default, the device uses the NTP time source specified on the default context.

If you execute the clock protocol command multiple times, the most recent configuration takes effect.

3.     Configure GNSS parameters.

For more information about GNSS configuration, see the related documents for the product.

Setting the time zone

1.     Enter system view.

system-view

2.     Set the time zone.

clock timezone zone-name { add | minus } zone-offset

By default, the time zone is GMT+08:00.

Setting the daylight saving time

1.     Enter system view.

system-view

2.     Set the daylight saving time.

clock summer-time name start-time start-date end-time end-date add-time

By default, the daylight saving time is not set.

Enabling displaying the copyright statement

About this task

This feature enables the device to display the copyright statement in the following situations:

·     When a Telnet or SSH user logs in.

·     When a console user quits user view. This is because the device automatically tries to restart the user session.

If you disable displaying the copyright statement, the device does not display the copyright statement in any situations.

Procedure

1.     Enter system view.

system-view

2.     Enable displaying the copyright statement.

copyright-info enable

By default, displaying the copyright statement is enabled.

Configuring banners

About this task

Banners are messages that the system displays when a user logs in.

The system supports the following banners:

·     Legal banner—Appears after the copyright statement. To continue login, the user must enter Y or press Enter. To quit the process, the user must enter N. Y and N are case insensitive.

·     Message of the Day (MOTD) banner—Appears after the legal banner and before the login banner.

·     Login banner—Appears only when password or scheme authentication is configured.

·     Shell banner—Appears before the user enters user view.

The system displays the banners in the following order: legal banner, MOTD banner, login banner, and shell banner.

Banner input methods

You can configure a banner by using one of the following methods:

·     Input the entire command line in a single line.

The banner cannot contain carriage returns. The entire command line, including the command keywords, the banner, and the delimiters, can have a maximum of 511 characters. The delimiters for the banner can be any printable character but must be the same. You cannot press Enter before you input the end delimiter.

For example, you can configure the shell banner "Have a nice day." as follows:

<System> system-view

[System] header shell %Have a nice day.%

·     Input the command line in multiple lines.

The banner can contain carriage returns. A carriage return is counted as two characters.

To input a banner configuration command line in multiple lines, use one of the following methods:

¡     Press Enter after the final command keyword, type the banner, and end the final line with the delimiter character %. The banner plus the delimiter can have a maximum of 1999 characters.

For example, you can configure the banner "Have a nice day." as follows:

<System> system-view

[System] header shell

Please input banner content, and quit with the character '%'.

Have a nice day.%

¡     After you type the final command keyword, type any printable character as the start delimiter for the banner and press Enter. Then, type the banner and end the final line with the same delimiter. The banner plus the end delimiter can have a maximum of 1999 characters.

For example, you can configure the banner "Have a nice day." as follows:

<System> system-view

[System] header shell A

Please input banner content, and quit with the character 'A'.

Have a nice day.A

¡     After you type the final command keyword, type the start delimiter and part of the banner. Make sure the final character of the final string is different from the start delimiter. Then, press Enter, type the rest of the banner, and end the final line with the same delimiter. The banner plus the start and end delimiters can have a maximum of 2002 characters.

For example, you can configure the banner "Have a nice day." as follows:

<System> system-view

[System] header shell AHave a nice day.

Please input banner content, and quit with the character 'A'.

A

Procedure

1.     Enter system view.

system-view

2.     Configure the legal banner.

header legal text

3.     Configure the MOTD banner.

header motd text

4.     Configure the login banner.

header login text

5.     Configure the shell banner.

header shell text

Disabling password recovery capability

About this task

Password recovery capability controls console user access to the device configuration and SDRAM from BootWare menus. For more information about BootWare menus, see the release notes.

If password recovery capability is enabled, a console user can access the device configuration without authentication to configure a new password.

If password recovery capability is disabled, console users must restore the factory-default configuration before they can configure new passwords. Restoring the factory-default configuration deletes the next-startup configuration files.

To enhance system security, disable password recovery capability.

Restrictions and guidelines

This feature is supported only on the default context.

To access the device configuration without authentication, you must connect to the active MPU and access the BootWare menu while the MPU is starting up.

Procedure

1.     Enter system view.

system-view

2.     Disable password recovery capability.

undo password-recovery enable

By default, password recovery capability is enabled.

Disabling BootWare menu access

About this task

By default, anyone can press Ctrl+B during device startup to access the BootWare menu, load software, and manage storage media. To prevent unauthorized access, disable BootWare menu access.

Restrictions and guidelines

This feature is supported only on the default context.

