HP 6125G HP 6125G & 6125G/XG Blade Switches Network Management and Mon - Page 3

Network Management and Monitoring Configuration Guide

Page 3 highlights

Contents Using ping, tracert, and system debugging 1 Ping 1 Using a ping command to test network connectivity 1 Ping example 1 Tracert 3 Prerequisites 4 Using a tracert command to identify failed or all nodes in a path 5 System debugging 5 Debugging information control switches 5 Debugging a feature module 6 Ping and tracert example 7 Configuring NTP 9 Overview 9 NTP application 9 NTP advantages 9 How NTP works 9 NTP message format 10 Operation modes 12 NTP configuration task list 14 Configuring NTP operation modes 14 Configuring the client/server mode 15 Configuring the symmetric peers mode 15 Configuring the broadcast mode 16 Configuring the multicast mode 17 Configuring optional parameters 17 Specifying the source interface for NTP messages 17 Disabling an interface from receiving NTP messages 18 Configuring the allowed maximum number of dynamic sessions 18 Configuring the DSCP value for NTP messages 19 Configuring access-control rights 19 Configuration prerequisites 20 Configuration procedure 20 Configuring NTP authentication 20 Configuring NTP authentication in client/server mode 20 Displaying and maintaining NTP 21 NTP configuration examples 22 Configuring the client/server mode 22 Configuring the NTP symmetric mode 23 Configuring NTP broadcast mode 25 Configuring NTP multicast mode 26 Configuring NTP client/server mode with authentication 28 Configuring NTP broadcast mode with authentication 30 Configuring the information center 34 Overview 34 Classification of system information 35 System information levels 35 Output channels and destinations 35 Outputting system information by source module 36 i

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157

i
Contents
Using ping, tracert, and system debugging ··············································································································· 1
Ping
·····················································································································································································1
Using a ping command to test network connectivity ····························································································1
Ping example ····························································································································································1
Tracert ················································································································································································3
Prerequisites ······························································································································································4
Using a tracert command to identify failed or all nodes in a path ·····································································5
System debugging ····························································································································································5
Debugging information control switches················································································································5
Debugging a feature module ··································································································································6
Ping and tracert example ·················································································································································7
Configuring NTP ·························································································································································· 9
Overview············································································································································································9
NTP application ························································································································································9
NTP advantages ·······················································································································································9
How NTP works ························································································································································9
NTP message format ············································································································································· 10
Operation modes ·················································································································································· 12
NTP configuration task list············································································································································· 14
Configuring NTP operation modes ······························································································································ 14
Configuring the client/server mode ···················································································································· 15
Configuring the symmetric peers mode ·············································································································· 15
Configuring the broadcast mode························································································································· 16
Configuring the multicast mode ··························································································································· 17
Configuring optional parameters ································································································································· 17
Specifying the source interface for NTP messages ···························································································· 17
Disabling an interface from receiving NTP messages ······················································································· 18
Configuring the allowed maximum number of dynamic sessions ···································································· 18
Configuring the DSCP value for NTP messages································································································· 19
Configuring access-control rights ································································································································· 19
Configuration prerequisites ·································································································································· 20
Configuration procedure ······································································································································ 20
Configuring NTP authentication ··································································································································· 20
Configuring NTP authentication in client/server mode ····················································································· 20
Displaying and maintaining NTP ································································································································· 21
NTP configuration examples ········································································································································· 22
Configuring the client/server mode ···················································································································· 22
Configuring the NTP symmetric mode ················································································································ 23
Configuring NTP broadcast mode······················································································································· 25
Configuring NTP multicast mode ························································································································· 26
Configuring NTP client/server mode with authentication ················································································· 28
Configuring NTP broadcast mode with authentication ····················································································· 30
Configuring the information center ··························································································································· 34
Overview········································································································································································· 34
Classification of system information ···················································································································· 35
System information levels ····································································································································· 35
Output channels and destinations ······················································································································· 35
Outputting system information by source module ······························································································ 36