HP MSR1003-8S, MSR1002-4, MSR3012, MSR3024, MSR3044 Command Reference (V7)

...
HP MSR Router Series Network Management and Monitoring
Command Reference(V7)
Part number: 5998-7743b Software version: Document version: 6PW10
4-20150914
i
Legal and notice information
© Copyright 2015 Hewlett-Packard Development Company, L.P.
No part of this documentation may be reproduced or transmitted in any form or by any means without prior written consent of Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
ii

Contents

Ping, tracert, and system debugging commands ······································································································· 1
debugging ································································································································································· 1 display debugging ··················································································································································· 2 ping ············································································································································································ 2 ping ipv6 ··································································································································································· 5 tracert ········································································································································································· 8 tracert ipv6 ································································································································································ 9
NQA commands ························································································································································ 12
NQA client commands ·················································································································································· 12
advantage-factor ··················································································································································· 12 codec-type ······························································································································································ 12 community read ····················································································································································· 13 data-fill ···································································································································································· 14 data-size ································································································································································· 15 description (any NQA operation type view) ······································································································ 16 destination ip ························································································································································· 17 destination ipv6 ····················································································································································· 17 destination port ······················································································································································ 18 display nqa history ················································································································································ 18 display nqa reaction counters ······························································································································ 20 display nqa result ·················································································································································· 22 display nqa statistics ············································································································································· 28 filename ·································································································································································· 36 frequency ································································································································································ 36 history-record enable ············································································································································ 37 history-record keep-time ········································································································································ 38 history-record number ··········································································································································· 39 init-ttl ········································································································································································ 39 lsr-path ···································································································································································· 40 max-failure ······························································································································································ 41 mode ······································································································································································· 41 next-hop ·································································································································································· 42 next-hop ipv6 ························································································································································· 42 no-fragment enable ··············································································································································· 43 nqa ·········································································································································································· 44 nqa agent enable ·················································································································································· 44 nqa schedule ·························································································································································· 45 operation (FTP operation view) ···························································································································· 46 operation (HTTP operation view) ························································································································· 47 out interface ··························································································································································· 47 password ································································································································································ 48 probe count ···························································································································································· 49 probe packet-interval ············································································································································ 50 probe packet-number ············································································································································ 51 probe packet-timeout ············································································································································· 52 probe timeout ························································································································································· 52 raw-request ····························································································································································· 53 reaction checked-element { jitter-ds | jitter-sd } ·································································································· 54
i
reaction checked-element { owd-ds | owd-sd } ·································································································· 55 reaction checked-element icpif ····························································································································· 56 reaction checked-element mos ····························································································································· 57 reaction checked-element packet-loss ·················································································································· 58 reaction checked-element probe-duration ··········································································································· 59 reaction checked-element probe-fail (for trap) ···································································································· 61 reaction checked-element probe-fail (for trigger) ······························································································· 62 reaction checked-element rtt ································································································································· 63 reaction trap ·························································································································································· 64 resolve-target ·························································································································································· 65 route-option bypass-route ······································································································································ 66 source interface ····················································································································································· 67 source ip ································································································································································· 67 source ipv6····························································································································································· 68 source port ····························································································································································· 69 statistics hold-time ·················································································································································· 70 statistics interval ····················································································································································· 70 statistics max-group ··············································································································································· 71 target-only ······························································································································································· 72 tos ············································································································································································ 72 ttl ·············································································································································································· 73 type ········································································································································································· 74 url ············································································································································································ 75 username ································································································································································ 75 version ···································································································································································· 76 vpn-instance ··························································································································································· 77
NQA server commands ················································································································································· 77
display nqa server ················································································································································· 77 nqa server enable ················································································································································· 78 nqa server tcp-connect ·········································································································································· 79 nqa server udp-echo ············································································································································· 80
NTP commands ·························································································································································· 82