Procedure

To disable BootWare menu access, execute the following command in user view:

undo bootrom-access enable

By default, access to the BootWare menu is enabled.

Setting the system operating mode

About this task

The device can operate in one of the following modes:

·     advance—Advanced mode.

·     standard—Standard mode.

Supported features and feature specifications vary by system operating mode.

Restrictions and guidelines

This feature is supported only on the default context.

Change to the operating mode takes effect after a system reboot.

Procedure

1.     Enter system view.

system-view

2.     Set the system operating mode.

system-working-mode{ advance | standard }

By default, the device operates in standard mode.

Specifying load sharing modes for a switching fabric or interface module

Restrictions and guidelines

This feature is supported only on the default context.

If you execute the fabric load-sharing mode command multiple times, the most recent configuration takes effect.

Procedure

1.     Enter system view.

system-view

2.     Specify load sharing modes for an interface module or a fabric module.

In standalone mode:

fabric load-sharing mode { { destination-ip | destination-mac | ingress-port | source-ip | source-mac } * | flexible } slot slot-number

In IRF mode:

fabric load-sharing mode { { destination-ip | destination-mac | ingress-port | source-ip | source-mac } * | flexible } chassis chassis-number slot slot-number

The default varies by interface module model or fabric module model. As a best practice, use the default. To change the default, contact H3C Support.

Setting the port status detection timer

About this task

The device starts a port status detection timer when a port is shut down by a protocol. Once the timer expires, the device brings up the port so the port status reflects the port's physical status.

Procedure

1.     Enter system view.

system-view

2.     Set the port status detection timer.

shutdown-interval time

The default setting is 30 seconds.

Monitoring CPU usage

About this task

To monitor CPU usage, the device performs the following operations:

·     Samples CPU usage at 1-minute intervals and compares the samples with the CPU usage threshold and the CPU usage recovery threshold.

¡     If a sample is greater than or equal to the CPU usage threshold, the device determines the CPU usage is high and sends traps to affected service modules and processes.

¡     If a sample decreases to or below the CPU usage recovery threshold, the device determines the CPU usage has recovered and sends traps to affected service modules and processes.

·     Samples and saves CPU usage at a configurable interval if CPU usage tracking is enabled. You can use the display cpu-usage history command to display the historical CPU usage statistics in a coordinate system.

Figure 1 CPU alarms and alarm-removed notifications

Procedure

1.     Enter system view.

system-view

2.     Set the CPU usage alarm thresholds.

In standalone mode:

monitor cpu-usage threshold severe-threshold recovery-threshold recovery-threshold [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

monitor cpu-usage threshold severe-threshold recovery-threshold recovery-threshold [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

By default, the CPU usage alarm threshold is 70%, and the CPU usage recovery threshold is 30%.

 

CAUTION

CAUTION:

If you set the severe CPU usage alarm threshold to a tool low value, the device will reach the threshold easily. Normal services will be affected.

3.     Set the sampling interval for CPU usage tracking.

In standalone mode:

monitor cpu-usage interval interval [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

monitor cpu-usage interval interval [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

By default, the sampling interval for CPU usage tracking is 1 minute.

4.     Enable CPU usage tracking.

In standalone mode:

monitor cpu-usage enable [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

monitor cpu-usage enable [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

By default, CPU usage tracking is enabled.

Monitoring CPU core usage

About this task

The device samples CPU core usage at 5-second intervals and calculates the average value during each CPU core usage statistics interval. If the value during an interval is greater than the CPU core usage threshold, the device issues an alarm and logs the event.

Restrictions and guidelines

As a best practice, set this argument to a multiple of the sampling interval, which is fixed at 5 seconds. If you do not do so, the actual statistics interval is the biggest multiple of the sampling interval that is smaller than the setting. For example, if you set this argument to 12 seconds, the actual statistics interval is 10 seconds.

Procedure

1.     Enter system view.

system-view

2.     Set CPU core usage statistics intervals.

In standalone mode:

monitor cpu-usage statistics-interval interval slot slot-number cpu cpu-number core core-id-list

In IRF mode:

monitor cpu-usage statistics-interval interval chassis chassis-number slot slot-number cpu cpu-number core core-id-list

By default, the CPU core usage statistics interval is 60 seconds.

3.     Set CPU core alarm resending intervals.

In standalone mode:

monitor resend cpu-usage core-interval core-interval [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

monitor resend cpu-usage core-interval core-interval [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

By default, the CPU core alarm resending interval is 300 seconds.

Monitoring CPU status

About CPU status monitoring

This feature enables the device to monitor the following items:

·     Whether the CPUs are receiving or sending packets correctly.

