HP Load Balancing Module

Size: px
Start display at page:

Download "HP Load Balancing Module"

Transcription

1 HP Load Balancing Module System Maintenance Configuration Guide Part number: Software version: Feature 3221 Document version: 6PW

2 Legal and notice information Copyright 2013 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitted in any form or by any means without prior written consent of Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

3 Contents Using ping, tracert, and system debugging 1 Ping 1 Using a ping command to test network connectivity 1 Ping example 1 Tracert 3 Prerequisites 4 Using a tracert command to identify failed or all nodes in a path 5 System debugging 5 Debugging information control switches 5 Debugging a feature module 6 Ping and tracert example 7 Configuring the information center 9 Overview 9 Classification of system information 9 System information levels 9 Output channels and destinations 10 Default output rules of system information 11 System information formats 11 Information center configuration task list 14 Outputting system information to the console 14 Outputting system information to the monitor terminal 15 Outputting system information to a log host 16 Outputting system information to the trap buffer 17 Outputting system information to the log buffer 18 Outputting system information to the SNMP module 19 Outputting system information to the Web interface 19 Saving system information to a log file 20 Managing security logs 21 Saving security logs into the security log file 22 Managing the security log file 22 Enabling synchronous information output 25 Disabling an interface from generating link up/down logging information 26 Displaying and maintaining information center 26 Information center configuration examples 27 Outputting log information to the console 27 Outputting log information to a UNIX log host 28 Outputting log information to a Linux log host 29 Saving security logs into the security log file 30 Managing logs 34 Configuring syslog 34 User logging (flow logging) overview 36 Configuring user logging in the Web interface 37 Displaying user logging statistics 39 Clearing user logs and user logging statistics 39 Configuring the time zone for user logs 40 Configuring user logging at the CLI 40 User logging configuration task list 40 Configuring the user logging version 40 i

4 Configuring the source address for user logging packets 41 Exporting user logs 41 Displaying and maintaining user logging 42 User logging configuration example 42 Troubleshooting user logging 43 Configuring session logging 44 Session logging configuration task list 44 Configuring a session logging policy 44 Setting session logging thresholds 45 Log report 46 Displaying system logs 46 Displaying connection limit logs 48 Displaying attack prevention logs 48 Displaying blacklist logs 49 Displaying user logs (flow logging) 50 Configuring SNMP 53 Overview 53 SNMP framework 53 MIB and view-based MIB access control 53 SNMP operations 54 SNMP protocol versions 54 SNMP configuration task list 54 Configuring SNMP basic parameters 55 Configuring SNMPv3 basic parameters 55 Configuring SNMPv1 or SNMPv2c basic parameters 56 Configuring SNMP logging 57 Configuring SNMP traps 58 Enabling SNMP traps 58 Configuring the SNMP agent to send traps to a host 59 Displaying and maintaining SNMP 60 SNMP configuration examples 61 SNMPv1/SNMPv2c configuration example 61 SNMPv3 configuration example 62 SNMP logging configuration example 64 Configuring RMON 66 Overview 66 Working mechanism 66 RMON groups 66 Configuring the RMON statistics function 68 Configuring the RMON Ethernet statistics function 68 Configuring the RMON history statistics function 68 Configuring the RMON alarm function 69 Displaying and maintaining RMON 70 Ethernet statistics group configuration example 70 History group configuration example 71 Alarm group configuration example 73 Managing the file system 75 Overview 75 Storage medium naming rules 75 File name formats 75 Managing files 76 Displaying file information 76 Displaying the contents of a file 76 ii

5 Renaming a file 76 Copying a file 77 Moving a file 77 Deleting/restoring a file 77 Emptying the recycle bin 77 Managing directories 77 Displaying directory information 78 Displaying the current working directory 78 Changing the current working directory 78 Creating a directory 78 Removing a directory 78 Managing storage media 79 Managing storage medium space 79 Mounting and unmounting a storage medium 79 Partitioning a CF card 80 Performing batch operations 81 Setting the file system operation mode 81 File system management examples 81 Configuring FTP 83 Overview 83 Using the device as an FTP client 83 Establishing an FTP connection 83 Managing directories on the FTP server 84 Working with the files on the FTP server 85 Switching to another user account 86 Maintaining and troubleshooting the FTP connection 86 Terminating the FTP connection 86 FTP client configuration example 86 Using the device as an FTP server 88 Configuring basic parameters 88 Configuring authentication and authorization 89 FTP server configuration example 90 Displaying and maintaining FTP 92 Configuring TFTP 93 Overview 93 Prerequisites 93 Using the device as a TFTP client 93 Displaying and maintaining the TFTP client 94 TFTP client configuration example 94 Optimizing IP performance 96 Configuring TCP attributes 96 Configuring TCP MSS for the interface 96 Configuring TCP path MTU discovery 96 Configuring the TCP send/receive buffer size 97 Configuring TCP timers 98 Configuring ICMP to send error packets 98 Advantages of sending ICMP error packets 98 Disadvantages of sending ICMP error packets 99 Configuration procedure 99 Displaying and maintaining IP performance optimization 100 Support and other resources 101 Contacting HP 101 iii

6 Subscription service 101 Related information 101 Documents 101 Websites 101 Conventions 102 Index 104 iv

7 Using ping, tracert, and system debugging Ping Use the ping, tracert, and system debugging utilities to test network connectivity and identify network problems. Ping, tracert, and system debugging utilities can be used only at the CLI. The ping utility sends ICMP echo requests (ECHO-REQUEST) to the destination device. Upon receiving the requests, the destination device responds with ICMP echo replies (ECHO-REPLY) to the source device. The source device outputs statistics about the ping operation, including the number of packets sent, number of echo replies received, and the round-trip time. You can measure the network performance by analyzing these statistics. Using a ping command to test network connectivity Execute ping commands in any view. Task Command Remarks Test the network connectivity to an IP address. For an IPv4 network: ping [ ip ] [ -a source-ip -c count -f -h ttl -i interface-type interface-number -m interval -n -p pad -q -r -s packet-size -t timeout -tos tos -v -vpn-instance vpn-instance-name ] * host For an IPv6 network: ping ipv6 [ -a source-ipv6 -c count -m interval -s packet-size -t timeout -vpn-instance vpn-instance-name ] * host [ -i interface-type interface-number ] Set a larger value for the timeout timer (indicated by the -t parameter in the command) when you configure the ping command for a low-speed network. Disabling the echo reply function on the destination affects the ping function. Ping example Network requirements Test the network connectivity between LB and Device B in Figure 1. If they can reach each other, get detailed information about routes from LB to Device B. 1

8 Figure 1 Network diagram Configuration procedure # Use the ping command on LB to test connectivity to Device B. <LB> ping PING : 56 data bytes, press CTRL_C to break Reply from : bytes=56 Sequence=1 ttl=254 time=205 ms Reply from : bytes=56 Sequence=2 ttl=254 time=1 ms Reply from : bytes=56 Sequence=3 ttl=254 time=1 ms Reply from : bytes=56 Sequence=4 ttl=254 time=1 ms Reply from : bytes=56 Sequence=5 ttl=254 time=1 ms ping statistics packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 1/41/205 ms # Get detailed information about routes from LB to Device B. <LB> ping -r PING : 56 data bytes, press CTRL_C to break Reply from : bytes=56 Sequence=1 ttl=254 time=53 ms Record Route: Reply from : bytes=56 Sequence=2 ttl=254 time=1 ms Record Route: Reply from : bytes=56 Sequence=3 ttl=254 time=1 ms Record Route:

9 Tracert Reply from : bytes=56 Sequence=4 ttl=254 time=1 ms Record Route: Reply from : bytes=56 Sequence=5 ttl=254 time=1 ms Record Route: ping statistics packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 1/11/53 ms The test procedure with the ping r command (see Figure 1) is as follows: 1. The source device (LB) sends an ICMP echo request with the RR option being empty to the destination device (Device B). 2. The intermediate device (Device A) adds the IP address of its outbound interface ( ) to the RR option of the ICMP echo request, and forwards the packet. 3. Upon receiving the request, the destination device copies the RR option in the request and adds the IP address of its outbound interface ( ) to the RR option. Then the destination device sends an ICMP echo reply. 4. The intermediate device adds the IP address of its outbound interface ( ) to the RR option in the ICMP echo reply, and then forwards the reply. 5. Upon receiving the reply, the source device adds the IP address of its inbound interface ( ) to the RR option. Finally, you can get the detailed information of routes from LB to Device B: <-> { ; } <-> Tracert (also called "Traceroute") enables you to get the IP addresses of Layer 3 devices in the path to a specific destination. You can use tracert to test network connectivity and identify failed nodes. 3

10 Figure 2 Traceroute operation Tracert uses received ICMP error messages to get the IP addresses of devices. As shown in Figure 2, tracert works as follows: 1. The source device (Device A) sends a UDP packet with a TTL value of 1 to the destination device (Device D). The destination UDP port is not used by any application on the destination device. 2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a TTL-expired ICMP error message to the source, with its IP address ( ) encapsulated. In this way, the source device can get the address of the first Layer 3 device ( ). 3. The source device sends a packet with a TTL value of 2 to the destination device. 4. The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the source device the address of the second Layer 3 device ( ). 5. The process continues until the packet sent by the source device reaches the ultimate destination device. Because no application uses the destination port specified in the packet, the destination device responds with a port-unreachable ICMP message to the source device, with its IP address encapsulated. This way, the source device gets the IP address of the destination device ( ). 6. The source device thinks that the packet has reached the destination device after receiving the port-unreachable ICMP message, and the path to the destination device is to to Prerequisites Before you use a tracert command, perform the tasks in this section. For an IPv4 network: Enable sending of ICMP timeout packets on the intermediate devices (devices between the source and destination devices). If the intermediate devices are HP devices, execute the ip ttl-expires enable command on the devices. For more information about this command, see System Maintenance Command Reference. Enable sending of ICMP destination unreachable packets on the destination device. If the destination device is an HP device, execute the ip unreachables enable command. For more information about this command, see System Maintenance Command Reference. For an IPv6 network: Enable sending of ICMPv6 timeout packets on the intermediate devices (devices between the source and destination devices). If the intermediate devices are HP devices, execute the ipv6 4

11 hoplimit-expires enable command on the devices. For more information about this command, see Network Management Command Reference. Enable sending of ICMPv6 destination unreachable packets on the destination device. If the destination device is an HP device, execute the ipv6 unreachables enable command. For more information about this command, see Network Management Command Reference. Using a tracert command to identify failed or all nodes in a path Execute tracert commands in any view. Task Command Remarks Display the routes from source to destination. For an IPv4 network: tracert [ -a source-ip -f first-ttl -m max-ttl -p port -q packet-number -vpn-instance vpn-instance-name -w timeout ] * host For an IPv6 network: tracert ipv6 [ -f first-ttl -m max-ttl -p port -q packet-number -vpn-instance vpn-instance-name -w timeout ] * host Use either approach. System debugging The device supports debugging for the majority of protocols and features and provides debugging information to help users diagnose errors. Debugging information control switches The following switches control the display of debugging information: Protocol debugging switch Controls whether to generate the protocol-specific debugging information. Screen output switch Controls whether to display the debugging information on a certain screen. As shown in Figure 3, assume that the device can provide debugging for the three modules 1, 2, and 3. The debugging information can be output on a terminal only when both the protocol debugging switch and the screen output switch are turned on. Output of debugging information depends on the configurations of the information center and the debugging commands of each protocol and functional module. Debugging information is typically displayed on a terminal (including console or VTY). You can also send debugging information to other destinations. For more information, see "Configuring the information center." 5