display ntp-service ipv6 sessions ························································································································· 82 display ntp-service sessions ·································································································································· 87 display ntp-service status ······································································································································ 91 display ntp-service trace ······································································································································· 93 ntp-service acl ························································································································································ 94 ntp-service authentication enable ························································································································ 96 ntp-service authentication-keyid ··························································································································· 96 ntp-service broadcast-client ·································································································································· 97 ntp-service broadcast-server ································································································································· 98 ntp-service dscp ····················································································································································· 99 ntp-service enable ·················································································································································· 99 ntp-service inbound enable ································································································································ 100 ntp-service ipv6 acl ············································································································································· 101 ntp-service ipv6 dscp ·········································································································································· 102 ntp-service ipv6 inbound enable························································································································ 102 ntp-service ipv6 multicast-client ·························································································································· 103 ntp-service ipv6 multicast-server ························································································································· 104 ntp-service ipv6 source ······································································································································· 105 ntp-service ipv6 unicast-peer ······························································································································ 106 ntp-service ipv6 unicast-server ···························································································································· 107 ntp-service max-dynamic-sessions ······················································································································ 108 ntp-service multicast-client ··································································································································· 109
ii
ntp-service multicast-server ·································································································································· 110 ntp-service refclock-master ·································································································································· 111 ntp-service reliable authentication-keyid ··········································································································· 112 ntp-service source ················································································································································ 112 ntp-service unicast-peer ······································································································································· 113 ntp-service unicast-server ···································································································································· 115
SNTP commands ····················································································································································· 117
display sntp ipv6 sessions ·································································································································· 117 display sntp sessions ··········································································································································· 118 sntp authentication enable ································································································································· 118 sntp authentication-keyid ···································································································································· 119 sntp enable ··························································································································································· 120 sntp ipv6 unicast-server ······································································································································· 120 sntp reliable authentication-keyid ······················································································································ 122 sntp unicast-server ··············································································································································· 122
PoE commands ························································································································································ 125
apply poe-profile ················································································································································· 125 apply poe-profile interface ································································································································· 126 display poe device ·············································································································································· 127 display poe interface ·········································································································································· 128 display poe interface power ······························································································································ 131 display poe power-usage ··································································································································· 132 display poe pse ··················································································································································· 135 display poe pse interface ··································································································································· 137 display poe pse interface power ······················································································································· 139 display poe-power ··············································································································································· 140 display poe-profile ··············································································································································· 144 display poe-profile interface ······························································································································· 145 poe disconnect ····················································································································································· 145 poe enable ··························································································································································· 146 poe enable pse ···················································································································································· 147 poe legacy enable ·············································································································································· 147 poe max-power ···················································································································································· 148 poe max-power (system view) ···························································································································· 149 poe pd-description ·············································································································································· 149 poe pd-policy priority ·········································································································································· 150 poe priority ·························································································································································· 151 poe priority (system view) ··································································································································· 152 poe pse-policy priority ········································································································································ 152 poe update ··························································································································································· 153 poe-profile ···························································································································································· 154 poe utilization-threshold ······································································································································ 155
SNMP commands ··················································································································································· 156
display snmp-agent community ·························································································································· 156 display snmp-agent context ································································································································ 158 display snmp-agent group ·································································································································· 158 display snmp-agent local-engineid ···················································································································· 159 display snmp-agent mib-node ···························································································································· 160 display snmp-agent mib-view ····························································································································· 166 display snmp-agent remote ································································································································ 168 display snmp-agent statistics ······························································································································ 169 display snmp-agent sys-info ································································································································ 171 display snmp-agent trap queue ·························································································································· 171
iii