·     Whether the PCI buses are operating correctly.

If the device detects an error, it generates a log message and issues an alarm.

Procedure

1.     Enter system view.

system-view

2.     Enable CPU forwarding status monitoring in the outbound direction.

monitor cpu-tx-status

By default, CPU forwarding status monitoring is disabled in the outbound direction.

3.     Enable CPU forwarding status monitoring in the inbound direction.

monitor cpu-rx-status

By default, CPU forwarding status monitoring is disabled in the inbound direction.

4.     Enable PCI bus monitoring.

monitor cpu-pci-status

By default, PCI bus monitoring is disabled.

Setting memory alarm thresholds

About memory alarm threholds

To ensure correct operation and improve memory efficiency, the system performs the following operations:

·     Samples memory usage at 1-minute intervals. If the sample is equal to or greater than the memory usage threshold, the device sends a trap.

·     Monitors the amount of free memory space in real time. If the amount of free memory space reaches the minor, severe, or critical alarm threshold, the system issues an alarm to affected service modules and processes.

As shown in Table 1 and Figure 2, the system supports the following free-memory thresholds:

·     Normal state threshold.

·     Minor alarm threshold.

·     Severe alarm threshold.

·     Critical alarm threshold.

Table 1 Memory alarm notifications and memory alarm-removed notifications

Notification

Triggering condition

Remarks

Minor alarm notification

The amount of free memory space decreases below the minor alarm threshold.

After generating and sending a minor alarm notification, the system does not generate and send any additional minor alarm notifications until the minor alarm is removed.

Severe alarm notification

The amount of free memory space decreases below the severe alarm threshold.

After generating and sending a severe alarm notification, the system does not generate and send any additional severe alarm notifications until the severe alarm is removed.

Critical alarm notification

The amount of free memory space decreases below the critical alarm threshold.

After generating and sending a critical alarm notification, the system does not generate and send any additional critical alarm notifications until the critical alarm is removed.

Critical alarm-removed notification

The amount of free memory space increases above the severe alarm threshold.

N/A

Severe alarm-removed notification

The amount of free memory space increases above the minor alarm threshold.

N/A

Minor alarm-removed notification

The amount of free memory space increases above the normal state threshold.

N/A

Figure 2 Memory alarm notifications and alarm-removed notifications

 

Restrictions and guidelines

Restrictions and guidelines

This feature is supported only on the default context.

If a memory alarm occurs, delete unused configuration items or disable some features to increase the free memory space. Because the memory space is insufficient, some configuration items might not be able to be deleted.

Procedure

1.     Enter system view.

system-view

2.     Set the memory usage threshold.

In standalone mode:

memory-threshold [ slot slot-number [ cpu cpu-number ] ] usage memory-threshold

In IRF mode:

memory-threshold [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] usage memory-threshold

By default, the memory usage threshold is 90%.

3.     Set the free-memory thresholds.

In standalone mode:

memory-threshold [ slot slot-number [ cpu cpu-number ] ] [ ratio ] minor minor-value severe severe-value critical critical-value normal normal-value

In IRF mode:

memory-threshold [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] [ ratio ] minor minor-value severe severe-value critical critical-value normal normal-value

The default settings vary by device model. To view the default settings, use the undo memory-threshold command to restore the default settings and then execute the display memory-threshold command.

Configuring resource monitoring

Monitoring the total inbound bandwidth usage

About this task

If the total inbound traffic remains greater than or equal to the total inbound bandwidth usage threshold for the specified duration, the device sends an alarm. If the alarm state persists, the device resends the alarm at 5-second intervals.

Restrictions and guidelines

This feature is supported only on the default context.

Procedure

1.     Enter system view.

system-view

2.     Set the total inbound bandwidth usage threshold.

monitor resource-usage bandwidth inbound threshold threshold-value [ duration duration-value ]

By default, the total inbound bandwidth usage threshold is not set. The bandwidth usage alarm feature is disabled.

Monitoring the aggregate interface usage

About this task

When the number of created Layer 2 or Layer 3 aggregate interfaces reaches the aggregate interface usage threshold, the device sends an alarm. If the alarm state persists, the device resends the alarm at 3-hour intervals.

Procedure

1.     Enter system view.

system-view

2.     Set aggregate interface usage thresholds.

monitor resource-usage { bridge-aggregation | route-aggregation } threshold threshold-value

By default, no aggregate interface usage thresholds are set. The aggregate interface usage alarm feature is disabled.

Monitoring the inner interface throughput

About this task

When the inner interface throughput reaches the threshold, the device sends an alarm. If the alarm state persists, the device resends the alarm at 10-minute intervals.

