No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Command Reference

S7700 and S9700 V200R011C10

This document describes all the configuration commands of the device, including the command function, syntax, parameters, views, default level, usage guidelines, examples, and related commands.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Network Management Compatible Commands

Network Management Compatible Commands

Ping and Tracert Compatible Commands

ping ipv6 (upgrade-compatible command)

Function

The ping ipv6 command checks whether a specified IPv6 IP address is reachable and exports corresponding statistics.

Format

ping ipv6 [ -a source-ipv6-address | -c count | -h ttl-value | -m time | -name | -s packetsize | -t timeout | -tc traffic-class-value | vpn6-instance vpn6-instance-name ] * { destination-ipv6-address | host } [ -i interface-type interface-number ]

Parameters

Parameter Description Value
-a source-ipv6-address

Specifies a source IPv6 address for sending ICMPv6 Echo Request messages.

If no source IPv6 address is specified, the IPv6 address of the outbound interface is used as the source address for sending ICMPv6 Echo Request messages.

The value is a 32-digit hexadecimal number, in the format of X:X:X:X:X:X:X:X.
-c count

Specifies the number of times for sending ICMPv6 Echo Request messages.

You can increase the number of outgoing packets to detect the network quality based on the packet loss rate.

The value is an integer that ranges from 1 to 4294967295. The default value is 5.
-h ttl-value Specifies the TTL value.

If the TTL field is reduced to 0 during message forwarding, the Layer 3 switch that the message reaches sends an ICMPv6 timeout message to the source host, indicating that the destination host is unreachable.

The value is an integer that ranges from 1 to 255. The default value is 255.
-m time Specifies the time to wait before sending the next ICMPv6 Echo Request message.

Each time the source sends an ICMPv6 Echo Request message using the ping ipv6 command, the source waits a period of time (2000 ms by default) before sending the next ICMPv6 Echo Request message. You can set the time to wait before sending the next ICMPv6 Echo Request message using the parameter time. In the case of poor network condition, the value should be equal to or larger than 2000, in milliseconds.

The value is an integer that ranges from 1 to 10000, in milliseconds. The default value is 2000.
-name Displays the name of the destination host. -
-s packetsize

Specifies the length of an ICMPv6 Echo Request message, excluding the IP header and ICMPv6 header.

The value is an integer that ranges from 20 to 9600, in bytes. The default value is 56.

-t timeout

Specifies the timeout period to wait for an ICMPv6 Echo Reply message after an ICMPv6 Echo Request message is sent.

After the ping ipv6 command is run, the source sends an ICMPv6 Echo Request message to a destination and waits for an ICMPv6 Echo Reply message. If the destination, after receiving the ICMPv6 Echo Request message, returns an ICMPv6 Echo Reply message to the source within the period specified by the parameter timeout, the destination is reachable. If the destination does not return an ICMPv6 Echo Reply message within the specified period, the source displays that the message times out. Normally, the source receives an ICMPv6 Echo Reply message within 1 to 10 seconds after sending an ICMPv6 Echo Request message. If the transmission speed is low, properly prolong the timeout period.

The value is an integer that ranges from 0 to 65535, in milliseconds. The default value is 2000.
-tc traffic-class-value

Specifies the traffic classification in the ICMPv6 Echo Request message.

To configure traffic control for ICMPv6 packets, set the parameter traffic-class-value.

The value is an integer that ranges from 0 to 255. The default value is 0.
vpn6-instance vpn6-instance-name

Specifies the name of a VPN instance for the IPv6 address family.

The value is a string of 1 to 31 characters without spaces.
destination-ipv6-address

Specifies the IPv6 address of the destination host.

The value is a 32-digit hexadecimal number, in the format of X:X:X:X:X:X:X:X.
host

Specifies the name of the destination host.

The value is a string of 1 to 46 characters.
-i interface-type interface-number

Specifies the outbound interface for sending ICMPv6 Echo Request messages.

-

Views

All views

Default Level

0: Visit level

Usage Guidelines

This command is available to aid upgrade compatibility. It can only be run during the configuration restoration phase of the upgrade.

tracert ipv6 (upgrade-compatible command)

Function

The tracert ipv6 command checks the path of packets from the source to the destination, checks IPv6 network connectivity, and locates a network fault.