12 Figure 3 Relationship between the protocol and screen output switch Debugging a feature module Output from debugging commands is memory intensive. To guarantee system performance, enable debugging only for modules that are in an exceptional condition. When debugging is complete, use the undo debugging all command to disable all the debugging functions. Configure the debugging, terminal debugging and terminal monitor commands before you can display detailed debugging information on the terminal. For more information about the terminal debugging and terminal monitor commands, see System Maintenance Command Reference. To debug a feature module and display the debugging information on a terminal: Step Command Remarks 1. Enable the terminal monitoring of system information. 2. Enable the terminal to display debugging information. 3. Enable debugging for a specified module. 4. Display the enabled debugging functions. terminal monitor terminal debugging debugging { all [ timeout time ] module-name [ option ] } display debugging [ interface interface-type interface-number ] [ module-name ] [ { begin exclude include } regular-expression ] By default, the monitoring of system information is enabled on the console port and disabled on the terminal. Available in user view. By default, the display of debugging information is disabled on the console. Available in user view. By default, debugging for a specified module is disabled. Available in user view. Available in any view. 6

13 Ping and tracert example Network requirements As shown in Figure 4, LB failed to Telnet Device B. Determine whether LB and Device B can reach each other. If they cannot reach each other, locate the failed nodes in the network. Figure 4 Network diagram Configuration procedure 1. Use the ping command to test connectivity between LB and Device B. <LB> ping PING : 56 data bytes, press CTRL_C to break Request time out Request time out Request time out Request time out Request time out ping statistics packet(s) transmitted 0 packet(s) received % packet loss The output shows that LB and Device B cannot reach each other. 2. Use the tracert command to identify failed nodes: # Enable sending of ICMP timeout packets on Device A. <DeviceA> system-view [DeviceA] ip ttl-expires enable # Enable sending of ICMP destination unreachable packets on Device B. <DeviceB> system-view [DeviceB] ip unreachables enable # Execute the tracert command on LB. <LB> tracert traceroute to ( ) 30 hops max,40 bytes packet, press CTRL_C to break ms 10 ms 20 ms 2 * * * 3 * * * 4 * * * 5 <LB> The output shows that LB and Device B cannot reach other, LB and Device A can reach each other, and an error occurred on the connection between Device A and Device B. 7

14 # Use the debugging ip icmp command on LB and Device B to verify that they can send and receive the specific ICMP packets, or use the display ip routing-table command to verify the availability of active routes between LB and Device B. 8

15 Configuring the information center Information center can be configured only at the CLI. Overview The information center collects and classifies system information as follows: Receives system information including log, trap, and debug information from source modules. Outputs the information to different information channels, according to output rules. Outputs information to different destinations, based on channel-to-destination associations. Figure 5 Information center diagram By default, the information center is enabled. It affects system performance to some degree when processing large amounts of information. If the system resources are insufficient, disable the information center to save resources. Classification of system information System information falls into the following types: Log information Describes user operations and interface state changes. Trap information Describes device faults such as authentication and network failures. Debug information Displays device running status for troubleshooting. Source modules refer to protocol modules, board drivers, and configuration modules which generate system information. You can classify, filter, and output system information based on source modules. To view the supported source modules, use the info-center source? command. System information levels System information is classified into eight severity levels, from 0 through 7 in descending order. The device outputs the system information with a severity level that is higher than or equal to the specified level. For example, if you configure an output rule with a severity level of 6 (informational), information that has a severity level from 0 to 6 is output. Table 1 System information levels Severity Emergency 0 Severity value Description The system is unusable. For example, the system authorization has expired. Corresponding keyword in commands emergencies 9

16 Severity Alert 1 Critical 2 Error 3 Warning 4 Notification 5 Informational 6 Severity value Description Action must be taken immediately to solve a serious problem. For example, traffic on an interface exceeds the upper limit. Critical condition. For example, the device temperature exceeds the upper limit, the power module fails or the fan tray fails. Error condition. For example, the link state changes or a storage card is unplugged. Warning condition. For example, an interface is disconnected, or the memory resources are used up. Normal but significant condition. For example, a terminal logs in to the device, or the device reboots. Informational message. For example, a command or a ping operation is executed. Corresponding keyword in commands alerts critical errors warnings notifications informational Debug 7 Debug message. debugging Output channels and destinations Table 2 shows the output channels and destinations. The system supports ten channels. By default, channels 0 through 6, and channel 9 are configured with channel names and output destinations. You can change these default settings as needed. You can also configure channels 7 and 8 and associate them with specific output destinations as needed. You can use the info-center channel name command to change the name of an information channel. Each output destination receives information from only one information channel, but each information channel can output information to multiple output destinations. Table 2 Default information channels and output destinations Channel number Default channel name Default output destination System information received by default 0 console Console Log, trap and debug information 1 monitor Monitor terminal Log, trap and debug information 2 loghost Log host Log, trap and debug information 3 trapbuffer Trap buffer Trap information 4 logbuffer Log buffer Log information 5 snmpagent SNMP module Trap information 6 channel6 Web interface Log information 7 channel7 Not specified Log, trap, and debug information 8 channel8 Not specified Log, trap, and debug information 9 channel9 Log file Log, trap, and debug information 10

17 Default output rules of system information A default output rule specifies the system information source modules, information type, and severity levels for an output destination. Table 3 shows the default output rules. Table 3 Default output rules Destinatio n Console System informatio n source modules All supported modules Log Trap Debug Output switch Enabled Severity Information al Output switch Severity Output switch Severity Enabled Debug Enabled Debug Monitor terminal All supported modules Enabled Information al Enabled Debug Enabled Debug Log host All supported modules Enabled Information al Enabled Debug Disabled Debug Trap buffer All supported modules Disabled Information al Enabled Informatio nal Disabled Debug Log buffer All supported modules Enabled Information al Disabled Debug Disabled Debug SNMP module All supported modules Disabled Debug Enabled Informatio nal Disabled Debug Web interface Log file All supported modules All supported modules Enabled Debug Enabled Debug Disabled Debug Enabled Debug Enabled Debug Disabled Debug System information formats Formats The following shows the original format of system information, which may be different from what you see. The actual system information format depends on the log resolution tool you use. The format of system information displayed on the Web interface depends on the Web interface. The system information format varies with output destinations. See Table 4. 11

18 Table 4 System information formats Output destination Format Example Console, monitor terminal, logbuffer, trapbuffer, SNMP module, or log file Log host timestamp sysname module/level/digest: content HP format: <PRI>timestamp Sysname %%vvmodule/level /digest: source content UNICOM format: <PRI>timestamp Sysname vvmodule/level/serial_numb er: content %Jun 26 17:08:35: Sysname SHELL/4/LOGIN: VTY login from HP format: <189>Oct 9 14:59: Sysname %%10SHELL/5/SHELL_LOGIN(l): VTY logged in from UNICOM format: <186>Oct 13 16:48: Sysname 10IFNET/2/210231a64jx : log_type=port;content=vlan-interface1 link status is DOWN. <186>Oct 13 16:48: Sysname 10IFNET/2/210231a64jx : log_type=port;content=line protocol on the interface Vlan-interface1 is DOWN. Field description Field Description PRI (priority) The priority is calculated by using this formula: facility*8+level, where: facility is the facility name. It can be configured with info-center loghost. It is used to identify different log sources on the log host, and to query and filter logs from specific log sources. level ranges from 0 to 7. See Table 1 for more information. Note that the priority field is available only for information that is sent to the log host. The timestamp records the time when the system information was generated. Timestamp Sysname (host name or host IP address) %% (vendor ID) vv (version information) Logs sent to the log host and those sent to the other destinations have different precisions, and their timestamp formats are configured with different commands. See Table 5 and Table 6 for more information. If the system information that is sent to a log host is in the UNICOM format, and the info-center loghost source command is configured, or the vpn-instance vpn-instance-name option is provided in the info-center loghost command, the sysname field is displayed as the IP address of the device that generated the system information. If the system information is in the HP format, the field is displayed as the system name of the device that generated the system information. You can use the sysname command to modify the local system name. For more information, see System Management Command Reference. This field indicates that the information was generated by an HP device. It exists only in logs sent to a log host. This field identifies the version of the log, and has a value of 10. It exists only in logs sent to the log host. 12

19 Field Module Level (severity) Description This field specifies source module name. You can execute the info-center source? command in system view to view the module list. System information is divided into eight severity levels, from 0 to 7. See Table 1 for more information about severity levels. You cannot change the system information levels generated by modules. However, you can use the info-center source command to control the output of system information based on severity levels. This field briefly describes the content of the system information. It contains a string of up to 32 characters. Digest Serial Number source content For system information destined to the log host: If the string ends with (l), the information is log information. If the string ends with (t), the information is trap information. If the string ends with (d), the information is debug information. This field indicates the serial number of the device that generated the system information. It is displayed only if the system information sent to the log host is in the UNICOM format. This optional field identifies the source of the information. It is displayed only if the system information is sent to a log host in HP format. This field contains the content of the system information. Table 5 Timestamp precisions and configuration commands Item Destined to the log host Destined to the console, monitor terminal, log buffer, and log file Precision Seconds Milliseconds Command used to set the timestamp format info-center timestamp loghost info-center timestamp Table 6 Description of the timestamp parameters Timestamp parameters boot date Description Time since system startup, in the format of xxx.yyy. xxx represents the higher 32 bits, and yyy represents the lower 32 bits, of milliseconds elapsed. System information sent to all destinations other than log host supports this parameter. Current date and time, in the format of mm dd hh:mm:ss:xxx yyy. All system information supports this parameter. Example % Sysname FTPD/5/FTPD_LOGIN: User ftp ( ) has logged in successfully is a timestamp in the boot format. %May 30 05:36:29: Sysname FTPD/5/FTPD_LOGIN: User ftp ( ) has logged in successfully. May 30 05:36:29: is a timestamp in the date format. 13

20 Timestamp parameters iso none no-year-date Description Timestamp format stipulated in ISO Only system information that is sent to the log host supports this parameter. No timestamp is included. All system information supports this parameter. Current date and time without year information, in the format of mm dd hh:mm:ss:xxx. Only the system information that is sent to the log host supports this parameter. Example <189> T06:42:44 Sysname %%10FTPD/5/FTPD_LOGIN(l): User ftp ( ) has logged in successfully T06:42:44 is a timestamp in the iso format. % Sysname FTPD/5/FTPD_LOGIN: User ftp ( ) has logged in successfully. No timestamp is included. <189>May 30 06:44:22 Sysname %%10FTPD/5/FTPD_LOGIN(l): User ftp ( ) has logged in successfully. May 30 06:44:22 is a timestamp in the no-year-date format. Information center configuration task list Task Outputting system information to the console Outputting system information to the monitor terminal Outputting system information to a log host Outputting system information to the trap buffer Outputting system information to the log buffer Outputting system information to the SNMP module Outputting system information to the Web interface Saving system information to a log file Managing security logs Enabling synchronous information output Disabling an interface from generating link up/down logging information Remarks Configurations for the information output destinations function independently. Outputting system information to the console Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable Enabled by default. 14

