12-Network Management and Monitoring Command Reference

HomeSupportSwitchesS9850-G SeriesTechnical DocumentsReference GuidesCommand ReferencesH3C S6850-G&S6805-G&S9850-G Switch Series Command References-R8336Pxx-6W10012-Network Management and Monitoring Command Reference
14-NetAnalysis commands
Title Size Download
14-NetAnalysis commands 306.85 KB

Contents

NetAnalysis commands· 1

NetAnalysis for RoCEv2 commands· 1

display netanalysis rocev2 cache· 1

display netanalysis rocev2 statistics· 4

netanalysis rocev2 ai-ecn enable· 6

netanalysis rocev2 drop global 6

netanalysis rocev2 mode· 7

netanalysis rocev2 report-interval 8

netanalysis rocev2 sampling-rate· 9

netanalysis rocev2 statistics· 10

netanalysis rocev2 timeout inactive· 10

netanalysis rocev2 vxlan drop global 11

netanalysis rocev2 vxlan statistics· 12

netanalysis rocev2 vxlan-ip drop global 13

netanalysis rocev2 vxlan-ip statistics· 14

reset netanalysis rocev2 statistics· 15

NetAnalysis for UDP commands· 15

display netanalysis udp cache· 15

display netanalysis udp statistics· 16

netanalysis udp identification block· 17

netanalysis udp statistics· 18

netanalysis udp timeout inactive· 19

reset netanalysis udp statistics· 20

NetAnalysis unified flow commands· 21

activate· 21

aging-time· 21

bind all-interface· 22

bind interface· 23

display netanalysis unified-flow· 24

display netanalysis unified-flow isdf-detect event-log· 27

display uad detection-result 28

exclude interface· 29

export-interval 29

netanalysis unified-flow· 30

flow· 31

flow-type· 32

hardware-flow aging-time· 33

hardware-flow delay-threshold· 34

hardware-flow export-interval 35

ifit color-flag tos-bit 35

ifit period· 36

instance· 37

isdf-detect drop-threshold· 38

isdf-detect period· 38

report-loss-reason enable· 39

reset netanalysis unified-flow· 40

uad enable (interface view) 40

uad enable (system view) 41

 


NetAnalysis commands

NetAnalysis for RoCEv2 commands

display netanalysis rocev2 cache

Use display netanalysis rocev2 cache to display the configuration and status of the RoCEv2 cache.

Syntax

display netanalysis rocev2 cache [ destination destination-ip | dstvxlan-id dstvxlan-id | source source-ip | srcvxlan-id srcxlan-id ]*

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

destination destination-ip: Specifies a server IP address.

dstvxlan-id dstvxlan-id: Specifies the destination VXLAN ID for the RoCEv2 flow. The value range of the dstvxlan-id argument is 0 to 16777215.

source source-ip: Specifies a client IP address.

srcvxlan-id srcvxlan-id: Specifies the source VXLAN ID for the RoCEv2 flow. The value range of the srcvxlan-id argument is 0 to 16777215.

Usage guidelines

The device uses the RoCEv2 cache to save RoCEv2 traffic statistics after receiving RoCEv2 flows. When an RoCEv2 flow ages out, the device deletes the related traffic statistics from the RoCEv2 cache.

Examples

# Display the configuration and status of the RoCEv2 cache when bidirectional mode is used for RoCEv2 traffic analysis.

<Sysname> display netanalysis rocev2 cache source 1.1.1.2 destination 2.2.2.1

NOTE:

S2D: source to destination              D2S: destination to source

RTT: round trip time                    RPT: packet throughput in read mode

WPT: packet throughput in write mode    SPT: packet throughput in send mode

I: input          O: output             L: local          R: remote

NetAnalysis cache information:

--------------------------------------------------------------------------------

Flow created at      Service type

Src IP               Src QP        S2D RTT          S2D RPT       S2D SPT/WPT

S2D NAK Pkts         S2D Interface(I)               S2D Interface(O)

S2D Src VXLAN ID     S2D Dst VXLAN ID

Dst IP               Dst QP        D2S RTT          D2S RPT       D2S SPT/WPT

D2S NAK Pkts         D2S Interface(I)               D2S Interface(O)

D2S Src VXLAN ID     D2S Dst VXLAN ID

--------------------------------------------------------------------------------

01/22/2019 09:08:15  RC

1.1.1.2              93309         50               11            11

2                    XGE1/0/1(L)                     XGE1/0/2(L)

10                   10

2.2.2.1              85353         50               11            11

8373                 XGE1/0/2(L)                     XGE1/0/1(L)

10                   10

Table 1 Command output

Field

Description

NOTE: 

S2D: source to destination              D2S: destination to source

RTT: round trip time                    RPT: packet throughput in read mode

WPT: packet throughput in write mode    SPT: packet throughput in send mode

I: input                                O: output

L: local                               R: remote

Meanings of the acronyms:

·     S2D—Statistics about an RoCEv2 flow sent from a client to a server.

·     D2S—Statistics about an RoCEv2 flow sent from a server to a client.

·     RTT—RTT for an RoCEv2 flow.

·     RPT—Read packet throughput.

·     WPT—Write packet throughput.

·     SPT—Send packet throughput.

·     I—Incoming interface for an RoCEv2 flow.

·     O—Outgoing interface for an RoCEv2 flow.

·     L—Local interface.

·     R—Interface on an M-LAG peer.

NetAnalysis cache information

Configuration and status of the RoCEv2 cache.

Flow created at

Time when the RoCEv2 flow was created.

Service type

Service type of the RoCEv2 flow:

·     RC—Reliable connection.

·     UC—Unreliable connection. This type is not supported in the current software version.

·     RD—Reliable datagram. This type is not supported in the current software version.

·     UD—Unreliable datagram.

·     XRC—Extended reliable connection. This type is not supported in the current software version.

Src IP

Client IP address for the RoCEv2 flow.

Dst IP

Server IP address for the RoCEv2 flow.

Src QP

Client QP for the RoCEv2 flow.

Dst QP

Server QP for the RoCEv2 flow.

S2D RPT

Throughput in KBps for the Read packets sent from the client.

D2S RPT

Throughput in KBps for the Read packets sent from the server. If the RoCEv2 flow service type is UD, this field displays 0.

S2D SPT/WPT

Throughput in KBps for the Send and Write packets sent from the client. The value for this field might be inaccurate if the device is configured with the mirror-to cpu command or INT feature.

D2S SPT/WPT

Throughput in KBps for the Send and Write packets sent from the server. The value for this field might be inaccurate if the device is configured with the mirror-to cpu command or INT feature. If the RoCEv2 flow service type is UD, this field displays 0.

S2D RTT

RTT in nanoseconds for the RoCEv2 flow sent from the client. If the RoCEv2 flow service type is UD, this field displays 0.

D2S RTT

RTT in nanoseconds for the RoCEv2 flow sent from the server. If the RoCEv2 flow service type is UD, this field displays 0.

S2D NAK Pkts

Number of NAK packets sent from the client. Packet loss has occurred if this field is not 0.

D2S NAK Pkts

Number of NAK packets sent from the server. Packet loss has occurred if this field is not 0.

S2D Interface(I)

Incoming interface for the RoCEv2 flow sent from the client.

S2D Interface(O)

Outgoing interface for the RoCEv2 flow sent from the client.

D2S Interface(I)

Incoming interface for the RoCEv2 flow sent from the server. Packets sent by a loopback interface cannot carry physical interface information. If the RoCEv2 flow service type is UD, this field displays 0.

D2S Interface(O)

Outgoing interface for the RoCEv2 flow sent from the server. If the RoCEv2 flow service type is UD, this field displays 0.

S2D Src VXLAN ID

Source VXLAN ID of the RoCEv2 flow sent from the client. A value of N/A indicates non-VXLAN flow table.

S2D Dst VXLAN ID

Destination VXLAN ID for the RoCEv2 flow originating from the client. A value of N/A indicates non-VXLAN flow table.

D2S Src VXLAN ID

Source VXLAN ID for the RoCEv2 flow returned from the server. A value of N/A indicates non-VXLAN flow table. If the RoCEv2 flow service type is UD, this field displays 0.

D2S Dst VXLAN ID

Destination VXLAN ID for the RoCEv2 flow returned from the server. A value of N/A indicates non-VXLAN flow table. If the RoCEv2 flow service type is UD, this field displays 0.

 

# Display the configuration and status of the RoCEv2 cache when unidirectional mode is used for RoCEv2 traffic analysis.

<sysname> display netanalysis rocev2 cache source 1.1.1.2 destination 2.2.2.1

NOTE: 

RPT: packet throughput in read mode    WPT: packet throughput in write mode

SPT: packet throughput in send mode

I: input          O: output            L: local          R: remote

NetAnalysis cache information:

-----------------------------------------------------------------------------

Flow created at          Service type

Src IP                   Dst IP                   Src QP        Dst QP

Interface(I)             Interface(O)             RPT           SPT/WPT

Src VXLAN ID             Dst VXLAN ID

-----------------------------------------------------------------------------

01/22/2019 09:08:15      RC

1.1.1.2                  2.2.2.1                  N/A           8373

XGE1/0/1(L)               XGE1/0/2(L)               11            11

10                       10

Table 2 Command output

Field

Description

NOTE: 

RPT: packet throughput in read mode    WPT: packet throughput in write mode

SPT: packet throughput in send mode

I: input                               O: output

L: local                              R: remote

Meanings of the acronyms:

·     RPT—Read packet throughput.