Format

tracert ipv6 [ -a source-ip-address | -f first-hop-limit | -m max-hop-limit | -name | -p port-number | -q probes | -s packetsize | -w timeout | vpn6-instance vpn6-instance-name ] * { destination-ipv6-address | host-name }

Parameters

Parameter Description Value
-a source-ip-address

Specifies the source address of a tracert packet.

If this parameter is not specified, the IP address of the outbound interface is used as the source IP address for sending tracert packets.

The value is a 32-digit hexadecimal number, in the format of X:X:X:X:X:X:X:X.
-f first-hop-limit Specifies the initial hop-limit.

Carried in the IPv6 header, the hop-limit (time to live) indicates the lifetime of IPv6 packets and specifies the maximum number of hops that the IPv6 packets can pass through. The hop-limit field in IPv6 packets is similar to the TTL field in the IPv4 packets. The hop-limit value is set on the source and reduced by 1 each time the packet passes through a Layer 3 device. When the hop-limit value is reduced to 0 on a Layer 3 device, the Layer 3 device discards the packet and sends an ICMPv6 Timeout message to the source.

If first-hop-limit is specified and the number of hops is smaller than the specified value, the hop-limit value will be greater than 0 after the packet passes through all the nodes. Therefore, no ICMPv6 Timeout message is sent to the source.

If max-hop-limit is specified, the value of first-hop-limit must be smaller than the value of max-hop-limit.

The value is an integer that ranges from 1 to 255. The default value is 1.
-m max-hop-limit Specifies the maximum hop-limit.

Usually, the maximum hop-limit is set to the number of hops that a packet passes through. To change the hop-limit value, you need to use this parameter.

If first-hop-limit is specified, the value of max-hop-limit must be greater than the value of first-hop-limit.

The value is an integer that ranges from 1 to 255. The default value is 30.
-name Displays the name of the destination host. -
-p port-number Specifies the UDP port number of the destination.
  • If no UDP port number is specified for the destination, when you run the tracert ipv6 command, a port with the port number greater than 32768 is randomly chosen for the destination to receive tracert packets.
  • Before specifying the UDP port number for the destination, ensure that the port is not in use; otherwise, the tracert fails.
The value is an integer that ranges from 1 to 65535. The default value is 33434.
-q probes Specifies the number of tracert packets sent each time.

In the case of poor network quality, you can set probes to a comparatively large value to ensure that tracert packets can reach the destination.

The value is an integer that ranges from 1 to 65535. The default value is 3.
-s packetsize

Specifies the length of an ICMPv6 Echo Request message, excluding the IP header and ICMPv6 header.

The value is an integer that ranges from 20 to 9600, in bytes. The default value is 56.
-w timeout Sets the timeout period to wait for a reply.

If a tracert packet times out when reaching a gateway, an asterisk (*) is displayed.

In the case of poor network quality and a low network transmission rate, you are advised to prolong the timeout period.

The value is an integer that ranges from 1 to 65535, in milliseconds. The default value is 5000.
vpn6-instance vpn6-instance-name

Specifies the name of a VPN instance for the IPv6 address family.

The value is a string of 1 to 31 case-sensitive characters.
destination-ipv6-address

Specifies the IPv6 address of the destination host.

The value is a 32-digit hexadecimal number, in the format of X:X:X:X:X:X:X:X.
host-name

Specifies the name of the destination host.

The value is a string of 1 to 46 characters.

Views

All views

Default Level

0: Visit level

Usage Guidelines

This command is available to aid upgrade compatibility. It can only be run during the configuration restoration phase of the upgrade.

SNMP Compatible Commands

snmp-agent group (upgrade-compatible command)

Function

The snmp-agent group command creates an SNMP group by mapping SNMP users to SNMP views.

The undo snmp-agent group command deletes a specified SNMP user group.

By default, no SNMP group is configured.

Format

snmp-agent group v3 group-name [ authentication | privacy ] [ read-view read-view | write-view write-view | notify-view notify-view ] * [ acl acl-number ]

undo snmp-agent group v3 group-name [ authentication | privacy ]

Parameters

Parameter Description Value
v3 Indicates that the SNMP group uses the security mode in SNMPv3. -
group-name Specifies the name of an SNMP group. It is a string of 1 to 32 case-sensitive characters without spaces.
authentication | privacy
Indicates the security level of the SNMP group.
  • authentication: authenticates SNMP messages without encryption.
  • privacy: authenticates and encrypts SNMP messages.