21 Step Command Remarks 3. Name the channel with a specified channel number. 4. Configure an output channel for the console. 5. Configure an output rule for the console. 6. Configure the timestamp format. info-center channel channel-number name channel-name info-center console channel { channel-number channel-name } info-center source { module-name default } channel { channel-number channel-name } [ debug { level severity state state } * log { level severity state state } * trap { level severity state state } * ] * info-center timestamp { debugging log trap } { boot date none } See Table 2 for default channel names. By default, system information is output to the console through channel 0 (console). See "Default output rules of system information." By default, the timestamp format for log, trap and debug information is date. 7. Return to user view. quit N/A 8. Enable system information output to the console. 9. Enable the display of system information on the console. terminal monitor Enable the display of debug information on the console: terminal debugging Enable the display of log information on the console: terminal logging Enable the display of trap information on the console: terminal trapping The default setting is enabled. By default, the console displays log and trap information, and discards debug information. Outputting system information to the monitor terminal Monitor terminals refer to terminals that log in to the device through the AUX or VTY user interface. To output system information to the monitor terminal: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable Enabled by default. 3. Name the channel with a specified channel number. info-center channel channel-number name channel-name See Table 2 for default channel names. 15

22 Step Command Remarks 4. Configure an output channel for the monitor terminal. 5. Configure an output rule for the monitor terminal. 6. Configure the timestamp format. info-center monitor channel { channel-number channel-name } info-center source { module-name default } channel { channel-number channel-name } [ debug { level severity state state } * log { level severity state state } * trap { level severity state state } * ] * info-center timestamp { debugging log trap } { boot date none } By default, system information is output to the monitor terminal through channel 1 (known as monitor). See "Default output rules of system information." By default, the timestamp format for log, trap and debug information is date. 7. Return to user view. quit N/A The default setting is disabled. 8. Enable system information output to the monitor terminal. 9. Enable the display of system information on a monitor terminal. terminal monitor Enable the display of debug information on a monitor terminal: terminal debugging Enable the display of log information on a monitor terminal: terminal logging Enable the display of trap information on a monitor terminal: terminal trapping You must execute this command before you can enable the display of debug, log, and trap information on the monitor terminal. By default, the monitor terminal displays log and trap information, and discards debug information. Outputting system information to a log host Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. 3. Name the channel with a specified channel number. info-center enable info-center channel channel-number name channel-name Enabled by default. See Table 2 for default channel names. 16

23 Step Command Remarks 4. Configure an output rule for the log host. 5. Specify the source IP address for the log information. 6. Configure the timestamp format for system information output to the log host. info-center source { module-name default } channel { channel-number channel-name } [ debug { level severity state state } * log { level severity state state } * trap { level severity state state } * ] * info-center loghost source interface-type interface-number info-center timestamp loghost { date iso no-year-date none } See "Default output rules of system information." By default, the source IP address of output log information is the primary IP address of the matching route' egress interface. date by default. 7. Set the format of the system information sent to a log host. Set the format to UNICOM: info-center format unicom Set the format to HP: undo info-center format Use either approach. HP by default. 8. Specify a log host and configure related parameters. info-center loghost [ vpn-instance vpn-instance-name ] { host-ipv4-address ipv6 host-ipv6-address } [ port port-number ] [ channel { channel-number channel-name } facility local-number ] * By default, no log host or related parameters are specified. If no channel is specified when outputting system information to a log host, the system uses channel 2 (loghost) by default. The value of the port-number argument must be the same as the value configured on the log host. Otherwise, the log host cannot receive system information. Outputting system information to the trap buffer The trap buffer only receives trap information, and discards log and debug information. To output system information to the trap buffer: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable Enabled by default. 3. Name the channel with a specified channel number. info-center channel channel-number name channel-name See Table 2 for default channel names. 17

24 Step Command Remarks 4. Configure an output channel for the trap buffer and set the buffer size. 5. Configure an output rule for the trap buffer. 6. Configure the timestamp format. info-center trapbuffer [ channel { channel-number channel-name } size buffersize ] * info-center source { module-name default } channel { channel-number channel-name } [ debug { level severity state state } * log { level severity state state } * trap { level severity state state } * ] * info-center timestamp { debugging log trap } { boot date none } By default, system information is output to the trap buffer through channel 3 (known as trapbuffer) and the default buffer size is 256. See "Default output rules of system information." The timestamp format for log, trap and debug information is date by default. Outputting system information to the log buffer The log buffer only receives log information, and discards trap and debug information. To output system information to the log buffer: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable Enabled by default. 3. Name the channel with a specified channel number. 4. Configure an output channel for the log buffer and set the buffer size. 5. Configure an output rule for the log buffer. 6. Configure timestamp format. info-center channel channel-number name channel-name info-center logbuffer [ channel { channel-number channel-name } size buffersize ] * info-center source { module-name default } channel { channel-number channel-name } [ debug { level severity state state } * log { level severity state state } * trap { level severity state state } * ] * info-center timestamp { debugging log trap } { boot date none } See Table 2 for default channel names. By default, system information is output to the log buffer through channel 4 (known as logbuffer) and the default buffer size is 512. See "Default output rules of system information." The timestamp format for log, trap and debug information is date by default. 18

25 Outputting system information to the SNMP module The SNMP module only receives trap information, and discards log and debug information. To monitor the device running status, trap information is usually sent to the SNMP network management system (NMS). For this purpose, you must configure output of traps to the SNMP module, and set the trap sending parameters for the SNMP module. For more information about SNMP, see "Configuring SNMP." To output system information to the SNMP module: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable Enabled by default. 3. Name the channel with a specified channel number. 4. Configure an output channel for the SNMP module. 5. Configure an output rule for the SNMP module. 6. Configure the timestamp format. info-center channel channel-number name channel-name info-center snmp channel { channel-number channel-name } info-center source { module-name default } channel { channel-number channel-name } [ debug { level severity state state } * log { level severity state state } * trap { level severity state state } * ] * info-center timestamp { debugging log trap } { boot date none } See Table 2 for default channel names. By default, system information is output to the SNMP module through channel 5 (known as snmpagent). See "Default output rules of system information." The timestamp format for log, trap and debug information is date by default. Outputting system information to the Web interface The Web interface only receives log information, and discards trap and debug information. This feature allows you to control whether to output system information to the Web interface and, if so, which system information can be output to the Web interface. The Web interface provides abundant search and sorting functions. If you output system information to the Web interface, you can view the system information by clicking corresponding tabs after logging in to the device through the Web interface. To output system information to the Web interface: Step Command Remarks 1. Enter system view. system-view N/A 19

26 Step Command Remarks 2. Enable the information center. info-center enable Enabled by default. 3. Name the channel with a specified channel number. 4. Configure an output channel for the Web interface. 5. Configure an output rule for the Web interface. 6. Configure the timestamp format. info-center channel channel-number name channel-name info-center syslog channel { channel-number channel-name } info-center source { module-name default } channel { channel-number channel-name } [ debug { level severity state state }* log { level severity state state }* trap { level severity state state }* ]* info-center timestamp { debugging log trap } { boot date none } See Table 2 for default channel names. By default, system information is output to the Web interface through channel 6. See "Default output rules of system information." The timestamp format for log, trap and debug information is date by default. Saving system information to a log file This feature enables the device to save generated log information to a log file. You can specify how often the log file is saved, or you can manually save the log file. Logs are saved into the log file buffer. The system writes the logs from the log file buffer to the log file at the specified interval (24 hours by default). You can also manually save the logs while the device is not busy. After saving logs from the log file buffer to the log file, the system clears the log file buffer. The log file has a specific capacity. When the capacity is reached, the system deletes the earliest messages and writes new messages into the log file. The log file is saved in the directory /logfile/logfile.log. To save system information to a log file: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable 3. Enable the log file feature. info-center logfile enable Enabled by default. Enabled by default. 4. Configure the interval at which the system saves logs in the logfile buffer to the log file. info-center logfile frequency freq-sec The default saving interval is seconds. 20

27 Step Command Remarks 5. Configure the maximum size of the log file. 6. Configure the directory to save the log file. 7. Manually save the log file buffer content to the log file. info-center logfile size-quota size info-center logfile switch-directory dir-name logfile save The default setting is 10 MB. To ensure normal operation of the device, set the size argument to a value between 1 MB and 10 MB. By default, the log file is saved in the logfile directory under the root directory of the storage device (the root directory of a storage device varies with devices). The configuration made by this command cannot survive a system reboot. Available in any view. By default, the system saves logs in the log file buffer to the log file at the interval configured by the info-center logfile frequency command. Managing security logs Security logs are very important for locating and troubleshooting network problems. Generally, security logs are output together with other logs. It is difficult to identify security logs among all logs. To solve this problem, you can save security logs into a security log file without affecting the current log output rules. The configuration of this feature and the management of the security log file are separate, and the security log file is managed by a privileged user. After logging in to the device, the administrator can enable the saving of security logs into the security log file and configure related parameters However, only the privileged user, known as the security log administrator, can perform operations on the security log file. The privileged user must pass AAA local authentication and log in to the device. No other users (including the system administrator) can perform operations on the security log file. A security log administrator is a local user who is authorized by AAA as the security log administrator. You can authorize a security log administrator by executing the authorization-attribute user-role security-audit command in local user view. The system administrator cannot view, copy, or rename the security log file. If they try, the system displays an "%Execution error" message. The system administrator can view, copy and rename other types of files. For more information about local user and AAA local authentication, see Security Configuration Guide. 21

28 Saving security logs into the security log file If this feature is enabled, the system first outputs security logs to the security log file buffer, and then saves the logs in the security log file buffer into the security log file at a specified interval (the security log administrator can also manually save security logs into the log file). After the logs are saved, the buffer is cleared immediately. The size of the security log file is limited. If the maximum size is reached, the system deletes the oldest log and writes the new log into the security log file. To avoid losing security logs, you can set an alarm threshold. When the alarm threshold is reached, the system outputs a message to inform the administrator. The administrator can log in to the device as the security log administrator and back up the security log file. By default, security logs are not saved into the security log file. The parameters, such as the saving interval, the maximum size, and the alarm threshold, have default settings. To modify these parameters, log in to the device as the system administrator, and then follow the steps in the following table to configure the related parameters: Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable 3. Enable the saving of the security logs into the security log file. 4. Set the interval for saving security logs to the security log file. info-center security-logfile enable info-center security-logfile frequency freq-sec Enabled by default. Disabled by default. The default saving interval is 600 seconds. 5. Set the maximum size of the security log file. 6. Set the alarm threshold of the security log file usage. info-center security-logfile size-quota size info-center security-logfile alarm-threshold usage The default setting is 1 MB. 80 by default. That is, when the usage of the security log file reaches 80%, the system informs the user. Managing the security log file To manage and maintain the security log file, the security log administrator must pass local AAA authentication first. For more information about security log administrator, see Security Configuration Guide. To manage the security log file: Task Command Remarks Display a summary of the security log file. display security-logfile summary [ { begin exclude include } regular-expression ] Available in user view. 22