display snmp-agent trap-list ································································································································ 172 display snmp-agent usm-user ······························································································································ 172 enable snmp trap updown ································································································································· 174 snmp-agent ··························································································································································· 175 snmp-agent calculate-password ························································································································· 176 snmp-agent community ······································································································································· 177 snmp-agent community-map ······························································································································· 180 snmp-agent context ·············································································································································· 181 snmp-agent group ················································································································································ 181 snmp-agent local-engineid ·································································································································· 184 snmp-agent log ···················································································································································· 185 snmp-agent mib-view ··········································································································································· 185 snmp-agent packet max-size ······························································································································ 187 snmp-agent port ··················································································································································· 187 snmp-agent remote ·············································································································································· 188 snmp-agent { inform | trap } source ·················································································································· 189 snmp-agent sys-info contact ································································································································ 190 snmp-agent sys-info location······························································································································· 190 snmp-agent sys-info version ································································································································ 191 snmp-agent target-host ········································································································································ 192 snmp-agent trap enable ······································································································································ 194 snmp-agent trap if-mib link extended ················································································································ 195 snmp-agent trap life ············································································································································· 196 snmp-agent trap log ············································································································································ 196 snmp-agent trap queue-size ································································································································ 197 snmp-agent usm-user { v1 | v2c } ······················································································································ 198 snmp-agent usm-user v3 ······································································································································ 200 snmp-agent usm-user v3 user-role ······················································································································ 204
RMON commands ·················································································································································· 206
display rmon alarm ············································································································································· 206 display rmon event ·············································································································································· 208 display rmon eventlog ········································································································································· 209 display rmon history ············································································································································ 211 display rmon prialarm ········································································································································ 213 display rmon statistics ········································································································································· 216 rmon alarm ··························································································································································· 218 rmon event ···························································································································································· 220 rmon history ························································································································································· 221 rmon prialarm ······················································································································································ 222 rmon statistics ······················································································································································· 224
Event MIB commands ·············································································································································· 226
action ···································································································································································· 226 comparison ·························································································································································· 227 context (action-set view) ······································································································································ 228 context (trigger view) ·········································································································································· 228 delta falling ·························································································································································· 229 delta rising ··························································································································································· 230 description (event view) ······································································································································ 231 description (trigger view) ···································································································································· 231 display snmp mib event ······································································································································ 232 display snmp mib event event ···························································································································· 233 display snmp mib event object list ····················································································································· 235 display snmp mib event summary ······················································································································ 236
iv
display snmp mib event trigger ·························································································································· 237 event enable ························································································································································· 240 event owner (trigger-Boolean view) ··················································································································· 241 event owner (trigger-existence view) ················································································································· 241 falling ···································································································································································· 242 frequency ······························································································································································ 243 object list owner (action-notification view) ········································································································ 244 object list owner (trigger-Boolean view) ············································································································ 244 object list owner (trigger-existence view) ·········································································································· 245 object list owner (trigger-threshold view) ·········································································································· 246 object list owner (trigger view) ·························································································································· 247 oid (action-notification view) ······························································································································ 248 oid (action-set view) ············································································································································ 248 oid (trigger view) ················································································································································· 249 rising ····································································································································································· 250 sample ·································································································································································· 251 snmp mib event owner ········································································································································ 251 snmp mib event object list ·································································································································· 252 snmp mib event sample instance maximum ····································································································· 253 snmp mib event sample minimum ······················································································································ 254 snmp mib event trigger ······································································································································· 255 snmp-agent trap enable event-mib ····················································································································· 255 startup (trigger-existence view) ··························································································································· 256 startup (trigger-threshold view) ··························································································································· 257 startup enable ······················································································································································ 258 test ········································································································································································· 258 trigger enable ······················································································································································ 259 type ······································································································································································· 260 value (action-set view) ········································································································································· 261 value (trigger-Boolean view) ······························································································································· 261 wildcard context (action-set view) ······················································································································ 262 wildcard context (trigger view) ·························································································································· 263 wildcard oid (action-set view) ···························································································································· 263 wildcard oid (trigger view) ································································································································· 264
NETCONF commands ············································································································································ 266
netconf soap http enable ···································································································································· 266 netconf soap https enable ·································································································································· 266 netconf ssh server enable ··································································································································· 267 netconf ssh server port ········································································································································ 268 xml········································································································································································· 268
CWMP commands ·················································································································································· 270