To ensure security, it is recommended that you set the security level of the SNMP group to privacy.

read-view read-view Specifies a read-only view. It is a string of 1 to 32 case-sensitive characters without spaces. read-view specified by the snmp-agent mib-view command.
write-view write-view Specifies a read-write view. It is a string of 1 to 32 case-sensitive characters without spaces. write-view is specified by the snmp-agent mib-view command.
notify-view notify-view Specifies a notify view. It is a string of 1 to 32 case-sensitive characters without spaces. notify-view is specified by the snmp-agent mib-view command.
acl acl-number Specifies a basic ACL.
NOTE:

The ACL configured by the acl acl-number parameter takes effect on both IPv4 and IPv6 networks.

The value is an integer that ranges from 2000 to 2999.

Views

System view

Default Level

3: Management level

Usage Guidelines

This command is available to aid upgrade compatibility. It can only be run during the configuration restoration phase of the upgrade.

snmp-agent trap enable (upgrade-compatible command)

Function

The snmp-agent trap enable command enables a specified trap for a specified feature.

The undo snmp-agent trap enable command disables a specified trap for a specified feature.

The default configuration of the snmp-agent trap enable command can be checked using the display snmp-agent trap all command.

Format

snmp-agent trap enable feature-name

undo snmp-agent trap enable feature-name

Parameters

Parameter Description Value
feature-name Specifies the name of the feature that generates traps. -

Views

System view

Default Level

3: Management level

Usage Guidelines

This command is available to aid upgrade compatibility. It can only be run during the configuration restoration phase of the upgrade.

snmp-agent trap enable standard (upgrade-compatible command)

Function

Using the snmp-agent trap enable standard command, you can enable the trap function of standard SNMP.

Using the undo snmp-agent trap enable standard command, you can disable the trap function of standard SNMP.

By default, no trap messages are sent to a device.

Format

snmp-agent trap enable standard [ authentication | coldstart | warmstart | linkup | linkdown ] *

undo snmp-agent trap enable standard [ authentication | coldstart | warmstart | linkup | linkdown ] *

Parameters

Parameter Description Value
Authentication Indicates that a trap message is sent when packets failed to be authenticated through SNMP. -
Coldstart Indicates that a trap message is sent when the system is cold started. -
Warmstart Indicates that a trap message is sent when the system is hot started. -
Linkup Indicates that a trap message is sent when the interface goes Up. -
Linkdown Indicates that a trap message is sent when the interface goes Down. -

Views

System view

Default Level

2: Configuration level

Usage Guidelines

This command is available to aid upgrade compatibility. It can only be run during the configuration restoration phase of the upgrade.

snmp-agent usm-user (upgrade-compatible command)

Function

The snmp-agent usm-user command adds a user to an SNMP user group.

The undo snmp-agent usm-user command deletes a user from an SNMP user group.

By default, the SNMP user group has no users added.

NOTE:

It is recommended that you deliver the snmp-agent usm-user v3 user-name group-name authentication-mode { md5 | sha } password [ privacy-mode { des56 | aes128 | aes192 | aes256 | 3des } encrypt-password ] [ acl acl-number ] to the switch from the NMS. Do not directly configure the command on the switch.

Format

snmp-agent usm-user v3 user-name group-name simple [ authentication-mode { md5 | sha } password [ privacy-mode { des56 | aes128 | aes192 | aes256 | 3des } encrypt-password ] ] [ acl acl-number ]

snmp-agent usm-user v3 user-name group-name [ cipher ] [ authentication-mode { md5 | sha } password [ privacy-mode { des56 | aes128 | aes192 | aes256 | 3des } encrypt-password ] ] [ acl acl-number ]

undo snmp-agent usm-user v3 user-name group-name [ engineid engineid | local ]