29 Task Command Remarks Change the directory of the security log file. Display contents of the security log file buffer. Manually save all the contents in the security log file buffer into the security log file. info-center security-logfile switch-directory dir-name display security-logfile buffer [ { begin exclude include } regular-expression ] security-logfile save By default, the security log file is saved in the seclog directory under the root directory of the storage device. If the device has been partitioned, the security log file is saved in the seclog directory in the second partition of the storage device. Available in user view. By default, the system automatically saves the contents in the security log file buffer into the security log file at the interval specified by the info-center security-logfile frequency command. The directory of the security log file can be configured by using the info-center security-logfile switch-directory command. Available in user view. 23

30 Task Command Remarks Perform these operations to the security log file. Display the contents of the specified file: more file-url Display information about all files and folders: dir [ /all ] [ file-url ] Create a folder in a specified directory on the storage medium: mkdir directory Change the current working directory: cd { directory.. / } Display the current path: pwd Copy a file: copy fileurl-source fileurl-des Rename a file or a folder: rename fileurl-source fileurl-dest Move a file: move fileurl-source fileurl-dest Move a specified file from a storage medium to the Recycle Bin: delete [ /unreserved ] file-url Remove a folder: rmdir directory Format a storage medium: format device [ FAT16 FAT32 ] Restore a file from the Recycle Bin: undelete file-url Available in user view. For more information about these commands, see System Management Command Reference. 24

31 Task Command Remarks () Upload the security log file to the SFTP server. Establish a connection to an IPv4 SFTP server and enter SFTP client view: sftp server [ port-number ] [ vpn-instance vpn-instance-name ] [ prefer-compress { zlib zlib-openssh } prefer-ctos-cipher { 3des aes128 des } prefer-ctos-hmac { md5 md5-96 sha1 sha1-96 } prefer-kex { dh-group-exchange dh-group1 dh-group14 } prefer-stoc-cipher { 3des aes128 des } prefer-stoc-hmac { md5 md5-96 sha1 sha1-96 } ] * Establish a connection to an IPv6 SFTP server and enter SFTP client view: sftp ipv6 server [ port-number ] [ vpn-instance vpn-instance-name ] [ prefer-compress { zlib zlib-openssh } prefer-ctos-cipher { 3des aes128 des } prefer-ctos-hmac { md5 md5-96 sha1 sha1-96 } prefer-kex { dh-group-exchange dh-group1 dh-group14 } prefer-stoc-cipher { 3des aes128 des } prefer-stoc-hmac { md5 md5-96 sha1 sha1-96 } ] * Upload a file on the client to the remote SFTP server: put localfile [ remotefile ] Download a file from a remote SFTP server and save it: get remotefile [ localfile ] The sftp and sftp ipv6 commands are available in user view. The other commands are available in SFTP client view. For more information about these commands, see Security Command Reference. For all other operations supported by the device acting as an SFTP client, see Security Configuration Guide. Enabling synchronous information output The output of system logs interrupts ongoing configuration operations. You have to find the previously input commands before the logs. Synchronous information output can show the previous input after log output and a command prompt in command editing mode, or a [Y/N] string in interaction mode so you can continue your operation from where you were stopped. If system information, such as log information, is output before you input any information under the current command line prompt, the system does not display the command line prompt after the system information output. If system information is output when you are inputting some interactive information (non Y/N confirmation information), the system displays your previous input in a new line but does not display the command line prompt. To enable synchronous information output: 25

32 Step Command Remarks 1. Enter system view. system-view N/A 2. Enable synchronous information output. info-center synchronous Disabled by default. Disabling an interface from generating link up/down logging information By default, all interfaces generate link up or link down log information when the state changes. In some cases, you might want to disable specific interfaces from generating this information. For example: You are concerned only about the states of some interfaces. In this case, you can use this function to disable other interfaces from generating link up and link down log information. An interface is unstable and continuously outputs log information. In this case, you can disable the interface from generating link up and link down log information. Use the default setting in normal cases to avoid affecting interface status monitoring. To disable an interface from generating link up/down logging information: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter Layer 2 Ethernet interface view, Layer 3 Ethernet interface view, or VLAN interface view. 3. Disable the interface from generating link up or link down logging information. interface interface-type interface-number undo enable log updown N/A By default, all interfaces generate link up and link down logging information when the state changes. Displaying and maintaining information center Task Command Remarks Display information about information channels. Display information center configuration information. Display the state and the log information of the log buffer. display channel [ channel-number channel-name ] [ { begin exclude include } regular-expression ] display info-center [ { begin exclude include } regular-expression ] display logbuffer [ reverse ] [ level severity size buffersize ] * [ { begin exclude include } regular-expression ] Available in any view. Available in any view. Available in any view. 26

33 Task Command Remarks Display a summary of the log buffer. Display the content of the log file buffer. Display the log file configuration. Display the state and the trap information of the trap buffer. display logbuffer summary [ level severity ] [ { begin exclude include } regular-expression ] display logfile buffer [ { begin exclude include } regular-expression ] display logfile summary [ { begin exclude include } regular-expression ] display trapbuffer [ reverse ] [ size buffersize ] [ { begin exclude include } regular-expression ] Available in any view. Available in any view. Available in any view. Available in any view. Clear the log buffer. reset logbuffer Available in user view. Clear the trap buffer. reset trapbuffer Available in user view. Information center configuration examples Outputting log information to the console Network requirements Configure the LB to send ARP and IP log information that has a severity level of at least informational to the console. Figure 6 Network diagram Configuration procedure # Enable the information center. <LB> system-view [LB] info-center enable # Use channel console to output log information to the console. (This step is optional because it is the default setting.) [LB] info-center console channel console # Disable the output of log, trap, and debug information of all modules on channel console. [LB] info-center source default channel console debug state off log state off trap state off To avoid output of unnecessary information, disable the output of log, trap, and debug information of all modules on the specified channel (console in this example), and then configure the output rule as needed. # Configure an output rule to enable the LB to send ARP and IP log information that has a severity level of at least informational to the console. 27

34 [LB] info-center source arp channel console log level informational state on [LB] info-center source ip channel console log level informational state on [LB] quit # Enable the display of log information on the console. (This function is enabled by default.) <LB> terminal monitor Info: Current terminal monitor is on. <LB> terminal logging Info: Current terminal logging is on. Now, if the ARP and IP modules generate log information, the information center automatically sends the log information to the console. Outputting log information to a UNIX log host Network requirements Configure the LB to send ARP and IP log information that has a severity level of at least informational to the UNIX log host at /16. Figure 7 Network diagram Configuration procedure Before the configuration, make sure the LB and the log host can reach each other. (Details not shown.) 1. Configure the LB: # Enable the information center. <LB> system-view [LB] info-center enable # Specify the log host /16, use channel loghost to output log information (optional, loghost by default), and specify local4 as the logging facility. [LB] info-center loghost channel loghost facility local4 # Disable the output of log, trap, and debug information of all modules on channel loghost. [LB] info-center source default channel loghost debug state off log state off trap state off To avoid outputting unnecessary information, disable the output of log, trap, and debug information on the specified channel (loghost in this example) before you configure an output rule. # Configure an output rule to output to the log host ARP and IP log information that has a severity level of at least informational. [LB] info-center source arp channel loghost log level informational state on trap state off [LB] info-center source ip channel loghost log level informational state on trap state off 2. Configure the log host: The following configurations were performed on Solaris which has similar configurations to the UNIX operating systems implemented by other vendors. 28

35 a. Log in to the log host as a root user. b. Create a subdirectory named LB in directory /var/log/, and then create file info.log in the LB directory to save logs from the LB. # mkdir /var/log/lb # touch /var/log/lb/info.log c. Edit the file syslog.conf in directory /etc/ and add the following contents. # LB configuration messages local4.info /var/log/lb/info.log In this configuration, local4 is the name of the logging facility that the log host uses to receive logs. info is the informational level. The UNIX system records the log information that has a severity level of at least informational to the file /var/log/lb/info.log. NOTE: Be aware of the following issues while editing file /etc/syslog.conf: Comments must be on a separate line and must begin with a pound sign (#). No redundant spaces are allowed after the file name. The logging facility name and the information level specified in the /etc/syslog.conf file must be identical to those configured on the LB by using the info-center loghost and info-center source commands. Otherwise the log information might not be output properly to the log host. d. Display the process ID of syslogd, kill the syslogd process, and then restart syslogd using the r option to make the new configuration take effect. # ps -ae grep syslogd 147 # kill -HUP 147 # syslogd -r & Now, the system can record log information into the log file. Outputting log information to a Linux log host Network requirements Configure the LB to send log information that has a severity level of at least informational to the Linux log host at /16. Figure 8 Network diagram Configuration procedure Before the configuration, make sure the LB and the log host can reach each other. (Details not shown.) 1. Configure the LB: # Enable the information center. <LB> system-view [LB] info-center enable 29

36 # Specify the host /16 as the log host, use the channel loghost to output log information (optional, loghost by default), and specify local5 as the logging facility. [LB] info-center loghost channel loghost facility local5 # Configure an output rule to output to the log host the log information that has a severity level of at least informational. [LB] info-center source default channel loghost log level informational state on debug state off trap state off Disable the output of unnecessary information of all modules on the specified channel in the output rule. 2. Configure the log host: a. Log in to the log host as a root user. b. Create a subdirectory named LB in the directory /var/log/, and create file info.log in the LB directory to save logs from the LB. # mkdir /var/log/lb # touch /var/log/lb/info.log c. Edit the file syslog.conf in the directory /etc/ and add the following contents. # LB configuration messages local5.info /var/log/lb/info.log In this configuration, local5 is the name of the logging facility used by the log host to receive logs. info is the information level. The Linux system will record the log information with severity level equal to or higher than informational to file /var/log/lb/info.log. NOTE: Be aware of the following issues while editing file /etc/syslog.conf: Comments must be on a separate line and must begin with a pound sign (#). No redundant spaces are allowed after the file name. The logging facility name and the information level specified in the /etc/syslog.conf file must be identical to those configured on the LB by using the info-center loghost and info-center source commands. Otherwise, the log information might not be output properly to the log host. d. Display the process ID of syslogd, kill the syslogd process, and then restart syslogd using the r option to make the new configuration take effect. # ps -ae grep syslogd 147 # kill # syslogd -r & Make sure the syslogd process is started with the -r option on a Linux log host. Now, the system can record log information into the log file. Saving security logs into the security log file Network requirements Save security logs into the security log file cfa0:/securitylog/seclog.log every one hour. Only the security log administrator can view the contents of the security log file. No other logged-in users can view, copy, or rename the security log file. 30

37 Figure 9 Network diagram Configuration considerations The configuration in this example includes two parts: 1. Log in to the LB as the system administrator Enable saving of security logs into the security log file and set the saving interval to one hour. Create a local user seclog with the password , and authorize this user as the security log administrator. That is, use the authorization-attribute command to set the user privilege level to 3 and specify the user role as security audit. In addition, specify the service types that the user can use by using service-type. Set the authentication mode to scheme for the user logging in to the lb, and make sure only a local user who has passed AAA local authentication can view and perform operations on the security log file. 2. Log in to the LB as the security log administrator Configuration procedure Set the directory for saving the security log file to cfa0:/securitylog/seclog.log. View the contents of the security log file to learn the security status of the LB. 1. Configuration performed by the system administrator # Enable saving security logs into the security log file and set the saving interval to one hour. <LB> system-view [LB] info-center security-logfile enable [LB] info-center security-logfile frequency 3600 # Create a local user seclog, and configure the password for the user as [LB] local-user seclog New local user added. [LB-luser-seclog] password simple # Authorize the user to manage the security log file. [LB-luser-seclog] authorization-attribute level 3 user-role security-audit # Authorize the user to use SSH, Telnet, and terminal services. [LB-luser-seclog] service-type ssh telnet terminal [LB-luser-seclog] quit 31