Restrictions and guidelines

This feature is supported only on the default context.

Procedure

1.     Enter system view.

system-view

2.     Set the inner interface throughput threshold.

monitor resource-usage blade-throughput threshold threshold-value

By default, the inner interface throughput threshold is not set. The inner interface throughput alarm feature is disabled.

Monitoring the number of contexts

About this task

This feature monitors both the total number of contexts created on the device and the number of contexts in each security engine group.

When the total number of contexts created on the device reaches the global context usage threshold, the device sends an alarm. If the alarm state persists, the device resends the alarm at 6-hour intervals.

After you enable monitoring of the number of contexts in each security engine group, the device regularly monitors the number of contexts in each security engine group.

The device supports a minor alarm threshold and a severe alarm threshold.

·     When the number of contexts in a security engine group increases to or above the minor alarm threshold, the security engine group enters minor alarm state and issues a minor alarm.

·     When the number of contexts in a security engine group increases to or above the severe alarm threshold, the security engine group enters severe alarm state and issues a severe alarm.

·     When the number of contexts in a security engine group decreases below the severe alarm threshold, the team enters minor alarm state and issues a severe-alarm-removed notification.

·     When the number of contexts in a security engine group decreases below the minor alarm threshold, the team issues a minor-alarm-removed notification.

·     If the security engine group stays in minor alarm state, the device resends minor alarms at 6-hour intervals. If the security engine group stays in severe alarm state, the device resends severe alarms at 6-hour intervals.

For more information about security engine groups, see context configuration in Virtual Technologies Configuration Guide.

Restrictions and guidelines

This feature is supported only on the default context.

The alarm thresholds for security engine groups are fixed and cannot be changed. You can view the thresholds by reading alarm messages.

Procedure

1.     Enter system view.

system-view

2.     Set the global context usage threshold.

monitor resource-usage context threshold threshold-value

By default, the global context usage threshold is not set. The global context usage alarm feature is disabled.

3.     Enable monitoring of the number of contexts in each security engine group.

monitor resource-usage blade-controller-team context

By default, monitoring of the number of contexts in each security engine group is enabled.

Monitoring the QACL resource usage

About this task

When the QACL resource usage reaches the QACL resource usage threshold, the device sends an alarm. If the alarm state persists, the device resends the alarm at 3-hour intervals.

Restrictions and guidelines

This feature is supported only on the default context.

Procedure

1.     Enter system view.

system-view

2.     Set the QACL resource usage threshold.

monitor resource-usage qacl threshold threshold-value

By default, the QACL resource usage threshold is not set. The QACL resource usage alarm feature is disabled.

Monitoring the number of security policy rules

About this task

When the number of created security policy rules reaches the security policy rule usage threshold, the device sends an alarm. If the alarm state persists, the device resends the alarm at 6-hour intervals.

Procedure

1.     Enter system view.

system-view

2.     Set security policy rule usage thresholds.

monitor resource-usage security-policy { ip | ipv6 } threshold threshold-value

By default, no security policy rule thresholds are set. The security policy rule alarm feature is disabled.

Monitoring the number of sessions

About this task

When the number of sessions reaches the session usage threshold, the device sends an alarm. If the alarm state persists, the device resends the alarm at 10-minute intervals.

Procedure

1.     Enter system view.

system-view

2.     Set the session usage threshold.

In standalone mode:

monitor resource-usage session-count [ slot slot-number cpu cpu-number ] threshold threshold-value

In IRF mode:

monitor resource-usage session-count [ chassis chassis-number slot slot-number cpu cpu-number ] threshold threshold-value

By default, no session usage thresholds are set. The session usage alarm feature is disabled.

Monitoring the session establishment rate

About this task

When the session establishment rate reaches the threshold, the device sends an alarm. If the alarm state persists, the device resends the alarm at 10-minute intervals.

Procedure

1.     Enter system view.

system-view

2.     Set the session establishment rate threshold.

In standalone mode:

monitor resource-usage session-rate [ slot slot-number cpu cpu-number ] threshold threshold-value

In IRF mode:

monitor resource-usage session-rate [ chassis chassis-number slot slot-number cpu cpu-number ] threshold threshold-value

By default, no session establishment rate thresholds are set. The session establishment rate alarm feature is disabled.

Configuring resource monitoring

About this task

The resource monitoring feature enables the device to monitor the available amounts of types of resources, for example, the space for ARP entries. The device samples the available amounts periodically and compares the samples with resource depletion thresholds to identify the resource depletion status.