Parameters

Parameter Description Value
v3 Indicates that the security mode in SNMPv3 is adopted. -
user-name Specifies the name of a user. It is a string of 1 to 32 case-sensitive characters without spaces.
group-name Specifies the name of the group to which a user belongs. It is a string of 1 to 32 case-sensitive characters without spaces.
simple Indicates the simple authentication. -
cipher Specifies that the password is in ciphertext, which is the default password type. If this parameter is specified, you can enter only a password in ciphertext. This type of password can be viewed using the configuration file. -
authentication-mode Sets the authentication mode.
NOTE:
Authentication is a process in which the SNMP agent (or the NMS) confirms that the message is received from an authorized NMS (or SNMP agent) and the message is not changed during transmission. RFC 2104 defines Keyed-Hashing for Message Authentication Code (HMAC), an effective tool that uses the security hash function and key to generate the message authentication code. This tool is widely used in the Internet. HMAC used in SNMP includes HWAC-MD5-96 and HWAC-SHA-96. The hash function of HWAC-MD5-96 is MD5 that uses 128-bit authKey to generate the key. The hash function of HWAC-SHA-96 is SHA-1 that uses 160-bit authKey to generate the key.
-
md5 | sha
Indicates the authentication protocol.
  • md5: Specifies HMAC-MD5-96 as the authentication protocol.
  • sha: Specifies HMAC-SHA-96 as the authentication protocol.
-
password Specifies the password for user authentication.

For plain-text password, the value is a string of 6 to 64 characters by default, and the minimum length is 6 characters. If the set password min-length command is run to set the minimum length of passwords to a value greater than 6, the minimum length is the value configured using the set password min-length command. For cipher-text password, the value is a string of 32 to 104 characters.

NOTE:
The password cannot be the same as the user name or reverse of the user name. The password must contain at least two types of characters, including letters, digits, and special characters. The special characters cannot be question mark (?) or space.
privacy-mode Specifies the authentication with encryption.

The system adopts the cipher block chaining (CBC) code of the data encryption standard (DES) and uses 128-bit privKey to generate the key. The NMS uses the key to calculate the CBC code and then adds the CBC code to the message while the SNMP agent fetches the authentication code through the same key and then obtains the actual information. Like the identification authentication, the encryption requires the NMS and the SNMP agent to share the same key to encrypt and decrypt the message.

-
des56 | aes128 | aes192 | aes256 | 3des Indicates the encryption protocol. -
encrypt-password Indicates the encryption password.

For plain-text password, the value is a string of 6 to 64 characters by default, and the minimum length is 6 characters. If the set password min-length command is run to set the minimum length of passwords to a value greater than 6, the minimum length is the value configured using the set password min-length command. For cipher-text password, the value is a string of 32 to 104 characters.

NOTE:
The password cannot be the same as the user name or reverse of the user name. The password must contain at least two types of characters, including letters, digits, and special characters. The special characters cannot be question mark (?) or space.
acl acl-number Specifies the ACL number of the access view. The value is an integer that ranges from 2000 to 2999.
engineid engineid Specifies the ID of the engine associated with a user. The value is a string of 10 to 64 case-insensitive characters without spaces.
local Indicates the local entity user. -

Views

System view

Default Level

3: Management level

Usage Guidelines

This command is available to aid upgrade compatibility. It can only be run during the configuration restoration phase of the upgrade.

transfer url (upgrade-compatible command)

Function

The transfer url command configures the mode of transferring bulk statistics files.

By default, bulk statistics files are not transferred.

Format

transfer { primary | secondary } url url

Parameters

Parameter Description Value
primary Specifies the primary file-based transfer mode. -
secondary Specifies the secondary file-based transfer mode. -
url url

Specifies the transfer mode, which is expressed using a URL character string.

Available formats are as follows:

  • FTP format

    • Format: ftp://user:password@host name or IP address/relative path

    • Example: ftp://user:password@host/folder/bulkstat1

    • The user name, password, and host name/IP address must be entered.

  • TFTP format

    • Format: tftp://host name or IP address/relative path

    • Example: tftp://10.1.0.1/tftpboot/user/bulkstat1

    • The user name and host name/IP address must be entered.

  • In the preceding formats, the user name contains a maximum of 64 characters, and the password contains a maximum of 16 characters.
  • The relative path is not mandatory. If no relative path is specified, the transferred file is stored in the default directory on the server. Ensure that the user name, password, and relative path are correct because the VRP does not check the correctness.
The value is a string of 1 to 127 case-sensitive characters, with spaces not supported.

Views

Bulk-file view

Default Level

2: Configuration level

Usage Guidelines

This command is available to aid upgrade compatibility. It can only be run during the configuration restoration phase of the upgrade.