38 # According to the network plan, the user will log in to the LB through SSH or Telnet, so configure the authentication mode of the VTY user interface as scheme. [LB] display user-interface vty? INTEGER<0-4> Specify one user terminal interface The output shows that the LB supports five VTY user interfaces, which are numbered 0 through 4. [LB] user-interface vty 0 4 [LB-ui-vty0-4] authentication-mode scheme [LB-ui-vty0-4] quit 2. Configuration performed by the security log administrator # Log in to the LB as user seclog. C:/> telnet ****************************************************************************** * Copyright (c) Hewlett-Packard Development Company, L.P. * * Without the owner's prior written consent, * * no decompiling or reverse-engineering shall be allowed. * ****************************************************************************** Login authentication Username:seclog Password: <Sysname> # Display the summary of the security log file. <LB> display security-logfile summary Security-log is enabled. Security-log file size quota: 1MB Security-log file directory: cfa0:/seclog Alarm-threshold: 80% Current usage: 0% Writing frequency: 1 hour 0 min 0 sec The output shows that the directory for saving the security log file is cfa0:/seclog. # Change the directory where the security log file is saved to cfa0:/securitylog. <LB> mkdir securitylog. %Created dir cfa0:/securitylog. <LB> info-center security-logfile switch-directory cfa0:/securitylog/ # Display the contents of the security log file buffer. <LB> display security-logfile buffer %@175 Nov 2 17:02:53: LB SHELL/4/LOGOUT: Trap : logout from Console %@176 Nov 2 17:02:53: LB SHELL/5/SHELL_LOGOUT:Console logged out from con0. The content of other logs is not shown. The preceding information indicates that there is still new content in the buffer that has not been saved into the security log file. 32

39 # Mannually save the contents of the security log file buffer into the security log file. <LB> security-logfile save Info: Save all the contents in the security log buffer into file cfa0:/securitylog/seclog.log successfully. # Display the contents of the security log file. <LB> more securitylog/seclog.log %@157 Nov 2 16:12:01: LB SHELL/4/LOGIN: Trap : login from Console %@158 Nov 2 16:12:01: LB SHELL/5/SHELL_LOGIN:Console logged in from con0. The content of other logs is not shown. 33

40 Managing logs This chapter describes how to manage various types of logs. Configuring syslog Syslog can be configured only in the Web interface. The syslog module allows you to set parameters for the information center. The information center classifies and manages system information and it can output log information to the Web interface and log hosts. To configure syslog: 1. Select Log Report > Syslog from the navigation tree to enter the page as shown in Figure

41 Figure 10 Syslog 2. Configure syslog settings as described in Table Click Apply. Table 7 Configuration items Item Log Buffer Size Description Set the number of syslogs that can be stored in the log buffer. Syslogs that can be stored in the log buffer include system logs, connection limit logs, attack prevention logs, and blacklist logs. 35

42 Item Log Host IP Address Log Host 1 Log Host 2 Log Host 3 Log Host 4 Description Set the address (IPv4 address, host name, or IPv6 address), port number and the VPN instance. You can report log information to log hosts in the format of syslog. You can specify up to four syslog log hosts. You can specify up to four syslog log hosts. Set the refresh period on the log information displayed on the log report Web interface. Refresh Period You can select manual refresh or automatic refresh: Manual Refresh the Web interface to view latest information. Automatic Select to refresh the webpage every 10 seconds, 30 seconds, 1 minute, 5 minutes, or 10 minutes. To clear syslogs: 4. Select Log Report > Syslog from the navigation tree to enter the page as shown in Figure Click Clear Log. The system clears all syslogs, including system logs, connection limit logs, attack prevention logs, and blacklist logs. User logging (flow logging) overview To generate user logs, configure session logging (see "Configuring session logging"). User logging records users' access information to the external network. The device classifies flows based on 5-tuple information, including the source IP address, destination IP address, source port, destination port, and protocol number. User logging records the 5-tuple information of the packets and numbers of the bytes received and sent. With user logging, administrators can track and record accesses to the network. You can output user logs in one of the following formats: Output logs to the information center in the format of system information. The information center determines the output destination. Output logs to a log host in UDP packets in binary format. Two versions are available with user logging: version 1.0 and version 3.0, which are slightly different in packet format. For more information about packet formats, see Table 8 and Table 9. Table 8 Packet format in user logging version 1.0 Field SourceIP DestIP SrcPort DestPort Description Source IP address. Destination IP address. TCP/UDP source port number. TCP/UDP destination port number. StartTime Start time of the flow, in seconds, counted from 1970/1/1 0:0. EndTime End time of the flow, in seconds, counted from 1970/1/1 0:0. 36

43 Field Prot Operator Reserved Description Protocol. Indicates the reason why the flow ended. For future applications. Table 9 Packet format in user logging version 3.0 Field Prot Operator IpVersion TosIPv4 SourceIP SrcNatIP DestIP DestNatIP SrcPort SrcNatPort DestPort DestNatPort Description Protocol. Indicates the reason why the flow ended. IP packet version. ToS field of the IPv4 packet. Source IP address. Source IP address after Network Address Translation (NAT). Destination IP address. Destination IP address after NAT. TCP/UDP source port number. TCP/UDP source port number after NAT. TCP/UDP destination port number. TCP/UDP destination port number after NAT. StartTime Start time of the flow, in seconds, counted from 1970/01/01 00:00. EndTime End time of the flow, in seconds, counted from 1970/01/01 00:00. InTotalPkg InTotalByte OutTotalPkg OutTotalByte Reserved1 Reserved2 Reserved3 Number of packets received. Number of bytes received. Number of packets sent. Number of the bytes sent. Reserved in version 0x02. In version 0x03, the first byte is the source VPN ID, the second byte is the destination VPN ID, and the third and forth bytes are reserved. For future applications. For future applications. Configuring user logging in the Web interface To configure user logging: 1. Select Log Report > Userlog from the navigation tree to enter the page as shown in Figure

44 Figure 11 User logging 2. Configure user logging settings as described in Table Click Apply. Table 10 Configuration items Item Description Set the user logging version, 1.0 or 3.0. Version Log timestamps IMPORTANT: Configure the user logging version according to the capacity of the log receiving device. If the log receiving device does not support user logging of the specified version, the device cannot resolve the logs received. Set the time zone for userlogs: UTC or localtime. UTC Coordinated Universal Time, loosely defined as current date and time of day in Greenwich, England. Localtime Coordinated Universal Time (UTC) plus the UTC offset. Set the source IP address of user logging packets. Source IP Address of Packets After you specify the source IP address, when Device A sends user logs to Device B, it uses the specified IP address instead of the actual egress address as the source IP address of the packets. In this way, although Device A sends out packets to Device B through different ports, Device B can judge whether the packets are sent from Device A according to their source IP addresses. This function also simplifies ACL and security policy configurations. If you specify the same source address as the source or destination address in the rule command in ACL, the IP address variance and the influence of interface status can be masked to filter user logging packets. HP recommends you to use the IP address of the loopback interface as the source IP address of user logging packets. 38

45 Item Log Host Configura tion Log Host 1 Log Host 2 Description Set the IPv4/IPv6 addresses, port number, and the VPN instance (this option is available only when you specify a log host with an IPv4 address) of the userlog log host to encapsulate user logs in UDP packets and send them to the specified userlog log host. The log host can analyze and display the user logs to remotely monitor the device. You can specify up to two userlog log hosts. IMPORTANT: To avoid collision with the common UDP port numbers, use a UDP port number in the range 1025 to Set to output user logs to the information center in the format of system information. Output user logs to the information center IMPORTANT: With this function enabled, user logs will not be output to the specified userlog log host. Outputting user logs to the information center occupies the storage space of the device. Output user logs to the information center when there are a small amount of user logs. Displaying user logging statistics If you select to send user logs in UDP packets to the specified userlog log host, you can view the related statistics, including the total number of user logs sent to the log host, the total number of UDP packets, and the total number of user logs stored on the device log buffer. 1. Select Log Report > Userlog from the navigation tree to enter the page as shown in Figure Click the Statistics expansion button on the page to view the user logging statistics as shown in Figure 12. Figure 12 Viewing user logging statistics Clearing user logs and user logging statistics 1. Select Log Report > Userlog from the navigation tree to enter the page as shown in Figure Click the Statistics expansion button on the page to display the information as shown in Figure Click Reset. The system clears all user logging statistics for the device and user logs in the log buffer. 39

46 Configuring the time zone for user logs User logs can be recorded in UTC or localtime: UTC Coordinated Universal Time, loosely defined as current date and time of day in Greenwich, England. Localtime Coordinated Universal Time (UTC) plus the UTC offset. To configure the time zone for user logs: Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the system to record user logs in localtime. userlog flow export timestamps localtime By default, userlogs are recorded in UTC. Configuring user logging at the CLI At the CLI, user logging is also known as "flow logging." User logging configuration task list Task Configuring the user logging version Configuring the source address for user logging packets Remarks Exporting user logs Exporting user logs to log servers Exporting user logs to the information center Required. Use either method. Configuring the user logging version Configure the user logging version according to the receiver capability. A receiver cannot resolve user logs correctly if it does not support the version of the user logs. To configure the user logging version: Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the user logging version. userlog flow export version version-number The default version is 1.0. Although the device supports two versions, only one can be active at one time. Therefore, if you configure the user logging version multiple times, the most recent configuration takes effect. 40

47 Configuring the source address for user logging packets A source IP address is usually used to uniquely identify the sender of a packet. Suppose Device A sends flow logs to Device B. Device A uses the specified IP address instead of the actual egress address as the source IP address of the packets. In this way, although Device A sends out packets to Device B through different ports, Device B can judge whether the packets are sent from Device A according to their source IP addresses. This function also simplifies the configurations of ACLs and security policies. You only need to specify one address to filter packets from or to a device. To configure the source address for user logging packets: Step Command Remarks 1. Enter system view. system-view N/A 2. Specify the source IP address of user logging packets. userlog flow export source-ip ip-address By default, the source IP address of user logging packets is the IP address of the egress interface. Exporting user logs User logs can be exported in the following ways: User logs can be encapsulated into UDP packets and sent to an IPv4 log server or an IPv6 log server (see Figure 13). The log server analyzes user logs and displays them by class, thus realizing remote monitoring. User logs in the format of system information are exported to the information center of the device. You can set the output destinations of the user logs by setting the output parameters of the system information. For more information about the information center, see "Configuring the information center." The two export approaches are mutually exclusive. If you configure both approaches, the system automatically exports user logs to the information center. Exporting user logs to log servers You can specify at most two log servers of the same type or different types for a device. There are three types of log servers, the VPN user logging server, the IPv4 user logging server, and the IPv6 user logging server. If you have already specified two servers, you need to delete one to specify a new one. If you specify a new server that has the same IP address as but has other information different from the current server, the new configuration overwrites the current one. To export user logs to an IPv4 log server: Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the IPv4 address and UDP port number of the log server. userlog flow export [ vpn-instance vpn-instance-name ] host ipv4-address udp-port Not configured by default. To export user logs to an IPv6 log server: 41

