No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

AR500, AR510, and AR530 V200R007 Commands Reference

This document describes all the configuration commands of the device, including the command function, syntax, parameters, views, default level, usage guidelines, examples, and related commands.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
IP Performance Configuration Commands

IP Performance Configuration Commands

broadcast routing disable

Function

The broadcast routing disable command disables routing forwarding of broadcast packets.

The undo broadcast routing disable command enables routing forwarding of broadcast packets.

By default, routing forwarding of broadcast packets is enabled.

NOTE:

Only V200R007C00 supports this command.

Format

broadcast routing disable

undo broadcast routing disable

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

A router forwards broadcast packets according to its IP routing table by default. Broadcast packets carry the destination MAC address of FFFF-FFFF-FFFF and a unicast destination IP address. If there are multiple paths from the source device to the destination device, broadcast packets will be forwarded along multiple paths. As a result, multiple copies of packets will reach the destination device. To ensure that the destination device receives only one copy of packets, run the broadcast routing disable command. This command will enable routing forwarding of broadcast packets on the routers along only one path.

Example

# Disable routing forwarding of broadcast packets.

<Huawei> system-view
[Huawei] broadcast routing disable

clear ip df

Function

The clear ip df command enables an interface to fragment outgoing IP packets.

The undo clear ip df command disables an interface from fragmenting outgoing IP packets.

By default, an interface does not fragment outgoing IP packets.

Format

clear ip df

undo clear ip df

Parameters

None

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

After forcible IP packet fragmentation is enabled on a device, the device sets the Don't Fragment (DF) field to 0 and fragments IP packets that meet the following conditions:

  • The value of the DF field in the IP packet header is 1.

  • The packet length is larger than the MTU value of the interface that sends the packets.

Example

# Enable forcible fragmentation for outgoing packets on GE0/0/1.

<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/1
[Huawei-GigabitEthernet0/0/1] clear ip df

control-packet output car bypass

Function

The control-packet output car bypass command configures the control packets generated by the device not to support traffic policing function.

The undo control-packet output car bypass command configures the control packets generated by the device to support traffic policing function.

By default, control packets generated by the device do not support traffic policing function.

Format

control-packet { bgp | icmp | igmp | ospf | pim | rip | snmp | ssh | telnet | vrrp | udp | other-protocols } * output car bypass

control-packet all output car bypass

undo control-packet { bgp | icmp | igmp | ospf | pim | rip | snmp | ssh | telnet | vrrp | udp | other-protocols } * output car bypass

undo control-packet all output car bypass

Parameters

Parameter Description Value
bgp Indicates BGP packets. -
icmp Indicates ICMP packets. -
igmp Indicates IGMP packets. -
ospf Indicates OSPF packets. -
pim Indicates PIM packets. -
rip Indicates RIP packets. -
snmp Indicates SNMP packets. -
ssh Indicates SSH packets. -
telnet Indicates Telnet packets. -
vrrp Indicates VRRP packets. -
udp Indicates UDP packets. -
other-protocols Indicates other control packets except BGP, ICMP, IGMP, OSPF, PIM, RIP, SNMP, SSH, Telnet, UDP and VRRP packets. -
all Indicates all control packets. -

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

After the enhanced forwarding function of the control packets generated by the device is enabled, you can run the undo control-packet output car bypass command to configures control packets generated by the device to support traffic policing function to apply QoS policies to different control packets.

Prerequisites

The enhanced forwarding function of the control packets generated by the device has been enabled using the ip soft-forward enhance enable command.

Follow-up Procedures

After control packets generated by the device are configured to support traffic policing function, configure QoS policies to process different control packets. For details about traffic policing configuration, see Configuring Traffic Policing in Huawei AR Series IOT Gateway Configuration Guide-QoS.

Precautions

  • Configuring control packets generated by the device to support traffic policing function may cause control packets to be discarded and affect user services.

  • When bgp, icmp, igmp, ospf, pim, rip, snmp, ssh, telnet, udp, vrrp, and other-protocols are specified in the undo control-packet output car bypass commands, the device generates a configuration file of the undo control-packet all output car bypass command. If the control-packet output queue bypass command is then executed to configure a specified type of control packets generated by the device not to support traffic policing function, the device does not generate the configuration file of the undo control-packet all output car bypass command but generates the configuration files of the control packets that are configured to support traffic policing function. For example, if BGP packets, ICMP packets, IGMP packets, OSPF packets, PIM packets, RIP packets, SNMP packets, SSH packets, UDP packets, and VRRP packets generated by the device are configured not to support traffic policing function, the device generates the configuration files of the undo control-packet telnet other-protocols output car bypass commands.

Example

# Configure BGP packets generated by the device to support traffic policing function.

<Huawei> system-view
[Huawei] undo control-packet bgp output car bypass

control-packet output filter bypass

Function

The control-packet output filter bypass command configures the device not to discard generated control packets when the traffic policy and ACL-based simplified traffic policy contain the deny action.

The undo control-packet output filter bypass command configures the device to discard generated control packets when the traffic policy and ACL-based simplified traffic policy contain the deny action.

By default, the device does not discard generated control packets when the traffic policy and ACL-based simplified traffic policy contain the deny action.

Format

control-packet { bgp | icmp | igmp | ospf | pim | rip | snmp | ssh | telnet | vrrp | udp | other-protocols } * output filter bypass

control-packet all output filter bypass

undo control-packet { bgp | icmp | igmp | ospf | pim | rip | snmp | ssh | telnet | vrrp | udp | other-protocols } * output filter bypass

undo control-packet all output filter bypass

Parameters

Parameter Description Value
bgp Indicates BGP packets. -
icmp Indicates ICMP packets. -
igmp Indicates IGMP packets. -
ospf Indicates OSPF packets. -
pim Indicates PIM packets. -
rip Indicates RIP packets. -
snmp Indicates SNMP packets. -
ssh Indicates SSH packets. -
telnet Indicates Telnet packets. -
vrrp Indicates VRRP packets. -
udp Indicates UDP packets. -
other-protocols Indicates other control packets except BGP, ICMP, IGMP, OSPF, PIM, RIP, SNMP, SSH, Telnet, UDP and VRRP packets. -
all Indicates all control packets. -

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

After the enhanced forwarding function is enabled for the control packets generated by the device, the device does not discard the control packets when the traffic policy and ACL-based simplified traffic policy contain the deny action. After the undo control-packet output filter bypass command is executed, the device is configured to discard generated control packets when the traffic policy and ACL-based simplified traffic policy contain the deny action and apply QoS policy to the control packets to meet different service requirements.

Prerequisites

The enhanced forwarding function of control packets generated by the device has been enabled using the ip soft-forward enhance enable command.

Follow-up Procedures

The packet filter action in the traffic policy or ACL-based simplified traffic policy has been set to deny.

Precautions

  • Configuring the device to discard generated control packet when the traffic policy and ACL-based simplified traffic policy contain the deny action may affect user services.

  • When bgp, icmp, igmp, ospf, pim, rip, snmp, ssh, telnet, udp, vrrp, and other-protocols are specified in the undo control-packet output filter bypass commands, the device generates a configuration file of the undo control-packet all output filter bypass command. If the control-packet output filter bypass command is then executed to configure the device not to discard a specified type of control packets, the device does not generate the configuration file of the undo control-packet all output filter bypass command but generates the configuration files of the control packets that the device is configured to discard. For example, if the device is configured not to discard BGP packets, ICMP packets, IGMP packets, OSPF packets, PIM packets, RIP packets, SNMP packets, SSH packets, UDP packets, and VRRP packets, the device generates the configuration files of the undo control-packet telnet other-protocols output filter bypass commands.

Example

# Configure the device to discard generated BGP packets when the traffic policy and ACL-based simplified traffic policy contain the deny action.

<Huawei> system-view
[Huawei] undo control-packet bgp output filter bypass

control-packet output queue bypass

Function

The control-packet output queue bypass command configures the control packets generated by the device not to support QoS queue functions.

The undo control-packet output queue bypass command configures the control packets generated by the device to support QoS queue functions.

By default, control packets generated by the device do not support QoS queue functions.

Format

control-packet { bgp | icmp | igmp | ospf | pim | rip | snmp | ssh | telnet | vrrp | udp | other-protocols } * output queue bypass

control-packet all output queue bypass

undo control-packet { bgp | icmp | igmp | ospf | pim | rip | snmp | ssh | telnet | vrrp | udp | other-protocols } * output queue bypass

undo control-packet all output queue bypass

Parameters

Parameter Description Value
bgp Indicates BGP packets. -
icmp Indicates ICMP packets. -
igmp Indicates IGMP packets. -
ospf Indicates OSPF packets. -
pim Indicates PIM packets. -
rip Indicates RIP packets. -
snmp Indicates SNMP packets. -
ssh Indicates SSH packets. -
telnet Indicates Telnet packets. -
vrrp Indicates VRRP packets. -
udp Indicates UDP packets. -
other-protocols Indicates other control packets except BGP, ICMP, IGMP, OSPF, PIM, RIP, SNMP, SSH, Telnet, UDP and VRRP packets. -
all Indicates all control packets. -

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

After the enhanced forwarding function of the control packets generated by the device is enabled, you can run the undo control-packet output queue bypass command to configures control packets generated by the device to support QoS queue functions (such as traffic shaping, congestion management, and congestion avoidance) to apply QoS policies to different control packets.

Prerequisites

The enhanced forwarding function of the control packets generated by the device has been enabled using the ip soft-forward enhance enable command.

Follow-up Procedures

After control packets generated by the device are configured to support QoS queue functions, configure QoS policies to process different control packets.

Precautions

  • Configuring control packets generated by the device to support QoS queue functions may cause control packets to be discarded and affect user services.

  • When bgp, icmp, igmp, ospf, pim, rip, snmp, ssh, telnet, udp, vrrp, and other-protocols are specified in the undo control-packet output queue bypass commands, the device generates a configuration file of the undo control-packet all output queue bypass command. If the control-packet output queue bypass command is then executed to configure a specified type of control packets generated by the device not to support QoS queue functions, the device does not generate the configuration file of the undo control-packet all output queue bypass command but generates the configuration files of the control packets that are configured to support QoS queue functions. For example, if BGP packets, ICMP packets, IGMP packets, OSPF packets, PIM packets, RIP packets, SNMP packets, SSH packets, UDP packets, and VRRP packets generated by the device are configured not to support QoS queue functions, the device generates the configuration files of the undo control-packet telnet other-protocols output queue bypass commands.

Example

# Configure BGP packets generated by the device to support QoS queue functions.

<Huawei> system-view
[Huawei] undo control-packet bgp output queue bypass

discard { ra | rr | srr | ts }

Function

The discard { ra | rr | srr | ts } command configures the device to discard the packets that contain the route alert option, route record option, source route option, or timestamp option on interfaces.

The undo discard { ra | rr | srr | ts } command configures the device to process the packets that contain the route alert option, route record option, source route option, or timestamp option on interfaces.

By default, the packets that contain the route option are not discarded.

Format

discard { ra | rr | srr | ts }

undo discard { ra | rr | srr | ts }

Parameters

None

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

IP packets can carry route options including the route alert option (ra), route record option (rr), source route option (srr), and timestamp option (ts).

These route options are used to diagnose network paths and temporarily transmit special services. These options, however, may be used by attackers to spy on the network structure for initiating attacks. This degrades network security and device performance. To solve this problem, you can run the discard { ra | rr | srr | ts } command to configure the device to discard the IP packets that contain the route options.

NOTE:

The discard { ra | rr | srr | ts } command only takes effect for the packets on inbound interfaces.

Example

# Configure the device to discard the packets that contain the route alert option on the interface GE0/0/1.

<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/1
[Huawei-GigabitEthernet0/0/1] discard ra

display icmp statistics

Function

The display icmp statistics command displays ICMP traffic statistics.

