Home > HP > Printer > HP 5500 Ei 5500 Si Switch Series Configuration Guide

HP 5500 Ei 5500 Si Switch Series Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual HP 5500 Ei 5500 Si Switch Series Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 2513
    							 
    vii  
    Stack configuration example ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ········· ··················\
    ················· 208 
    Index ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ··················\
    ············· ··················\
    ··················\
    ··········· 211 
      
    						
    							 
    1 
    Using ping, tracert, and system debugging 
    Use the ping, tracert, and system debugging utilitie s to test network connectivity and identify network 
    problems. 
    Ping 
    The ping utility sends ICMP echo requests (ECHO-REQUEST) to the destination device. Upon receiving 
    the requests, the destination device responds with ICMP echo replies (ECHO-REPLY) to the source device. 
    The source device outputs statistics about the ping operation, including the number of packets sent, 
    number of echo replies received, and the round-trip time. You can measure the network performance by 
    analyzing these statistics.  
    Using a ping command to test network connectivity  
    Task Command Remarks 
    Check whether a specified 
    address in an IP network is 
    reachable. 
    •  For an IPv4 net work: 
    ping  [ ip ] [ -a source-ip  | -c count  | -f | - h 
    ttl  | - i interface-type interface-number  | -m 
    interval  | -n |  -p pad |  -q |  -r |  -s 
    packet-size |  -t timeout  | -tos  tos | -v | 
    -vpn-instance  vpn-instance-name  ] * host
     
    • For an IPv6 net work: 
    ping ipv6  [ -a source-ipv6  | -c count  | -m  
    interval  | -s  packet-size  | -t timeout  |-tos  
    tos | -vpn-instance  vpn-instance-name  ] * 
    host  [ -i interface-type interface-number  ]  Use one of the commands. 
    Available in any view. 
    Only the HP 5500 EI Switch 
    Series supports the 
    vpn-instance 
    keyword. 
     
      IMPORTANT: 
    When you configure the 
    ping command for a low-speed network, HP recommends that you set a larger 
    value for the timeout timer (indicated by the  -t keyword in the command).  
    Ping example 
    Network requirements 
    Test the network connectivity between Device A and Device C in  Figure 1. If the y can reach each other, 
    get detailed information about routes from Device A to Device C.  
    						
    							 
    2 
    Figure 1  Network diagram 
     
     
    Test procedure 
    # Use the ping command on Device A to test connectivity to Device C. 
     ping 1.1.2.2 
      PING 1.1.2.2: 56  data bytes, press CTRL_C to break 
        Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=205 ms 
        Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms 
        Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms 
        Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms 
        Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms 
     
      --- 1.1.2.2 ping statistics --- 
        5 packet(s) transmitted 
        5 packet(s) received 
        0.00% packet loss 
    round-trip min/avg/max = 1/41/205 ms 
    # Get detailed information about routes from Device A to Device C. 
     ping -r 1.1.2.2 
      PING 1.1.2.2: 56  data bytes, press CTRL_C to break 
        Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=53 ms 
          Record Route: 
             1.1.2.1 
             1.1.2.2 
             1.1.1.2 
             1.1.1.1 
        Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms 
          Record Route: 
             1.1.2.1 
             1.1.2.2 
             1.1.1.2 
             1.1.1.1 
        Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms 
          Record Route: 
             1.1.2.1 
             1.1.2.2 
             1.1.1.2 
      
    						
    							 