cwmp ···································································································································································· 270 cwmp acs default password ······························································································································· 270 cwmp acs default url ··········································································································································· 271 cwmp acs default username ······························································································································· 272 cwmp acs password ··········································································································································· 272 cwmp acs url ························································································································································ 273 cwmp acs username ············································································································································ 274 cwmp cpe connect interface ······························································································································ 275 cwmp cpe connect retry······································································································································ 276 cwmp cpe inform interval ··································································································································· 276 cwmp cpe inform interval enable ······················································································································ 277 cwmp cpe inform time ········································································································································ 278
v
cwmp cpe password ··········································································································································· 278 cwmp cpe provision-code ··································································································································· 279 cwmp cpe stun enable ········································································································································ 280 cwmp cpe username ··········································································································································· 281 cwmp cpe wait timeout ······································································································································· 281 cwmp enable ······················································································································································· 282 display cwmp configuration ······························································································································· 283 display cwmp status ············································································································································ 284 ssl client-policy ····················································································································································· 285
EAA commands ······················································································································································· 287
action cli ······························································································································································· 287 action reboot ························································································································································ 288 action switchover ················································································································································· 290 action syslog ························································································································································ 290 commit ·································································································································································· 291 display rtm environment······································································································································ 292 display rtm policy ················································································································································ 292 event cli ································································································································································ 294 event hotplug ······················································································································································· 295 event interface ····················································································································································· 296 event process ······················································································································································· 298 event snmp oid ···················································································································································· 300 event snmp-notification········································································································································ 301 event syslog ·························································································································································· 302 rtm cli-policy ························································································································································· 303 rtm environment ··················································································································································· 304 rtm scheduler suspend ········································································································································· 305 rtm tcl-policy ························································································································································· 306 running-time ·························································································································································· 307 user-role ································································································································································ 307
Process monitoring and maintenance commands ································································································ 309
display exception context ··································································································································· 309 display exception filepath ·································································································································· 314 display kernel deadloop ····································································································································· 315 display kernel deadloop configuration ············································································································· 319 display kernel exception ····································································································································· 320 display process ···················································································································································· 323 display process cpu ············································································································································ 326 display process log ············································································································································· 328 display process memory ····································································································································· 329 display process memory heap ··························································································································· 331 display process memory heap address ············································································································ 332 display process memory heap size ··················································································································· 334 exception filepath ················································································································································ 335 monitor kernel deadloop enable ······················································································································· 336 monitor kernel deadloop exclude-thread ·········································································································· 337 monitor kernel deadloop time ···························································································································· 338 monitor process ··················································································································································· 339 monitor thread ····················································································································································· 345 process core ························································································································································· 348 reset exception context ······································································································································· 349 reset kernel deadloop ········································································································································· 350 reset kernel exception ········································································································································· 351
vi
Sampler configuration commands ························································································································· 353
display sampler ··················································································································································· 353 sampler ································································································································································· 354
Port mirroring commands ······································································································································· 356
display mirroring-group ······································································································································ 356 mirroring-group ···················································································································································· 357 mirroring-group mirroring-port (interface view) ································································································ 357 mirroring-group mirroring-port (system view) ··································································································· 358 mirroring-group monitor-port (interface view) ··································································································· 359 mirroring-group monitor-port (system view) ······································································································ 360
Flow mirroring commands ······································································································································ 361
mirror-to ································································································································································ 361
NetStream configuration commands ····················································································································· 362
display ip netstream cache ································································································································· 362 display ip netstream export ································································································································ 368 display ip netstream template ···························································································································· 369 enable ··································································································································································· 372 ip netstream ·························································································································································· 373 ip netstream { inbound | outbound } filter ········································································································ 373 ip netstream { inbound | outbound } sampler ·································································································· 374 ip netstream aggregation ··································································································································· 375 ip netstream export host ····································································································································· 376 ip netstream export rate ······································································································································ 378 ip netstream export source ································································································································· 378 ip netstream export v9-template refresh-rate packet ························································································ 379 ip netstream export v9-template refresh-rate time ···························································································· 380 ip netstream export version ································································································································ 381 ip netstream max-entry ········································································································································ 382 ip netstream mpls ················································································································································· 382 ip netstream timeout active ································································································································· 383 ip netstream timeout inactive ······························································································································ 384 reset ip netstream statistics ································································································································· 384