Format

display icmp statistics

Parameters

None

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

None

Example

# Display ICMP traffic statistics.

<Huawei> display icmp statistics
  Input: bad formats         0          bad checksum            0   
         echo                10         destination unreachable 0   
         source quench       0          redirects               0   
         echo reply          25         parameter problem       0   
         timestamp request   0          information request     0   
         mask requests       0          mask replies            0   
         time exceeded       0          timestamp reply         0         
         Mping request       0          Mping reply             0   
  Output:echo                25         destination unreachable 0   
         source quench       0          redirects               0   
         echo reply          10         parameter problem       0   
         timestamp request          0    information reply       0   
         mask requests       0          mask replies            0   
         time exceeded       0          timestamp reply         0
         Mping request       0          Mping reply             0   
Table 7-60  Description of the display icmp statistics command output

Item

Description

Input

Received packets.

Output

Sent packets.

bad formats

Number of packets in incorrect format.

bad checksum

Number of packets with checksum errors.

echo

Number of echo request packets.

destination unreachable

Number of unreachable packets.

source quench

Number of source quench packets.

redirects

Number of redirection packets.

echo reply

Number of echo reply packets.

parameter problem

Number of packets with incorrect parameters.

timestamp request

Number of timestamp request packets.

information request

Number of information request packets.

information reply

Number of information reply packets.

mask requests

Number of mask request packets.

mask replies

Number of mask reply packets.

time exceeded

Number of expired packets.

timestamp reply

Number of timestamp reply packets.

Mping request

Number of multicast ping request packets.

Mping reply

Number of multicast ping reply packets.

display ip fast-forwarding table

Function

The display ip fast-forwarding table command displays information about IPv4 fast forwarding entries generated on the router.

Format

display ip fast-forwarding table [ source-ip ip-address ] [ destination-ip ip-address ]

NOTE:

Only routers in V200R007C00 support the source-ip ip-address and destination-ip ip-address parameters.

Parameters

Parameter

Description

Value

source-ip ip-address

Specifies the source IP address in an IPv4 fast forwarding entry.

The value is in dotted decimal notation.

destination-ip ip-address

Specifies the destination IP address in an IPv4 fast forwarding entry.

The value is in dotted decimal notation.

Views

All views

Default Level

2: Configuration level

Usage Guidelines

After fast forwarding is enabled on an interface using the ip fast-forwarding enable command, you can run the display ip fast-forwarding table command to view information about IPv4 fast forwarding entries generated on the router.

Example

# Display information about the IPv4 fast forwarding entry with source IP address 10.1.2.90 and destination IP address 10.1.2.255.

<Huawei> system-view
[Huawei] diagnose
[Huawei-diagnose] display ip fast-forwarding table source-ip 10.1.2.90 destination-ip 10.1.2.255
Ipv4 FastForward Table(The latest used 100 tables to show)                                                                          
SIP             DIP             SPort DPort Pro Dscp VpnId Linkinfo                                                                 
10.1.2.90       10.1.2.255      137   137   17  0    0     0x10000064 0x4                                                           
                                                                                                                                    
Ipv4 FastForward Table : 1
Table 7-61  Description of the display ip fast-forwarding table command output

Item

Description

SIP

Source IP address in an IPv4 fast forwarding entry generated on the router.

DIP

Destination IP address in an IPv4 fast forwarding entry generated on the router.

SPort

Source port number in an IPv4 fast forwarding entry generated on the router.

DPort

Destination port number in an IPv4 fast forwarding entry generated on the router.

Pro

Protocol number in an IPv4 fast forwarding entry generated on the router.

Dscp

Priority information in an IPv4 fast forwarding entry generated on the router.

VpnId

VPN information in an IPv4 fast forwarding entry generated on the router.

Linkinfo

Link information in an IPv4 fast forwarding entry generated on the router.

Ipv4 FastForward Table

Total number of IPv4 fast forwarding entries generated on the router.

display ip fast-forwarding table clear

Function

The display ip fast-forwarding table clear command clears the IPv4 fast forwarding tables generated on the device.

Format

display ip fast-forwarding table clear

Parameters

None

Views

All views

Default Level

2: Configuration level

Usage Guidelines

When the device needs to regenerate IPv4 fast forwarding tables, you can run the display ip fast-forwarding table clear command to clear the original IPv4 fast forwarding tables generated on the device. This command is not recommended in normal cases.

Example

# Clear the IPv4 fast forwarding tables generated on the device.

<Huawei> display ip fast-forwarding table clear

display ip fast-forwarding table number

Function

The display ip fast-forwarding table number command displays the number of IPv4 fast forwarding tables generated on the device.

Format

display ip fast-forwarding table number [ source-ip ip-address ] [ destination-ip ip-address ]

NOTE:

Only routers in V200R007C00 support the source-ip ip-address and destination-ip ip-address parameters.

Parameters

Parameter

Description

Value

source-ip ip-address

Specifies the source IP address in an IPv4 fast forwarding entry.

The value is in dotted decimal notation.

destination-ip ip-address

Specifies the destination IP address in an IPv4 fast forwarding entry.

The value is in dotted decimal notation.

Views

All views

Default Level

2: Configuration level

Usage Guidelines

After fast forwarding is enabled on an interface using the ip fast-forwarding enable command, you can run the display ip fast-forwarding table number command to view the number of IPv4 fast forwarding entries generated on the router.

Example

# Display the number of IPv4 fast forwarding entries generated on the router.

<Huawei> display ip fast-forwarding table number
Ipv4 FastForward Table Number: 0 
Table 7-62  Description of the display ip fast-forwarding table number command output

Item

Description

Ipv4 FastForward Table Number

Number of IPv4 fast forwarding entries generated on the router.

display ip interface

Function

The display ip interface command displays the IP configuration and statistics on interfaces. The statistics include the number of packets and bytes received and sent by interfaces, number of multicast packets sent and received by interfaces, and number of broadcast packets received, sent, forwarded, and discarded by interfaces.

The display ip interface brief command displays brief information about interface IP addresses, including the IP address, subnet mask, physical status, link-layer protocol status, and number of interfaces in different states.

Format

display ip interface [ interface-type interface-number ]

display ip interface brief [ interface-type [ interface-number ] | slot slot-id [ card card-number ] ]

display ip interface brief [ interface-type [ interface-number ] ]

display ip interface brief [ interface-type ] &<1-8>

Parameters

Parameter Description Value
interface-type interface-number

Specifies the type and number of an interface. If no interface is specified, IP configuration and statistics about all interfaces are displayed.

-
brief Displays brief information, including the IP address, subnet mask, physical status, link-layer protocol status, and number of interfaces in different states. -
slot slot-id

Displays the IP configuration and statistics of interfaces on the specified slot.

If the slot number is not specified, brief information related to the IP addresses of the interfaces on all interface boards and main control boards is displayed.

-
card card-number

Displays the IP configuration and statistics of interfaces on specified card.

-

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

You can run the display ip interface brief command to view the following information:
  • IP configurations of all interfaces
  • IP configurations of interfaces of the specified type and a specified interface
  • IP configurations of interfaces that have IP addresses
This command, however, cannot display the IP configurations of Layer 2 interfaces or Eth-Trunk member interfaces.
NOTE:

Example

# Display the IP configuration and statistics on GE1/0/0.
<Huawei> display ip interface gigabitethernet 1/0/0
GigabitEthernet1/0/0 current state : UP
Line protocol current state : UP
The Maximum Transmit Unit : 1500 bytes
input packets : 1431, bytes : 97912, multicasts : 1426
output packets : 2716, bytes : 179760, multicasts : 2710
Directed-broadcast packets:
 received packets:            0, sent packets:            0
 forwarded packets:           0, dropped packets:           0
ARP packet input number:          11
  Request packet:                 11
  Reply packet:                    0
  Unknown packet:                  0
Internet Address is 10.5.40.1/24
Broadcast address : 10.5.40.255
TTL being 1 packet number:         0
TTL invalid packet number:         0
ICMP packet input number:          0
  Echo reply:                      0
  Unreachable:                     0
  Source quench:                   0
  Routing redirect:                0
  Echo request:                    0
  Router advert:                   0
  Router solicit:                  0
  Time exceed:                     0
  IP header bad:                   0
  Timestamp request:               0
  Timestamp reply:                 0
  Information request:             0
  Information reply:               0
  Netmask request:                 0
  Netmask reply:                   0
  Unknown type:                    0
Table 7-63  Description of the display ip interface command output

Item

Description

GigabitEthernet1/0/0 current state

Physical status of GigabitEthernet1/0/0:
  • UP: indicates that the interface is physically Up.

  • DOWN: indicates that the interface is physically Down.

  • Administratively DOWN: indicates that the administrator has run the shutdown command on the interface.

Line protocol current state

Link layer protocol status of the interface:
  • UP: The link layer protocol of the interface is running properly.

  • DOWN: The link layer protocol of the interface is Down or no IP address is configured on the interface.

The Maximum Transmit Unit

MTU of the interface. The default MTU of an Ethernet interface is 1500 bytes. Packets longer than the MTU are fragmented before being transmitted. If fragmentation is not allowed, the packets are discarded.

input packets : 1431, bytes : 97912, multicasts : 1426

Total number of packets, bytes, and multicast packets received by the interface.

output packets : 2716, bytes : 179760, multicasts : 2710

Total number of packets, bytes, and multicast packets sent by the interface.

Directed-broadcast packets

Number of packets broadcast on the interface directly.

received packets

Total number of received packets.

sent packets

Total number of sent packets.

forwarded packets

Total number of forwarded packets.

dropped packets

Total number of discarded packets.

ARP packet input number

Number of received ARP packets.

Request packet

Number of request packets.

Reply packet

Number of response packets.

Unknown packet

Number of unknown packets.

Internet Address is

IP address and subnet mask of the interface. The displayed information varies according to the IP address allocation mode:
  • If the IP address is manually configured, the information is displayed as "Internet Address is 10.5.40.1/24."

  • If the IP address is obtained using DHCP, the information is displayed as "Internet Address is allocated by DHCP, 10.5.40.1/24."

Broadcast address

Broadcast address of an interface.

TTL being 1 packet number

Number of packets with TTL 1.

TTL invalid packet number

Number of packets with invalid TTL.

ICMP packet input number

Number of received ICMP packets.

Echo reply

Number of Echo Reply packets.

Unreachable

Number of Destination Unreachable packets.

Source quench

Number of Source Quench packets.

Routing redirect

Number of Redirect packets.

Echo request

Number of Echo Request packets.

Router advert

Number of Router Advertisement packets.

Router solicit

Number of Router Solicitation packets.

Time exceed

Number of Time Exceeded packets.

IP header bad

Number of IP header error packets.

Timestamp request

Number of Timestamp Request packets.

Timestamp reply

Number of Timestamp Reply packets.

Information request

Number of Information Request packets.

Information reply

Number of Information Reply packets.

Netmask request

Number of Address Mask Request packets.

Netmask reply

Number of Address Mask Reply packets.

Unknown type

Number of unknown packets.

# Display brief IP information about all interfaces.
<Huawei> display ip interface brief
*down: administratively down                                                    
^down: standby                                                                  
(l): loopback                                                                   
(s): spoofing                                                                   
(E): E-Trunk down    
The number of interface that is UP in Physical is 2                             
The number of interface that is DOWN in Physical is 3                           
The number of interface that is UP in Protocol is 2                             
The number of interface that is DOWN in Protocol is 3                           
                                                                                
Interface                         IP Address/Mask      Physical   Protocol      
Atm0/0/0                          unassigned           down       down          
Bridge-if10                       unassigned           down       down          
MFR0/0/1                          unassigned           down       down          
NULL0                             unassigned           up         up(s)         
Vlanif1                           192.168.200.161/24   up         up          
                         
Table 7-64  Description of the display ip interface brief command output

Item

Description

*down:

Reason why an interface is physically Down. Administratively down indicates that the administrator has run the shutdown command on the interface.

^down: standby

Indicates that the interface is a backup interface.

(l): loopback

Indicates that the loopback function is enabled on the interface.

(s): spoofing

Indicates that the spoofing function is enabled on the interface.

(E): E-Trunk down

Indicates that the Eth-Trunk is Down because of the protocol negotiation on the E-Trunk.

The number of interface that is UP/DOWN in Physical is

Up or Down state of a physical link and number of interfaces in different states.

The number of interface that is UP/DOWN in Protocol is

Up or Down state of the protocol and number of interfaces in different states.