    3 
             1.1.1.1 
        Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms 
          Record Route: 
             1.1.2.1 
             1.1.2.2 
             1.1.1.2 
             1.1.1.1 
        Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms 
          Record Route: 
             1.1.2.1 
             1.1.2.2 
             1.1.1.2 
             1.1.1.1 
      --- 1.1.2.2 ping statistics --- 
        5 packet(s) transmitted 
        5 packet(s) received 
        0.00% packet loss 
    round-trip min/avg/max = 1/11/53 ms 
    The test procedure with the  ping –r command (see Figure 1) is a s follows: 
    1. The source (Device A) sends an ICMP echo request with the RR option being empty to the 
    destination (Device C). 
    2. The intermediate device (Device B) adds the IP addr ess of its outbound interface (1.1.2.1) to the RR 
    option of the ICMP echo requ est, and forwards the packet. 
    3. Upon receiving the request, the destination device copies the RR option in the request and adds the 
    IP address of its outbound interface (1.1.2.2) to  the RR option. Then the destination device sends 
    an ICMP echo reply. 
    4.  The intermediate device adds the IP address of its ou tbound interface (1.1.1.2) to the RR option in 
    the ICMP echo reply, and then forwards the reply. 
    5.  Upon receiving the reply, the so urce device adds the IP address of  its inbound interface (1.1.1.1) 
    to the RR option. Finally, you can ge t detailed information about routes from Device A to Device C: 
    1.1.1.1  {1.1.1.2; 1.1.2.1}  1.1.2.2. 
    Tracert 
    Tracert (also called Traceroute) enables you to get the IP addresses of Layer 3 devices in the path to a 
    specific destination. You can use tracert to test network connectivity and identify failed nodes.  
    						
    							 
    4 
    Figure 2  Network diagram 
     
     
    Tracert uses received ICMP error messages to get the IP addresses of devices. As shown in Figure 2, 
    tr
    acert works as follows: 
    1.  The source device (Device A) sends a UDP packet with a TTL value of 1 to the destination device 
    (Device D). The destination UDP port is not used  by any application on the destination device. 
    2. The first hop (Device B, the first Layer 3 device  that receives the packet) responds by sending a 
    TTL-expired ICMP error message to the source, with  its IP address encapsulated. In this way, the 
    source device can get the address of  the first Layer 3 device (1.1.1.2). 
    3. The source device sends a packet with a TTL  value of 2 to the destination device. 
    4. The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the 
    source device the address of the se cond Layer 3 device (1.1.2.2). 
    5. The process continues until the packet sent by the source device reaches the ultimate destination 
    device. Because no application uses the destination  port specified in the packet, so the destination 
    device responds with a port-unreachable ICMP me ssage to the source device, with its IP address 
    1.1.3.2 encapsulated. This way, the source device  gets the IP address of the destination device 
    (1.1.3.2). 
    6.  The source device thinks that the packet has re ached the destination device after receiving the 
    port-unreachable ICMP message, and the path to th e destination device is 1.1.1.2 to 1.1.2.2 to 
    1.1.3.2. 
    Prerequisites 
    Before you use a tracert command, perform the tasks in this section.  
    For an IPv4 net work: 
    •   Enable sending of ICMP timeout packets on the  intermediate devices (the devices between the 
    source and destination devices). If the interm ediate devices are HP devices, execute the ip 
    ttl-expires enable  command on the devices. For more  information about this command, see  Layer 
    3—IP Services Command Reference . 
    •   Enable sending of ICMP destination unreachabl e packets on the destination device. If the 
    destination device is an HP device, execute the  ip unreachables enable command. For more 
    information about this command, see  Layer 3—IP Services Command Reference . 
    For an IPv6 net work: 
    •   Enable sending of ICMPv6 timeout packets on th e intermediate devices (the devices between the 
    source and destination devices). If the intermediate devices are HP devices, execute the  ipv6 
      
    						
    							 
    5 
    hoplimit-expires enable  command on the devices. For more information about this command, see 
    Layer 3—IP Services Command Reference . 
    •   Enable sending of ICMPv6 destination unreacha ble packets on the destination device. If the 
    destination device is an HP device, execute the  ipv6 unreachables enable command. For more 
    information about this command, see  Layer 3—IP Services Command Reference . 
    Using a tracert command to identify failed or all nodes in a 
    path 
     
    Task Command Remarks 
    Display the routes from 
    source to destination. 
    • For an IPv4 net work: 
    tracert  [ -a source-ip  | -f first-ttl  | -m  max-ttl |  
    -p  port  | -q packet-number  | -tos  tos | 
    -vpn-instance  vpn-instance-name  | -w  
    timeout  ] * host
     
    • For an IPv6 net work: 
    tracert ipv6  [ -f first-ttl  | -m max-ttl  | -p port  | 
    -q  packet-number  | -tos  tos  | -vpn-instance  
    vpn-instance-name  | -w timeout  ] * host  Use one of the commands. 
    Available in any view. 
    Only the HP 5500 EI Switch 
    Series supports the 
    vpn-instance 
    keyword. 
     