IPv6 NetStream commands ···································································································································· 386
display ipv6 netstream cache ···························································································································· 386 display ipv6 netstream export ···························································································································· 391 display ipv6 netstream template ························································································································ 392 enable ··································································································································································· 396 ipv6 netstream ····················································································································································· 397 ipv6 netstream { inbound | outbound } filter ···································································································· 397 ipv6 netstream { inbound | outbound } sampler ····························································································· 398 ipv6 netstream aggregation ······························································································································· 399 ipv6 netstream export host ································································································································· 400 ipv6 netstream export rate ································································································································· 401 ipv6 netstream export source ····························································································································· 402 ipv6 netstream export v9-template refresh-rate packet ···················································································· 403 ipv6 netstream export v9-template refresh-rate time ························································································ 403 ipv6 netstream export version 9 ························································································································ 404 ipv6 netstream max-entry ···································································································································· 405 ipv6 netstream timeout active ···························································································································· 406 ipv6 netstream timeout inactive ························································································································· 406 reset ipv6 netstream statistics ····························································································································· 407
vii
sFlow commands ····················································································································································· 408
display sflow ························································································································································ 408 sflow agent ··························································································································································· 409 sflow collector ······················································································································································ 410 sflow counter interval ·········································································································································· 411 sflow counter collector ········································································································································ 411 sflow flow collector ·············································································································································· 412 sflow flow max-header ········································································································································ 413 sflow sampling-mode ·········································································································································· 413 sflow sampling-rate ············································································································································· 414 sflow source ························································································································································· 415
Information center commands ································································································································ 416
diagnostic-logfile save ········································································································································ 416 display diagnostic-logfile summary ··················································································································· 416 display info-center ··············································································································································· 417 display logbuffer ·················································································································································· 418 display logbuffer summary ································································································································· 420 display logfile summary ······································································································································ 422 display security-logfile summary ························································································································ 423 enable log updown ············································································································································· 423 info-center diagnostic-logfile enable ·················································································································· 424 info-center diagnostic-logfile frequency ············································································································· 425 info-center diagnostic-logfile quota ···················································································································· 425 info-center diagnostic-logfile directory ·············································································································· 426 info-center logfile overwrite-protection ·············································································································· 427 info-center enable ················································································································································ 427 info-center format ················································································································································· 428 info-center logbuffer ············································································································································ 428 info-center logbuffer size ···································································································································· 429 info-center logfile enable ···································································································································· 430 info-center logfile frequency ······························································································································· 430 info-center logfile size-quota ······························································································································· 431 info-center logfile directory ································································································································· 431 info-center logging suppress duplicates ············································································································ 432 info-center loghost ··············································································································································· 434 info-center loghost source ··································································································································· 435 info-center security-logfile alarm-threshold ········································································································ 435 info-center security-logfile enable ······················································································································· 436 info-center security-logfile frequency ················································································································· 437 info-center security-logfile size-quota ················································································································· 437 info-center security-logfile directory ··················································································································· 438 info-center source ················································································································································ 439 info-center synchronous ······································································································································ 440 info-center timestamp ·········································································································································· 441 info-center timestamp loghost ····························································································································· 442 info-center trace-logfile quota ····························································································································· 443 logfile save ··························································································································································· 443 reset logbuffer ······················································································································································ 444 security-logfile save ············································································································································· 444 terminal debugging ············································································································································· 445 terminal logging level ········································································································································· 446 terminal monitor ··················································································································································· 447
viii
Packet capture commands ······································································································································ 448
packet-capture interface ····································································································································· 448 packet-capture read ············································································································································ 450
Support and other resources ·································································································································· 452
Contacting HP ······························································································································································ 452
Subscription service ············································································································································ 452
Related information ······················································································································································ 452
Documents ···························································································································································· 452 Websites ······························································································································································· 452
Conventions ·································································································································································· 453
Index ········································································································································································ 455
ix

Ping, tracert, and system debugging commands

debugging

Use debugging to enable debugging for a module.