Interface

Interface type and number.

IP Address/Mask

IP address and subnet mask of an interface.

Physical

Physical status of an interface:
  • Up: indicates that the interface is physically Up. (l) indicates that the loopback function is configured on the interface.

  • Down: indicates that the interface becomes faulty.

  • *down: indicates that the administrator has run the shutdown (interface view) command on the interface. (l) indicates that the loopback function is configured on the interface.

  • !down: indicates that the FIB module is suspended. In this case, the link protocol status of the interface is Down.

Protocol

Link protocol status of the interface:

  • Up: indicates that the link protocol of the interface is running properly. (s) indicates that the link protocol status of the interface is Up when this interface is created and has no IP address configured. This is an inherent attribute of an interface. When this interface is configured with an IP address, (s) is still displayed.

  • Down: indicates that the link protocol of the interface fails or no IP address is configured on the interface.

(l) indicates that the loopback function is configured on the interface.

Related Topics

display ip socket

Function

The display ip socket command displays information about the created IPv4 socket.

Format

display ip [ ha ] socket [ monitor ] [ task-id task-id socket-id socket-id | socket-type socket-type ]

Parameters

Parameter Description Value
ha

Displays IPv4 socket information on the slave main control board.

-
monitor Displays information about the socket monitor. Information about the socket monitor is displayed together with information about the socket. If no parameter is specified, this command displays information about all types of sockets. -
task-id task-id Displays socket information of the task with a specified ID. The value must be an existing task ID.
socket-id socket-id Displays information about the socket with a specified ID. The value must be an existing socket ID.
socket-type socket-type Displays information about a socket of a specified type. The value is an integer. Table 7-65 shows the value range.
Table 7-65  Value range of socket-type socket-type

Value

Description

1

TCP socket

2

UDP socket

3

RAWIP socket

4

RAWLINK socket

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

A socket monitor monitors and records each connection. A RawLink also monitors interfaces. The socket monitor records specific protocol events that occur during operations. In addition, it logs information in the disk space.

The socket monitor is similar to a black box of the system. It records specific events that happen during system operations. When the system fails, you can use information recorded by the socket monitor to locate faults.

You can also set the filtering rules, such as the task ID, socket ID, and socket type so that only the information matching the rules is displayed. This reduces information output and helps you locate faults accurately and efficiently.

Example

# Display information about the IP socket.
<Huawei> display ip socket monitor
SOCK_STREAM:
Task = VTYD(30), socketid = 1, Proto = 6, 
LA = 0.0.0.0:23, FA = 0.0.0.0:0, 
sndbuf = 8192, rcvbuf = 8192, sb_cc = 0, rb_cc = 0, 
socket option = SO_ACCEPTCONN SO_KEEPALIVE SO_LINGER SO_REUSEPORT SO_SENDVPNID(23553) SO_SETKEEPALIVE SO_SETACL,
socket state = SS_PRIV SS_ASYNC
                          Socket Monitor:
Asyn Que status:
 read = 0, write = 0, connect = 0, close = 0,
 peer close = 0, accept = 0, keep alive down = 0,
 cram time = 00H00M00S, lost msg = 0, msg type = 0x00000000;
Nothing else has been captured!
SOCK_DGRAM: 
Task = DHCP(54), socketid = 2, Proto = 17,
LA = 0.0.0.0:67, FA = 0.0.0.0:0,
sndbuf = 9216, rcvbuf = 41600, sb_cc = 0, rb_cc = 0, 
socket option = SO_BROADCAST SO_REUSEPORT SO_UDPCHECKSUM SO_SENDVPNID(14849),
socket state = SS_PRIV
                          Socket Monitor:
Statistics:
 input packets = 6,recv packets = 6,output packets = 0;
Rcvbuf status: 
 cram time = 00H00M00S: full times = 0,dropped packets = 0;
Asyn Que status: 
 read = 0, write = 0, connect = 0, close = 0, 
 peer close = 0, accept = 0, keep alive down = 0, 
 smb input = 0, smb output = 0, smooth over = 0,
 cram time = 00H00M00S, lost msg = 0, msg type = 0x00000000;
Table 7-66  Description of the display ip socket command output

Item

Description

SOCK_STREAM

Socket types:
  • SOCK_STREAM

  • SOCK_DGRAM

  • SOCK_RAWLINK

  • SOCK_RAWIP

Task = VTYD(30)

Type and ID of the task that invokes the socket. For example, the task named VTYD uses the socket, with the task ID being 30.

socketid = 1

Socket ID.

Proto = 6

Protocol number.

LA = 0.0.0.0:23, FA = 0.0.0.0:0,

  • LA: Local address/port number.

  • FA: Remote address/port number.

sndbuf = 8192, rcvbuf = 8192, sb_cc = 0, rb_cc = 0,

  • sndbuf: maximum socket send buffer size. The value is in bytes.

  • rcvbuf: maximum socket receive buffer size. The value is in bytes.

  • sb_cc: number of sent packets. The value is in bytes and is valid only when TCP caches data packets.

  • rb_cc: number of received packets. The value is in bytes.

socket option = SO_ACCEPTCONN SO_KEEPALIVE SO_LINGER SO_REUSEPORT SO_SENDVPNID (23553) SO_SETKEEPALIVE SO_SETACL,

Set socket options:
  • SO_DEBUG: indicates that debugging is enabled.

  • SO_ACCEPTCONN: indicates that the socket is the server and is responsible for monitoring.

  • SO_REUSEADDR: indicates that addresses are overlapped. After the option is set, multiple identical addresses can be bound to an interface.

  • SO_KEEPALIVE: indicates that the keepalive timer starts after a TCP connection is set up.

  • SO_DONTROUTE: indicates that a socket must choose the direct route to the destination when setting up a connection.

  • SO_BROADCAST: indicates that an interface can send broadcast packets.

  • SO_REUSEPORT: indicates that interfaces are overlapped. After the option is set, multiple identical interfaces can be bound to the local interface. This option is often set on servers.

  • SO_UDPCHECKSUM: indicates that the socket calculates the checksum of UDP packets.

  • SO_SENDVPNID: indicates an exclusive option for VPNs.

  • SO_SETKEEPALIVE: indicates that the keepalive timer starts after a TCP connection is set up.

  • SO_SETACL: indicates that an ACL can be configured on the interface.

  • SO_USELOOPBACK: indicates that a socket can use a loopback interface to receive or send data.

  • SO_LINGER: indicates the time for closing a TCP connection. If the time is not set to 0, a TCP connection is closed after the timer expires. If the time is set to 0, a TCP connection is closed immediately.

  • SO_OOBINLINE: indicates out-band data. When receiving data, a socket processes the out-band data first.

  • SO_SENDDATAIF: indicates that a socket uses the specified interface to receive or send data.

  • SO_SENDDATAIF_DONTSETTTL: indicates that a socket uses the specified interface to receive or send data but does not set the TTL value.

  • SO_SETSRCADDR: indicates that a socket sets the source address of outgoing packets.

  • SO_SENDBY_IF_NEXTHOP: indicates that a socket sets the outbound interface and next hop address of outgoing packets.

socket state = SS_PRIV SS_ASYNC

Socket status:
  • SS_NOFDREF: indicates that the socket ID is deleted.

  • SS_ISCONNECTED: indicates that a TCP connection is set up.

  • SS_ISCONNECTING: indicates that a TCP connection is being set up.

  • SS_ISDISCONNECTING: indicates that a TCP connection is being closed.

  • SS_CANTSENDMORE: indicates that a socket cannot send data.

  • SS_CANTRCVMORE: indicates that a socket cannot receive data.

  • SS_RCVMARK: indicates that a socket sets the receiving option in the received packet.

  • SS_NBIO: indicates that the type of a socket is non-blocking.

  • SS_ISCONFIRMING: indicates that the upper-layer application will complete processing a connection.

  • SS_BLOCKING: indicates that congestion occurs during packet receiving and sending.

  • SS_RECALL: indicates that the message notification method is set by an asynchronous socket.

  • SS_PRIV: indicates the option transferred from the Unix. The option is invalid in the current socket.

  • SS_ASYNC: indicates the status identifier of an asynchronous socket.

Asyn Que status

Current asynchronous queue status.

read=0

Number of messages read by the asynchronous queue is 0.

write=0

Number of messages written by the asynchronous queue is 0.

connect=0

Number of connection messages in the asynchronous queue is 0.

close=0

Number of messages about closed connections in the asynchronous queue is 0.

peer close=0

Number of messages about connections closed by the remote end in the asynchronous queue.is 0.

accept=0

Number of messages received by the asynchronous queue is 0.

keep alive down=0

Number of keepalivedown messages in the asynchronous queue is 0.

cram time=00H00M00S

Time for the asynchronous queue to become full is 00:00:00.

lost msg=0

Number of asynchronous messages discarded by the asynchronous queue is 0.

msg type

Current asynchronous message type.

smb input = 0

Number of times of notifying the application layer to read received packets on the backup board.

smb output = 0

Number of times of notifying the application layer to read sent packets on the backup board.

smooth over = 0

Number of times of notifying the application layer that the smoothing is over.

display ip socket register-port

Function

The display ip socket register-port command displays non-well-known port numbers that have been assigned to services on the device.

Format

display ip socket register-port

Parameters

None

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

As defined in RFC standards, port numbers larger than 1024 are non-well-known port numbers and can be assigned to desired services, such as NQA and FTP services. However, a non-well-known port number can be assigned to only one service on the same device. If you assign a non-well-known port number to two or more services, this port number takes effect for only the latest configured service. As a result, the other services using this port number will fail.

Before you assign a non-well-known port number to a service, run the display ip socket register-port command to check non-well-known port numbers that have been assigned to other services, preventing service failures caused by conflicts of non-well-known port numbers.

Example

# Display non-well-known port numbers that have been assigned to services on the device.

<Huawei> display ip socket register-port
Port      Task        Type                                                                                                          
3232      mdt         UDP4                                                                                                          
3503      MPLSFW      UDP4                                                                                                          
3784      BFD         UDP4                                                                                                          
4784      BFD         UDP4                                                                                                          
31009     MPLSFW      UDP4                                                                                                          
3232      mdt         UDP6                                                                                                          
3503      MPLSFW      UDP6                                                                                                          
3784      BFD         UDP6                                                                                                          
4784      BFD         UDP6                                                                                                          
31009     MPLSFW      UDP6   
Table 7-67  Description of the display ip socket register-port command output

Item

Description

Port

Non-well-known port number that has been assigned to a service.

Task

Name of the task to which a non-well-known port number is assigned.

Type

Port type, including TCP and UDP.

display ip statistics

Function

The display ip statistics command displays IP traffic statistics.

Format

display ip statistics

Parameters

None

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

IP traffic statistics include statistics about received packets (including discarded packets that carry source-route options), sent packets, fragmented packets, and reassembled packets. If a large number of bad protocol and no route fields is displayed in the command output, the device receives a large volume of IP packets of unknown protocol types and IP packets for which no routes can be found. In this situation, the device may be attacked by the connected devices.

Example

# Display IP traffic statistics.

<Huawei> display ip statistics
  Input:     sum                 49617      local                 40133         
             bad protocol            0      bad format                0         
             bad checksum            0      bad options               0         
             discard srr             0      discard rr                0         
             discard ra              0      discard ts                0         
             TTL exceeded            0                                          
  Output:    forwarding              0      local                 44518         
             dropped                 0      no route                  0         
  Fragment:  input                   0      output                    0         
             dropped                 0                                          
             fragmented              0      couldn't fragment         0         
  Reassembling:sum                   0      timeouts                  0         
Table 7-68  Description of the display ip statistics command output

Item

Description

Input

Received packets.

sum

Total number of packets.

local

Number of packets sent to the upper-layer protocol.

bad protocol

Number of received IP packets of unknown protocol types. The protocol field in the IP header cannot be identified by the upper-layer protocol.

bad format

Number of packets in incorrect format.

bad checksum

Number of packets with checksum errors.

bad options

Number of packets with incorrect options.

discard srr

Number of discarded packets with source route options.

discard rr

Indicates the number of packets that are received and then discarded because of record-route options.

discard ra

Indicates the number of packets that are received and then discarded because of alert-route options.

discard ts

Indicates the number of packets that are received and then discarded because of time stamps options.