    System debugging 
    The device supports various debugging for the majo rity of protocols and features and provides 
    debugging information to help users diagnose errors. 
    Debugging information control switches 
    The following two switches control the display of debugging information: 
    •   Protocol debugging switch —Controls protocol-specific debugging information. 
    •   Screen output switch —Controls whether to display the debugging information on a certain screen. 
    As shown in  Figure 3, a
    ssume that the device can provide debugging for the three modules 1, 2, and 3. 
    The debugging information can be output on a termin al only when both the protocol debugging switch 
    and the screen output switch are turned on. 
    Output of debugging information depends on the configurations of the information center and the 
    debugging commands of each protocol and function al module. Debugging information is typically 
    displayed on a terminal (including console or  VTY) for display. You can also send debugging 
    information to other destinations. For more information, see  Configuring the information center.  
    						
    							 
    6 
    Figure 3  Relationship between the protocol and screen output switch 
     
     
    Debugging a feature module 
    Output of debugging commands is memory intensive. To guarantee system performance, enable 
    debugging only for modules that are in an exceptio nal condition. When debugging is complete, use the 
    undo debugging all  command to disable all the debugging functions. 
    Configure the  debugging, terminal debugging , and terminal monitor commands before you can display 
    detailed debugging information on the te rminal. For more information about the terminal debugging 
    and terminal monitor  commands, see Network Management and Monitoring Command Reference . 
    To debug a feature module and display th e debugging information on a terminal: 
     
    Step Command Remarks 
    1.  Enable the terminal 
    monitoring of system 
    information.  terminal monitor  Optional. 
    The terminal monitoring on the 
    console is enabled by default and 
    the terminal monitoring on the 
    monitoring terminal is disabled by 
    default. 
    Available in user view. 
    2.
      Enable the terminal display of 
    debugging information.  terminal debugging  Disabled by default. 
    Available in user view. 
    3.
      Enable debugging for a 
    specified module.  debugging
      module-name  [ option ] Disabled by default. 
    Available in user view. 
    4.  Display the enabled 
    debugging functions.  display
     debugging  [ interface 
    interface-type interface-number  ] 
    [  module-name  ] [ | { begin  | 
    exclude  | include  } 
    regular-expression  ] Optional. 
    Available in any view. 
      
    						
    							 
    7 
    Ping and tracert example 
    Network requirements 
    As shown in  Figure 4, Device A failed to Telnet Device C. Determine whether Device A and Device C can 
    reach each other. If they cannot reach each other, locate the failed nodes in the network. 
    Figure 4  Network diagram 
     
     
    Test procedure 
    1. Use the  ping command to test connectivity between Device A and Device C. 
     ping 1.1.2.2 
      PING 1.1.2.2: 56  data bytes, press CTRL_C to break 
        Request time out 
        Request time out 
        Request time out 
        Request time out 
        Request time out 
     
      --- 1.1.2.2 ping statistics --- 
        5 packet(s) transmitted 
        0 packet(s) received 
    100.00% packet loss 
    The output shows that Device A and Device C cannot reach each other. 
    2. Use the  tracert command to identify failed nodes. 
     system-view 
    [DeviceA] ip ttl-expires enable 
    [DeviceA] ip unreachables enable 
    [DeviceA] tracert 1.1.2.2 
     traceroute to 1.1.2.2(1.1.2.2) 30 hops max,40 bytes packet, press CTR\
    L_C to bre 
    ak 
     1  1.1.1.2 14 ms 10 ms 20 ms 
     2  * * * 
     3  * * * 
     4  * * * 
     5 
     
    The output shows that Device A and Device C  cannot reach other, Device A and Device B can 
    reach each other, and an error has occurred on  the connection between Device B and Device C.  
    3. Use the  debugging ip icmp  command on Device A and Device C to verify that they can send and 
    receive the specific ICMP packets, or use the  display ip routing-table command to verify the 
    availability of active routes  between Device A and Device C.  
    						