Use undo debugging to disable debugging for a module.
Syntax
debugging { all [ timeout time ] | module-name [ option ] }
undo debugging { all | module-name [ option ] }
Default
Debugging functions are disabled for all modules.
Views
User view
Predefined user roles
network-admin
Parameters
all: Enables all debugging functions.
timeout time: Specifies the timeout time for the debugging all command. When all debugging is enabled,
the system automatically executes the undo debugging all command after the timeout time. The time argument is in the range of 1 to 1440 minutes.
module-name: Specifies a module by its name, such as arp or device. To display the current module name, use the debugging ? command.
option: Specifies the debugging option for a module. The option number and content differ for different modules. To display the supported options, use the debugging module-name ? command.
Usage guidelines
Output of debugging commands is memory intensive. To guarantee system performance, enable debugging only for modules that are in an exceptional condition.
Examples
# Enable debugging for the device management module.
<Sysname> debugging dev
Related commands
display debugging
1

display debugging

Use display debugging to display the enabled debugging functions.
Syntax
display debugging [ module-name ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
module-name: Specifies a module by its name. To display the current module name, use the display debugging ? command.
Examples
# Display all enabled debugging functions.
<Sysname> display debugging DEV debugging switch is on
Related commands
debugging

ping

Use ping to determine whether the destination IP address is reachable, and display related statistics.
Syntax
ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type interface-number | -m interval | -n | -p
pad | -q | -r | -s packet-size | -t timeout | -tos tos | -v | { -topology topo-name | -vpn-instance vpn-instance-name } ] * host
Views
Any view
Predefined user roles
network-admin
Parameters
ip: Distinguishes between a destination host name and the ping command keywords if the name of the destination host is i, ip, ipv, ipv6, l, ls, or lsp. For example, you must use the command in the form of ping ip ip instead of ping ip if the destination host name is ip.
-a source-ip: Specifies an IP address of the device as the source IP address of ICMP echo requests. If this
option is not specified, the source IP address of ICMP echo requests is the primary IP address of the outbound interface.
-c count: Specifies the number of ICMP echo requests that are sent to the destination. The value range is 1 to 4294967295, and the default is 5.
2
-f: Sets the "do-not-fragment" bit in the IP header.
-h ttl: Specifies the TTL value of ICMP echo requests. The value range is 1 to 255, and the default is 255.
-i interface-type interface-number: Specifies the source interface for ICMP echo requests. If you do not
specify this option, the system uses the primary IP address of the matching route's egress interface as the source interface for ICMP echo requests.
-m interval: Specifies the interval (in milliseconds) to send ICMP echo requests. The value range is 1 to 65535, and the default is 200.
-n: Disables domain name resolution for the host argument. If the host argument represents the host name of the destination, and if this keyword is not specified, the device translates host into an address.
-p pad: Specifies the value of the pad field in an ICMP echo request, in hexadecimal format, 1 to 8 bits. The pad argument is in the range of 0 to ffffffff. If the specified value is less than 8 bits, 0s are added in front of the value to extend it to 8 bits. For example, if pad is configured as 0x2f, then the packets are padded with 0x0000002f to make the total length of the packet meet the requirements of the device. By default, the padded value starts from 0x01 up to 0xff, where another round starts again if necessary, such as 0x010203…feff01….
-q: Displays only the summary statistics. If this keyword is not specified, the system displays all the ping statistics.
-r: Records the addresses of the hops (up to 9) the ICMP echo requests passed. If this keyword is not specified, the addresses of the hops that the ICMP echo requests passed are not recorded.
-s packet-size: Specifies the length (in bytes) of ICMP echo requests (excluding the IP packet header and the ICMP packet header). The value range is 20 to 8100, and the default is 56.