TTL exceeded

Number of packets discarded because the TTL expires.

Output

Sent packets.

forwarding

Number of forwarded packets.

local

Number of generated packets.

dropped

Number of discarded packets.

no route

Number of packets for which no correct route can be found, including the packets sent and forwarded by the local device.

Fragment

Number of packet fragments.

input

Number of received fragments.

output

Number of sent fragments.

dropped

Number of discarded fragments.

fragmented

Number of successfully fragmented packets.

couldn't fragment

Number of packets that cannot be fragmented.

Reassembling:sum

Number of successfully reassembled fragments.

timeouts

Number of expired fragments.

display load-sharing

Function

The display load-sharing command displays the Unequal Cost Multiple Path (UCMP) configuration.

Format

display load-sharing [ vpn-instance vpn-instance ] ip-address ip-address mask

Parameters

Parameter Description Value
vpn-instance vpn-instance Specifies the name of a VPN instance. The value is a string of 1 to 31 case-sensitive characters.
ip-address ip-address Specifies destination IP address of an equal-cost route in the routing table. The destination IP address can be a network segment. The value is in dotted decimal notation.
mask Specifies the mask length in the routing table. The value is an integer that ranges from 0 to 32.

Views

User view

Default Level

1: Monitoring level

Usage Guidelines

None

Example

# Check the UCMP configuration.

<Huawei> display load-sharing vpn-instance 0 ip-address 3.3.3.3 32 

 ------------------------Load Sharing Information------------------------       
 ECMP Index is 0                                                                
 UCMP is Enabled                                                                
 ------------------------------------------------------------------------       
 NextHop             BandWidth           State               Interface          
                                                                                
 40.1.1.2            1000                Active              GE1/0/0            
                                                                                
 30.1.1.2            2000                Active              Eth-Trunk1         
Table 7-69  Description of the display load-sharing command output
Item Description
ECMP Index ECMP index, maintained by the system.
UCMP is Enabled

The UCMP function is enabled.

To enable the UCMP function, run the load-balance unequal-cost enable command.

NextHop IP address of the next hop in the route matching the destination IP address.
BandWidth

Bandwidth of the link involved in UCMP.

To set the UCMP bandwidth, run the load-balance bandwidth command.

State UCMP status:
  • Active
  • Inactive
Interface Outbound interface in the route matching the destination IP address.

display network status

Function

Running the display network status command, you can check the network status of a device.

Format

display network status { all | tcp | udp | port port-number }

Parameters

Parameter Description Value
all Displays all the network information. -
tcp Displays TCP. -
udp Displays UDP. -
port port-number Specifies the number of an interface. The value is an integer ranging from 1 to 65535.

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

The display network status command is used to check the network status, such as the running interfaces and services on the network. For example, when you find that an interface is being used by an unknown module during a security scan, run the command to check out the module.

Example

# Display the IPv4 RawIP connection status.
<Huawei> display network status all
Proto Task/SockId Local Addr&Port          Foreign Addr&Port        State
TCP   VTYD/1      0.0.0.0:23               0.0.0.0:0                Listening
TCP   HTTP/2      0.0.0.0:80               0.0.0.0:0                Listening
TCP   HTTP/1      0.0.0.0:443              0.0.0.0:0                Listening
TCP   VTYD/59     192.168.50.166:23        10.135.19.141:60445      Established
TCP6  VTYD/2      ::->23                   ::->0                    Listening
UDP   AGNT/1      0.0.0.0:161              0.0.0.0:0
UDP   SLAG/1      0.0.0.0:1025             0.0.0.0:0
UDP   RDS /1      0.0.0.0:1812             0.0.0.0:0
UDP6  AGT6/1      ::->161                  ::->0
UDP6  RDS /2      ::->1812                 ::->0
Table 7-70  Description of the display network status command output

Item

Description

Proto Task/SockId

Protocol Task and Socket ID

Local Addr&Port

Local IP address and Port number

Foreign Addr&Port

Remote IP address and Port number

State

Connection status

display rawip statistics

Function

The display rawip statistics command displays RawIP traffic statistics.

Format

display rawip statistics [ verbose ]

Parameters

Parameter Description Value
verbose Displays detailed RawIP traffic statistics based on the ICMP, OSPF, RSVP, and Others protocols. -

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

Usage Scenario

The statistics about RawIP packets include the number of sent RawIP packets and the number of received RawIP packets.

RSVP, OSPF, and ICMP packets are encapsulated into RawIP packets to be sent. During the ping operation, for example, you can run the display rawip statistics command to view the number of RawIP packets sent by the local device to check whether the abnormality on the network is caused by abnormal sending and receiving of RawIP packets.

If you want to diagnose problems and monitor information of specific applications, configure verbose in the display rawip statistics command to display application-specific RawIP packet statistics. The applications can be ICMP, OSPF, RSVP, and others.

Precautions

The number of packets received by a industrial switch router includes the number of forwarded packets, packets sent to the upper layer, and discarded packets.

RawIP traffic statistics are collected based on the well-known protocol number. The protocol number is identified by the protocol field in the IP packet header.
  • The protocol number of ICMP statistics is 1.
  • The protocol number of OSPF statistics is 89.
  • The protocol number of RSVP statistics is 46.
  • Statistics about packets with other protocol numbers are collected into the Others field.

Example

# View the statistics about RawIP packets.
<Huawei> display rawip statistics
Received packets:
  dropped packets because the socket buffer is full   : 0
  dropped packets because no matching socket is found : 0

Sent packets:
  dropped packets : 0  
Table 7-71  Description of the display rawip statistics command output

Item

Description

Received packets

Indicates the number of received packets.

dropped packets because the socket buffer is full

Indicates the number of RawIP packets that are discarded because the socket buffer is full.

dropped packets because no matching socket is found

Indicates the number of RawIP packets that are discarded because the socket of the receiver does not match with that of the sender.

Sent packets

Indicates the number of sent packets.

dropped packets

Indicates the number of discarded packets.

# Display detailed RawIP traffic statistics.
<Huawei> display rawip statistics verbose
Received packets:
------------------------------------------------------------------
Application    Overflow         No Matching
------------------------------------------------------------------
ICMP           0                0
OSPF           0                0
RSVP           0                0
Others         0                1
------------------------------------------------------------------

Sent packets:
------------------------------------------------------------------
Application    Dropped Packets
------------------------------------------------------------------
ICMP           0
OSPF           0
RSVP           0
Others         0
------------------------------------------------------------------
Table 7-72  Description of the display rawip statistics verbose command output

Item

Description

Received packets

Statistics on received packets.

Application

Application type.

Overflow

Number of RawIP packets discarded because the Socket buffer is full.

No Matching

Number of RawIP packets discarded because the receiver's Socket is mismatching.

ICMP

ICMP packets.

OSPF

OSPF packets.

RSVP

RSVP packets.

Others

Other types of packets.

Sent packets

Statistics about sent packets.

Dropped Packets

Number of discarded packets.

display tcp statistics

Function

The display tcp statistics command displays TCP traffic statistics.

Format

display tcp statistics

Parameters

None

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

The command displays TCP traffic statistics including different types of received and sent packets. For example, duplicate received packets and packets with checksum errors. In addition, connection-related statistics are displayed, for example, times of accepted connections, the number of retransmitted packets, and the number of keepalive packets.

Most of the preceding statistics are expressed in number of packets, and some of them are expressed in number of bytes.

Example

# Display TCP traffic statistics.
<Huawei> display tcp statistics
Received packets:
     Total: 0
     Total(64bit high-capacity counter): 0
     packets in sequence: 0 (0 bytes)
     window probe packets: 0, window update packets: 0
     checksum error: 0, offset error: 0, short error: 0

     duplicate packets: 0 (0 bytes), partially duplicate packets: 0 (0 bytes)
     out-of-order packets: 0 (0 bytes)
     packets of data after window: 0 (0 bytes)
     packets received after close: 0

     ACK packets: 0 (0 bytes)
     duplicate ACK packets: 0, too much ACK packets: 0

Sent packets:
    Total: 0
     Total(64bit high-capacity counter): 0
     urgent packets: 0
     control packets: 0 (including 0 RST)
     window probe packets: 0, window update packets: 0

     data packets: 0 (0 bytes),    data packets retransmitted: 0 (0 bytes)
     ACK-only packets: 0 (0 delayed)

Other information:
    Retransmitted timeout: 0, connections dropped in retransmitted timeout: 0
    Keep alive timeout: 0, keep alive probe: 0,     Keep alive timeout, so connections disconnected : 0
    Initiated connections: 0,     accepted connections: 0, established connections: 0
    Closed connections: 0 (    dropped: 0, initiated dropped: 0)
    Packets dropped with MD5 authentication: 0
    Packets permitted with MD5 authentication: 0
    Send Packets permitted with Keychain authentication: 0
    Receive Packets permitted with Keychain authentication: 0
    Receive Packets Dropped with Keychain authentication: 0
Table 7-73  Description of the display tcp statistics command output

Item

Description

Received packets

Statistics about received packets.

Total

Total number of packets.

Total (64bit high-capacity counter)

Total number of packets, using the 64-bit counter.

packets in sequence (bytes)

Number of bytes in the packets that arrive in order.

window probe packets

Number of window probe packets.

window update packets

Number of window update packets.

checksum error

Number of packets with checksum errors.

offset error

Number of packets with offset errors.

short error

Number of packets whose length is too short.

duplicate packets (bytes)

Number of bytes in the duplicate packets.

partially duplicate packets (bytes)

Number of bytes in partially duplicate packets.

out-of-order packets (bytes)

Number of bytes in the out-of-order packets.

packets of data after window (bytes)

Number of bytes in the packets whose size is greater than the window size.

packets received after close

Number of packets that arrive after a connection is closed.

ACK packets (bytes)

Number of acknowledged packets, in bytes.

duplicate ACK packets

Number of re-acknowledged packets.

too much ACK packets

Number of acknowledged packets with no data sent.

Sent packets

Number of sent packets.

urgent packets

Number of urgent packets.

control packets (RST)

Number of control packets (RST packets).

data packets

Number of data packets.

data packets retransmitted (0 bytes)

Number of bytes in the retransmitted packets.

ACK only packets (delayed)

Number of acknowledged packets that are delayed.

Retransmitted timeout

Timeout interval of the retransmission timer.

connections dropped in retransmitted timeout

Number of connections discarded because the number of retransmission times exceeds the threshold.

Keep alive timeout

Timeout interval of the keepalive timer.

keep alive probe

Number of sent keepalive packets.

Keep alive timeout, so connections disconnected

Number of connections discarded because keepalive probe fails.

Initiated connections

Number of initiated connections.

accepted connections

Number of accepted connections.

established connections

Number of established connections.

Closed connections (dropped, initiated dropped)

Number of closed connections (number of discarded packets after a connection is set up or before a connection is set up).

Packets dropped with MD5 authentication

Number of packets that fail to pass MD5 authentication.

Packets permitted with MD5 authentication

Number of packets that pass MD5 authentication.

Send Packets permitted with Keychain authentication

Number of sent packets that carry keychain options.

Receive Packets permitted with Keychain authentication

Number of received packets that pass keychain authentication.

Receive Packets Dropped with Keychain authentication

Number of received packets that fail to pass keychain authentication.

Related Topics

display tcp status

Function

The display tcp status command displays current TCP connection status.

Format

display tcp status [ [ task-id task-id ] [ socket-id socket-id ] | [ local-ip ip-address ] [ local-port local-port-number ] [ remote-ip ip-address ] [ remote-port remote-port-number ] ]

Parameters

Parameter Description Value
task-id task-id

Displays the TCP connection status of the task with a specified ID.

The value must be an existing task ID.
socket-id socket-id Displays the TCP connection status of the socket with a specified ID. The value must be an existing socket ID.
local-ip ip-address Displays the TCP connection status of a specified local IP address. The value is in dotted decimal notation.
local-port local-port-number Displays the TCP connection status of a specified local port ID. The value must be an existing local port ID.
remote-ip ip-address Displays the TCP connection status a specified remote IP address. The value is in dotted decimal notation.
remote-port remote-port-number Displays the TCP connection status of a specified remote port ID. The value must be an existing remote port ID.