·     WPT—Write packet throughput.

·     SPT—Send packet throughput.

·     I—Incoming interface for an RoCEv2 flow.

·     O—Outgoing interface for an RoCEv2 flow.

·     L—Local interface.

·     R—Interface on an M-LAG peer.

NetAnalysis cache information

Configuration and status of the RoCEv2 cache.

Flow created at

Time when the RoCEv2 flow was created.

Service type

Service type of the RoCEv2 flow:

·     RC—Reliable connection.

·     UC—Unreliable connection. This type is not supported in the current software version.

·     RD—Reliable datagram. This type is not supported in the current software version.

·     UD—Unreliable datagram.

·     XRC—Extended reliable connection. This type is not supported in the current software version.

Src IP

Source IP address for the RoCEv2 flow.

Dst IP

Destination IP address for the RoCEv2 flow.

Src QP

Source QP for the RoCEv2 flow.

Dst QP

Destination QP for the RoCEv2 flow.

RPT

Throughput in KBps for Read packets.

SPT/WPT

Throughput in KBps for the Send and Write packets. The value for this field might be inaccurate if the device is configured with the mirror-to cpu command or INT feature.

NAK Pkts

Number of NAK packets. Packet loss has occurred if this field is not 0.

Interface(I)

Incoming interface for the RoCEv2 flow.

Interface(O)

Outgoing interface for the RoCEv2 flow.

Src VXLAN ID

Source VXLAN ID for the RoCEv2 flow. A value of N/A indicates non-VXLAN flow table.

Dst VXLAN ID

Destination VXLAN ID for the RoCEv2 flow. A value of N/A indicates non-VXLAN flow table.

 

display netanalysis rocev2 statistics

Use display netanalysis rocev2 statistics to display RoCEv2 traffic statistics.

Syntax

display netanalysis rocev2 statistics

Views

Any view

Predefined user roles

network-admin

network-operator

Examples

# Display RoCEv2 traffic statistics when bidirectional mode is used for RoCEv2 traffic analysis.

<Sysname> display netanalysis rocev2 statistics

Last statistics resetting time: Never

--------------------------------------------------------------------------------

Received packets: 1833088

--------------------------------------------------------------------------------

Type

         Active         Aged           Created         Reported

        (Sessions)     (Sessions)     (Sessions)      (Sessions)

--------------------------------------------------------------------------------

RoCEv2

        2               0               2              10

--------------------------------------------------------------------------------

# Display RoCEv2 traffic statistics when unidirectional mode is used for RoCEv2 traffic analysis.

<Sysname> display netanalysis rocev2 statistics

Last statistics resetting time: Never

--------------------------------------------------------------------------------

Received packets: 2833088

--------------------------------------------------------------------------------

Type

         Active        Aged           Created        Reported

        (Flows)       (Flows)         (Flows)        (Flows)

--------------------------------------------------------------------------------

RoCEv2

        4              0              2              20

--------------------------------------------------------------------------------

Table 3 Command output

Field

Description

Last statistics resetting time

Time when the RoCEv2 traffic statistics were last cleared.

Received packets

Number of received RoCEv2 packets.

Type

Flow type. The current software version supports only the RoCEv2 flow type.

Active (Flows)

Number of active flows.

Aged (Flows)

Number of aged flows.

Created (Flows)

Number of created flows.

Reported (Flows)

Number of flows reported to the NDA.

Active (Sessions)

Number of active sessions.

Aged (Sessions)

Number of aged sessions.

Created (Sessions)

Number of created sessions.

Reported (Sessions)

Number of sessions reported to the NDA.

 

Related commands

reset netanalysis rocev2 statistics

netanalysis rocev2 ai-ecn enable

Use netanalysis rocev2 ai-ecn enable to enable AI ECN for RoCEv2 traffic statistics collection.

Use undo netanalysis rocev2 ai-ecn enable to disable AI ECN for RoCEv2 traffic statistics collection.

Syntax

netanalysis rocev2 ai-ecn enable

undo netanalysis rocev2 ai-ecn enable

Default

AI ECN is disabled for RoCEv2 traffic statistics collection.

Views

System view

Predefined user roles

network-admin

Usage guidelines

AI ECN allows the device to collect RoCEv2 traffic statistics on a per-session basis on the outgoing interfaces for RoCEv2 traffic and send the RoCEv2 traffic statistics to the NDA. Based on the RoCEv2 traffic statistics, the NDA automatically adjusts the ECN threshold for lossless queues to ensure low latency and high throughput for lossless traffic. For more information about ECN, see QoS configuration in ACL and QoS Configuration Guide.

This feature is based on the global RoCEv2 traffic analysis. You must specify the global keyword for at least one of netanalysis rocev2 statistics, netanalysis rocev2 vxlan statistics, netanalysis rocev2 vxlan-ip statistics commands.

Examples

# Enable AI ECN for RoCEv2 traffic statistics collection.

<Sysname> system-view

[Sysname] netanalysis rocev2 ai-ecn enable

Related commands

netanalysis rocev2 mode

netanalysis rocev2 drop global

Use netanalysis rocev2 drop global to enable RoCEv2 packet loss analysis globally.

Use undo netanalysis rocev2 drop global to disable RoCEv2 packet loss analysis globally.

Syntax

netanalysis rocev2 drop global

undo netanalysis rocev2 drop global

Default

RoCEv2 packet loss analysis is disabled globally.

Views

System view

Predefined user roles

network-admin

Usage guidelines

For RoCEv2 packet loss analysis to take effect, first enable bidirectional mode for RoCEv2 traffic analysis.

This command enables the device to perform RoCEv2 packet loss analysis for all received RoCEv2 packets.

To view RoCEv2 packet loss statistics, examine the S2D NAK Pkts and D2S NAK Pkts fields in the output from the display netanalysis rocev2 cache command.

Examples

# Enable RoCEv2 packet loss analysis globally.

<Sysname> system-view

[Sysname] netanalysis rocev2 drop global

Related commands

netanalysis rocev2 mode

netanalysis rocev2 mode

Use netanalysis rocev2 mode to set the mode of RoCEv2 traffic analysis.

Use undo netanalysis rocev2 mode to restore the default.

Syntax

netanalysis rocev2 mode { bidir | single } [ session ]

undo netanalysis rocev2 mode

Default

RoCEv2 traffic analysis is disabled, and the mode of RoCEv2 traffic analysis is not set.

Views

System view

Predefined user roles

network-admin

Parameters

bidir: Specifies bidirectional mode. In this mode, NetAnalysis collects RoCEv2 traffic statistics based on RoCEv2 sessions and provides the RTT and lost packet count for each RoCEv2 session.

single: Specifies unidirectional mode. In this mode, NetAnalysis collects RoCEv2 traffic statistics based on RoCEv2 flows and does not provides the flow-specific RTT or lost packet count.

session: Specifies session mode. In this mode, NetAnalysis collects RoCEv2 traffic statistics and analyze packet loss based on sessions

Usage guidelines

For NetAnalysis features to take effect, first set the mode of RoCEv2 traffic analysis.

When you change the mode of RoCEv2 traffic analysis, all NetAnalysis configuration and the RoCEv2 cache are cleared. Make sure you are fully aware of the impact of this operation when you perform it on a live network.

When multiple paths exist between an RDMA client and an RDMA server, set the mode of RoCEv2 traffic analysis as follows to ensure correct RoCEv2 traffic analysis:

·     Enable bidirectional mode on the devices attached to the server and the client.

·     Enable unidirectional mode on the intermediate devices.

If you set the bidirectional mode, the ACL specified in the netanalysis rocev2 statistics command must match both client-to-server traffic and server-to-client traffic.

When you specify the session keyword, the device analyzes RoCEv2 traffic based on session information (five-tuple and Opcode field) for NetAnalysis and packet loss, and sends the results to the NAP. In this case, you cannot configure NetAnalysis statistics or packet loss analysis separately on RoCEv2 traffic.

Examples

# Enable unidirectional RoCEv2 traffic analysis.

<Sysname> system-view

[Sysname] netanalysis rocev2 mode single

This operation will erase all the NetAnalysis configuration.

Continue?[Y/N]:y

# Enable bidirectional RoCEv2 traffic analysis.

<Sysname> system-view

[Sysname] netanalysis rocev2 mode bidir

This operation will erase all the NetAnalysis configuration.

Continue?[Y/N]:y

Related commands

netanalysis rocev2 statistics

netanalysis rocev2 report-interval

Use netanalysis rocev2 report-interval to set the interval for reporting RoCEv2 traffic statistics to the NDA.

Use undo netanalysis rocev2 report-interval to restore the default.

