- Table of Contents
- Related Documents
-
Title | Size | Download |
---|---|---|
02-INT commands | 96.18 KB |
telemetry ifa acl action add-metadata
telemetry ifa acl action mirror-to-processor drop
telemetry ifa acl local-loopback action add-metadata
telemetry ifa action mirror-to-processor
telemetry ifa global packet-drop
telemetry ifa role (interface view)
INT commands
display telemetry ifa
Use display telemetry ifa to display INT configuration.
Syntax
display telemetry ifa
Views
Any view
Predefined user roles
network-admin
network-operator
Examples
# (Common INT.) Display the INT configuration on the entry node.
<Sysname> display telemetry ifa
Telemetry ifa status : Enabled
Telemetry ifa packet-drop : Disabled
Telemetry ifa device-id : 10.1.1.10
Telemetry ifa role:
Twenty-FiveGigE1/0/1: Ingress
Telemetry ifa loopback:
Twenty-FiveGigE1/0/2
# (Common INT.) Display the INT configuration on the transit node.
<Sysname> display telemetry ifa
Telemetry ifa status : Enabled
Telemetry ifa packet-drop : Disabled
Telemetry ifa device-id : 10.1.1.10
Telemetry ifa role:
Twenty-FiveGigE1/0/1: Transit
# (Common INT.) Display the INT configuration on the exit node.
<Sysname> display telemetry ifa
Telemetry ifa status : Enabled
Telemetry ifa packet-drop : Disabled
Telemetry ifa device-id : 10.1.1.10
Telemetry ifa role:
Twenty-FiveGigE1/0/1: Egress
Telemetry ifa collector:
Source IP: 20.0.0.2
Destination IP: 30.0.0.1
Source-port: 12
Destination-port: 14
# (Flexible INT.) Display the INT configuration on the entry node.
<Sysname> display telemetry ifa
Telemetry ifa status : Enabled
Telemetry ifa packet-drop : Disabled
Telemetry ifa device-id : 10.1.1.10
Telemetry ifa action:
Twenty-FiveGigE1/0/1:
Telemetry ifa 1 acl 2000 action mirror-to-processor sampler samp
Telemetry ifa 2 acl user-defined 5000 local-loopback action add-metadata
Telemetry ifa loopback:
Twenty-FiveGigE1/0/2
# (Flexible INT.) Display the INT configuration on the transit node.
<Sysname> display telemetry ifa
Telemetry ifa status : Enabled
Telemetry ifa packet-drop : Disabled
Telemetry ifa device-id : 10.1.1.10
Telemetry ifa action:
Twenty-FiveGigE1/0/1:
Telemetry ifa 1 acl user-defined 5000 action add-metadata
# (Flexible INT.) Display the INT configuration on the exit node.
<Sysname> display telemetry ifa
Telemetry ifa status : Enabled
Telemetry ifa packet-drop : Disabled
Telemetry ifa device-id : 10.1.1.10
Telemetry ifa action:
Twenty-FiveGigE1/0/1:
Telemetry ifa 1 acl user-defined 5000 action mirror-to-processor drop
Telemetry ifa collector:
Source IP: 20.0.0.2
Destination IP: 30.0.0.1
Source-port: 12
Destination-port: 14
Field |
Description |
Telemetry ifa role |
INT role: · Ingress—Entry node. · Transit—Transit node. · Egress—Exit node. |
Telemetry ifa packet-drop |
Global INT packet dropping: Enabled or Disabled. |
Telemetry ifa loopback |
Interface on which internal loopback is enabled. |
Telemetry ifa collector |
Encapsulation parameters for INT packets. |
Telemetry ifa action |
Flexible INT configuration: · ifa 1—Action ID. · action add-metadata—Action of adding collected data on the transit node. · action mirror-to-processor drop—Action of mirroring incoming INT packets to the INT processor and dropping original INT packets on the transit node. · local-loopback action add-metadata—Action of adding collected data to incoming INT packets on the entry or exit node. |
Related commands
telemetry ifa acl action add-metadata
telemetry ifa acl action mirror-to-processor drop
telemetry ifa acl local-loopback action add-metadata
telemetry ifa action mirror-to-processor
telemetry ifa collector
telemetry ifa device-id
telemetry ifa role
telemetry ifa acl action add-metadata
Use telemetry ifa acl action add-metadata to configure an action of adding collected data to incoming INT packets on the transit node.
