HP 6125XLG R2306-HP 6125XLG Blade Switch Network Management and Monitoring Con - Page 3

Contents

Page 3 highlights

Contents Using ping, tracert, and system debugging 1 Ping 1 Using a ping command to test network connectivity 1 Ping example 1 Tracert 3 Prerequisites 4 Using a tracert command to identify failed or all nodes in a path 4 Tracert example 4 System debugging 5 Debugging information control switches 6 Debugging a feature module 6 Configuring NTP 8 Overview 8 How NTP works 8 NTP architecture 9 Association modes 10 NTP security 12 Protocols and standards 13 Configuration restrictions and guidelines 13 Configuration task list 13 Enabling the NTP service 13 Configuring NTP association modes 13 Configuring NTP in client/server mode 14 Configuring NTP in symmetric active/passive mode 14 Configuring NTP in broadcast mode 15 Configuring NTP in multicast mode 16 Configuring access control rights 17 Configuring NTP authentication 17 Configuring NTP authentication in client/server mode 17 Configuring NTP authentication in symmetric active/passive mode 19 Configuring NTP authentication in broadcast mode 21 Configuring NTP authentication in multicast mode 23 Configuring NTP optional parameters 25 Specifying the source interface for NTP messages 25 Disabling an interface from receiving NTP messages 26 Configuring the maximum number of dynamic associations 26 Configuring the local clock as a reference source 27 Displaying and maintaining NTP 27 NTP client/server mode configuration example 28 IPv6 NTP client/server mode configuration example 29 NTP symmetric active/passive mode configuration example 30 IPv6 NTP symmetric active/passive mode configuration example 32 NTP broadcast mode configuration example 34 NTP multicast mode configuration example 36 IPv6 NTP multicast mode configuration example 39 Configuration example for NTP client/server mode with authentication 42 Configuration example for NTP broadcast mode with authentication 44 i

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148

i
Contents
Using ping, tracert, and system debugging ··············································································································· 1
Ping
·····················································································································································································1
Using a ping command to test network connectivity ····························································································1
Ping example ····························································································································································1
Tracert ················································································································································································3
Prerequisites ······························································································································································4
Using a tracert command to identify failed or all nodes in a path ·····································································4
Tracert example ························································································································································4
System debugging ····························································································································································5
Debugging information control switches················································································································6
Debugging a feature module ··································································································································6
Configuring NTP ·························································································································································· 8
Overview············································································································································································8
How NTP works ························································································································································8
NTP architecture ·······················································································································································9
Association modes ················································································································································ 10
NTP security ··························································································································································· 12
Protocols and standards ······································································································································· 13
Configuration restrictions and guidelines ···················································································································· 13
Configuration task list ···················································································································································· 13
Enabling the NTP service ·············································································································································· 13
Configuring NTP association modes···························································································································· 13
Configuring NTP in client/server mode ·············································································································· 14
Configuring NTP in symmetric active/passive mode ························································································ 14
Configuring NTP in broadcast mode ·················································································································· 15
Configuring NTP in multicast mode····················································································································· 16
Configuring access control rights ································································································································· 17
Configuring NTP authentication ··································································································································· 17
Configuring NTP authentication in client/server mode ····················································································· 17
Configuring NTP authentication in symmetric active/passive mode ······························································· 19
Configuring NTP authentication in broadcast mode ························································································· 21
Configuring NTP authentication in multicast mode ··························································································· 23
Configuring NTP optional parameters ························································································································· 25
Specifying the source interface for NTP messages ···························································································· 25
Disabling an interface from receiving NTP messages ······················································································· 26
Configuring the maximum number of dynamic associations ············································································ 26
Configuring the local clock as a reference source ····································································································· 27
Displaying and maintaining NTP ································································································································· 27
NTP client/server mode configuration example ········································································································· 28
IPv6 NTP client/server mode configuration example································································································· 29
NTP symmetric active/passive mode configuration example ··················································································· 30
IPv6 NTP symmetric active/passive mode configuration example ··········································································· 32
NTP broadcast mode configuration example ············································································································· 34
NTP multicast mode configuration example
················································································································ 36
IPv6 NTP multicast mode configuration example ······································································································· 39
Configuration example for NTP client/server mode with authentication
································································· 42
Configuration example for NTP broadcast mode with authentication ····································································· 44