Syntax

netanalysis rocev2 report-interval interval

undo netanalysis rocev2 report-interval

Default

The device reports RoCEv2 traffic statistics to the NDA at an interval of 10 seconds.

Views

System view

Predefined user roles

network-admin

Parameters

seconds: Specifies an interval value in seconds, in the range of 5 to 500.

Usage guidelines

Use this command to adjust the interval at which the device reports RoCEv2 traffic statistics to the NDA.

Examples

# Configure the device to report RoCEv2 traffic statistics to the NDA at an interval of 15 seconds.

<Sysname> system-view

[Sysname] netanalysis rocev2 report-interval 15

netanalysis rocev2 sampling-rate

Use netanalysis rocev2 sampling-rate to set the sampling rate for RoCEv2 packets.

Use undo netanalysis rocev2 sampling-rate to restore the default.

Syntax

netanalysis rocev2 sampling-rate rate

undo netanalysis rocev2 sampling-rate

Default

No sampling rate is set for RoCEv2 packets.

Views

System view

Predefined user roles

network-admin

Parameters

rate rate: Specifies the sampling rate for RoCEv2 packets. The value range for the rate argument is 1 to 16384.

Usage guidelines

For the sampling rate to take effect, first set the mode of RoCEv2 traffic analysis.

A sampling rate allows the device to sample one packet from a number of RoCEv2 packets for analysis. For example, if you configure the sampling rate as 1000, the device samples 1 packet from 1000 RoCEv2 packets.

Examples

# Set the sampling rate for RoCEv2 packets to 1024.

<Sysname> system-view

[Sysname] netanalysis rocev2 sampling-rate 1024

Related commands

netanalysis rocev2 mode

netanalysis rocev2 statistics

Use netanalysis rocev2 statistics to enable RoCEv2 traffic statistics collection.

Use undo netanalysis rocev2 statistics to disable RoCEv2 traffic statistics collection.

Syntax

netanalysis rocev2 statistics { global | acl name acl-name }

undo netanalysis rocev2 statistics

Default

RoCEv2 traffic statistics collection is disabled.

Views

System view

Predefined user roles

network-admin

Parameters

global: Specifies all received RoCEv2 traffic.

acl name acl-name: Specifies an advanced ACL for filtering RoCEv2 traffic by its name, a case-insensitive string of 1 to 63 characters. The ACL name must begin with an uppercase or lowercase letter and cannot be all.

Usage guidelines

Use this command to enable NetAnalysis to analyze RoCEv2 traffic and send the analysis results to the NAP. You can use an ACL to match the RoCEv2 traffic of interest. The deny or permit action in the ACL does not take effect. NetAnalysis supports the following rules of advanced ACLs:

·     Rule 1—Matches the UDP protocol and destination IPv4 address.

·     Rule 2—Matches the UDP protocol and source IPv4 address.

·     Rule 3—Matches the UDP protocol and source and destination IPv4 addresses.

To ensure correct collection and reporting of RoCEv2 traffic statistics, use the rules supported by NetAnalysis. For more information about ACLs, see ACL and QoS Configuration Guide.

If the specified ACL does not exist or does not contain any rules, this command does not take effect.

In an ACL, rules do not support the vpn-instance criterion, and the rule applies to both public network traffic and VPN traffic.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Enable NetAnalysis to collect statistics about all received RoCEv2 traffic.

<Sysname> system-view

[Sysname] netanalysis rocev2 statistics global

# Enable NetAnalysis to collect statistics about the received RoCEv2 traffic that matches ACL abc.

<Sysname> system-view

[Sysname] netanalysis rocev2 statistics acl name abc

netanalysis rocev2 timeout inactive

Use netanalysis rocev2 timeout inactive to set the aging timer for inactive RoCEv2 flows.

Use undo netanalysis rocev2 timeout inactive to restore the default.

Syntax

netanalysis rocev2 timeout inactive seconds

undo netanalysis rocev2 timeout inactive

Default

The aging timer for inactive RoCEv2 flows is set to 30 seconds.

Views

System view

Predefined user roles

network-admin

Parameters

seconds: Sets the aging timer for inactive RoCEv2 flows, in seconds. The value range for this argument is 5 to 500 seconds.

Usage guidelines

When an inactive RoCEv2 flow ages out, the device outputs the related traffic statistics to the NDA and deletes these traffic statistics from the RoCEv2 cache.

Examples

# Set the aging timer for inactive RoCEv2 flows to 10 seconds.

<Sysname> system-view

[Sysname] netanalysis rocev2 timeout inactive 10

netanalysis rocev2 vxlan drop global

Use netanalysis rocev2 vxlan drop global to enable the global packet loss analysis feature for RoCEv2 traffic on VXLAN tunnel intermediate nodes.

Use undo netanalysis rocev2 vxlan drop global to disable the global packet loss analysis feature for RoCEv2 traffic on VXLAN tunnel intermediate nodes.

Syntax

netanalysis rocev2 vxlan drop global

undo netanalysis rocev2 vxlan drop global

Default

The global packet loss analysis feature is disabled for RoCEv2 traffic on VXLAN tunnel intermediate nodes.

Views

System view

Predefined user roles

network-admin

Usage guidelines

For this feature to take effect, you must first set the mode of RoCEv2 traffic analysis to bidirectional.

In a VXLAN network with RoCEv2, ensuring zero packet loss for network traffic is crucial. You can configure this feature to analyze packet loss for decapsulated RoCEv2 traffic on intermediate nodes within the VXLAN tunnel.

You can execute the display netanalysis rocev2 cache command and view the S2D NAK Pkts and D2S NAK Pkts fields in the command output to view packet loss information.

Examples

# Enable the global packet loss analysis feature for RoCEv2 traffic on VXLAN tunnel intermediate nodes.

<Sysname> system-view

[Sysname] netanalysis rocev2 vxlan drop global

Related commands

netanalysis rocev2 mode

netanalysis rocev2 vxlan statistics

Use netanalysis rocev2 vxlan statistics to enable the NetAnalysis statistics feature for RoCEv2 traffic on VXLAN tunnel intermediate nodes.

Use undo netanalysis rocev2 vxlan statistics to disable the NetAnalysis statistics feature for RoCEv2 traffic on VXLAN tunnel intermediate nodes.

Syntax

netanalysis rocev2 vxlan statistics { acl name acl-name | global }

undo netanalysis rocev2 vxlan statistics

Default

The NetAnalysis statistics feature is disabled for RoCEv2 traffic on VXLAN tunnel intermediate nodes.

Views

System view

Predefined user roles

network-admin

Parameters

acl name acl-name: Specifies the name of an advanced ACL. The acl-name represents the ACL name, a case-insensitive string of 1 to 63 characters. The string must start with a letter but cannot be all. If you do not specify this option, the command enables the statistics feature for all RoCEv2 flows on the intermediate nodes. If the specified ACL does not exist or the specified ACL does not contain valid rules, the configuration does not take effect and the command does not enable the statistics feature for any RoCEv2 flows on the intermediate nodes.

global: Enables NetAnalysis statistics for all RoCEv2 flows on the intermediate nodes.

Usage guidelines

Application scenarios

To understand and optimize network performance, and to enhance the transmission speed and reliability, you can configure the NetAnalysis statistics feature for RoCEv2 traffic within a VXLAN tunnel.

Operating mechanism

With this feature enabled, the device performs NetAnalysis statistical analysis on RoCEv2 traffic on VXLAN tunnel intermediate nodes. It characterizes each traffic flow's data, including volume, bandwidth, and latency, and uploads the analysis results to the Net-analysis Processor (NAP) for further processing.

Restrictions and guidelines

The specified RoCEv2 traffic is matched through ACL rules, but the designated deny or permit actions do not take effect. Currently, only the following advanced ACL rules are supported:

·     rule1—Configures only the UDP protocol and destination IPv4 address.

·     rule2—Configures only the UDP protocol and source IPv4 address.

·     rule3—Configures only the UDP protocol, source IPv4 address, and destination IPv4 address.

Unsupported ACL rules do not take effect, preventing NAP from receiving the matched traffic flows. For more information about ACL rule configuration, see ACL and QoS Configuration Guide.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Enable the NetAnalysis statistics feature for RoCEv2 traffic matching ACL abc on VXLAN tunnel intermediate nodes

<Sysname> system-view

[Sysname] netanalysis rocev2 vxlan statistics acl name abc

# Enable the NetAnalysis statistics feature for all RoCEv2 traffic on VXLAN tunnel intermediate nodes.

<Sysname> system-view

[Sysname] netanalysis rocev2 vxlan statistics global

netanalysis rocev2 vxlan-ip drop global

Use netanalysis rocev2 vxlan-ip drop global to enable the global packet loss analysis feature for RoCEv2 traffic at the VXLAN tunnel edges.

Use undo netanalysis rocev2 vxlan-ip drop global to disable the global packet loss analysis feature for RoCEv2 traffic at the VXLAN tunnel edges.

Syntax

netanalysis rocev2 vxlan-ip drop global

undo netanalysis rocev2 vxlan-ip drop global

Default

The global packet loss analysis feature is disabled for RoCEv2 traffic at the VXLAN tunnel edges.