NQA Compatible Commands

send-trap overthreshold (upgrade-compatible command)

Function

Using the send-trap overthreshold command, you can configure conditions for sending trap messages.

Using the undo send-trap overthreshold command, you can delete the previous configuration.

By default, the device is disabled from sending traps.

Format

send-trap overthreshold

undo send-trap overthreshold

Parameters

None

Views

NQA view

Default Level

2: Configuration level

Usage Guidelines

This command is available to aid upgrade compatibility. It can only be run during the configuration restoration phase of the upgrade.

After the upgrade, this command is no longer supported, and it is replaced by the send-trap rtd command.

Mirror Compatible Commands

mirroring { observe-port | observing-port } (upgrade-compatible command)

Function

The mirroring { observe-port | observing-port } command mirrors all the flows matching the specified rule to an observing interface.

By default, traffic mirroring is not configured.

Format

mirroring { observe-port | observing-port } observe-port-index

Parameters

Parameter

Description

Value

observe-port-index

Specifies the index of an observing interface.

The value is an integer that ranges from 1 to 8.

Views

Traffic behavior view

Default Level

3: Management level

Usage Guidelines

This command is available to aid upgrade compatibility. It can be run when it is entered in full.

Example

# Mirror the packets matching certain rules to observing interface 1.

<HUAWEI> system-view
[HUAWEI] traffic behavior tb1
[HUAWEI-behavior-tb1] mirroring observing-port 1

mirror observe-port (upgrade-compatible command)

Function

The mirror observe-port command mirrors all the flows matching the specified rule to an observing interface.

By default, traffic mirroring is not configured.

Format

mirror observe-port observe-port-index

Parameters

Parameter

Description

Value

observe-port-index

Specifies the index of an observing interface.

The value is an integer that ranges from 1 to 8.

Views

Traffic behavior view

Default Level

3: Management level

Usage Guidelines

This command is available to aid upgrade compatibility. It can be run when it is entered in full.

Example

# Mirror the packets matching certain rules to observing interface 1.

<HUAWEI> system-view
[HUAWEI] traffic behavior tb1
[HUAWEI-behavior-tb1] mirror observe-port 1

mirror to observing-port (upgrade-compatible command)

Function

The mirror to observing-port command mirrors all the flows matching the specified rule to an observing interface.

By default, traffic mirroring is not configured.

Format

mirror to observing-port observe-port-index

Parameters

Parameter

Description

Value

observe-port-index

Specifies the index of an observing interface.

The value is an integer that ranges from 1 to 8.

Views

Traffic behavior view

Default Level

3: Management level

Usage Guidelines

This command is available to aid upgrade compatibility. It can be run when it is entered in full.

Example

# Mirror the packets matching certain rules to observing interface 1.

<HUAWEI> system-view
[HUAWEI] traffic behavior tb1
[HUAWEI-behavior-tb1] mirror to observing-port 1

mirroring cpu (upgrade-compatible command)

Function

Using the mirroring cpu command, you can mirror all the traffic that matches rules to the CPU.

By default, traffic is not mirrored to the CPU.

Format

mirroring cpu

Parameters

None

Views

Traffic behavior view

Default Level

3: Management level

Usage Guidelines

This command is available to aid upgrade compatibility. It can be run when it is entered in full.

Example

# Mirror the traffic that matches rules to the CPU.

<HUAWEI> system-view
[HUAWEI] traffic behavior tb1
[HUAWEI-behavior-tb1] mirroring cpu

mirroring to observing-port (upgrade-compatible command)

Function

The mirroring to observing-port command mirrors all the flows matching the specified rule to an observing interface.

By default, traffic mirroring is not configured.

Format

mirroring to observing-port observe-port-index

Parameters

Parameter

Description

Value

observe-port-index

Specifies the index of an observing interface.

The value is an integer that ranges from 1 to 8.

Views

Traffic behavior view

Default Level

3: Management level

Usage Guidelines

This command is available to aid upgrade compatibility. It can be run when it is entered in full.

Example

# Mirror the packets matching certain rules to observing interface 1.

<HUAWEI> system-view
[HUAWEI] traffic behavior tb1
[HUAWEI-behavior-tb1] mirroring to observing-port 1
Translation
Download
Updated: 2019-10-18

Document ID: EDOC1000178288

Views: 25550

Downloads: 109

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next