48 Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the IPv6 address and UDP port number of the log server. userlog flow export [ vpn-instance vpn-instance-name ] host ipv6 ipv6-address udp-port Not configured by default. Exporting user logs to the information center Exporting user logs to the information center occupies device storage space, so use this export approach only if there are a small amount of logs. User logs exported to the information center have a severity level of informational. To export user logs to the information center: Step Command Remarks 1. Enter system view. system-view N/A 2. Export user logs to the information center. userlog flow syslog User logs are exported to the log server by default. Displaying and maintaining user logging Task Command Remarks Display the configuration and statistics about user logging. display userlog export [ { begin exclude include } regular-expression ] Available in any view. Clear statistics about user logging. reset userlog flow export Available in user view. Clear user logs in the log buffer. reset userlog flow logbuffer Available in user view. User logging configuration example Network requirements As shown in Figure 13, configure user logging on the LB so that the log server can monitor the user's access to the network. 42

49 Figure 13 Network diagram Configuration procedure # Configure IP addresses for the interfaces according to the network diagram. Make sure that the devices can reach each other. (Details not shown.) # Set the user logging version to 3.0. <LB> system-view [LB] userlog flow export version 3 # Export user logs to the log server with IP address :2000. [LB] userlog flow export host # Configure the source IP address of UDP packets carrying user logs as [LB] userlog flow export source-ip Configuration verification # Display the configuration and statistics about user logs. <LB> display userlog export flow: Export Version 3 logs to log server : enabled Source address of exported logs : Address of log server : (port: 2000) total Logs/UDP packets exported : 112/87 Logs in buffer : 6 Troubleshooting user logging Symptom 1: No user log is exported Analysis: No export approach is specified. Solution: Configure user logging to export user logs to the information center or to the log server. Symptom 2: User logs cannot be exported to log server Analysis: Both of the export approaches are configured. Solution: Restore to the default, and then configure the IP address and UDP port number of the log server. 43

50 Configuring session logging Session logging can be configured only in the Web interface. Session logging records users' access information, IP address translation information, and traffic information, and can output the records in a specific format to a log host, allowing administrators to perform security auditing. Session logging records an entry for a session if it reaches the specified threshold. Session logging supports two categories of thresholds: Time threshold When the lifetime of a session reaches this threshold, a log entry is output for the session. Traffic threshold The traffic threshold can be in units of the number of bytes or the number of packets. When the traffic of a session reaches the specified number of bytes or packets, a log entry is output for the session. For more information about session management, see Security Configuration Guide. Session logs are output in the format of user logs. To view session logs, you also need to configure user logging. Session logging configuration task list Task Configuring a session logging policy Setting session logging thresholds Remarks Required. Configure a session logging policy, specifying the source zone and destination zone of the sessions and the ACL for filtering log entries. By default, no session logging policy exists. Required. Configure the time threshold or/and traffic threshold for session logging. By default, both the time threshold and traffic threshold are 0, meaning that no session logging entries are output. IMPORTANT: If both the time threshold and traffic threshold are configured, a log entry is output for the session when it reaches whichever threshold and the statistics of the session will be cleared. Configuring a session logging policy 1. Select Log Report > Session Log > Log Policy from the navigation tree to display existing session logging policies, as shown in Figure

51 Figure 14 Session logging policy list 2. Click Add to enter the session logging policy configuration page, as shown in Figure 15. Figure 15 Creating a session logging policy 3. Configure a session logging policy as described in Table Click Apply. Table 11 Configuration items Item Source Zone Destination Zone ACL Description Specify the source zone and destination zone. You can configure an optional security zone on the page entered by selecting Security > Zone. Specify the ACL for filtering log entries, and only log entries permitted by the ACL will be output. The rules of the specified ACL can be configured on the page entered by selecting Security > ACL. Setting session logging thresholds 1. Select Log Report > Session Log > Global Setup from the navigation tree to enter the page for setting session logging thresholds, as shown in Figure

52 Figure 16 Global configuration page 2. Configure session logging thresholds as described in Table Click Apply. Table 12 Configuration items Item Time Threshold Traffic Threshold Description Set the time threshold for outputting session logging entries. With this argument set, log entries will be output for sessions whose lifetimes reach the specified time threshold. Set the traffic threshold for outputting session logging entries. It can be in number of packets or bytes. With the traffic threshold set, log entries will be output for sessions whose traffic reaches the specified threshold in number of bytes or packets. Log report The log report module allows you to view the following types of log information on the device: System logs. Connection limit logs. Attack prevention logs. Blacklist logs. User logs. Except that the user logs can be viewed at both the Web interface and the CLI, all other types of log information can only be viewed in the Web interface. Displaying system logs Select Log Report > Report > System Log from the navigation tree to enter the page as shown in Figure 17. Table 13 describes the configuration items. 46

53 Figure 17 Operation log configuration page Table 13 Configuration items Item Time/Date Source Level Description Description Time when the system log was generated. Module that generated the system log. Severity level of the system log. For more information about severity levels, see Table 14. Content of the system log. Table 14 System log severity level Severity level Description Value Emergency The system is unusable. 0 Alert Information that demands prompt reaction. 1 Critical Critical information. 2 Error Error information. 3 Warning Warning information. 4 Notification Normal but significant information. 5 Information Informational information to be recorded. 6 Debug Information generated during debugging. 7 Note: A smaller value represents a higher severity level. 47

54 Displaying connection limit logs Select Log Report > Report > Connection Limit Log from the navigation tree to enter the page as shown in Figure 18. Table 15 describes the configuration items. Figure 18 Connection limit log configuration page Table 15 Configuration items Item Time/Date Type Source Zone Source IP Destination Zone Destination IP Current Rate Current Connection TCP Percentage UDP Percentage ICMP Percentage Description Time when the connection limit log was generated. Type of the traffic alarm: too many source IP sessions The number of source IP-based connections exceeds the upper limit. too many source IP sessions The number of destination IP-based connections exceeds the upper limit. Source zone of the connection. Source IP address of the connection. Destination zone of the connection. Destination IP address of the connection. Rate of the current connection. Total number of the current connections. Percentage of TCP packets to the total packets. Percentage of UDP packets to the total packets. Percentage of ICMP packets to the total packets. Displaying attack prevention logs Select Log Report > Report > Attack Prevention Log from the navigation tree to enter the page as shown in Figure 19. Table 16 describes the configuration items. 48

55 Figure 19 Attack prevention log configuration page Table 16 Configuration items Item Time Type Interface Source IP Source MAC Destination IP Destination MAC Speed Description Time when the attack was detected. Attack type. Interface that receives the attack packets. Source IP address of the attack packets. Source MAC address of the attack packets. Destination IP address of the attack packets. Destination MAC address of the attack packets. Connection speed of the attack. Displaying blacklist logs Select Log Report > Report > Blacklist Log from the navigation tree to enter the page as shown in Figure 20. Table 17 describes the configuration items. Figure 20 Blacklist log configuration page 49

56 Table 17 Configuration items Item Time/Date Mode Source IP Reason Hold Time Description Time when the log was generated. Whether the log is added or removed. Source IP address. Why the source IP address was added to the blacklist: Auto insert The source IP address was automatically added to the blacklist by the system. Manual insert The source IP address was manually added to the blacklist through the Web interface. Hold time. Displaying user logs (flow logging) This section describes how to view the userlog in the Web interface. For information about viewing the userlog at the CLI, see "Displaying and maintaining user logging." To display user logs through the Web interface, configure outputting user logs to the information center. Select Log Report > Report > Userlog from the navigation tree to enter the page for displaying user logs. If you select the 1.0 option, the user logging information is displayed, as shown in Figure 21. If you select the 3.0 option, the user logging 3.0 information is displayed, as shown in Figure 22. Figure 21 User logging 1.0 log report 50

57 Figure 22 User logging 3.0 log report Table 18 User logging 1.0 configuration items Item Time/Date Protocol Type Flow Information Start Time End Time Description Time and date when the user log was generated. Protocol type of the flow log. Flow information: If the protocol type is TCP or UDP, the displayed flow information is source IP address:source port-->destination IP address:destination port, for example, :1026--> :69. If the protocol type is another type except TCP or UDP, the displayed flow information is source IP address-->destination IP address, for example, > Time when the flow was created. Time when the flow was removed. Operator field of the flow: (1)Normal over The flow ended normally. (2)Aged for timeout Timer timed out. (3)Aged for reset or config-change Flow aging due to configuration change. Flow Action (4)Aged for no enough resource Flow aging due to insufficient resource. (5)Aged for no-pat of NAT One to one NAT. In this case, only the source IP address, the source IP address after translation and the time fields are available. (6)Active data flow timeout The lifetime of the flow reached the limit. (8)Data flow created Record for the flow when it was created. (254)Other Other reasons. 51

HP 5120 SI Switch Series

HP 5120 SI Switch Series HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright

More information

HP 6125 Blade Switch Series

HP 6125 Blade Switch Series HP 6125 Blade Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-3162 Software version: Release 2103 Document version: 6W100-20120907 Legal and notice information Copyright

More information

HP 6125G & 6125G/XG Blade Switches

HP 6125G & 6125G/XG Blade Switches HP 6125G & 6125G/XG Blade Switches Network Management and Monitoring Configuration Guide Part number: 5998-3162b Software version: Release 2103 and later Document version: 6W103-20151020 Legal and notice

More information

HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine

HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine Network Management and Monitoring Configuration Guide Part number: 5998-3936 Software version: 3308P26 Document version: 6W101-20130628 Legal

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-2900 Software version: Release 2210 Document version: 6W100-20131105 Legal and notice information Copyright

More information

HP A5500 EI & A5500 SI Switch Series Network Management and Monitoring. Configuration Guide. Abstract

HP A5500 EI & A5500 SI Switch Series Network Management and Monitoring. Configuration Guide. Abstract HP A5500 EI & A5500 SI Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the

More information

HP 5820X & 5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract

HP 5820X & 5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract HP 5820X & 5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP 5820X & 5800 Series products and guides you through

More information

Using ping, tracert, and system debugging

Using ping, tracert, and system debugging Contents Using ping, tracert, and system debugging 1 Ping 1 Using a ping command to test network connectivity 1 Ping example 1 Tracert 3 Prerequisites 4 Using a tracert command to identify failed or all

More information

Table of Contents 1 System Maintaining and Debugging 1-1

Table of Contents 1 System Maintaining and Debugging 1-1 Table of Contents 1 System Maintaining and Debugging 1-1 System Maintaining and Debugging 1-1 Ping 1-1 Introduction 1-1 Configuring Ping 1-1 Ping Configuration Example 1-2 Tracert 1-4 Introduction 1-4

More information

HP FlexFabric 5930 Switch Series

HP FlexFabric 5930 Switch Series HP FlexFabric 5930 Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-7772b Software version: Release 241x Document version: 6W102-20171117 Legal and notice information