Views

System view

Predefined user roles

network-admin

Usage guidelines

For this feature to take effect, you must first set the mode of RoCEv2 traffic analysis to bidirectional.

In a VXLAN network with RoCEv2, ensuring zero packet loss for network traffic is crucial. You can configure this feature to analyze packet loss for decapsulated RoCEv2 traffic at the edges of the VXLAN tunnel.

You can execute the display netanalysis rocev2 cache command and view the S2D NAK Pkts and D2S NAK Pkts fields in the command output to view packet loss information.

Examples

# Enable the global packet loss analysis feature for RoCEv2 traffic at the VXLAN tunnel edges.

<Sysname> system-view

[Sysname] netanalysis rocev2 vxlan-ip drop global

Related commands

netanalysis rocev2 mode

netanalysis rocev2 vxlan-ip statistics

Use netanalysis rocev2 vxlan-ip statistics to enable the NetAnalysis statistics feature for RoCEv2 traffic at the VXLAN tunnel edges.

Use undo netanalysis rocev2 vxlan-ip statistics to disable the NetAnalysis statistics feature for RoCEv2 traffic at the VXLAN tunnel edges.

Syntax

netanalysis rocev2 vxlan-ip statistics { acl name acl-name | global }

undo netanalysis rocev2 vxlan-ip statistics

Default

The NetAnalysis statistics feature is disabled for RoCEv2 traffic at the edges of a VXLAN tunnel.

Views

System view

Predefined user roles

network-admin

Parameters

acl name acl-name: Specifies the name of an advanced ACL. The acl-name represents the ACL name, a case-insensitive string of 1 to 63 characters. The string must start with a letter but cannot be all. If you do not specify this option, the command enables the statistics feature for all RoCEv2 flows at the VXLAN tunnel edges. If the specified ACL does not exist or the specified ACL does not contain valid rules, the configuration does not take effect and the command does not enable the statistics feature for any RoCEv2 flows at the VXLAN tunnel edges.

global: Enables NetAnalysis statistics for all RoCEv2 flows at the VXLAN tunnel edges.

Usage guidelines

Application scenarios

To understand and optimize network performance, and to enhance the transmission speed and reliability, you can configure the NetAnalysis statistics feature for RoCEv2 traffic within a VXLAN tunnel.

Operating mechanism

With this feature enabled, the device performs NetAnalysis statistical analysis on RoCEv2 traffic at VXLAN tunnel edges. It characterizes each traffic flow's data, including volume, bandwidth, and latency, and uploads the analysis results to the Net-analysis Processor (NAP) for further processing.

Restrictions and guidelines

The specified RoCEv2 traffic is matched through ACL rules, but the designated deny or permit actions do not take effect. Currently, only the following advanced ACL rules are supported:

·     rule1—Configures only the UDP protocol and destination IPv4 address.

·     rule2—Configures only the UDP protocol and source IPv4 address.

·     rule3—Configures only the UDP protocol, source IPv4 address, and destination IPv4 address.

Unsupported ACL rules do not take effect, preventing NAP from receiving the matched traffic flows. For more information about ACL rule configuration, see ACL and QoS Configuration Guide.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Enable the NetAnalysis statistics feature for RoCEv2 traffic matching ACL abc at the VXLAN tunnel edges.

<Sysname> system-view

[Sysname] netanalysis rocev2 vxlan-ip statistics acl name abc

# Enable the NetAnalysis statistics feature for all RoCEv2 traffic at the VXLAN tunnel edges.

<Sysname> system-view

[Sysname] netanalysis rocev2 vxlan-ip statistics global

reset netanalysis rocev2 statistics

Use reset netanalysis rocev2 statistics to clear RoCEv2 traffic statistics.

Syntax

reset netanalysis rocev2 statistics

Views

User view

Predefined user roles

network-admin

Usage guidelines

Use this command to clear RoCEv2 traffic statistics if you want to collect RoCEv2 traffic statistics for a specific time period.

You cannot recover cleared RoCEv2 traffic statistics. Make sure you are fully aware of the impact of this command when you use it on a live network.

Examples

# Clear RoCEv2 traffic statistics.

<Sysname> reset netanalysis rocev2 statistics

Related commands

display netanalysis rocev2 statistics

NetAnalysis for UDP commands

display netanalysis udp cache

Use display netanalysis udp cache to display configuration and status of the UDP cache.

Syntax

display netanalysis udp cache [ destination destination-ip | interface interface-type interface-number | source source-ip | vni vxlan-id ]*

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

destination destination-ip: Specifies the IP address at the server end of the UDP flow.

interface interface-type interface-number: Specifies the ingress interface number of the UDP flow.

source source-ip: Specifies the IP address at the client end of the UDP flow.

vni vxlan-id: Specifies the VXLAN ID of the UDP flow, in the range of 1 to 16777215.

Usage guidelines

When the device receives UDP traffic, it does not immediately send NetAnalysis statistical information to the analyzer. Instead, it caches the statistical information in the UDP flow cache. The flow statistical information in the cache will be cleared after the inactive aging time of the UDP flow is reached.

Examples

# Display configuration and status of the UDP cache.

<sysname> display netanalysis udp cache source 1.1.1.2 destination 2.2.2.1

NetAnalysis cache information:

-----------------------------------------------------------------------------

Flow created at          Direction

Src IP                   Dst IP                   Src Port      Dst Port

Interface                VNI                      Block Id      Block Timestamp

Receive Packets          Receive Bytes

-----------------------------------------------------------------------------

01/22/2019 09:08:15      inbound

1.1.1.2                  2.2.2.1                  1000          2000

XGE1/0/1                  N/A                      10            100000000

5000                     6000000

Table 4 Command output

Field

Description

Direction

UDP flow direction.

Src IP

Source IP address of the UDP flow.

Dst IP

Destination IP address of the UDP flow.

Src Port

Source port of the UDP flow.

Dst Port

Destination port of the UDP flow.

Interface

Ingress interface of the UDP flow.

VNI

VXLAN ID of the inner UDP packet encapsulated by VXLAN.

Receive Packets

Number of UDP packets within this block collected from the ingress interface of the UDP flow.

Receive Bytes

Bytes of UDP packets within this block collected from the ingress interface of the UDP flow.

 

display netanalysis udp statistics

Use display netanalysis udp statistics to display UDP traffic statistics.

Syntax

display netanalysis udp statistics

Views

Any view

Predefined user roles

network-admin

network-operator

Examples

# Display UDP traffic statistics.

<Sysname> display netanalysis udp statistics

Last statistics resetting time: Never

--------------------------------------------------------------------------------

Received packets: 2833088

--------------------------------------------------------------------------------

Type

         Active        Aged           Created        Reported

        (Flows)       (Flows)         (Flows)        (Flows)

--------------------------------------------------------------------------------

UDP

        4              0              2              20

--------------------------------------------------------------------------------

Table 5 Command output

Field

Description

Last statistics resetting time

Most recent time at which the UDP traffic statistics were cleared.

Type

Flow type. Only UDP is supported.

Active (Flows)

Number of active flows.

Aged (Flows)

Number of aged flows.

Created (Flows)

Number of created flows.

Reported (Flows)

Number of flows sent to the analyzer.

 

Related commands

reset netanalysis udp statistics

netanalysis udp identification block

Use netanalysis udp identification block to specify the number of blocks for segment analysis of UDP traffic.

Use undo netanalysis udp identification block to restore the default.

Syntax

netanalysis udp identification block block-number

undo netanalysis udp identification block

Default

The number of blocks for segment analysis of UDP traffic is 256.

Views

System view

Predefined user roles

network-admin

Parameters

block-number: Specifies the number of blocks. Options include 4, 8, 16, 32, 64, 128, and 256.

Usage guidelines

NetAnalysis for UDP traffic performs analysis on UDP flows based on the Block granularity. Each UDP flow contains multiple UDP packets. With each packet sent, the Identification field increases by 1. The field value determines the UDP packet sequence number.

In a UDP flow, UDP packets have sequence numbers ranging from 0 to 65535. By segmenting the sequence numbers of UDP packets, a UDP flow can be divided into multiple blocks. For example, setting the number of blocks to 128 means dividing a UDP flow into 128 blocks, with UDP packets numbered 0 to 511 belonging to the first block.

The NAP creates a flow table for the received UDP block and analyzes all UDP packets contained in the block.

Do not configure this feature with RDMA Telemetry. If you fail to do so, this feature will affect RDMA Telemetry. For more information about RDMA Telemetry, see Telemetry Configuration Guide.

Examples

# Set the number of blocks for segment analysis of UDP traffic to 64.

<Sysname> system-view

[Sysname] netanalysis udp identification block 64

netanalysis udp statistics

Use netanalysis udp statistics to enable UDP traffic statistics collection.

Use undo netanalysis udp statistics to disable UDP traffic statistics collection.

Syntax

netanalysis udp statistics [ vxlan { single-tagged | untagged } ] acl name acl-name inbound

undo netanalysis udp statistics inbound

Default

UDP traffic statistics collection is disabled.