Use undo telemetry ifa acl action add-metadata to delete an action.
Syntax
telemetry ifa ifa-id acl user-defined { acl-number | name acl-name } action add-metadata
undo telemetry ifa ifa-id
Default
No action is configured.
Views
Layer 2 Ethernet interface view
Layer 3 Ethernet interface view
Predefined user roles
network-admin
Parameters
ifa-id: Specifies an action ID in the range of 1 to 32.
user-defined: Specifies a user-defined ACL.
acl-number: Specifies a user-defined ACL by its number in the range of 5000 to 5999.
name acl-name: Specifies a user-defined ACL by its name, a case-insensitive string of 1 to 63 characters.
Usage guidelines
This command adds collected data to INT packets matching the specified ACL for calculating the transmission delay of the network.
If an ACL is used on the entry node to match original packets, the ACL specified in this command must have the same identification attributes plus an attribute to identify the INT flag. The identification attributes and the attribute to identify the INT flag must be in the same rule. For example, the rule in the ACL used on the entry node is rule permit tcp source 10.0.0.3 0, the rule in the ACL specified in this command must be rule permit tcp source 10.0.0.3 0 ifa l5 aaaaaaaabbbbbbbb ffffffffffffffff 0.
If the specified ACL does not exist or does not have any rules, no traffic will match the ACL.
If the vpn-instance vpn-instance-name option is specified in an ACL rule, the rule takes effect only on VPN packets. If the vpn-instance vpn-instance-name option is not specified in an ACL rule, the rule takes effect on both non-VPN packets and VPN packets.
This command and the telemetry ifa role command are mutually exclusive on an interface.
You can execute this command multiple times to configure different actions for different traffic types. If you execute this command multiple times with the same ifa-id, the most configuration takes effect.
Examples
# Configure an action of adding collected data to incoming INT packets on Twenty-FiveGigE 1/0/1.
<Sysname> system-view
[Sysname] interface twenty-fivegige 1/0/1
[Sysname-Twenty-FiveGigE1/0/1] telemetry ifa 1 acl user-defined 5001 action add-metadata
Related commands
acl (ACL and QoS Command Reference)
telemetry ifa role
telemetry ifa acl action mirror-to-processor drop
Use telemetry ifa acl action mirror-to-processor drop to configure an action of mirroring incoming INT packets to the INT processor and dropping original INT packets on the exit node.
Use undo telemetry ifa acl action mirror-to-processor drop to delete an action.
Syntax
telemetry ifa ifa-id acl user-defined { acl-number | name acl-name } action mirror-to-processor drop
undo telemetry ifa ifa-id
Default
No action is configured.
Views
Layer 2 Ethernet interface view
Layer 3 Ethernet interface view
Predefined user roles
network-admin
Parameters
ifa-id: Specifies an action ID in the range of 1 to 32.
user-defined: Specifies a user-defined ACL.
acl-number: Specifies a user-defined ACL by its number in the range of 5000 to 5999.
name acl-name: Specifies a user-defined ACL by its name, a case-insensitive string of 1 to 63 characters.
Usage guidelines
This command mirrors incoming INT packets matching the specified ACL to the INT processor, drops original INT packets, encapsulates the mirrored INT packets, and sends them to the collector.
If an ACL is used on the entry node to match original packets, the ACL specified in this command must have the same identification attributes plus an attribute to identify the INT flag. The identification attributes and the attribute to identify the INT flag must be in the same rule. For example, the rule in the ACL used on the entry node is rule permit tcp source 10.0.0.3 0, the rule in the ACL specified in this command must be rule permit tcp source 10.0.0.3 0 ifa l5 aaaaaaaabbbbbbbb ffffffffffffffff 0.
If the specified ACL does not exist or does not have any rules, no traffic will match the ACL.