More information

HP 6125XLG Blade Switch

HP 6125XLG Blade Switch HP 6125XLG Blade Switch Network Management and Monitoring Configuration Guide Part number: 5998-5376a Software version: Release 240x Document version: 6W101-20150515 Legal and notice information Copyright

More information

HP A6600 Routers Network Management and Monitoring. Command Reference. Abstract

HP A6600 Routers Network Management and Monitoring. Command Reference. Abstract HP A6600 Routers Network Management and Monitoring Command Reference Abstract This document describes the commands and command syntax options available for the HP A Series products. This document is intended

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series Network Management and Monitoring Command Reference Part number: 5998-2889 Software version: Release 2210 Document version: 6W100-20131105 Legal and notice information Copyright

More information

HP MSR Router Series. Network Management and Monitoring Configuration Guide(V7)

HP MSR Router Series. Network Management and Monitoring Configuration Guide(V7) HP MSR Router Series Network Management and Monitoring Configuration Guide(V7) Part number: 5998-7724b Software version: CMW710-R0304 Document version: 6PW104-20150914 Legal and notice information Copyright

More information

HP 6125G & 6125G/XG Blade Switches

HP 6125G & 6125G/XG Blade Switches HP 6125G & 6125G/XG Blade Switches Network Management and Monitoring Command Reference Part number: 5998-3173b Software version: Release 2103 and later Document version: 6W103-20151020 Legal and notice

More information

Table of Contents 1 System Maintenance and Debugging Commands 1-1

Table of Contents 1 System Maintenance and Debugging Commands 1-1 Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display

More information

HPE FlexFabric 5940 Switch Series

HPE FlexFabric 5940 Switch Series HPE FlexFabric 5940 Switch Series Network Management and Monitoring Configuration Guide Part number: 5200-1026b Software version: Release 25xx Document version: 6W102-20170830 Copyright 2017 Hewlett Packard

More information

H3C S7500E Series Ethernet Switches. Network Management and Monitoring. Configuration Guide. Hangzhou H3C Technologies Co., Ltd.

H3C S7500E Series Ethernet Switches. Network Management and Monitoring. Configuration Guide. Hangzhou H3C Technologies Co., Ltd. H3C S7500E Series Ethernet Switches Network Management and Monitoring Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 20100722-C-1.01 Product Version: Release

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module System Management Configuration Guide Part number: 5998-4216 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Table of Contents 1 System Maintaining and Debugging Commands 1-1

Table of Contents 1 System Maintaining and Debugging Commands 1-1 Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining

More information

Table of Contents 1 Information Center 1-1

Table of Contents 1 Information Center 1-1 Table of Contents 1 Information Center 1-1 Information Center Overview 1-1 Introduction to Information Center 1-1 System Information Format 1-4 Information Center Configuration 1-6 Introduction to the

More information

HP MSR Router Series Network Management and Monitoring

HP MSR Router Series Network Management and Monitoring HP MSR Router Series Network Management and Monitoring Command Reference(V7) Part number: 5998-7743b Software version: CMW710-R0304 Document version: 6PW104-20150914 i Legal and notice information Copyright

More information

H3C SR6600/SR6600-X Routers

H3C SR6600/SR6600-X Routers H3C SR6600/SR6600-X Routers Network Management and Monitoring Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SR6600X-CMW520-R3103 SR6602-CMW520-R3103 SR6602X_MCP-CMW520-R3103

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Operation Manual System Management. Table of Contents

Operation Manual System Management. Table of Contents Table of Contents Table of Contents Chapter 1 File System Management... 1-1 1.1 File System Configuration... 1-1 1.1.1 File System Overview... 1-1 1.1.2 Directory... 1-1 1.1.3 File... 1-2 1.1.4 Storage

More information

HP 6125 Blade Switch Series

HP 6125 Blade Switch Series HP 6125 Blade Switch Series Layer 3 - IP Services Configuration Guide Part number: 5998-3156 Software version: Release 2103 Document version: 6W100-20120907 Legal and notice information Copyright 2012

More information

Contents. Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9

Contents. Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9 Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9 i Ping, tracert, and system debugging commands debugging Syntax Default

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module High Availability Configuration Guide Part number: 5998-2687 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company,

More information

HP VPN Firewall Appliances

HP VPN Firewall Appliances HP VPN Firewall Appliances High Availability Configuration Guide Part number: 5998-4169 Software version: F1000-A-EI/F1000-S-EI (Feature 3726) F1000-E (Release 3177) F5000 (Feature 3211) F5000-S/F5000-C

More information

Ping, tracert and system debugging commands

Ping, tracert and system debugging commands Contents Ping, tracert and system debugging commands 1 Ping and tracert commands 1 ping 1 ping ipv6 5 tracert 7 tracert ipv6 9 System debugging commands 10 debugging 10 display debugging 11 i Ping, tracert

More information

HP 5120 EI Switch Series

HP 5120 EI Switch Series HP 5120 EI Switch Series Layer 3 - IP Routing Configuration Guide Part number: 5998-1793 Software version: Release 2220 Document version: 6W100-20130810 Legal and notice information Copyright 2013 Hewlett-Packard

More information

H3C SR6600 Routers. Network Management and Monitoring. Command Reference. Hangzhou H3C Technologies Co., Ltd.

H3C SR6600 Routers. Network Management and Monitoring. Command Reference. Hangzhou H3C Technologies Co., Ltd. H3C SR6600 Routers Network Management and Monitoring Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 20100930-C-1.08 Product Version: SR6600-CMW520-R2420 Copyright

More information

H3C S5820X&S5800 Switch Series

H3C S5820X&S5800 Switch Series H3C S5820X&S5800 Switch Series Network Management and Monitoring Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 1211 Document version: 6W100-20110415

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Access Control Configuration Guide Part number: 5998-2648 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Security Configuration Guide Part number: 5998-2686 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part

More information

Logging in to the CLI

Logging in to the CLI Contents Logging in to the CLI 1 Login methods 1 Logging in through the console port 2 Introduction 2 Configuration procedure 2 Logging in through the AUX port 5 Configuration prerequisites 5 Configuration

More information

HP MSR Routers Troubleshooting Guide (Comware V7)

HP MSR Routers Troubleshooting Guide (Comware V7) HP MSR Routers Troubleshooting Guide (Comware V7) H3C MSR1000 Router Series H3C MSR2000 Router Series H3C MSR3000 Router Series H3C MSR4000 Router Series Software version: MSR-CMW710-R0106 Document version:

More information

About the HP 830 Series PoE+ Unified Wired-WLAN Switch and HP 10500/ G Unified Wired-WLAN Module

About the HP 830 Series PoE+ Unified Wired-WLAN Switch and HP 10500/ G Unified Wired-WLAN Module About the HP 830 Series Switch and HP 10500/7500 20G Unified Module s Part number: 5998-3903 Software version: 3308P29 (HP 830 Series Switch) 2308P29 (HP 10500/7500 20G Unified Module) Document version:

More information

Contents. Ping, tracert, and system debugging commands 1. debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10

Contents. Ping, tracert, and system debugging commands 1. debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10 Contents Ping, tracert, and system debugging commands 1 debugging 1 display debugging 1 ping 2 ping ipv6 5 tracert 7 tracert ipv6 10 i Ping, tracert, and system debugging commands debugging Syntax Default

More information

H3C S7500E Series Ethernet Switches. Network Management and Monitoring. Configuration Guide. Hangzhou H3C Technologies Co., Ltd.

H3C S7500E Series Ethernet Switches. Network Management and Monitoring. Configuration Guide. Hangzhou H3C Technologies Co., Ltd. H3C S7500E Series Ethernet Switches Network Management and Monitoring Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 20100930-C-1.01 Product Version: Release

More information

HP FlexFabric 5700 Switch Series

HP FlexFabric 5700 Switch Series HP FlexFabric 5700 Switch Series Layer 3 - IP Routing Configuration Guide Part number: 5998-6688 Software version: Release 2416 Document version: 6W100-20150130 Legal and notice information Copyright 2015

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series Layer 3 - IP Services Configuration Guide Part number: 5998-2351 Software version: Release 2108P01 Document version: 6W100-20131130 Legal and notice information Copyright 2013

More information

HP 6125 Blade Switch Series

HP 6125 Blade Switch Series HP 6125 Blade Switch Series About the HP 6125 Blade s Part number: 5998-3152 Software version: Release 2103 Document version: 6W100-20120907 Legal and notice information Copyright 2012 Hewlett-Packard

More information

H3C S5500-HI Switch Series

H3C S5500-HI Switch Series H3C S5500-HI Switch Series Network Management and Monitoring Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 52xx Document version: 6W102-20131220 Copyright

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2630 Software version: F1000-E/Firewall module: R3166 F5000-A5: R3206 Document version: 6PW101-20120706 Legal and notice information

More information

Table of Contents 1 FTP and SFTP Configuration TFTP Configuration 2-1

Table of Contents 1 FTP and SFTP Configuration TFTP Configuration 2-1 Table of Contents 1 FTP and SFTP Configuration 1-1 Introduction to FTP and SFTP 1-1 Introduction to FTP 1-1 Introduction to SFTP 1-1 FTP Configuration 1-2 FTP Configuration: A Switch Operating as an FTP

More information

HP 3100 v2 Switch Series

HP 3100 v2 Switch Series HP 3100 v2 Switch Series ACL and QoS Configuration Guide HP 3100-8 v2 SI Switch (JG221A) HP 3100-16 v2 SI Switch (JG222A) HP 3100-24 v2 SI Switch (JG223A) HP 3100-8 v2 EI Switch (JD318B) HP 3100-16 v2

More information

Table of Contents. 2 MIB Style Configuration 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1

Table of Contents. 2 MIB Style Configuration 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1 Table of Contents 1 SNMP Configuration 1-1 SNMP Overview 1-1 SNMP Mechanism 1-1 SNMP Protocol Version 1-2 MIB Overview 1-2 SNMP Configuration 1-3 Configuring SNMP Logging 1-5 Introduction to SNMP Logging

More information

About the Configuration Guides for HP Unified

About the Configuration Guides for HP Unified About the Configuration Guides for HP Unified Wired-W Products HP 830 Unified Wired-W PoE+ Switch Series HP 850 Unified Wired-W Appliance HP 870 Unified Wired-W Appliance HP 11900/10500/7500 20G Unified

More information

Login management commands

Login management commands Contents Login management commands 1 CLI login configuration commands 1 display telnet client configuration 1 telnet 1 telnet ipv6 2 telnet server enable 3 User interface configuration commands 3 acl (user

More information

Appendix A Command Index A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Appendix A Command Index A B C D E F G H I J K L M N O P Q R S T U V W X Y Z The command index includes all the commands in the Comware Command Manual, which are arranged alphabetically. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A access-limit accounting accounting optional

More information

HP A5120 EI Switch Series IRF. Command Reference. Abstract

HP A5120 EI Switch Series IRF. Command Reference. Abstract HP A5120 EI Switch Series IRF Command Reference Abstract This document describes the commands and command syntax options available for the HP A Series products. This document is intended for network planners,

More information

HP FlexFabric 5700 Switch Series

HP FlexFabric 5700 Switch Series HP FlexFabric 5700 Switch Series High Availability Configuration Guide Part number: 5998-6680 Software version: Release 2416 Document version: 6W100-20150130 Legal and notice information Copyright 2015