Views

System view

Predefined user roles

network-admin

Parameters

vxlan:: Performs statistics collection on packets that match the VXLAN inner layer information.

single-tagged: Performs statistics collection on packets that carry only one VLAN tag.

untagged: Performs statistics collection on untagged packets.

acl name acl-name: Specifies the name of the advanced ACL. The acl-name argument represents the name of the advanced ACL, a case-insensitive string of 1 to 63 characters that must start with a letter. To avoid confusion, the ACL name cannot be all.

inbound: Performs statistics collection on incoming UDP traffic.

Usage guidelines

Perform this task to enable NetAnalysis to analyze UDP traffic and send the analysis results to the NAP. You can use an ACL to match the UDP traffic of interest. The deny or permit action in the ACL does not take effect. NetAnalysis supports the following rules of advanced ACLs:

·     Rule 1—Matches the UDP protocol and destination IPv4 address.

·     Rule 2—Matches the UDP protocol and source IPv4 address.

·     Rule 3—Matches the UDP protocol and source and destination IPv4 addresses.

·     Rule 4—Matches the UDP protocol, source and destination IPv4 addresses, and UDP destination ports.

When you specify an ACL, follow these restrictions and guidelines:

·     If the specified ACL does not exist or does not contain any rules, the system does not perform NetAnalysis statistics collection on UDP traffic received on the specified ingress interface.

·     The ACL rules do not support using a VPN instance, and the rules apply to both public network packets and VPN packets.

For more information about ACL, see ACL and QoS Configuration Guide.

NetAnalysis statistics collection does not support RoCEv2 packets with a destination UDP port number of 4791.

If you execute this command multiple times, the most recent configuration takes effect.

If the following features (listed in descending order of priority) are configured, only the feature with the highest priority takes effect:

·     NetAnalysis for UDP.

·     NetAnalysis UFA.

·     Flexible global load balancing (FGLB) adaptive routing.

·     NetStream and IPv6 NetStream.

·     MOD and flow group in delay monitoring mode.

For more information about FGLB adaptive routing, see adaptive routing in Layer 3IP Routing Configuration Guide. For more information about NetStream and IPv6 NetStream, see Network Management and Monitoring Configuration Guide. For more information about MOD and flow groups, see MOD configuration and flow group configuration in Telemetry Configuration Guide.

Examples

# Enable UDP traffic analysis on packets matching the specified ACL in the inbound direction.

<Sysname> system-view

[Sysname] netanalysis udp statistics acl name abc inbound

netanalysis udp timeout inactive

Use netanalysis udp timeout inactive to set the aging timer for inactive UDP flow.

Use undo netanalysis udp timeout inactive to restore the default.

Syntax

netanalysis udp timeout inactive seconds

undo netanalysis udp timeout inactive

Default

The aging timer for inactive UDP flow is 30 seconds.

Views

System view

Predefined user roles

network-admin

Parameters

seconds: Specifies the aging time in the range of 5 to 500 seconds.

Usage guidelines

With NetAnalysis statistics collection enabled for UDP traffic, the device must also send the UDP flow table containing the statistical results to the specified NDA to complete further processing and visualization of the flow information.

When an inactive UDP flow ages out, the device outputs the related traffic statistics to the NDA, deletes these traffic statistics from the UDP cache, and deletes the related flow entries.

Examples

# Set the aging timer for inactive UDP flow to 10 seconds.

<Sysname> system-view

[Sysname] netanalysis udp timeout inactive 10

reset netanalysis udp statistics

Use reset netanalysis udp statistics to clear UDP traffic statistics.

Syntax

reset netanalysis udp statistics

Views

User view

Predefined user roles

network-admin

Usage guidelines

When diagnosing and locating faults in the UDP flow analysis function, it is necessary to specifically count the UDP flow information over a certain period of time. In this case, you can use this command to first clear the history statistics.

Executing this command clears all historical UDP flow statistical information in the NetAnalysis function, and the cleared information cannot be recovered. Use this feature with caution.

Examples

# Clear UDP traffic statistics.

<Sysname> reset netanalysis udp statistics

Related commands

display netanalysis udp statistics

NetAnalysis unified flow commands

activate

Use activate to enable a measurement feature for a UFA instance.

Use undo activate to disable the measurement feature for a UFA instance.

Syntax

activate { { flow-analysis | ifit | isdf-detect drop } * | mod }

undo activate

Default

No measurement feature is enabled for a UFA instance.

Views

UFA instance view

Predefined user roles

network-admin

Parameters

flow-analysis: Enables flow analysis.

flow-monitor: Enables flow monitor.

ifit: Enables iFIT.

isdf-detect drop: Enables ISDF packet loss detection.

mod: Enables MOD.

Usage guidelines

For this command to take effect, you must create a UFA instance and configure a traffic matching rule before you execute this command.

To modify the settings of a UFA instance after you execute this command, you must first execute the undo activate command to disable the measurement feature.

Examples

# Enable flow analysis for a UFA instance.

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] instance 1 name abc

[Sysname-netanalysis-instance-1] flow ipv4

[Sysname-netanalysis-instance-1] activate flow-analysis

aging-time

Use aging-time to set the aging time for the software flow table.

Use undo aging-time to restore the default.

Syntax

aging-time time-value

undo aging-time

Default

The aging time for the software flow table is 30 seconds.

Views

UFA view

Predefined user roles

network-admin

Parameters

time-value: Specifies the aging time for the software flow table, in the range of 5 to 500 seconds.

Usage guidelines

If a flow is idle for the specified aging time, the flow information will be deleted from the software flow table .

If you execute this command multiple times, the most recent configuration takes effect.

The aging time for the software flow table must be longer than the aging time for the hardware flow table configured by using the hardware-flow aging-time command and the iFIT measurement period configured by the ifit period command.

Examples

# Set the aging time for the software flow table to 50 seconds.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] aging-time 50

bind all-interface

Use bind all-interface to specify a default interface role.

Use undo bind all-interface to restore the default.

Syntax

bind all-interface { egress | ingress | ingress-egress [ bidirectional-flow ] | transit [ bidirectional-flow ] }

undo bind all-interface

Default

No default interface role is specified.

Views

UFA instance view

Predefined user roles

network-admin

Parameters

egress: Specifies the interface as an egress interface. This role can remove the color of packets. The device measures the outgoing traffic of an interface in this role.

ingress: Specifies the interface as an ingress interface. This role can color packets. The device measures the incoming traffic of an interface in this role.

ingress-egress: Specifies the interface as both an egress interface and an ingress interface. This role can both color packets and remove the color of packets. The device measures both the outgoing and incoming traffic of an interface in this role. The incoming traffic of an interface in this role will be colored, and the color of the outgoing traffic of the interface will be removed.

transit: Specifies the interface as a transit node. This role can count packets.

bidirectional-flow: Matches both the forward flow and return flow. If you do not specify this keyword, only the forward flow is matched.

Usage guidelines

The device measures the traffic on an interface according to the role of that interface.

If you do not specify a role for an interface by using the bind interface command, the device uses the default interface role for that interface.

Examples

# Specify egress node as the default interface role.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] instance 1 name abc

[Sysname-netanalysis-instance-1] flow ipv4 source-ip 10.1.1.1 24 destination-ip 10.2.2.2 24

[Sysname-netanalysis-instance-1] bind all-interface egress

Related commands

bind interface

bind interface

Use bind interface to specify a role for an interface.

Use undo bind interface to restore the default.

Syntax

bind interface interface-type interface-number { egress | ingress | ingress-egress [ bidirectional-flow ] | transit [ bidirectional-flow ] }

undo bind interface [ interface-type interface-number ]

Default

No role is specified for an interface.

Views

UFA instance view

Predefined user roles

network-admin

Parameters

interface-type interface-number: Specifies  an interface by its type and number.

egress: Specifies the interface as an egress node. This role can remove the color of packets. The device measures the outgoing traffic of an interface in this role.

ingress: Specifies the interface as an ingress node. This role can color packets. The device measures the incoming traffic of an interface in this role.

ingress-egress: Specifies the interface as both an egress node and an ingress node. This role can both color packets and remove the color of packets. The device measures both the outgoing and incoming traffic of an interface in this role. The incoming traffic of an interface in this role will be colored, and the color of the outgoing traffic of the interface will be removed.

transit: Specifies the interface as a transit node. This role can count packets.

bidirectional-flow: Matches both the forward flow and return flow. If you do not specify this keyword, only the forward flow is matched.

Usage guidelines

The device measures the traffic on an interface according to the role of that interface.

If you execute both this command and the bind all-interface command, this command takes effect.

If you do not specify the interface-type interface-number argument when you execute the undo bind interface command, the roles specified for all interfaces are unbound.

You can specify roles for only Layer 2 physical interfaces and Layer 3 physical interfaces by using this command.

Examples

# Specify GigabitEthernet 1/0/1 as an egress node.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] instance 1 name abc

[Sysname-netanalysis-instance-1] flow ipv4 source-ip 10.1.1.1 24 destination-ip 10.2.2.2 24

[Sysname-netanalysis-instance-1] bind interface gigabitethernet 1/0/1 egress

display netanalysis unified-flow

Use display netanalysis unified-flow to display UFA flow table information.