If the vpn-instance vpn-instance-name option is specified in an ACL rule, the rule takes effect only on VPN packets. If the vpn-instance vpn-instance-name option is not specified in an ACL rule, the rule takes effect on both non-VPN packets and VPN packets.
This command and the telemetry ifa role command are mutually exclusive on an interface.
You can execute this command multiple times to configure different actions for different traffic types. If you execute this command multiple times with the same ifa-id, the most configuration takes effect.
Examples
# Configure an action of mirroring incoming INT packets matching the specified ACL to the INT processor and dropping the original INT packets on Twenty-FiveGigE 1/0/1.
<Sysname> system-view
[Sysname] interface twenty-fivegige 1/0/1
[Sysname-Twenty-FiveGigE1/0/1] telemetry ifa 2 acl user-defined 5001 action mirror-to-processor sampler S1 drop
Related commands
acl (ACL and QoS Command Reference)
telemetry ifa role
telemetry ifa acl local-loopback action add-metadata
Use telemetry ifa acl local-loopback action add-metadata to configure an action of adding collected data to local loopback traffic on the entry node.
Use undo telemetry ifa to delete an action.
Syntax
telemetry ifa ifa-id acl user-defined { acl-number | name acl-name } local-loopback action add-metadata
undo telemetry ifa ifa-id
Default
No action is configured.
Views
Layer 2 Ethernet interface view
Layer 3 Ethernet interface view
Predefined user roles
network-admin
Parameters
ifa-id: Specifies an action ID in the range of 1 to 32.
user-defined: Specifies a user-defined ACL.
acl-number: Specifies a user-defined ACL by its number in the range of 5000 to 5999.
name acl-name: Specifies a user-defined ACL by its name, a case-insensitive string of 1 to 63 characters.
Usage guidelines
This command adds collected data to local loopback traffic matching the specified ACL for calculating the transmission delay of the network.
If an ACL is used on the entry node to match original packets, the ACL specified in this command must have the same identification attributes plus an attribute to identify the INT flag. The identification attributes and the attribute to identify the INT flag must be in the same rule. For example, the rule in the ACL used on the entry node is rule permit tcp source 10.0.0.3 0, the rule in the ACL specified in this command must be rule permit tcp source 10.0.0.3 0 ifa l5 aaaaaaaabbbbbbbb ffffffffffffffff 0.
If the specified ACL does not exist or does not have any rules, no traffic will match the ACL.
If the vpn-instance vpn-instance-name option is specified in an ACL rule, the rule takes effect only on VPN packets. If the vpn-instance vpn-instance-name option is not specified in an ACL rule, the rule takes effect on both non-VPN packets and VPN packets.
This command and the telemetry ifa role command are mutually exclusive on an interface.
You can execute this command multiple times to configure different actions for different traffic types. If you execute this command multiple times with the same ifa-id, the most configuration takes effect.
Examples
# Configure an action of adding collected data to local loopback traffic on Twenty-FiveGigE 1/0/1.
<Sysname> system-view
[Sysname] interface twenty-fivegige 1/0/1
[Sysname-Twenty-FiveGigE1/0/1] telemetry ifa 2 acl user-defined 5001 local-loopback action add-metadata
Related commands
acl (ACL and QoS Command Reference)
telemetry ifa role
telemetry ifa action mirror-to-processor
Use telemetry ifa action mirror-to-processor to configure an action of mirroring incoming packets to the INT processor on the entry node.
Use undo telemetry ifa action mirror-to-processor to delete an action.
Syntax
telemetry ifa ifa-id [ acl [ mac | user-defined ] { acl-number | name acl-name } ] action mirror-to-processor [ sampler sampler-name ]
undo telemetry ifa ifa-id
Default
No action is configured.
Views
Layer 2 Ethernet interface view
Layer 3 Ethernet interface view
Predefined user roles
network-admin
Parameters
ifa-id: Specifies an action ID in the range of 1 to 32.
acl: Specifies an ACL. If you do not specify this keyword, the command mirrors all packets.
· mac: Specifies a Layer 2 ACL.