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

Usage Scenario

The transmission control protocol defined in RFC 793 ensures high reliability of transmission between hosts. TCP provides reliable and connection-oriented services in full duplex mode. Run the display tcp status command to monitor the TCP connection status. The following information is displayed.
  • ID of the TCP task control block.
  • ID of the IPv4 TCP task and socket.
  • Local IPv4 address and port ID.
  • Remote IPv4 address and port ID.
  • ID of the VPN instance to which the TCP connection belongs.
  • IPv4 TCP connection status.

You can set filtering rules based on the Task ID, socket ID, IP address and port number of the local device, and IP address and port number of the remote device so that only the information matching the rules is displayed. This prevents unnecessary information from being displayed and helps you locate faults accurately and efficiently.

Precautions

The command output is null if there is no TCP connection.

Example

# Display the TCP connection status on the local device.

<Huawei> display tcp status
TCPCB    Tid/Soid Local Add:port        Foreign Add:port      VPNID  State
0a5d560c 30 /1    0.0.0.0:23            0.0.0.0:0             14849 Listening

# Display the status of the TCP connection originated from the local IP address 0.0.0.0 and port 23.

<Huawei> display tcp status local-ip 0.0.0.0 local-port 23
TCPCB    Tid/Soid Local Add:port        Foreign Add:port      VPNID  State
0a5d560c 30 /1    0.0.0.0:23            0.0.0.0:0             14849 Listening

# Display the status of the TCP connection originated from the local IP address 0.0.0.0 and port 24.

<Huawei> display tcp status local-ip 0.0.0.0 local-port 24
TCPCB    Tid/Soid Local Add:port        Foreign Add:port      VPNID  State
Table 7-74  Description of the display tcp status command output

Field

Description

TCPCB

ID of the TCP task control block.

Tid/Soid

Task ID and socket ID.

Local Add: port

IP address and port number of the local device. If the value of Local Add is 0.0.0.0, TCP connections of all IP addresses are monitored. If the value of port is 0, the TCP connection of all ports is monitored.

Foreign Add: port

IP address and port number of the remote device. If the value of Foreign Add is 0.0.0.0, the TCP connection of all IP addresses is monitored. If the value of port is 0, TCP connections of all ports are monitored.

VPNID

ID of the VPN instance to which the TCP connection belongs.
  • -1: indicates all VPNs.
  • 0: indicates the public VPN.
  • Other values: indicates the private VPN. The VPNID is defined by users.

State

TCP connection status:
  • Closed: indicates that the TCP connection is closed.

  • Listening: indicates that the TCP connection is being monitored.

  • Syn_Rcvd: indicates that a packet with the SYN flag is received.

  • Established: indicates that the TCP connection has been set up.

  • Close_Wait: indicates that a user sends a packet with the FIN flag to the server to close the TCP connection in Established state. The server then sends an ACK packet to the user after receiving the packet and enters the Close_Wait state.

  • Fin_Wait1: indicates that a user sends a packet with the FIN flag to the server to close the TCP connection and enter this state.

  • Fin_Wait2: indicates that a user receives an ACK packet that responds to the sent packet with the FIN flag.

  • Time_Wait: indicates that TCP enters this state after the TCP connection is closed. When TCP has been in Time_Wait state two times the lifetime of the longest packets, records about the closed connection are deleted.

  • Closing: indicates that the user and server close the TCP connection simultaneously.

display udp statistics

Function

The display udp statistics command displays UDP traffic statistics.

Format

display udp statistics

Parameters

None

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

The command displays UDP traffic statistics including different types of received and sent packets. For example, packets with checksum errors. In addition, connection-related statistics are displayed, for example, the number of broadcast packets. The preceding statistics are expressed in number of packets.

Example

# Display UDP traffic statistics.
<Huawei> display udp statistics
Received packets:
    Total: 0
    Total(64bit high-capacity counter): 0
    checksum error: 0
    shorter than header: 0
    data length larger than packet: 0
    unicast(no socket on port): 0
    broadcast/multicast(no socket on port): 0
    not delivered, input socket full: 0
    input packets missing pcb cache: 0

Sent packets:
    Total: 0
    Total(64bit high-capacity counter): 0
Table 7-75  Description of the display udp statistics command output

Item

Description

Received packet:

Total:

Total (64bit high-capacity counter):

Total number of received UDP packets.

Total number of received UDP packets (using the 64-bit counter).

checksum error:

Number of packets with checksum errors.

shorter than header:

Number of packets whose length is shorter than the packet header.

data length larger than packet:

Number of packets whose data length is greater than the packet length.

unicast (no socket on port):

Number of unicast packets.

broadcast/multicast (no socket on port):

Number of broadcast and multicast packets.

not delivered, input socket full:

Number of packets that are not sent out because the socket buffer is full.

input packets missing pcb cache:

Number of sent packets that are not found in the PCB cache.

Sent packets:

Total:

Total (64bit high-capacity counter):

Total number of sent UDP packets.

Total number of sent UDP packets (using the 64-bit counter).

Related Topics

icmp blackhole unreachable send

Function

The icmp blackhole unreachable send command enables the BRAS to send a Destination Unreachable ICMP packet to an initiator when a tracert packet matches an IPv4 blackhole route.

The undo icmp blackhole unreachable send command disables the BRAS from sending a Destination Unreachable ICMP packet to an initiator when a tracert packet matches an IPv4 blackhole route.

By default, the BRAS is disabled from sending a Destination Unreachable ICMP packet to an initiator when a tracert packet matches an IPv4 blackhole route.

Format

icmp blackhole unreachable send

undo icmp blackhole unreachable send

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

If static IPv4 blackhole routes are configured on the BRAS and a user goes offline, only the IPv4 blackhole route corresponding to the user's address segment exists on the BRAS. When a tracert packet matches the IPv4 blackhole route, the BRAS discards the packet. As a result, an initiator cannot detect that the user has gone offline.

After you run the icmp blackhole unreachable send command, the BRAS sends a Destination Unreachable ICMP packet to an initiator, notifying the initiator that the user has gone offline if a user goes offline and a tracert packet matches the IPv4 blackhole route.

Pre-configuration Tasks

Static IPv4 blackhole routes have been configured on the BRAS.

Example

# Enable the BRAS to send a Destination Unreachable ICMP packet to an initiator when a tracert packet matches an IPv4 blackhole route.

<Huawei> system-view
[Huawei] icmp blackhole unreachable send

icmp fragmentneed-dfset send

Function

The icmp fragmentneed-dfset send command enables an interface to send ICMP Fragmentation Needed and DF Set messages.

The undo icmp fragmentneed-dfset send command disables an interface from sending ICMP Fragmentation Needed and DF Set messages.

By default, an interface is enabled to send ICMP Fragmentation Needed and DF Set messages.

Format

icmp fragmentneed-dfset send

undo icmp fragmentneed-dfset send

Parameters

None

Views

Virtual-Ethernet interface view

Default Level

2 : Configuration level

Usage Guidelines

When a device sends or forwards an IP packet that needs to be fragmented but with the Don't Fragment (DF) flag set, the device responds with an ICMP Fragmentation Needed and DF Set message. When the device is under flooding attacks, it continuously responds with ICMP Fragmentation Needed and DF Set messages, which causes a high CPU usage and subsequently affects system performance. To address this problem, run the undo icmp fragmentneed-dfset send command on the interface that sends ICMP messages to disable the interface from sending ICMP Fragmentation Needed and DF Set messages.

Example

# Disable VE 0/0/1 from sending ICMP Fragmentation Needed and DF Set messages.
<Huawei> system-view
[Huawei] interface Virtual-Ethernet0/0/1
[Huawei-Virtual-Ethernet0/0/1] undo icmp fragmentneed-dfset send

icmp host-unreachable send

Function

The icmp host-unreachable send command enables the device to send ICMP host unreachable packets.

The undo icmp host-unreachable send command disables the device from sending ICMP host unreachable packets.

By default, the device can send ICMP host unreachable packets.

Format

icmp host-unreachable send

undo icmp host-unreachable send

Parameters

None

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

After you run the undo icmp host-unreachable send command, the device does not send ICMP host unreachable packets externally. This prevents the peer device from processing a large number of ICMP packets.

This command needs to be configured on the inbound interface of ICMP packets.

Example

# Enable GE0/0/1 to send ICMP host unreachable packets.
<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/1
[Huawei-GigabitEthernet0/0/1] icmp host-unreachable send

icmp port-unreachable send

Function

The icmp port-unreachable send command enables the device to send ICMP port unreachable packets.

The undo icmp port-unreachable send command disables the device from sending ICMP port unreachable packets.

By default, the device does not send ICMP port unreachable packets.

Format

icmp port-unreachable send

undo icmp port-unreachable send

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

After the function of sending ICMP port unreachable packets is disabled, the device does not send ICMP port unreachable packets. This can reduce the number of ICMP packets on the network and reduce the workload on the peer device.

Example

# Enable the device to send ICMP port unreachable packets.

<Huawei> system-view
[Huawei] icmp port-unreachable send

icmp protocol-unreachable send

Function

The icmp protocol-unreachable send command enables the function of sending ICMP unreachable packets.

The undo icmp protocol-unreachable send command disables the function of sending ICMP unreachable packets.

By default, the function of sending ICMP unreachable packets is enabled.

Format

icmp protocol-unreachable send

undo icmp protocol-unreachable send

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The switch replies with ICMP unreachable packets (Type=3, Code=2) to IP packets of unknown protocol types that cannot be processed by the protocol stack. A large number of ICMP unreachable packets affects the CPU usage. In such a case, you can disable the function of sending ICMP unreachable packets.

Precautions

ICMP unreachable packets are not sent after the function of sending ICMP unreachable packets is disabled.

Example

# Enable the function of sending ICMP unreachable packets.
<Huawei> system-view
[Huawei] icmp protocol-unreachable send

icmp redirect send

Function

The icmp redirect send command enables the system to send ICMP redirection packets.

The undo icmp redirect send command disables the system from sending ICMP redirection packets.

By default, the system sends ICMP redirection packets.
NOTE:

The device does not support this function.

Format

icmp redirect send

undo icmp redirect send

Parameters

None

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

The command is used on the interface that receives ICMP packets.

ICMP redirection packets are a type of ICMP control packets. When the device detects that a host uses a non-optimal route, it sends an ICMP redirection packet to the host, requesting the host to change the route. The device also sends an ICMP redirection packet to the destination.

Example

# Enable GE0/0/1 to send ICMP redirection packets.
<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/1
[Huawei-GigabitEthernet0/0/1] icmp redirect send

icmp time-exceed

Function

The icmp time-exceed command specifies the format of ICMP Time Exceeded packets.

The undo icmp time-exceed command restores the format of ICMP Time Exceeded packets to the default setting.

By default, ICMP Time Exceeded packets carry extension headers in compliant mode and original datagrams are of variable length.

Format

icmp time-exceed { extension { compliant | non-compliant } | classic }

undo icmp time-exceed

Parameters

Parameter Description Value
extension Indicates that ICMP Time Exceeded packets carry extension headers. -
compliant Indicates that ICMP Time Exceeded packets carry extension headers in compliant mode and original datagrams are of variable length. -
non-compliant Indicates that ICMP Time Exceeded packets carry extension headers in non-compliant mode and original datagrams are of fixed length. -
classic Indicates that ICMP Time Exceeded packets do not carry extension headers. -

Views

System view

Default Level

2: Configuration level

Usage Guidelines

When using the tracert command to check the network connectivity, you can run the icmp time-exceed command to specify the format of ICMP Time Exceeded packets.
  • When the icmp time-exceed command carry the parameter extension compliant, ICMP Time Exceeded packets carry extension headers in compliant mode and original datagrams are of variable length. ICMP Time Exceeded packets carry as many original datagrams as possible. Lengths of original datagrams carried in ICMP Time Exceeded packets are recorded in ICMP headers.
  • When the icmp time-exceed command carry the parameter extension non-compliant, ICMP Time Exceeded packets carry extension headers in non-compliant mode and original datagrams are of fixed length. If the length of original datagrams is less than 128 bytes, the system automatically fills the length to 128 bytes.
  • When the icmp time-exceed command carry the parameter classic, ICMP Time Exceeded packets do not carry extension headers.