Syntax

display netanalysis unified-flow ipv4 [ destination-ip dest-ip-address [ dest-mask-length ] | protocol { protocol-number | { sctp | tcp | udp } [ destination-port dest-port-number | source-port src-port-number ]* } | source-ip src-ip-address [ src-mask-length ] | vlan-id vlan-id-value | vxlan-id vxlan-id-value ]* [ slot slot-number ]

display netanalysis unified-flow ipv6 [ destination-ipv6 dest-ipv6-address [ dest-prefix-length ] | protocol { protocol-number | { sctp | tcp | udp } [ destination-port dest-port-number | source-port src-port-number ]* } | source-ipv6 src-ipv6-address [ src-prefix-length ] | vlan-id vlan-id-value | vxlan-id vxlan-id-value ]* [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

ipv4: Displays the IPv4 UFA flow table information.

ipv6: Displays the IPv6 UFA flow table information.

destination-ip dest-ip-address: Specifies a destination IP address.

dest-mask-length: Specifies the mask length for the destination IPv4 address, in the range of 1 to 31. If you do not specify a mask length, the specified destination IPv4 address is a host address.

destination-ipv6 dest-ipv6-address: Specifies a destination IPv6 address.

dest-prefix-length: Specifies the prefix length for the destination IPv6 address, in the range of 1 to 127. If you do not specify a mask length, the specified destination IPv6 address is a host address.

protocol: Specifies a protocol.

sctp: Specifies SCTP.

tcp: Specifies TCP.

udp: Specifies UDP.

protocol-number: Specifies a protocol its number. The value range is 0 to 254 (excluding 6, 17, and 132).

source-port port-number: Specifies a source port number in the range of 1 65535. If you do not specify a source port number, any source port number can be matched.

destination-port dest-port-number: Specifies a destination port number in the range of 1 to 65535. If you do not specify a destination port number, any destination port number can be matched.

source-ip src-ip-address: Specifies a source IP address.

src-mask-length: Specifies the mask length for the source IPv4 address, in the range of 1 to 31. If you do not specify a mask length, the specified source IPv4 address is a host address.

source-ipv6 src-ipv6-address: Specifies a source IPv6 address.

src-prefix-length : Specifies the prefix length for the source IPv6 address, in the range of 1 to 127. If you do not specify a mask length, the specified source IPv6 address is a host address.

vxlan-id vxlan-id-value: Specifies a VXLAN ID in the range of 0 to 16777215.

vlan-id vxlan-id-value: Specifies a VLAN ID in the range of 0 to 4094.

slot slot-number: Specifies an IRF member device by its member ID.

Usage guidelines

This command displays only flow table information for UFA enabled with flow analysis.

Examples

# Display the IPv4 UFA flow table information.

<Sysname> display netanalysis unified-flow ipv4 slot 1

Source IP/mask           : 192.168.0.10/32 

Destination IP/mask      : 100.1.1.23/32

Source port              : 20  

Destination port         : 30

Protocol                 : tcp

VNI                  : --

VLAN                     : --

# Display the IPv4 UFA flow table information for the specified 5-tuple.

<Sysname> display netanalysis unified-flow ipv4 source-ip 192.168.0.10 destination-ip 100.1.1.23 protocol 17 source-port 20 destination-port 30 slot 1

Direction                : Inbound

Instance ID              : 1

Source IP/mask           : 192.168.0.10/32

Destination IP/mask      : 100.1.1.23/32

Source port              : 20

Destination port         : 30

Protocol                 : 17

VNI                      : --

VLAN                     : --

VPN instance             : --

Start time (sec)         : 2025-02-07 09:54:53 (1738922093)

End time (sec)           : 2025-02-07 09:55:30 (1738922130)

Input packets            : 97569

Input bytes              : 12488832

Output packets           : 97569

Output bytes             : 12488832

Current TTL              : 0

Min TTL                  : 5

Max TTL                  : 5

Discarded packets        : 0

Discarded bytes          : 0

Discard reason           : 0

Abnormal reason          : 0

Cross chip               : True

Current delay            : 498ns

Average delay            : 532ns

Min delay                : 411ns

Max delay                : 607ns

Average jitter           : 60ns

Min jitter               : 0ns

Max jitter               : 120ns

Interface name           : HundredGigE1/0/2

Main interface name      : --

--------------------------------------------------------------------------------------------------------------

Role           Period ID      Color  Packet count   Byte count    Timestamp(sec,nsec)    IfName

--------------------------------------------------------------------------------------------------------------

Ingress        173892212      1      97569          12488832      1738922121,0           HundredGigE1/0/2

Ingress        173892211      0      99716          12763648      1738922111,0           HundredGigE1/0/2

--------------------------------------------------------------------------------------------------------------

Table 6 Command output

Field

Description

Direction

Flow direction.

Instance ID

UFA instance ID. A smaller ID indicates a higher priority.

Start time (sec)

Start time of the flow:

·     For TCP packets, it is the time when the SYN packet was received.

·     For UDP/RoCEv2 packets, it is the time when the first packet was received.

·     For VXLAN packets, it is the time when the first packet was received.

End time (sec)

End time of the flow:

·     For TCP packets, it is the time when the FIN packet was received.

·     For UDP/RoCEv2 packets, it is the time when the last packet was received.

·     For VXLAN packets, it is the time when the last packet was received.

 

display netanalysis unified-flow isdf-detect event-log

Use display netanalysis unified-flow isdf-detect event-log to display event information about silent faults

Syntax

display netanalysis unified-flow isdf-detect event-log

Views

Any view

Predefined user roles

network-admin

network-operator

Usage guidelines

This command is used to display event information about silent faults after you enable ISDF.

Examples

# Display event information about silent faults.

<Sysname> display netanalysis unified-flow isdf-detect event-log

Time (sec)               : 2025-08-06 20:14:36 (1754511276137)

 Source IP               : 2.2.2.2

 Destination IP          : 1.1.1.1

 Protocol                : TCP

 Source port             : 2000

 Destination port        : 1000

 Input interface        : GigabitEthernet2/0/1

 Output interface       : GigabitEthernet2/0/2

Table 7 Command output

Field

Description

Time (sec)

Time when the fault is sent.

Source IP

Source IP address of the target flow.

Destination IP

Destination IP address of the target flow.

Protocol

Protocol of the target flow. Options include:

·     A value in the range of 0 to 5, 7 to 16, 18 to 131, and 133 to 254—ID of a protocol except for UDP, TCP, and SCTP.

·     UDP.

·     TCP.

·     SCTP.

·     Hyphen (-)—Invalid value.

Source port

Source port number for the target flow. Hyphens (--) are displayed for invalid values.

Destination port

Destination port number for the target flow. Hyphens (--) are displayed for invalid values.

Input interface

ID of the input interface for the faulty flow.

Output interface

ID of the output interface for the faulty flow.

 

display uad detection-result

Use display uad detection-result to display unauthorized access detection results.

Syntax

display uad detection-result [ interface-type interface-number | interface-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

interface-type interface-number: Specifies an interface by its type and number.

interface-name: Specifies an interface by its name.

Usage guidelines

If you do not specify an interface, this command displays unauthorized access detection results for all interfaces.

A maximum of 4096 detection results are displayed for each unauthorized access type.

Examples

# Display unauthorized access detection results for an interface.

<Sysname> display uad detection-result GE1/0/1

    Interface   MAC              IP address      VLAN  UA-type     Detected at

    GE1/0/1    00e0-fc00-0001   10.136.112.32    --    Router      2022-10-15T20:13:16

Table 1 Command output

Field

Description

MAC

MAC address of the unauthorized device.

IP address

IP address of the unauthorized device. This field displays two hyphens (--) for an unauthorized hub.

VLAN

VLAN ID of the unauthorized device. This field displays two hyphens (--) for an unauthorized router.

UA type

Unauthorized device type.

Detected at

Time when the unauthorized device was detected.

 

exclude interface

Use exclude interface to exclude an interface from iFIT.

Use undo exclude interface to restore the default.

Syntax

exclude interface interface-type interface-number

undo exclude interface [ interface-type interface-number ]

Default

No interface is excluded from iFIT.

Views

UFA instance view

Predefined user roles

network-admin

Parameters

interface interface-type interface-number: Specifies an interface by its type and number.

Usage guidelines

Use this command if you do not need to perform iFIT on an interface.

If you do not specify the interface-type interface-number argument when you execute the undo exclude interface command, all excluded interfaces are removed.

To exclude multiple interfaces, repeat this command.

Examples

# Exclude GigabitEthernet 1/0/1 from iFIT.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] instance 1 name abc

[Sysname-netanalysis-instance-1] exclude interface Gigabitethernet 1/0/1

export-interval

Use export-interval to set the export interval for the software flow table.

Use undo export-interval to restore the default.

Syntax

export-interval interval

undo export-interval

Default

The export interval for the software flow table is 10 seconds.