· user-defined: Specifies a user-defined ACL.
· acl-number: Specifies an ACL by its number. The following are available value ranges:
¡ 2000 to 2999 for basic ACLs.
¡ 3000 to 3999 for advanced ACLs.
¡ 4000 to 4999 for Layer 2 ACLs.
¡ 5000 to 5999 for user-defined ACLs.
· name acl-name: Specifies an ACL by its name, a case-insensitive string of 1 to 63 characters.
sampler sampler-name: Specifies a sampler by its name, a case-insensitive string of 1 to 31 characters. If you do not specify this option, the command mirrors all packets.
Usage guidelines
When specifying an ACL, follow these restrictions and guidelines:
· If the specified ACL does not exist or does not have any rules, no traffic will match the ACL.
· If the vpn-instance vpn-instance-name option is specified in an ACL rule, the rule takes effect only on VPN packets. If the vpn-instance vpn-instance-name option is not specified in an ACL rule, the rule takes effect on both non-VPN packets and VPN packets.
This command and the telemetry ifa role command are mutually exclusive on an interface.
When specifying an ACL by its number, follow these rules:
· To specify an IPv4 ACL, specify the acl-number argument.
· To specify a Layer 2 or user-defined ACL, you can specify its ACL number without the mac or user-defined keyword.
When specifying an ACL by its name, follow these rules:
· To specify an IPv4 ACL, specify the name acl-name option.
· To specify an Layer 2 or user-defined ACL, you can specify both its ACL name and the related keyword.
A sampler selects a packet from sequential packets and sends the packet to other service modules for processing. You can reference a nonexistent sampler and then create the sampler. For more information about sampler, see Network Management and Monitoring Configuration Guide.
This command and the telemetry ifa role command are mutually exclusive on an interface.
If you execute this command multiple times with the same ifa-id, the most configuration takes effect.
Examples
# Configure an action of mirroring incoming packets matching the specified ACL to the INT processor on Twenty-FiveGigE 1/0/1.
<Sysname> system-view
[Sysname] interface twenty-fivegige 1/0/1
[Sysname-Twenty-FiveGigE1/0/1] telemetry ifa 1 acl 3000 action mirror-to-processor sampler S1
Related commands
acl (ACL and QoS Command Reference)
telemetry ifa role
telemetry ifa device-id
Use telemetry ifa device-id to specify a device ID for an INT node.
Use undo telemetry ifa device-id to restore the default.
Syntax
telemetry ifa device-id address
undo telemetry ifa device-id
Default
An INT node does not have a device ID.
Views
System view
Predefined user roles
network-admin
Parameters
address: Specifies an IPv4 address as the device ID. You can specify any IPv4 address other than 0.0.0.0. As a best practice, specify the loopback address of the device as the device ID.
Examples
# Specify IPv4 address 10.1.1.10 as the device ID.
<Sysname> system-view
[Sysname] telemetry ifa device-id 10.1.1.10
Related commands
telemetry ifa role
telemetry ifa global enable
Use telemetry ifa global enable to enable INT globally.
Use undo telemetry ifa global enable to disable INT globally.
Syntax
telemetry ifa global enable
undo telemetry ifa global enable
Default
INT is enabled globally.
Views
System view
Predefined user roles
network-admin
Examples
# Enable INT globally.
<Sysname> system-view
[Sysname] telemetry ifa global enable
Related commands
telemetry ifa collector
telemetry ifa device-id
telemetry ifa role
telemetry ifa global packet-drop
Use telemetry ifa global packet-drop to enable global INT packet dropping.
Use undo telemetry ifa global packet-drop to disable global INT packet dropping.
Syntax
telemetry ifa global packet-drop
undo telemetry ifa global packet-drop
Default
Global INT packet dropping is disabled.
Views
System view
Predefined user roles
network-admin
Usage guidelines
Execute this command if you do not want to send INT packets to the downstream node.
Examples
# Enable global INT packet dropping.
<Sysname> system-view
[Sysname] telemetry ifa global packet-drop
Related commands
display telemetry ifa
telemetry ifa loopback
|
NOTE: This command is required only on the S6805, S6825, and S9850 series switches. |
Use telemetry ifa loopback to enable internal loopback on an interface on the entry node.