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series Security Command Reference Part number: 5998-2887 Software version: Release2208 Document version: 6W100-20130228 Legal and notice information Copyright 2013 Hewlett-Packard

More information

HP FlexFabric 5700 Switch Series

HP FlexFabric 5700 Switch Series HP FlexFabric 5700 Switch Series Security Command Reference Part number: 5998-6695 Software version: Release 2416 Document version: 6W100-20150130 Legal and notice information Copyright 2015 Hewlett-Packard

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls NAT and ALG Command Reference Part number: 5998-2639 Software version: F1000-E/Firewall module: R3166 F5000-A5: R3206 Document version: 6PW101-20120706 Legal and notice information

More information

HP 6125 Blade Switch Series

HP 6125 Blade Switch Series HP 6125 Blade Switch Series About the HP 6125 Blade Command s Part number: 5998-3163 Software version: Release 2103 Document version: 6W100-20120907 Legal and notice information Copyright 2012 Hewlett-Packard

More information

HP MSR Router Series. IPX Configuration Guide(V5) Part number: Software version: CMW520-R2513 Document version: 6PW

HP MSR Router Series. IPX Configuration Guide(V5) Part number: Software version: CMW520-R2513 Document version: 6PW HP MSR Router Series IPX Configuration Guide(V5) Part number: 5998-8183 Software version: CMW520-R2513 Document version: 6PW106-20150808 Legal and notice information Copyright 2015 Hewlett-Packard Development

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series Fundamentals Command Reference Part number: 5998-2359 Software version: Release 2101 Document version: 6W101-20130930 Legal and notice information Copyright 2013 Hewlett-Packard

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series OpenFlow Command Reference Part number: 5998-4679a Software version: Release 23xx Document version: 6W101-20150320 Legal and notice information Copyright 2015 Hewlett-Packard

More information

HPE FlexFabric 5700 Switch Series

HPE FlexFabric 5700 Switch Series HPE FlexFabric 5700 Switch Series Fundamentals Command Reference Part number: 5998-5600R Software version: Release 2422P01 and later Document version: 6W100-20160331 Copyright 2016 Hewlett Packard Enterprise

More information

HP A5830 Switch Series Layer 3 - IP Services. Configuration Guide. Abstract

HP A5830 Switch Series Layer 3 - IP Services. Configuration Guide. Abstract HP A5830 Switch Series Layer 3 - IP Services Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software configuration procedures.

More information

HP Routing Switch Series

HP Routing Switch Series HP 12500 Routing Switch Series MPLS Configuration Guide Part number: 5998-3414 Software version: 12500-CMW710-R7128 Document version: 6W710-20121130 Legal and notice information Copyright 2012 Hewlett-Packard

More information

HP A3100 v2 Switch Series

HP A3100 v2 Switch Series HP A3100 v2 Switch Series Fundamentals Command Reference HP A3100-8 v2 SI Switch (JG221A) HP A3100-16 v2 SI Switch (JG222A) HP A3100-24 v2 SI Switch (JG223A) HP A3100-8 v2 EI Switch (JD318B) HP A3100-16

More information

Appendix A Command Index

Appendix A Command Index Appendix A Command Index The command index includes all the commands in the Command Manual, which are arranged alphabetically. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A aaa nas-id profile 21-AAA

More information

HP 5820X & 5800 Switch Series IRF. Command Reference. Abstract

HP 5820X & 5800 Switch Series IRF. Command Reference. Abstract HP 5820X & 5800 Switch Series IRF Command Reference Abstract This document describes the commands and command syntax options available for the HP 5820X & 5800 Series products. This document is intended

More information

Emergency shell commands 1

Emergency shell commands 1 Contents Emergency shell commands 1 copy 1 delete 1 dir 2 display copyright 4 display install package 4 display interface m-eth0 5 display ip routing-table 7 display ipv6 routing-table 7 display version

More information

HP A5820X & A5800 Switch Series MPLS. Configuration Guide. Abstract

HP A5820X & A5800 Switch Series MPLS. Configuration Guide. Abstract HP A5820X & A5800 Switch Series MPLS Configuration Guide Abstract This document describes the software features for the HP 5820X & 5800 Series products and guides you through the software configuration

More information

H3C Access Controllers

H3C Access Controllers H3C Access Controllers Network Management and Monitoring Command Reference New H3C Technologies Co., Ltd. http://www.h3c.com.hk Document version: 6W101-20171122 Copyright 2017, New H3C Technologies Co.,

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series IRF Configuration Guide Part number: 5998-2349a Software version: Release 2108P01 Document version: 6W100-20131130 Legal and notice information Copyright 2013 Hewlett-Packard Development

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for

More information

HP 5500 HI Switch Series

HP 5500 HI Switch Series HP 5500 HI Switch Series IRF Configuration Guide Part number: 5998-2376a Software version: Release 5203 and Release 5206 Document version: 6W102-20140228 Legal and notice information Copyright 2014 Hewlett-Packard

More information

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Commands for Access Controller and Access Controller Switch Interface Board 1-1 acl (user interface view) 1-1 activation-key

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series Fundamentals Command Reference Part number: 5998-7608 Software version: Release 2110P02 Document version: 6W100-20150305 Legal and notice information Copyright 2015 Hewlett-Packard

More information

HP 5130 EI Switch Series

HP 5130 EI Switch Series HP 5130 EI Switch Series ACL and QoS Configuration Guide Part number: 5998-5471a Software version: Release 31xx Document version: 6W100-20150731 Legal and notice information Copyright 2015 Hewlett-Packard

More information

HP FlexFabric 12900E Switch Series

HP FlexFabric 12900E Switch Series HP FlexFabric 12900E Switch Series Software Upgrade Guide Part number: 5998-8368 Document version: 6W100-20150930 Legal and notice information Copyright 2015 Hewlett-Packard Development Company, L.P. No

More information

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls NAT Configuration Guide Part number:5998-2649 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,

More information

H3C S7500E-X Switch Series

H3C S7500E-X Switch Series H3C S7500E-X Switch Series Comware 7 Network Management and Monitoring Command Reference New H3C Technologies Co., Ltd. http://www.h3c.com.hk Software version: S7500EX-CMW710-R7536P05 Document version:

More information

HP 3600 v2 Switch Series

HP 3600 v2 Switch Series HP 3600 v2 Switch Series ACL and QoS Configuration Guide Part number: 5998-2354 Software version: Release 2101 Document version: 6W101-20130930 Legal and notice information Copyright 2013 Hewlett-Packard

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series ACL and QoS Configuration Guide Part number: 5998-2897 Software version: Release2207 Document version: 6W100-20121130 Legal and notice information Copyright 2012 Hewlett-Packard

More information

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24 Contents Logging in to the CLI 1 Login methods 1 Logging in through the console or AUX port 2 Introduction 2 Configuration procedure 2 Logging in through Telnet 6 Introduction 6 Logging in to the switch

More information

HP FlexFabric 5930 Switch Series

HP FlexFabric 5930 Switch Series HP FlexFabric 5930 Switch Series Layer 3 IP Services Command Reference Part number: 5998-4568 Software version: Release 2406 & Release 2407P01 Document version: 6W101-20140404 Legal and notice information

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series IRF Command Reference Part number: 5998-2881 Software version: Release2207 Document version: 6W100-20121130 Legal and notice information Copyright 2012 Hewlett-Packard Development

More information

HP FlexFabric 5930 Switch Series

HP FlexFabric 5930 Switch Series HP FlexFabric 5930 Switch Series ACL and QoS Configuration Guide Part number: 5998-7761a Software version: Release 241x Document version: 6W102-20151210 Legal and notice information Copyright 2015 Hewlett-Packard

More information

H3C S5830V2 & S5820V2 Switch Series

H3C S5830V2 & S5820V2 Switch Series H3C S5830V2 & S5820V2 Switch Series Network Management and Monitoring Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 23xx Document version: 6W102-20150315

More information

HP Unified Wired-WLAN Products

HP Unified Wired-WLAN Products HP Unified Wired-WLAN Products Security Command Reference HP 830 Unified Wired-WLAN PoE+ Switch Series HP 850 Unified Wired-WLAN Appliance HP 870 Unified Wired-WLAN Appliance HP 11900/10500/7500 20G Unified

More information

H3C S5500-EI & S5500-SI Switch Series

H3C S5500-EI & S5500-SI Switch Series H3C S5500-EI & S5500-SI Switch Series Network Management and Monitoring Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 2210 Document version: 6W100-20110915

More information

Table of Contents. 2 MIB Style Configuration 2-1 Overview 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1

Table of Contents. 2 MIB Style Configuration 2-1 Overview 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1 Table of Contents 1 SNMP Configuration 1-1 SNMP Overview 1-1 SNMP Mechanism 1-1 SNMP Protocol Versions 1-2 MIB Overview 1-2 Configuring SNMP 1-3 Configuring SNMPv3 1-3 Configuring SNMPv1 and SNMPv2c 1-4

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series MCE Configuration Guide Part number: 5998-2896 Software version: Release2207 Document version: 6W100-20121130 Legal and notice information Copyright 2012 Hewlett-Packard Development

More information

HP A3100 v2 Switch Series

HP A3100 v2 Switch Series HP A3100 v2 Switch Series Layer 3 - IP Services Configuration Guide HP A3100-8 v2 SI Switch (JG221A) HP A3100-16 v2 SI Switch (JG222A) HP A3100-24 v2 SI Switch (JG223A) HP A3100-8 v2 EI Switch (JD318B)

More information

HP FlexFabric 5930 Switch Series

HP FlexFabric 5930 Switch Series HP FlexFabric 5930 Switch Series Layer 3 - IP Services Configuration Guide Part number: 5998-4571 Software version: Release 2406 & Release 2407P01 Document version: 6W101-20140404 Legal and notice information

More information

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls VPN Configuration Guide Part number:5998-2652 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,

More information

HP Switch Series

HP Switch Series HP 10500 Switch Series ACL and QoS Configuration Guide Part number: 5998-5230 Software version: Release 2111P01 and later Document version: 6W101-20140331 Legal and notice information Copyright 2014 Hewlett-Packard

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

HP FlexFabric 5700 Switch Series

HP FlexFabric 5700 Switch Series HP FlexFabric 5700 Switch Series IRF Command Reference Part number: 5998-6683 Software version: Release 2416 Document version: 6W100-20150130 Legal and notice information Copyright 2015 Hewlett-Packard

More information

Using the emergency shell 1

Using the emergency shell 1 Contents Using the emergency shell 1 Emergency shell usage guidelines 1 Managing the file systems 1 Obtaining a system image from an FTP/TFTP server 2 Configuring the management Ethernet interface 2 Checking

More information

HP MSR Router Series. Terminal Access Configuration Guide(V5) Part number: Software version: CMW520-R2509 Document version: 6PW

HP MSR Router Series. Terminal Access Configuration Guide(V5) Part number: Software version: CMW520-R2509 Document version: 6PW HP MSR Router Series Terminal Access Configuration Guide(V5) Part number: 5998-2022 Software version: CMW520-R2509 Document version: 6PW102-20130925 Legal and notice information Copyright 2013 Hewlett-Packard

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Getting Started Guide Part number: 5998-2646 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719 Legal

More information