Views

UFA view

Predefined user roles

network-admin

Parameters

interval: Specifies the export interval for the software flow table, in the range of 10 to 1800 seconds.

Usage guidelines

After you execute this command, the data of the software flow table on the device will be sent to the analyzer at the specified export interval for further analysis.

The export interval for the software flow table must be longer than the export interval for the hardware flow table configured by using the hardware-flow export interval command.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Set the export interval for the software flow table is 50 seconds.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] export-interval 50

netanalysis unified-flow

Use netanalysis unified-flow to enable unified flow analytics and enter unified flow analytics view, or enter the existing unified flow analytics view.

Use undo netanalysis unified-flow to disable unified flow analytics.

Syntax

netanalysis unified-flow

undo netanalysis unified-flow

Default

Unified flow analytics is disabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

Application scenarios

NetAnalysis UFA is a network traffic monitoring and analysis technology designed for comprehensive traffic across the network. It is suitable for in-depth analysis of entire network traffic, helping users quickly detect and accurately locate network failures, thereby improving network operation efficiency. When users need to perform in-depth analysis on TCP/UDP/VXLAN traffic in the network, they can enable this function.

Operating mechanism

After UFA is enabled, the device will perform NetAnalysis statistical analysis on incoming TCP/UDP/VXLAN traffic. The device establishes flow tables and collects traffic statistics based on information such as the five-tuple of the traffic, and then uploads the statistical results to a network analytics processor (NAP) for further processing. The NAP helps users gain a more comprehensive understanding of traffic patterns within the network by analyzing forwarding paths of data flows, identifying TCP anomalies, and investigating packet loss during forwarding.

Restrictions and guidelines

If the following features (listed in descending order of priority) are configured, only the feature with the highest priority takes effect:

·     NetAnalysis for UDP.

·     NetAnalysis UFA.

·     FGLB adaptive routing.

·     NetStream and IPv6 NetStream.

·     MOD and flow group in delay monitoring mode.

For more information about FGLB adaptive routing, see adaptive routing in Layer 3IP Routing Configuration Guide. For more information about NetStream and IPv6 NetStream, see Network Management and Monitoring Configuration Guide. For more information about MOD and flow groups, see MOD configuration and flow group configuration in Telemetry Configuration Guide.

Examples

# Enable unified flow analytics and enter unified flow analytics view.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow]

flow

Use flow to configure a traffic matching rule for a UFA instance.

Use flow to delete the traffic matching rule from a UFA instance.

Syntax

flow any-ip

flow ipv4 [ destination-ip dest-ip-address [ dest-mask-length ] | protocol { protocol-number | { sctp | tcp | udp } [ destination-port dest-port-number | source-port src-port-number ] * } | source-ip src-ip-address [ src-mask-length ] ] *

flow ipv6 [ destination-ipv6 dest-ipv6-address [ dest-prefix-length ] | protocol { protocol-number | { sctp | tcp | udp } [ destination-port dest-port-number | source-port src-port-number ] * } | source-ipv6 src-ipv6-address [ src-prefix-length ] ] *

undo flow

Default

No traffic matching rule is configured for a UFA instance.

Views

UFA instance view

Predefined user roles

network-admin

Parameters

ipv4: Matches IPv4 traffic.

ipv6: Matches IPv6 traffic.

destination-ip dest-ip-address: Specifies a destination IP address.

dest-mask-length: Specifies the mask length for the destination IPv4 address, in the range of 1 to 31. If you do not specify a mask length, the specified destination IPv4 address is a host address.

destination-ipv6 dest-ipv6-address: Specifies a destination IPv6 address.

dest-prefix-length: Specifies the prefix length for the destination IPv6 address, in the range of 1 to 127. If you do not specify a mask length, the specified destination IPv6 address is a host address.

any-ip: Matches all IP traffic, including IPv4 and IPv6 traffic.

protocol: Specifies a protocol type.

sctp: Specifies SCTP.

tcp: Specifies TCP.

udp: Specifies UDP.

destination-port dest-port-number: Specifies a destination port number in the range of 1 to 65535. If you do not specify a destination port number, any destination port number can be matched.

source-port port-number: Specifies a source port number in the range of 1 65535. If you do not specify a source port number, any source port number can be matched.

protocol-number: Specifies a protocol other than TCP, UDP, and SCTP by its number. The value range is 0 to 254 (excluding 6, 17, and 132).

source-ip src-ip-address: Specifies a source IP address.

src-mask-length: Specifies the mask length for the source IPv4 address, in the range of 1 to 31. If you do not specify a mask length, the specified source IPv4 address is a host address.

source-ipv6 src-ipv6-address: Specifies a source IPv6 address.

src-prefix-length: Specifies the prefix length for the source IPv6 address, in the range of 1 to 127. If you do not specify a mask length, the specified source IPv6 address is a host address.

Usage guidelines

This command specifies the traffic to be measured by UFA. You must configure a traffic matching rule on all measurement nodes before each measurement.

The specified source and destination IP addresses cannot be broadcast or multicast addresses.

Only one traffic matching rule is supported in a UFA instance. If you execute this command multiple times in the same UFA interface, the most recent configuration takes effect.

Examples

# Configure a traffic matching rule for a UFA instance.

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] instance 1 name abc

[Sysname-netanalysis-instance-1] flow ipv4 source-ip 10.10.10.1 24 destination-ip 10.10.10.2 24

flow-type

Use flow-type to specify a flow type for a UFA instance.

Use undo flow-type to restore the default.

Syntax

flow-type { dynamic [ ip-pair ] | static }

undo flow-type

Default

The flow type in a UFA instance is dynamic flow.

Views

UFA instance view

Predefined user roles

network-admin

Parameters

dynamic: Specifies the dynamic flow type.

ip-pair: Specifies the IP pair-based dynamic flow type.

static: Specifies the static flow type.

Usage guidelines

Application scenarios

The dynamic flow type is suitable for scenarios requiring precise statistics on each individual flow, while the static flow type is suitable for scenarios needing aggregated statistics on traffic within a specific network segment.

Operating mechanism

After you create a UFA instance, you can specify a flow type:

·     Dynamic flow: The device will generate a flow entry for each flow that meets the filters configured by the flow command. For example, if you specify a network segment in a traffic matching rule, the device generates a flow entry for each flow of that network segment.

·     Static flow: The device will generate only one flow entry for traffic that meets the filters configured by the flow command. For example, if you specify a network segment in a traffic matching rule, the device generates only one flow entry for all flows of that network segment.

Examples

# Specify the static flow type for a UFA instance.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] instance 1 name abc

[Sysname-netanalysis-instance-1] flow-type static

Related commands

flow

hardware-flow aging-time

Use hardware-flow aging-time to set the aging time for the hardware flow table.

Use undo hardware-flow aging-time to restore the default.

Syntax

hardware-flow aging-time time-value

undo hardware-flow aging-time

Default

The aging time for the hardware flow table is 5000 milliseconds.

Views

UFA view

Predefined user roles

network-admin

Parameters

Usage guidelines

When the device detects a flow that meets the requirements, it logs the flow information to the hardware flow table. If the flow is idle for the specified aging time, the flow information will be deleted from the hardware flow table .

If you execute this command multiple times, the most recent configuration takes effect.

The aging time for the hardware flow table must be shorter than the aging time for the software flow table configured by using the aging-time command and the IFIT measurement period configured by using the ifit period command.

Examples

# Set the aging time for the hardware flow table is 2000 milliseconds.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] hardware-flow aging-time 2000

hardware-flow delay-threshold

Use hardware-flow delay-threshold to set the delay threshold for the hardware flow table.

Use undo hardware-flow delay-threshold to restore the default.

Syntax

hardware-flow delay-threshold threshold-value

undo hardware-flow delay-threshold

Default

The delay threshold for the hardware flow table is 1000 nanoseconds.

Views

UFA view

Predefined user roles

network-admin

Parameters

Usage guidelines

The device will collect statistics on the flows that meet the requirements and generate hardware flow table entries. If the device detects that the delay of a flow exceeds the specified threshold, it will immediately upload the hardware flow table data to the software flow table and notify the analyzer for traffic analysis.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Set the delay threshold for the hardware flow table to 500 nanoseconds.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] hardware-flow delay-threshold 500

hardware-flow export-interval

Use hardware-flow export-interval to set the export interval for the hardware flow table.

Use undo hardware-flow export-interval to restore the default.

Syntax

hardware-flow export-interval interval

undo hardware-flow export-interval

Default

The export interval for the hardware flow table is 1000 milliseconds.

Views

UFA view

Predefined user roles

network-admin

Parameters

Usage guidelines

After NetAnalysis is configured, the device will monitor the flows that meet the requirements and generate hardware flow table entries. The device will send hardware flow table entries to the hardware flow table at the specified export interval. The data of the software flow table will be sent to the analyzer periodically for further analysis.

The export interval for the hardware flow table must be shorter than the export interval for the software flow table configured by using the export-interval command.

If you execute this command multiple times, the most recent configuration takes effect.