Example

# Configure ICMP Time Exceeded packets to carry extension headers in compliant mode.

<Huawei> system-view 
[Huawei] icmp time-exceed extension compliant 
Related Topics

icmp ttl-exceeded drop

Function

The icmp ttl-exceeded drop command enables the device to discard the ICMP packets whose TTL values are 1.

The undo icmp ttl-exceeded drop command disables the device from discarding the ICMP packets whose TTL values are 1.

By default, the device does not discard the ICMP packets whose TTL values are 1.

Format

icmp ttl-exceeded drop

undo icmp ttl-exceeded drop

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

When the device receives a large number of IGMP packets, the function enables the device to discard some ICMP packets to reduce the workload on the device.

NOTE:

After the function is enabled on the device, the tracert command does not take effect.

Example

# Enable the device to discard the ICMP packets whose TTL values are 1.

<Huawei> system-view
[Huawei] icmp ttl-exceeded drop 

icmp ttl-exceeded send

Function

The icmp ttl-exceeded send command enables an interface to send ICMP Time Exceeded messages.

The undo icmp ttl-exceeded send command disables an interface from sending ICMP Time Exceeded messages.

By default, an interface is enabled to send ICMP Time Exceeded messages.

Format

icmp ttl-exceeded send

undo icmp ttl-exceeded send

Parameters

None

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

By default, an interface replies with an ICMP Time Exceeded message after it receives a message with TTL 1. The interface adds its IP address as the source IP address in the ICMP Time Exceeded message, exposing the interface itself to attackers. In addition, after being attacked, the interface replies with numerous ICMP Time Exceeded messages, consuming CPU resources and degrading system performance. To resolve these problems, run the undo icmp ttl-exceeded send command to disable the interface from replying with ICMP Time Exceeded messages.

Example

# Enable GE0/0/1 from sending ICMP Time Exceeded messages.
<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/1
[Huawei-GigabitEthernet0/0/1] icmp ttl-exceeded send

icmp unreachable drop

Function

The icmp unreachable drop command enables the function of discarding ICMP destination unreachable packets.

The undo icmp unreachable drop command disables the function of discarding the ICMP destination unreachable packets.

By default, the function of discarding ICMP destination unreachable packets is disabled.

Format

icmp unreachable drop

undo icmp unreachable drop

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

After the function is enabled on the device, the device discards some ICMP packets. This reduces the workload on the device.

Example

# Enable the function of discarding ICMP destination unreachable packets.

<Huawei> system-view
[Huawei] icmp unreachable drop

icmp with-options drop

Function

The icmp with-options drop command enables the device to discard ICMP packets that carry options.

The undo icmp with-options drop command disables the device from discarding ICMP packets that carry options.

By default, the device does not discard ICMP packets that carry options.

Format

icmp with-options drop

undo icmp with-options drop

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

When the device receives a large number of ICMP packets, the function enables the device to discard some ICMP packets to reduce the workload on the device.

Example

# Enable the device to discard the ICMP packets that carry options.

<Huawei> system-view
[Huawei] icmp with-options drop 

icmp receive

Function

The icmp receive command enables the device to receive ICMP messages.

The undo icmp receive command disables the device from receiving ICMP messages.

By default, the device receives ICMP messages.

Format

icmp { type icmp-type code icmp-code | name icmp-name | all } receive

undo icmp { type icmp-type code icmp-code | name icmp-name | all } receive

Parameters

Parameter Description Value
type icmp-type Specifies the type number of an ICMP message. The value is an integer ranging from 0 to 255.
code icmp-code Specifies the code of an ICMP message. The value is an integer ranging from 0 to 255.
name icmp-name Specifies the name of an ICMP message. The value is a string of case-insensitive characters, with spaces not supported. The string length ranges from 1 to 32. The value can be any of the following:
  • echo

  • echo-reply

  • fragmentneed-dfset

  • host-redirect

  • host-tos-redirect

  • host-unreachable

  • information-reply

  • information-request

  • net-redirect

  • net-tos-redirect

  • net-unreachable

  • parameter-problem

  • port-unreachable

  • protocol-unreachable

  • reassembly-timeout

  • source-quench

  • source-route-failed

  • timestamp-reply

  • timestamp-request

  • ttl-exceeded

all Specifies all ICMP packets. -

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The undo icmp receive command can be used to disable the device from receiving ICMP messages for the purpose of improving network performance or enhancing network security.
  • On secure networks, the device can normally receive ICMP messages. In the case of heavy traffic on the network, if hosts or ports are frequently unreachable, the device will receive a large number of ICMP packets, which causes heavier traffic burdens over the network and degrades the performance of the device.

  • On insecure networks, network attackers often make use of ICMP error messages to probe on the internal structure of the network.

Precautions

If the network status is normal and the device is required to receive ICMP messages, you can run the icmp receive command.

After the undo icmp receive command is run, the device no longer process ICMP messages of a certain type, causing the host to fail to ping the device.

Example

# Disable the device from receiving ICMP messages with the type number being 3 and the code number being 1.

<Huawei> system-view
[Huawei] undo icmp type 3 code 1 receive

icmp-reply fast

Function

The icmp-reply fast command enables the fast ICMP reply function on the device.

The undo icmp-reply fast command disables the fast ICMP reply function on the device.

By default, the fast ICMP reply function is enabled on the device.

Format

icmp-reply fast

undo icmp-reply fast

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

After the fast ICMP reply function is enabled on the device, the switches fast respond to the ICMP echo request packets whose destination addresses are the addresses of the switches. This improves the device forwarding performance.

NOTE:

After the fast ICMP reply function is enabled on the device, the local policy-based routing function does not take effect for ICMP packets. Therefore, if the local policy-based routing function is configured on the device, you are advised to disable the fast ICMP reply function.

Example

# Enable the fast ICMP reply function on the device.

<Huawei> system-view
[Huawei] icmp-reply fast

ip fast-forwarding enable

Function

Using the ip fast-forwarding enable command, you can enable fast forwarding on an interface.

Using the undo ip fast-forwarding enable command, you can disable fast forwarding on an interface.

By default, fast forwarding is enabled on an interface.

Format

ip fast-forwarding enable

undo ip fast-forwarding enable

Parameters

None

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

Fast forwarding allows devices to process packets using the high-speed cache. After the first packet of a data flow is forwarded according to the routing table, forwarding information is generated in the high-speed cache. Subsequent packets of the data flow can be forwarded according to the forwarding information stored in the high-speed cache. Fast forwarding shortens the packet queuing time, speeds up IP packet forwarding, and therefore improves IP packet forwarding throughput.

Example

# Enable fast forwarding on GE1/0/0.

<Huawei> system-view
[Huawei] interface gigabitethernet 1/0/0
[Huawei-GigabitEthernet1/0/0] ip fast-forwarding enable

ip forward-broadcast

Function

The ip forward-broadcast command enables an interface to forward directed broadcast packets.

The undo ip forward-broadcast command disables an interface from forwarding directed broadcast packets.

By default, an interface is disabled from forwarding directed broadcast packets.

Format

ip forward-broadcast [ acl acl-number ]

undo ip forward-broadcast

Parameters

Parameter

Description

Value

acl acl-number Specifies the number of an ACL.

The value is an integer that ranges from 2000 to 3999.

  • The number of a basic ACL ranges from 2000 to 2999.
  • The number of an advanced ACL ranges from 3000 to 3999.

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

Directed broadcast packets are sent to a specified network. In the destination IP address of a directed broadcast packet, the network number is that of the specified network and the host number is all 1s.

To enable an interface to receive and forward directed broadcast packets destined for its direct network segment, run the ip forward-broadcast command. Then the following situations occur:
  • The device is allowed to receive directed broadcast packets destined for the interface's direct network segment.
  • When the device receives directed broadcast packets destined for this interface's direct network segment through other interfaces, the device forwards these packets through this interface.

Directed broadcast packets can be used by hackers to attack the network system, bringing security risks. However, the device interfaces may need to receive or forward directed broadcast packets in some scenarios. For example, to enable the Wake on LAN function so that directed broadcast packets can be sent to wake up computers on a remote network, enable the interface to receive and forward directed broadcast packets destined for its direct network segment.

The device can also be enabled to receive and forward a certain type of directed broadcast packets based on ACLs. For example, if the basic ACL is used, run the acl (system view) and rule (basic ACL view) commands to define the directed broadcast packets to be received and forwarded as permit, and then run the ip forward-broadcast command to bind this ACL.

Precautions

By default, the device identifies directed broadcast packets as malformed packets, and intercepts and discards them because the attack defense function of malformed packets is enabled on the device. In this case, the interface on the device cannot forward the directed broadcast packets.

To solve this problem, use either of the following methods:

  • Run the anti-attack abnormal disable command to disable the attack defense function of malformed packets. However, after this command is configured, other malformed packets will not be intercepted and discarded, which brings certain security risks. Use this command with caution.

  • Run the anti-attack disable command to disable all attack defense functions. However, after this command is configured, not only malformed packets but also fragmented, tcp-syn, udp-flood, and icmp-flood attack packets will not be intercepted and discarded, which brings certain security risks. Use this command with caution.

Example

# Enable GE0/0/1 to forward broadcast packets.

<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/1
[Huawei-GigabitEthernet0/0/1] ip forward-broadcast
Related Topics

ip icmp source-address

Function

The ip icmp source-address command configures a source address for ICMP port unreachable packets or timeout packets.

The undo ip icmp source-address command deletes the source address configured for ICMP port unreachable packets or timeout packets.

By default, no source address is configured for ICMP port unreachable packets or timeout packets.

Format

ip icmp { ttl-exceeded | port-unreachable } source-address

undo ip icmp { ttl-exceeded | port-unreachable } source-address

Parameters

Parameter Description Value
ttl-exceeded Indicates ICMP timeout packets. -
port-unreachable Indicates ICMP port unreachable packets. -

Views

Loopback interface view

Default Level

2: Configuration level

Usage Guidelines

To enable that the ICMP port unreachable packets or timeout packets received by users in a VPN have the same source address, run the ipv6 icmp source-address command to configure the loopback interface address as the source address for ICMP port unreachable packets or timeout packets. After this command is executed, when users of the VPN in which the loopback interface resides tracert a remote address, the source address of the ICMP port unreachable packets or timeout packets is the loopback interface address.

Example

# Configure the loopback interface address as the source address of the ICMP timeout packets.

<Huawei> system-view
[Huawei] interface loopback 1
[Huawei-LoopBack1] ip icmp ttl-exceeded source-address

# Configure the loopback interface address as the source address of the ICMP port unreachable packets.

<Huawei> system-view
[Huawei] interface loopback 1
[Huawei-LoopBack1] ip icmp port-unreachable source-address

ip soft-forward enhance enable

Function

The ip soft-forward enhance enable command enables the enhanced forwarding function for control packets generated by the device.

The undo ip soft-forward enhance enable command disables the enhanced forwarding function for control packets generated by the device.

By default, the enhanced forwarding function is enabled for control packets generated by the device.

Format

ip soft-forward enhance enable

undo ip soft-forward enhance enable

Parameters

None.

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

You can configure forwarding policies (such as QoS policies) for data packets to implement differentiated services. In some scenarios, you may need to manage control packets generated by the device to process different control packets. For example, carriers have limited the bandwidth of data packets through QoS policies and also want to limit the bandwidth of control packets. In this situation, QoS policies take effect only for data packets. You can configure the enhanced forwarding function to make QoS policies take effect for control packets. Currently, the enhanced forwarding function is valid only for the control packets generated by the device but not for the control packets forwarded by other devices.

You can run the ip soft-forward enhance enable command to enable the enhanced forwarding function for control packets generated by the device.

Follow-up Procedures

After enabling the enhanced forwarding function on the device, you can perform some configurations on the control packets generated by the device. For example, you can configure different QoS policies for different types of packets generated by the device.