The device supports a minor resource depletion threshold and a severe resource depletion threshold for each supported resource type.

·     If the available amount is equal to or less than the minor resource depletion threshold but greater than the severe resource depletion threshold, the resource type is in minor alarm state.

·     If the available amount is equal to or less than the severe resource depletion threshold, the resource type is in severe alarm state.

·     If the available amount increases above the minor resource depletion threshold, the resource type is in recovered state.

When a resource type enters severe alarm state, the device issues a severe alarm. If the resource type stays in severe alarm state, the device resends severe alarms periodically.

When a resource type enters minor alarm state, the device issues a minor alarm. If the resource type stays in minor alarm state or changes from severe alarm state to minor alarm state, the device identifies whether resending of minor resource depletion alarms is enabled. If the feature is disabled, the device does not issue additional minor alarms. If the feature is enabled, the device resends minor alarms periodically.

Resource depletion alarms can be sent to NETCONF, SNMP, and the information center to be encapsulated as NETCONF events, SNMP traps and informs, and log messages. For more information, see NETCONF, SNMP, and information center in Network Management and Monitoring Configuration Guide.

Figure 3 Resource depletion alarms and alarm-removed notifications

Restrictions and guidelines

This feature is supported only on the default context.

Procedure

1.     Enter system view.

system-view

2.     Set resource depletion thresholds.

In standalone mode:

resource-monitor resource resource-name slot slot-number cpu cpu-number by-percent minor-threshold minor-threshold severe-threshold severe-threshold

In IRF mode:

resource-monitor resource resource-name chassis chassis-number slot slot-number cpu cpu-number by-percent minor-threshold minor-threshold severe-threshold severe-threshold

The default settings vary by resource type. Use the display resource-monitor command to display the resource depletion thresholds.

3.     Specify destinations for resource depletion alarms.

resource-monitor output { netconf-event | snmp-notification | syslog } *

By default, resource depletion alarms are sent to NETCONF, SNMP, and the information center.

4.     Enable resending of minor resource depletion alarms.

resource-monitor minor resend enable

By default, resending of minor resource depletion alarms is enabled.

 

Setting the temperature alarm thresholds

About this task

The device monitors its temperature based on the following thresholds:

·     Low-temperature threshold.

·     High-temperature warning threshold.

·     High-temperature alarming threshold.

When the device temperature drops below the low-temperature threshold or reaches the high-temperature warning or alarming threshold, the device performs the following operations:

·     Sends log messages and traps.

·     Sets LEDs on the device panel.

Restrictions and guidelines

This feature is supported only on the default context.

Procedure

1.     Enter system view.

system-view

2.     Configure the temperature alarm thresholds.

In standalone mode:

temperature-limit slot slot-number { hotspot | inflow | outflow } sensor-number lowlimit warninglimit [ alarmlimit ]

In IRF mode:

temperature-limit chassis chassis-number slot slot-number { hotspot | inflow | outflow } sensor-number lowlimit warninglimit [ alarmlimit ]

The defaults vary by temperature sensor model. To view the defaults, execute the undo temperature-limit and display environment commands in turn.

The high-temperature alarming threshold must be higher than the high-temperature warning threshold, and the high-temperature warning threshold must be higher than the low-temperature threshold.

Verifying and diagnosing transceiver modules

Verifying transceiver modules

About this task

You can use one of the following methods to verify the genuineness of a transceiver module:

·     Display the key parameters of a transceiver module, including its transceiver type, connector type, central wavelength of the transmit laser, transfer distance, and vendor name.

·     Display its electronic label. The electronic label is a profile of the transceiver module and contains the permanent configuration, including the serial number, manufacturing date, and vendor name. The data was written to the transceiver module or the device's storage component during debugging or testing of the transceiver module or device.

The device regularly checks transceiver modules for their vendor names. If a transceiver module does not have a vendor name or the vendor name is not H3C, the device repeatedly outputs traps and log messages. For information about logging rules, see information center in Network Management and Monitoring Configuration Guide.

Procedure

To verify transceiver modules, execute the following commands in any view:

·     Display the key parameters of transceiver modules.

display transceiver interface [ interface-type interface-number ]

·     Display the electrical label information of transceiver modules.

display transceiver manuinfo interface [ interface-type interface-number ]

Diagnosing transceiver modules

About this task

The device provides the alarm and digital diagnosis functions for transceiver modules. When a transceiver module fails or is not operating correctly, you can perform the following tasks:

·     Check the alarms that exist on the transceiver module to identify the fault source.

·     Examine the key parameters monitored by the digital diagnosis function, including the temperature, voltage, laser bias current, TX power, and RX power.