    							 8 
    Configuring NTP 
    The term Layer 3 Ethernet port  refers to route-mode (or Layer 3) Ethernet ports. You can set an Ethernet 
    port to operate in route mode by using the  port link-mode  route  command (see  Layer 2—LAN Switching 
    Configuration Guide ). 
    Overview 
    NTP is typically used in large networks to dynamically synchronize time among network devices. It 
    guarantees higher clock accuracy than manual system  clock setting. In a small network that does not 
    require high clock accuracy, you can keep time synchronized among devices by changing their system 
    clocks one by one.  
    NTP runs over UDP and uses UDP port 123. 
    NTP application 
    An administrator is unable to keep time synchronized among all devices within a network by changing 
    the system clock on each station, because this is  a huge work and does not guarantee clock precision. 
    NTP, however, allows quick clock synchronization within the entire network and ensures high clock 
    precision. 
    NTP is used when all devices within the network must keep consistent time. For example: 
    •   In analyzing log and debugging information collected from different devices in network 
    management, time must be used as a reference basis. 
    •   All devices must use the same reference clock in a charging system. 
    •   To implement certain functions, such as a scheduled restart of all devices within the network, all 
    devices must keep consistent time. 
    •   If multiple systems process a complex event in cooperation, these systems must use the same 
    reference clock to ensure the correct execution sequence. 
    •   For incremental backup between a backup server and clients, timekeeping must be synchronized 
    between the backup server and all clients. 
    NTP advantages 
    •  NTP uses a stratum to describe clock accuracy. The stratum ranges from 1 to 16. Clock accuracy 
    decreases as the stratum number increases. The stratum of a reference clock ranges from 1 to 15. A 
    stratum 16 clock is in unsynchronized state. 
    •   The local clock of this Switch Series cannot operate as a reference clock. It can serve as an NTP 
    server only after it is synchronized. 
    •   NTP supports access control and MD5 authentication. 
    •   NTP can unicast, multicast, or broadcast protocol messages.  
    						
    							 9 
    How NTP works 
    Figure 5 shows the basic workflow of NTP. Device A and Device B are connected over a network. They 
    have their own independent system clocks, which need to be automatically synchronized through NTP. 
    Assume that: 
    •   Prior to system clock synchronization between Device A and Device B, the clock of Device A is set 
    to 10:00:00 am while that of Device B is set to 1 1:00:00 am. 
    •   Device B is used as the NTP time server, so Device A synchronizes to Device B. 
    •   It takes 1 second for an NTP message to travel from one device to the other. 
    Figure 5  Basic workflow of NTP 
     
     
    The synchronization process is as follows: 
    •  Device A sends Device B an NTP message, which  is timestamped when it leaves Device A. The 
    timestamp is 10:00:00 am (T1). 
    •   When this NTP message arrives at Device B, it is timestamped by Device B. The timestamp is 
    11:00:01 am (T2). 
    •   When the NTP message leaves Device B, De vice B timestamps it. The timestamp is 11:00:02 am 
    (T3). 
    •   When Device A receives the NTP message, the local time of Device A is 10:00:03 am (T4). 
    Up to now, Device A can calculate the following parameters based on the timestamps: 
    •   The roundtrip delay of NTP message: Delay = (T4–T1) – (T3-T2) = 2 seconds. 
    •   Time difference between Device A and Device B: Offset = ((T2-T1) + (T3-T4))/2 = 1 hour. 
    Based on these parameters, Device A can synchronize its own clock to the clock of Device B. 
    This is a rough description of how NTP works. For more information, see RFC 1305.  
    						
    All HP manuals Comments (0)

    Related Manuals for HP 5500 Ei 5500 Si Switch Series Configuration Guide