Example

# Disable the enhanced forwarding function for control packets generated by the device.
<Huawei> system-view
[Huawei] undo ip soft-forward enhance enable

ip verify source-address

Function

The ip verify source-address command enables an interface to check validity of source IP addresses of received packets.

The undo ip verify source-address command disables an interface from checking validity of source IP addresses of received packets.

By default, an interface does not check validity of source IP addresses of received packets.

Format

ip verify source-address

undo ip verify source-address

Parameters

None

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

The following IP addresses are illegal source addresses:
  • Addresses with all 0s or 1s
  • Multicast addresses (class D addresses)
  • Class E addresses
  • Loopback addresses that are not generated on local hosts (in 127.x.x.x format)
  • Broadcast addresses of classes A, B, and C
  • Subnet broadcast addresses that are on the same network segment as the address of the inbound interface

The interface only check validity of source IP addresses of the packets that are forwarded to the CPU and does not check validity of source IP addresses of the packets that will be directly forwarded according to the FIB table.

Example

# Enable GE0/0/1 to check validity of source addresses of received packets.

<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/1
[Huawei-GigabitEthernet0/0/1] ip verify source-address
Related Topics

ip virtual-reassembly

Function

The ip virtual-reassembly command enables virtual fragment reassembly of IP packets.

The undo ip virtual-reassembly command disables virtual fragment reassembly of IP packets.

By default, virtual fragment reassembly of IP packets is disabled.

Format

ip virtual-reassembly

undo ip virtual-reassembly

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

During network transmission, IP packets are fragmented if they have a long length. The forwarding device forwards the fragmented packets, and the destination device receives the fragmented packets and reassembles them. If some fragmented packets are discarded during transmission due to the bandwidth limitation, the packets cannot be reassembled on the destination device. To solve the problem, you can enable virtual fragment reassembly of IP packets on the device functioning as the intermediate of fragmented packets. After that, the device checks, sorts, and caches the fragmented packets received to ensure complete packet forwarding or scheduling.

Precautions

If the NAT, firewall, smart application control (SAC), or in-depth security defense functions is configured on the device, virtual fragment reassembly is enabled by default and cannot be disabled. That is, the undo ip virtual-reassembly command does not take effect.

Example

# Enable virtual fragment reassembly of IP packets.

<Huawei> system-view
[Huawei] ip virtual-reassembly

load-balance unequal-cost enable

Function

Using the load-balance unequal-cost enable command, you can enable the Unequal-Cost Multiple Path (UCMP) function on an interface.

Using the undo load-balance unequal-cost enable command, you can disable the UCMP function on an interface.

By default, UCMP is disabled on an interface.

Format

load-balance unequal-cost enable

undo load-balance unequal-cost enable

Parameters

None

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

On the device, there are multiple equal-cost routes over multiple equal-cost links to a destination. Among the equal-cost links, there are high-speed links and low-speed links. The device evenly load balances traffic over multiple equal-cost links to a single destination regardless of the bandwidth. Consequently, traffic congestion may occur on low-speed links and bandwidth of high-speed links cannot be used efficiently. To solve the preceding problems, configure UCMP so that the equal-cost links carry traffic by bandwidth.

Precautions

This command can only be used on Layer 3 interfaces.

Among all subinterfaces, only the Ethernet sub-interfaces (Dot1q and QinQ termination sub-interfaces) and Eth-trunk sub-interfaces (Dot1q termination sub-interfaces) support configuration of unequal cost multiple path.

After enabling or disabling UCMP on an outbound interface of an equal-cost link, run the shutdown and undo shutdown commands on the outbound interface, or run the restart command restarts the interface, to make the configuration take effect.

The equal-cost links carry traffic by bandwidth only when UCMP is enabled on outbound interfaces of all the equal-cost links and FIB entry updating is triggered. If any outbound interface is not enabled with UCMP, the equal-cost links evenly load balance traffic though FIB entry updating is triggered.

Among the equal-cost links, the bandwidth of any link must be equal to or greater than 1/4 of the total bandwidth; otherwise, the link cannot participate in load balancing traffic by bandwidth.

You are advised to configure the bandwidth of each link participating in UCMP to an integral multiple of the minimum bandwidth. If the bandwidth of each link is not configured to an integral multiple of the minimum bandwidth, the system still uses an integral multiple of the minimum bandwidth to process. For example, if the bandwidths of four links participating in UCMP are configured to 2 Kbps, 3 Kbps, 4 Kbps, and 5 Kbps, the final bandwidths of the links are 2 Kbps, 2 Kbps, 4 Kbps, and 4 Kbps.

Before enabling UCMP on a logical interface, run the load-balance bandwidth command to manually configure the bandwidth for the logical interface.

Example

# Enable UCMP on GE0/0/1.

<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/1
[Huawei-GigabitEthernet0/0/1] load-balance unequal-cost enable
Warning: The configuration succeeded. Please shutdown/undo shutdown the interfac
e to make changes take effect.    
[Huawei-GigabitEthernet0/0/1] shutdown
[Huawei-GigabitEthernet0/0/1] undo shutdown

# Enable UCMP on Eth-Trunk1.

<Huawei> system-view
[Huawei] interface eth-trunk 1
[Huawei-Eth-Trunk1] undo portswitch 
[Huawei-Eth-Trunk1] load-balance bandwidth 300000
 Warning: The configuration succeeded. Please shutdown/undo shutdown the interfa
ce to make changes take effect.
[Huawei-Eth-Trunk1] load-balance unequal-cost enable
Warning: The configuration succeeded. Please shutdown/undo shutdown the interfac
e to make changes take effect.    
[Huawei-Eth-Trunk1] shutdown
[Huawei-Eth-Trunk1] undo shutdown

load-balance bandwidth

Function

The load-balance bandwidth command sets the bandwidth of an interface manually.

The undo load-balance bandwidth command deletes the manually configured bandwidth of an interface.

For a logical interface, the interface bandwidth is not configured by default; for a physical interface, the actual interface bandwidth is used by default.

Format

load-balance bandwidth bandwidth

undo load-balance bandwidth

Parameters

Parameter

Description

Value

bandwidth

Specifies the manually configured bandwidth of an interface.

The value is an integer that ranges from 1 to 10000000, in Kbps.

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

When configuring the UCMP function, you need to manually set the bandwidth of an interface in the following scenarios:

  • Users need to adjust the bandwidth of equal-cost links so that the equal-cost links load balance traffic based on the configured bandwidth.

  • The outbound interface of the equal-cost route is a logical interface.

Precautions

This command can only be used on Layer 3 interfaces.

When the manually configured bandwidth of an interface changes or the physical bandwidth corresponding to a logical interface changes, run the shutdown and undo shutdown commands on the interface to make the new bandwidth take effect.

When you manually configure the bandwidth for an interface, the bandwidth ratio of each equal-cost link will change. In UCMP mode, traffic is load balanced by bandwidth. If the bandwidth ratio changes, packets on a link will be lost when the allocated traffic exceeds the physical bandwidth of the link.

You are advised to configure the bandwidth of each link participating in UCMP to an integral multiple of the minimum bandwidth. If the bandwidth of each link is not configured to an integral multiple of the minimum bandwidth, the system still uses an integral multiple of the minimum bandwidth to process. For example, if the bandwidths of four links participating in UCMP are configured to 2 Kbps, 3 Kbps, 4 Kbps, and 5 Kbps, the final bandwidths of the links are 2 Kbps, 2 Kbps, 4 Kbps, and 4 Kbps.

Example

# Set the bandwidth of GE0/0/1 to 500000 Kbps.

<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/1
[Huawei-GigabitEthernet0/0/1] load-balance bandwidth 500000
 Warning: The configuration succeeded. Please shutdown/undo shutdown the interfa
ce to make changes take effect.
[Huawei-GigabitEthernet0/0/1] shutdown
[Huawei-GigabitEthernet0/0/1] undo shutdown

reset ip socket monitor

Function

The reset ip socket monitor command clears information in a socket monitor.

Format

reset ip socket monitor [ task-id task-id socket-id socket-id ]

Parameters

Parameter Description Value
task-id task-id Clears information about the task with a specified ID in the socket monitor. The value must be an existing task ID.
socket-id socket-id Clears information about the socket with a specified ID in the socket monitor. The value must be an existing socket ID.

Views

User view

Default Level

3: Management level

Usage Guidelines

You can specify the task ID and socket ID for deleting information about the socket monitor that meets the filtering condition.

Example

# Clear information in a socket monitor.

<Huawei> reset ip socket monitor
Related Topics

reset ip socket pktsort

Function

The reset ip socket pktsort command resets statistics on the dual receive buffer of the socket.

Format

reset ip socket pktsort task-id task-id socket-id socket-id

Parameters

Parameter Description Value
task-id task-id Specifies the ID of a task. The value must be an existing task ID.
socket-id socket-id Specifies the ID of a socket. The value must be an existing socket ID.

Views

User view

Default Level

3: Management level

Usage Guidelines

This command clears statistics on the dual receive buffer of the socket and restarts the count. Therefore, confirm your action before running the command.

Example

# Reset statistics on the dual receive buffer of the socket with the task ID of 2 and the socket ID of 6.

<Huawei> reset ip socket pktsort task-id 2 socket-id 6

reset ip statistics

Function

The reset ip statistics command clears IP traffic statistics on an interface.

Format

reset ip statistics [ interface interface-type interface-number ]

Parameters

Parameter Description Value
interface interface-type interface-number Specifies the type and ID of an interface. If no optional parameter is specified, all the IP statistics will be deleted. -

Views

User view

Default Level

3: Management level

Usage Guidelines

To collect IP traffic statistics on an interface in a period of time, you must clear the existing traffic statistics and collect IP statistics after a period of time. Run the display ip statistics command to display information.

If no parameter is specified, the command clears IP traffic statistics on all boards.

Example

# Clear IP statistics on all interfaces.

<Huawei> reset ip statistics

reset rawip statistics

Function

The reset rawip statistics command clears RawIP packet statistics.

Format

reset rawip statistics

Parameters

None

Views

User view

Default Level

3: Management level

Usage Guidelines

The reset rawip statistics command clears RawIP packet statistics. Confirm your action before running this command.

Example

# Clear RawIP packet statistics.

<Huawei> reset rawip statistics

reset tcp statistics

Function

The reset tcp statistics command deletes TCP traffic statistics.

Format

reset tcp statistics

Parameters

None

Views

User view

Default Level

3: Management level

Usage Guidelines

The reset tcp statistics command deletes TCP traffic statistics. Confirm your action before running this command.

Example

# Delete TCP traffic statistics.

<Huawei> reset tcp statistics

reset udp statistics

Function

The reset udp statistics command deletes UDP traffic statistics.

Format

reset udp statistics

Parameters

None

Views

User view

Default Level

3: Management level

Usage Guidelines

The reset udp statistics command deletes UDP traffic statistics. Confirm your action before running this command.

Example

# Delete UDP traffic statistics.

<Huawei> reset udp statistics

set priority dscp

Function

The set priority dscp command sets the DSCP priority of control packets generated by the device.

The undo set priority dscp command restores the default DSCP priority of control packets generated by the device.

For the default DSCP priorities of control packets generated by the device, see Table 7-76.

Format

set priority protocol-type protocol-type dscp dscp-value

undo set priority protocol-type protocol-type dscp

set priority acl acl-number dscp dscp-value

undo set priority acl acl-number

Parameters

Parameter

Description

Value

protocol-type protocol-type

Sets the DSCP priority of control packets based on the protocol type.

The value can be bgp, ftp, icmp, snmp, ssh, or telnet.

acl acl-number

Sets the DSCP priority of control packets based on the ACL.

The value is an integer that ranges from 3000 to 3999.

dscp dscp-value

Specifies the DSCP priority of control packets.

The value is as follows:

  • The value is an integer that ranges from 0 to 63.

  • The value can be ef, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cs1, cs2, cs3, cs4, cs5, cs6, cs7, or default.