Procedure

To diagnose transceiver modules, execute the following commands in any view:

·     Display transceiver alarms.

display transceiver alarm interface [ interface-type interface-number ]

·     Display the current values of the digital diagnosis parameters on transceiver modules.

display transceiver diagnosis interface [ interface-type interface-number ]

Enabling USB interfaces on service modules from providing power

About this task

Loops might exist in a scenario that has the following conditions:

·     A PFC is connected to a blade module on the device through the USB interface.

·     The interface modules on the device are connected to transceiver modules on the PFC.

To resolve this issue, enable USB interfaces on service modules to provide power.

Procedure

1.     Enter system view.

system-view

2.     Enable USB interfaces on service modules to provide power.

hardware usb power-on

By default, USB interfaces on service modules can provide power.

Enabling a switching fabric module to distribute traffic to multiple IRF interface modules

About this task

In this section, the term "IRF interface modules" refers to interface modules that have IRF physical interfaces. The term "non-IRF interface modules" refers to interface modules that do not have IRF physical interfaces.

By default, traffic from a non-IRF interface module can be forwarded to multiple switching fabric modules. However, the switching fabric modules forward the traffic to only one IRF interface module. After you execute this command for switching fabric modules, the switching fabric modules can forward the traffic to multiple IRF interface modules to implement load balancing.

Procedure

1.     Enter system view.

system-view

2.     Enable a switching fabric module to distribute traffic to multiple IRF interface modules.

stack load-sharing fabric-slot-based chassis chassis-number slot slot-number

By default, a switching fabric module can distribute traffic to only one IRF interface module..

Enabling IRF physical interface splitting

About this task

Use this feature in scenarios where an interface module has multiple types of IRF physical interfaces. You can enable IRF physical interface splitting on the interface module to improve the usage of high-speed physical interfaces.

Procedure

1.     Enter system view.

system-view

2.     Enable IRF physical interface splitting.

stack port split chassis chassis-number slot slot-number

By default, IRF physical interface splitting is disabled.

Scheduling a task

About task scheduling

You can schedule the device to automatically execute a command or a set of commands without administrative interference.

You can configure a periodic schedule or a non-periodic schedule. A non-periodic schedule is not saved to the configuration file and is lost when the device reboots. A periodic schedule is saved to the startup configuration file and is automatically executed periodically.

Restrictions and guidelines

·     To assign a command (command A) to a job, you must first assign the job the command or commands for entering the view of command A.

·     Make sure all commands in a schedule are compliant to the command syntax. The system does not check the syntax when you assign a command to a job.

·     A schedule cannot contain any one of these commands: telnet, ftp, ssh2, and monitor process.

·     A schedule does not support user interaction. If a command requires a yes or no answer, the system always assumes that a Y or Yes is entered. If a command requires a character string input, the system assumes that either the default character string (if any) or a null string is entered.

·     A schedule is executed in the background, and no output (except for logs, traps, and debug information) is displayed for the schedule.

Procedure

1.     Enter system view.

system-view

2.     Create a job.

scheduler job job-name

3.     Assign a command to the job.

command id command

By default, no command is assigned to a job.

You can assign multiple commands to a job. A command with a smaller ID is executed first.

4.     Exit to system view.

quit

5.     Create a schedule.

scheduler schedule schedule-name

6.     Assign a job to the schedule.

job job-name

By default, no job is assigned to a schedule.

You can assign multiple jobs to a schedule. The jobs will be executed concurrently.

7.     Assign user roles to the schedule.

user-role role-name

By default, a schedule has the user role of the schedule creator.

You can assign a maximum of 64 user roles to a schedule. A command in a schedule can be executed if it is permitted by one or more user roles of the schedule.

8.     Specify the execution time for the schedule.

Choose one option as needed:

¡     Execute the schedule at specific points of time.

time at time date

time once at time [ month-date month-day | week-day week-day&<1-7> ]

¡     Execute the schedule after a period of time.

time once delay time

¡     Execute the schedule at the specified time on every specified day in a month or week.

time repeating at time [ month-date [ month-day | last ] | week-day week-day&<1-7> ]

¡     Execute the schedule periodically from the specified time on.

time repeating [ at time [date ] ] interval interval

By default, no execution time is specified for a schedule.

The time commands overwrite each other. The most recently executed command takes effect.

9.     (Optional.) Set the size of the job execution log file.

scheduler logfile size value

By default, the size of the job execution log file is 16 KB.

The job execution log file stores the execution information of jobs. If the file is full, old records are deleted to make room for new records. If the size of the log information to be written to the file is greater than the file size, the excessive information is not written to the file.