Use undo telemetry ifa loopback to disable internal loopback on an interface on the entry node.
Syntax
telemetry ifa loopback
undo telemetry ifa loopback
Default
Internal loopback is disabled on an interface on the entry node.
Views
Interface view
Predefined user roles
network-admin
Usage guidelines
When you execute the telemetry ifa role ingress (in common INT) or telemetry ifa action mirror-to-processor (in flexible INT) command on an interface, the device prints the port list in the port group to which the interface belongs. You must enable internal loopback on an interface in the port group other than that interface.
After you enable internal loopback on an interface, all settings on the interface are lost, and the interface can be used only for internal loopback.
If you specify multiple interfaces in the port group as ingress interfaces, you may enable internal loopback only on one interface in the port group.
To determine which ports are in one group, execute the display qos-acl resource command. The ports in the same Interfaces field belong to the same group.
Examples
# Enable internal loopback on Twenty-FiveGigE 1/0/1 on the entry node.
<Sysname> system-view
[Sysname] interface twenty-fivegige 1/0/1
[Sysname-Twenty-FiveGigE1/0/1] telemetry ifa loopback
All configurations on the interface will be lost. Continue?[Y/N]:y
[Sysname–Twenty-FiveGigE1/0/1]
Related commands
telemetry ifa collector
telemetry ifa device-id
telemetry ifa role
telemetry ifa role (interface view)
Use telemetry ifa role to specify an INT role for an interface.
Use undo telemetry ifa role to restore the default.
Syntax
telemetry ifa role { egress | ingress | transit }
undo telemetry ifa role
Default
An interface does not take any INT role.
Views
Layer 2 Ethernet interface view
Layer 3 Ethernet interface view
Predefined user roles
network-admin
Parameters
egress: Specifies the interface as an egress interface.
ingress: Specifies the interface as an ingress interface.
transit: Specifies the interface as a transit interface.
Usage guidelines
For common INT, specify the interface on the entry node as the ingress interface. Specify the interface on the transit node as the transit interface. Specify the interface on the exit node as the egress interface.
Interfaces in different roles take different actions on incoming packets.
· The ingress interface adds a timestamp and encapsulates the packet as an INT packet.
· The transit interface adds a timestamp for the INT packet.
· The egress interface adds a timestamp, encapsulates the INT packet according to the specified addressing parameters, and sends it to the collector.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Specify Twenty-FiveGigE 1/0/1 as the transit interface.
<Sysname> system-view
[Sysname] interface twenty-fivegige 1/0/1
[Sysname-Twenty-FiveGigE1/0/1] telemetry ifa role transit
Related commands
telemetry ifa device-id
telemetry ifa collector
Use telemetry ifa collector to configure the addressing parameters to encapsulate in INT packets sent to the collector.
Use undo telemetry ifa collector to restore the default.
Syntax
telemetry ifa collector source source-address destination dest-address source-port port destination-port port [ vlan vlan-id ]
undo telemetry ifa collector
Default
No addressing parameters are configured for INT packets.
Views
System view
Predefined user roles
network-admin
Parameters
source source-address: Specifies the source IP address for INT packets.
destination dest-address: Specifies the destination IP address for INT packets.
source-port port: Specifies the source port number for INT packets.
destination-port port: Specifies the destination port number for INT packets.
vlan vlan-id: Specifies a VLAN ID in the range of 1 to 4094.
Usage guidelines
Use this command on the exit node. The exit node uses the addressing parameters to find the outgoing interface for INT packets and sends the packets to the collector.
Do not specify the IP address of the management Ethernet port on the local device for the destination dest-address option.
Examples
# Specify source IP address 1.1.1.1, destination IP address 2.2.2.2, source port number 67, and destination port number 68 for INT packets.
<Sysname> system-view
[Sysname] telemetry ifa collector source 1.1.1.1 destination 2.2.2.2 source-port 67 destination-port 68
Related commands
telemetry ifa device-id
telemetry ifa role