Examples

# Set the export interval for the hardware flow table to 100 milliseconds.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] hardware-flow export-interval 100

Related commands

export-interval

ifit period

ifit color-flag tos-bit

Use ifit color-flag tos-bit to configure the iFIT coloring bit.

Use undo ifit color-flag tos-bit to restore the default.

Syntax

ifit color-flag tos-bit tos-bit

undo ifit color-flag tos-bit

Default

No iFIT coloring bit is configured.

Views

UFA view

Predefined user roles

network-admin

Parameters

tos-bit: Specifies a bit in the ToS field as the coloring bit, in the range of 0 to 7.

Usage guidelines

iFIT uses bits 0-7 of the Type of Service (ToS) field in the IPv4 header as coloring bits. By alternately setting these coloring bits to 1 and 0 in cycles, it distinguishes the target flow from regular service traffic. In an IPv6 environment, iFIT uses the bits 0-7 bits the Traffic Class field in the IPv6 packet as coloring bits.

The ToS field consists of 8 bits, where bits 0-5 are DSCP bits used to provide differential services, and bits 6 and 7 are reserved bits. If you use bit 5 as the coloring bit, do not to use it for DSCP to provide differential services. If you use it for DSCP, packet drop statistics will be inaccurate.

When this command is executed together with other commands that can change DSCP values (such as qos priority, priority-flow-control dscp-mapping, remark dscp, and so on), the iFIT configuration takes the highest priority and will override modifications to the DSCP values made by other configurations.

Examples

# Configure an iFIT coloring bit.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] ifit color-flag tos-bit 3

ifit period

Use ifit period to set the IFIT measurement period.

Use undo ifit period to restore the default.

Syntax

ifit period period-time

undo ifit period

Default

The IFIT measurement period is 30 seconds.

Views

UFA view

Predefined user roles

network-admin

Parameters

period-time: Specifies the IFIT measurement period in seconds. Valid values are 10, 30, 60, and 300.

Usage guidelines

IFIT collects performance statistics based on the measurement period:

·     The sender records the sending time of the first IFIT packet in each sending interval, and counts the number of the IFIT packets sent from an interface in each sending interval. Sending interval = IFIT measurement period.

·     The receiver records the receiving time of the first IFIT packet in each receiving interval, and counts the number of the IFIT packets received by an interface in each receiving interval. To reduce the impact of network delay and disorder on statistics, the receiving interval equals to (1+1/3) measurement period.

If network delay between the ingress and egress nodes is greater than 1/3 measurement period, the accuracy of IFIT packet loss statistics might be affected. This is because IFIT considers packets received beyond the receiving interval as packet loss. For example, the measurement period is 1 second and the network delay greater than 1/3 seconds (333 milliseconds), the accuracy of IFIT packet loss statistics might be affected. In this case, set the measurement period to a greater value.

The IFIT measurement period must be longer than the aging time for the hardware flow table configured by using the hardware-flow aging-time command.

Examples

# Set the IFIT measurement period to 10 seconds.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] ifit period 10

instance

Use instance to create a UFA instance and enter its view, or enter the view of an existing UFA instance.

Use undo instance to delete a UFA instance.

Syntax

instance instance-id name instance-name

undo instance instance-id

Default

No UFA instance exists.

Views

UFA view

Predefined user roles

network-admin

Parameters

instance-id: Specifies an instance ID, in the range of 1 to 2048. A smaller ID indicates a higher priority.

name instance-name: Specifies a UFA instance name, a case-sensitive string of 1 to 63 characters.

Usage guidelines

UFA is a network traffic monitoring and analysis technology designed for comprehensive traffic across the network. It is suitable for in-depth analysis of entire network traffic, helping users quickly detect and accurately locate network failures, thereby improving network operation efficiency. UFA can be used to measure latency and packet loss in a network, and you need to create instances on the nodes of the measurement network. You can configure only one traffic matching rule for a UFA instance. To configure multiple traffic matching rules, create multiple UFA instances.

Examples

# Create a UFA instance numbered 1 and name abc and enter its view.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] instance 1 name abc

[Sysname-netanalysis-instance-1]

isdf-detect drop-threshold

Use isdf-detect drop-threshold to set the packet loss threshold for fault detection in percentage.

Use undo isdf-detect drop-threshold to restore the default.

Syntax

isdf-detect drop-threshold percent

undo isdf-detect drop-threshold

Default

The packet loss threshold for fault detection in percentage is 30.

Views

UFA view

Predefined user roles

network-admin

Parameters

percent: Specifies packet loss threshold for fault detection in percentage, in the range of 1 to 100.

Usage guidelines

The device collect statistics on traffic that matches the filters and generates a hardware flow table. If the device detects that the packet loss threshold of the flow exceeds the packet loss threshold configured by this command, it immediately triggers a silent failure event and notifies the ISDF module. Upon receiving the notification, the ISDF module takes corresponding measures to achieve silent failure detection and recovery.

Examples

# Set the packet loss threshold for fault detection in percentage to 50.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] isdf-detect drop-threshold 50

isdf-detect period

Use isdf-detect period to set the measurement period for fault detection.

Use undo isdf-detect period to restore the default.

Syntax

isdf-detect period period-time

undo isdf-detect period

Default

The measurement period for fault detection is 3000 milliseconds.

Views

UFA view

Predefined user roles

network-admin

Parameters

period-time: Specifies the measurement period for fault detection in milliseconds, in the range of 1000 to 300000.

Usage guidelines

After you configure this feature, the device will detect traffic based on the specified measurement period. You can set the measurement period as needed.

Examples

# Set the measurement period for fault detection to 2000 milliseconds.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] isdf-detect period 2000

report-loss-reason enable

Use report-loss-reason enable to enable packet drop reason reporting.

Use undo report-loss-reason enable to disable packet drop reason reporting.

Syntax

report-loss-reason enable

undo report-loss-reason enable

Default

Packet drop reason reporting is enabled.

Views

UFA view

Predefined user roles

network-admin

Usage guidelines

You can disable packet drop reason reporting if the analyzer does not require packet drop reasons. After you disable packet drop reason, the device does not report the number of dropped packets, the number of dropped bytes, and the packet drop reasons. In the display netanalysis unified-flow command output, all the three fields displays 0.

Examples

# Disable packet drop reason reporting.

<Sysname> system-view

[Sysname] netanalysis unified-flow

[Sysname-netanalysis-unified-flow] undo report-loss-reason enable

reset netanalysis unified-flow

Use reset netanalysis unified-flow to clear UFA flow table information.

Syntax

reset netanalysis unified-flow { ipv4 | ipv6 } [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

Parameters

slot slot-number: Specifies an IRF member device by its member ID.

Examples

# Clear the IPv4 UFA flow table information.

<Sysname> reset netanalysis unified-flow ipv4 slot 1

uad enable (interface view)

Use uad enable to enable unauthorized access detection on an interface.

Use undo uad enable to disable unauthorized access detection on an interface.

Syntax

uad enable

undo uad enable

Default

Unauthorized access detection is enabled on an interface.

Views

Interface view

Predefined user roles

network-admin

Usage guidelines

After you execute this command in interface view, the corresponding interface is enabled with unauthorized access detection.

When unauthorized access detection is enabled globally, you can execute the undo uad enable command in interface view to disable unauthorized access detection on the corresponding interface. If you execute the undo uad enable command in system view, the uad enable command executed in interface view does not take effect.

Examples

# Enable unauthorized access detection on an interface.

<Sysname> system-view

[Sysname] interface GigabitEthernet 1/0/1

[Sysname-GigabitEthernet 1/0/1] uad enable

Related commands

display uad detection-result

uad enable (system view)

uad enable (system view)

Use uad enable to enable unauthorized access detection globally.

Use undo uad enable to disable unauthorized access detection globally.

Syntax

uad enable { unauthorized-hub | unauthorized-router }

undo uad enable { unauthorized-hub | unauthorized-router }

Default

Unauthorized access detection is disabled globally.

Views

System view

Predefined user roles

network-admin

Parameters

unauthorized-hub: Detects unauthorized hubs.

unauthorized-router: Detects unauthorized routers.

Usage guidelines

After you execute this command in system view, all interfaces on the device are enabled with unauthorized access detection. If the device detects unauthorized hubs or routers, it notifies the controller. The controller takes an action on them.

The mechanisms for detecting unauthorized hubs and routers are different.

·     Detecting unauthorized hub—The device detects unauthorized hubs by identifying whether multiple IP addresses and MAC addresses exist on an interface. Typically, an interface corresponds to only one IP address and one MAC address. If the device detects multiple IP addresses and MAC addresses exist on an interface, it determines that unauthorized hubs are connected.

·     Detecting unauthorized router—The device detects unauthorized routers by examining the TTL value. The initial TTL value is typically 128, 64, 255, 32, or 1. After a packet passes through a router, the TTL value decreases by 1. If the device detects that the TTL value of a packet is not the initial value, it determines that unauthorized routers are connected.

Examples

# Enable detection of unauthorized hubs globally.

<Sysname> system-view

[Sysname] uad enable unauthorized-hub

Related commands

dis uad detection-results

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us