Locating devices

About device locating

The device provides LEDs for device locating. The locator blink blink-time command flashes the LEDs quickly for a specified period of time unless you execute the locator blink stop command.

Restrictions and guidelines

This feature is supported only on the default context.

Starting LED flashing

To start LED flashing, execute one of the following commands in user view:

In standalone mode:

locator blink blink-time

In IRF mode:

locator [ chassis chassis-number ] blink blink-time

Stopping LED flashing

To stop LED flashing, execute one of the following commands in user view:

In standalone mode:

locator blink stop

In IRF mode:

locator [ chassis chassis-number ] blink stop

Rebooting the device

About device reboot

The following device reboot methods are available:

·     Schedule a reboot at the CLI, so the device automatically reboots at the specified time or after the specified period of time.

·     Immediately reboot the device at the CLI.

During the reboot process, the device performs the following operations:

a.     Resets all of its chips.

b.     Uses the BootWare to verify the startup software package, decompress the package, and load the images.

c.     Initializes the system.

·     Power off and then power on the device. This method might cause data loss, and is the least-preferred method.

Using the CLI, you can reboot the device from a remote host.

Restrictions and guidelines for device reboot

For data security, the device does not reboot while it is performing file operations.

Rebooting devices immediately at the CLI

Prerequisites

Perform the following steps in any view:

1.     Verify that the next-startup configuration file is correctly specified.

display startup

For more information about the display startup command, see Fundamentals Command Reference.

2.     Verify that the startup image files are correctly specified.

display boot-loader

If one main startup image file is damaged or does not exist, you must specify another main startup image file before rebooting the device.

For more information about the display boot-loader command, see Fundamentals Command Reference.

3.     Save the running configuration to the next-startup configuration file.

save

To avoid configuration loss, save the running configuration before a reboot.

For more information about the save command, see Fundamentals Command Reference.

Procedure

To reboot the device immediately at the CLI, execute one of the following commands in user view:

In standalone mode:

reboot [ slot slot-number ] [ force ]

In IRF mode:

reboot [ chassis chassis-number [ slot slot-number ] ] [ force ]

 

CAUTION

CAUTION:

·     Execute this command with caution. A device reboot might result in service interruption.

·     Use the force keyword to reboot the device only when the system is faulty or fails to start up normally. A forced device reboots might cause file system damage. Before using the force keyword to reboot the device, make sure you understand its impact..

Scheduling a device reboot

Restrictions and guidelines

(In standalone mode.) The automatic reboot configuration is canceled if an active/standby switchover occurs.

(In IRF mode.) The automatic reboot configuration is effective on all member devices. It will be canceled if a switchover between the global active MPU and a global standby MPU occurs.

The device supports only one device reboot schedule. If you execute the scheduler reboot command multiple times, the most recent configuration takes effect.

Procedure

To schedule a reboot, execute one of the following commands in user view:

·     scheduler reboot at time [ date ]

·     scheduler reboot delay time

By default, no device reboot time is specified.

 

CAUTION

CAUTION:

This task enables the device to reboot at a scheduled time, which causes service interruption. Before configuring this task, make sure you fully understand its impact on your live network.

Restoring the factory-default configuration

About this task

If you want to use the device in a different scenario or you cannot troubleshoot the device by using other methods, use this task to restore the factory-default configuration.

This task does not delete .bin files and license files.

Restrictions and guidelines

This feature is supported only on the default context.

Procedure

To restore the factory-default configuration for the device, execute the following command in user view:

restore factory-default

 

CAUTION

CAUTION:

Use this command with caution. This command restores the device to the factory default settings.

Resetting the health status of a card

About this task

This feature allows you to reset the health status of a card after the card is recovered from a specific error.

Procedure

1.     Enter system view.

system-view

2.     Reset the health status of a card.

In standalone mode:

reset-health-value { hg-packet-drop | hg-packet-loss | hg-packet-tamper | hg-port-down | parity-error } slot slot-number

In IRF mode:

reset-health-value { hg-packet-drop | hg-packet-loss | hg-packet-tamper | hg-port-down | parity-error } chassis chassis-number slot slot-number

Display and maintenance commands for device management configuration

IMPORTANT

IMPORTANT:

Support for the display device manuinfo fan, display device manuinfo power, and display xbar commands depends on the device model. For more information, see device management in Fundamentals Command Reference.

IMPORTANT

IMPORTANT:

Non-default vSystems do not support some of the display and maintenance commands. For information about vSystem support for these commands, see the device management command reference. For more information about vSystem, see Virtual Technologies Configuration Guide.