Table 7-76  Default DSCP priorities of control packets generated by the device

control Packet

Value

BGP

48

ICMP

0

SNMP

0

SSH

48

Telnet

48

FTP

48

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

After the ip soft-forward enhance enable command is executed to enable the enhanced forwarding function of control packets generated by the device, the same QoS policy will be applied to both the control packets and data packets. When the device maps packets based on DSCP priorities, it may send some control packets with low DSCP priorities generated on the device to low-priority queues, such as ICMP and Telnet packets. You can use the set priority command to set DSCP priorities of some control packets to prevent them from being sent to low-priority queues.

Precautions

If you run the set priority command with the same value of protocol-type multiple times, only the latest configuration takes effect.

If the device is configured to set the DSCP priority of control packets based on both the protocol type and ACL, the device sets the DSCP priority of control packets based on the protocol type.

If the device is configured to set the DSCP priority of protocol packets based on ACL rules, a maximum of 16 ACL rules can be configured.

To set DSCP priorities of multiple control packets, run the set priority command multiple times.

Example

# Set the DSCP priority of Telnet packets to 56.

<Huawei> system-view
[Huawei] set priority protocol-type telnet dscp 56

set priority dot1p

Function

The set priority dot1p command sets the 802.1p priority of control packets generated by the device.

The undo set priority dot1p command restores the default 802.1p priority of control packets generated by the device.

By default, the 802.1p priority of control packets generated by the device is 6.

Format

set priority dot1p priority-value

undo set priority dot1p

Parameters

Parameter

Description

Value

priority-value

Specifies the 802.1p priority of control packets generated by the device.

The value is an integer that ranges from 0 to 7.

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The 802.1p priority is determined by the 3-bit priority field contained in a VLAN tag and is used to guarantee QoS in the differentiated services (DiffServ) model.

You can run the set priority dot1p command to change the 802.1p priority of control packets generated by the device.

Precautions

If you run the set priority dot1p command multiple times, only the latest configuration takes effect.

The set priority dot1p command will not take effect on a Layer 2 interface.

Example

# Set the 802.1p priority of control packets generated by the device to 5.

<Huawei> system-view
[Huawei] set priority dot1p 5

tcp adjust-mss

Function

The tcp adjust-mss command sets the maximum segment size (MSS) of TCP packets on an interface.

The undo tcp adjust-mss command deletes the configured MSS of TCP packets.

By default, the MSS of TCP packets is not set on the interface.

Format

tcp adjust-mss value

undo tcp adjust-mss

Parameters

Parameter

Description

Value

value

Specifies the MSS of TCP packets on an interface.

The value is an integer that ranges from 128 to 2048, in bytes.

Views

Interface view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The MSS of TCP packets is an option defined in TCP. It refers to the maximum length of a TCP packet segment that can be received by the peer device. When establishing the TCP connection, the local and peer ends negotiate the MSS value to determine the maximum data length of TCP packets. If the length of a TCP packet sent by the peer device exceeds the negotiated MSS, the TCP packet is fragmented.

Precautions
  • To ensure that TCP packets are not fragmented, pay attention to the relationship between the MSS and MTU during configuration. MTU is an option used to identify whether IP packets need to be fragmented. If the size of an IP packet sent by the peer device exceeds the MTU, the IP packet is fragmented. To ensure that the packet transmission is not affected, the MSS value plus the header lengths (such as the TCP header and IP header) does not exceed the MTU value. For example, the default MTU value of an Ethernet interface is 1500 bytes. To ensure that packets are not fragmented, the MSS value can be set to 1460 bytes. The formula is as follows: Default MTU value (1500 bytes) – Minimum length of the TCP header (20 bytes) – Minimum length of the IP header (20 bytes). The recommended MSS value is 1200 bytes.

  • The tcp adjust-mss command does not only take effect for the industrial switch router functioning as the client or server used for TCP connections. When another device functions as the client to perform MSS negotiation through the industrial switch router, the negotiation result is modified based on the MSS configured on the industrial switch router. In addition, the MSS value is changed to the value configured using the tcp adjust-mss command only when the MSS value received by the industrial switch router is larger than the value configured using the tcp adjust-mss command executed on the industrial switch router.

  • If you run the tcp adjust-mss multiple times in the same interface view, only the latest configuration takes effect.

Example

# Set the MSS of TCP packets on GE0/0/1 to 1200 bytes.

<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/1
[Huawei-GigabitEthernet0/0/1] tcp adjust-mss 1200

tcp max-mss

Function

The tcp max-mss command configures the maximum Maximum Segment Size (MSS) value for a TCP connection.

The undo tcp max-mss command deletes the maximum MSS value of a TCP connection.

By default, the maximum MSS value is not configured for TCP connections.

Format

tcp max-mss mss-value

undo tcp max-mss

Parameters

Parameter Description Value
mss-value Specifies the maximum MSS value for a TCP connection. The value is an integer ranging from 32 to 9600, in bytes.

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

To establish a TCP connection, the MSS value is negotiated, which indicates the maximum length of packets that the local device can receive. This length is the TCP payload length, excluding that of the TCP header. If the path MTU is unavailable on one end of a TCP connection, this end cannot adjust the TCP packet size based on the MTU. As a result, this end may send TCP packets that are longer than the MTUs on intermediate devices, which will discard these packets. To prevent this problem, run the tcp max-mss command on either end of a TCP connection to set the maximum MSS value of TCP packets. Then the MSS value negotiated by both ends will not exceed this maximum MSS value, and accordingly TCP packets sent from both ends will not be longer than this maximum MSS value and can travel through the intermediate network.

Precautions

The maximum MSS value configured using the tcp max-mss command must be greater than the minimum MSS value configured using the tcp min-mss command.

Example

# Set the maximum MSS value for a TCP connection to 1024 bytes.

<Huawei> system-view
[Huawei] tcp max-mss 1024
Related Topics

tcp min-mss

Function

The tcp min-mss command sets the minimum value of maximum segment size (MSS) for a TCP connection.

The undo tcp min-mss command restores the default minimum value of the MSS for a TCP connection.

The default minimum MSS value for a TCP connection is 216 bytes.

Format

tcp min-mss mss-value

undo tcp min-mss

Parameters

Parameter Description Value
mss-value Specifies the minimum MSS value for a TCP connection. The value ranges from 32 byte to 1500 bytes. By default, the value is 216 bytes.

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

To establish a TCP connection, the MSS value is negotiated, which indicates the maximum length of packets that the local device can receive. The TCP client on a network may send a request packet for establishing a TCP connection carrying a small MSS value. For example, the MSS value is 1. After the TCP server receives the request packet carrying the MSS value, the TCP connection is established. The TCP client then may send large numbers of requests to the server by an application, causing the TCP server to generate large numbers of reply packets. This may burden the TCP server or network, causing denial of service (DoS) attacks. To resolve this problem, run the tcp min-mss command to set the minimum MSS value for a TCP connection. This configuration prevents a server from receiving packets carrying a small MSS value.

Precautions

If the tcp min-mss command is run more than once in the same view, the latest configuration overrides the previous one.

Configure the parameters under the guidance of the technical personnel.

Example

# Set the minimum MSS value for a TCP connection to 512 bytes.

<Huawei> system-view
[Huawei] tcp min-mss 512
Related Topics

tcp timer fin-timeout

Function

The tcp timer fin-timeout command configures the value of the TCP FIN-Wait timer.

The undo tcp timer fin-timeout command restores the default value of the TCP FIN-Wait timer.

By default, the value of the TCP FIN-Wait timer is 675s.

Format

tcp timer fin-timeout interval

undo tcp timer fin-timeout

Parameters

Parameter Description Value
interval Specifies the value of the TCP FIN-Wait timer. The value is an integer that ranges from 76 to 3600, in seconds.

Views

System view

Default Level

2: Configuration level

Usage Guidelines

When a TCP connection changes from FIN_WATI_1 to FIN_WAIT_2, the TCP FIN-Wait timer is started. If no response packet is received after the TCP FIN-Wait timer expires, the TCP connection is closed.

If you run this command in the same view for multiple times, only the last configuration takes effect.

You are advised to configure this parameter under the supervision of technical support personnel.

Example

# Set the value of the TCP FIN-Wait timer to 400s.

<Huawei> system-view
[Huawei] tcp timer fin-timeout 400

tcp timer pathmtu-age

Function

The tcp timer pathmtu-age command sets the aging time for a TCP PMTU.

The undo tcp timer pathmtu-age command restores the aging time for a TCP PMTU to the default value.

By default, the aging time of the PMTU is 0 minutes, that is, the PMTU never ages.

Format

tcp timer pathmtu-age age-time

undo tcp timer pathmtu-age

Parameters

Parameter Description Value
age-time Specifies the aging time for a TCP PMTU. The value is an integer that ranges from 10 to 100, in minutes. The default value is 0 minutes, which is recommended.

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

When hosts on the same network communicate with each other, the MTU of the network is important for the hosts. When hosts communicate with each other across multiple networks, it is important to determine the minimum MTU on the network path because the MTUs of the link layers on different networks are different. The minimum MTU on the network path is called the path MTU (PMTU).

When hosts on the network communicate with each other, the interface MTU on the communication path may change. This may cause the following problems:
  • If the interface MTU changes to a smaller value, the system refragments the data packets to be sent and learn a new PMTU. This affects data transmission efficiency and network performance.

  • If the interface MTU changes to a value greater than the PMTU, the interface MTU will be too big for transmitting the fragmented packets. This also affects data transmission efficiency and network performance.

To prevent the preceding problems, run the tcp timer pathmtu-age command to set the aging time for a PMTU. After the PMTU ages, the device sends data packets based on the MTU of the outbound interface to detect the PMTU change.

Configuration Impact

The tcp timer pathmtu-age command changes only the aging time of dynamic PMTUs. It is not applicable to static PMTUs because static PMTUs cannot age.

Precautions

You need to set a PMTU based on network stability. The default PMTU is recommended. That is, a PMTU does not age.
  • If the aging time of a PMTU is set too longer, the PMTU may not be updated in time. This will affect network performance.

  • If the aging time of a PMTU is set too short, data transmission efficiency on the network will be affected.

Example

# Set the aging time of a TCP PMTU to 50 minutes.

<Huawei> system view
[Huawei] tcp timer pathmtu-age 50

tcp timer syn-timeout

Function

The tcp timer syn-timeout command configures the value of the TCP SYN-Wait timer.

The undo tcp timer syn-timeout command restores the default value of the TCP SYN-Wait timer.

By default, the value of the TCP SYN-Wait timer is 75s.

Format

tcp timer syn-timeout interval

undo tcp timer syn-timeout

Parameters

Parameter Description Value
interval Specifies the value of the TCP SYN-Wait timer. The value is an integer ranging from 2 to 600, in seconds. The default value is 75s.

Views

System view

Default Level

2: Configuration level

Usage Guidelines

When an SYN packet is sent, the TCP SYN-Wait timer is started. If no response packet is received after the TCP SYN-Wait timer expires, the TCP connection is closed.

If you run this command in the same view for multiple times, only the last configuration takes effect.

You are advised to configure this parameter under the supervision of technical support personnel.

Example

# Set the value of the TCP SYN-Wait timer to 100s.

<Huawei> system-view
[Huawei] tcp timer syn-timeout 100

tcp window

Function

The tcp window command configures the size of the receive or send buffer of a connection-oriented socket.

The undo tcp window command restores the default size of the receive or send buffer of a connection-oriented socket.

By default, the size of the receive or send buffer of a connection-oriented socket is 8k bytes.

Format

tcp window window-size

undo tcp window

Parameters

Parameter Description Value
window-size Specifies the size of the receive or send buffer of a connection-oriented socket. The value is an integer that ranges from 1 to 32, in k bytes. The default value is 8k bytes.

Views

System view

Default Level

2: Configuration level

Usage Guidelines

If you run this command in the same view for multiple times, only the last configuration takes effect.

You are advised to configure this parameter under the supervision of technical support personnel.

Example

# Set the size of the receive or send buffer of a connection-oriented socket to 3K bytes.

<Huawei> system-view
[Huawei] tcp window 3
Translation
Download
Updated: 2019-05-29

Document ID: EDOC1000097293

Views: 90988

Downloads: 124

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next