Execute display commands in any view. Execute the reset scheduler logfile command in user view. Execute the reset version-update-record command in system view.

Task

Command

Display device alarm information.

In standalone mode:

display alarm [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display alarm [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Display the system time, date, time zone, and daylight saving time.

display clock

Display the copyright statement.

display copyright

Display CPU usage statistics.

In standalone mode:

display cpu-usage [ summary ] [ slot slot-number [ cpu cpu-number [ core { core-number | all } ] ] ]

display cpu-usage [ control-plane | data-plane ] [ summary ] [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display cpu-usage [ summary ] [ chassis chassis-number slot slot-number [ cpu cpu-number [ core { core-number | all } ] ] ]

display cpu-usage [ control-plane | data-plane ]  [ summary ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Display CPU usage monitoring settings.

In standalone mode:

display cpu-usage configuration [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display cpu-usage configuration [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Display the historical CPU usage statistics in a coordinate system.

In standalone mode:

display cpu-usage history [ job job-id ] [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display cpu-usage history [ job job-id ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Display hardware information.

In standalone mode:

display device  [ slot slot-number [ cpu cpu-number ] [ subslot subslot-number ] | verbose ]

In IRF mode:

display device [ chassis chassis-number [ slot slot-number [ cpu cpu-number ] [ subslot subslot-number ] ] | verbose ]

Display electronic label information for the device.

In standalone mode:

display device manuinfo [ slot slot-number [ cpu cpu-number ] [ subslot subslot-number ] ]

In IRF mode:

display device manuinfo [ chassis chassis-number [ slot slot-number [ cpu cpu-number ] [ subslot subslot-number ] ] ]

Display electronic label information for the chassis backplane.

In standalone mode:

display device manuinfo chassis-only

In IRF mode:

display device manuinfo chassis chassis-number chassis-only

Display electronic label information for a fan tray.

In standalone mode:

display device manuinfo fan fan-id

In IRF mode:

display device manuinfo chassis chassis-number fan fan-id

Display electronic label information for a power supply.

In standalone mode:

display device manuinfo power power-id

In IRF mode:

display device manuinfo chassis chassis-number power power-id

Display or save operating information for features and hardware modules.

display diagnostic-information [ hardware | infrastructure | l2 | l3 | service ] [ context context-name ] [ key-info ] [ filename ]

Display device temperature information.

In standalone mode:

display environment [ slot slot-number ]

In IRF mode:

display environment [ chassis chassis-number [ slot slot-number ] ]

Display the operating states of fan trays.

In standalone mode:

display fan [ fan-id ]

In IRF mode:

display fan [ chassis chassis-number [ fan-id ] ]

Display memory usage statistics.

In standalone mode:

display memory [ summary ] [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display memory [ summary ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Display memory alarm thresholds and statistics.

In standalone mode:

display memory-threshold [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display memory-threshold [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Display power supply information.

In standalone mode:

display power [ power-id ]

In IRF mode:

display power [ chassis chassis-number [ power-id ] ]

Display resource monitoring information.

In standalone mode:

display resource-monitor [ resource resource-name ] [ slot slot-number [ cpu cpu-number ] ]

In IRF mode:

display resource-monitor [ resource resource-name ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]

Display job configuration information.

display scheduler job [ job-name ]

Display job execution log information.

display scheduler logfile

Display the automatic reboot schedule.

display scheduler reboot

Display schedule information.

display scheduler schedule [ schedule-name ]

Display system heath status information.

In standalone mode:

display system health

In IRF mode:

display system health [ chassis chassis-number ]

display display system health [ chassis chassis-number ]

Display historical system heath status change information.

In standalone mode:

display system health history

In IRF mode:

display system health history[ chassis chassis-number ]

Display system stability and status information.

display system stable state [ context { context-id | all } ]

Display system working mode information.

display system-working-mode

Display system version information.

display version

Display startup software image upgrade records.

display version-update-record

Clear job execution log information.

reset scheduler logfile

Clear startup software image upgrade records.

reset version-update-record

 

NOTE:

·     Executing the display cpu-usage, display cpu-usage configuration, display cpu-usage history, or display memory command on a context displays information for the context.

·     The display device command displays device information about the physical devices, whether you execute the command on the default context or on a non-default context.

 

NOTE:

The following commands are supported only on the default context:

·     display alarm

·     display bootrom-access

·     display device manuinfo chassis-only

·     display memory-threshold

·     display system-working-mode

·     display version-update-record

·     reset scheduler logfile

·     reset version-update-record

·     display xbar

 

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网