-t timeout: Specifies the timeout time (in milliseconds) of an ICMP echo reply. The value range is 0 to 65535, and the default is 2000. If the source does not receive an ICMP echo reply within the timeout, it considers the ICMP echo reply timed out.
-tos tos: Specifies the ToS value of ICMP echo requests. The value range is 0 to 255, and the default is
0.
-v: Displays non-ICMP echo reply packets. If this keyword is not specified, the system does not display non-ICMP echo reply packets.
-topology topo-name: Specifies the topology to which the destination belongs, where topo-name is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option.
-vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the destination belongs, where the vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option.
host: Specifies the IP address or host name of the destination. The host name is a case-insensitive string of 1 to 253 characters. It can contain letters, digits, and special characters such as hyphen (-), underscore (_), and dot (.).
Usage guidelines
Examples
To use the name of the destination host to perform the ping operation, you must first configure the DNS on the device. Otherwise, the ping operation will fail.
To abort the ping operation during the execution of the command, press Ctrl+C.
# Test whether the device with an IP address of 1.1.2.2 is reachable.
3
<Sysname> ping 1.1.2.2 Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break 56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms 56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms 56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms 56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms
--- Ping statistics for 1.1.2.2 --­5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms
# Test whether the device with an IP address of 1.1.2.2 in VPN 1 is reachable.
<Sysname> ping -vpn-instance vpn1 1.1.2.2 Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break 56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms 56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms 56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms 56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms
--- Ping statistics for 1.1.2.2 in VPN instance vpn1 --­5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms
# Test whether the device with an IP address of 1.1.2.2 is reachable. Only results are displayed.
<Sysname> ping -q 1.1.2.2 Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
--- Ping statistics for 1.1.2.2 --­5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.962/2.196/2.665/0.244 ms
# Test whether the device with an IP address of 1.1.2.2 is reachable. The IP addresses of the hops that the ICMP packets passed in the path are displayed.
<Sysname> ping -r 1.1.2.2 Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break 56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=4.685 ms RR: 1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1 56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=4.834 ms (same route) 56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=4.770 ms (same route) 56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=4.812 ms (same route) 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=4.704 ms (same route)
--- Ping statistics for 1.1.2.2 --­5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 4.685/4.761/4.834/0.058 ms
4
The output shows that:
p
The destination is reachable.
T h e r o u t e i s 1.1.1.1 < - > { 1.1.1. 2 ; 1.1. 2 .1 } < - > 1.1. 2. 2.
Table 1 Command output
Field Descri
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=4.685 ms
Test whether the device with IP address 1.1.2.2 is reachable. There are 56 bytes in each ICMP echo request. Press Ctrl+C to abort the ping operation.
Received ICMP echo replies from the device whose IP address is
1.1.2.2. If no echo reply is received within the timeout period, no information is displayed.
bytes—Number of bytes in the ICMP echo reply.
icmp_seq—Packet sequence, used to determine whether a segment
tion
is lost, disordered or repeated.
ttl—TTL value in the ICMP echo reply.
time—Response time.
Routers through which the ICMP echo request passed. They are
RR:
--- Ping statistics for 1.1.2.2 --- Statistics on data received and sent in the ping operation.
--- Ping statistics for 1.1.2.2 in VPN instance vpn1 ---
5 packet(s) transmitted Number of ICMP echo requests sent.
5 packet(s) received Number of ICMP echo replies received.
displayed in inversed order, which means the router with a smaller distance to the destination is displayed first.
Ping statistics for a device in a VPN instance.
0.0% packet loss Percentage of unacknowledged packets to the total packets sent.
round-trip min/avg/max/std-dev =
4.685/4.761/4.834/0.058 ms

ping ipv6

Use ping ipv6 to determine whether an IPv6 address is reachable, and display related statistics.
Syntax
ping ipv6 [ -a source-ipv6 | -c count | -i interface-type interface-number | -m interval | -q | -s packet-size | -t timeout | -tc traffic-class| -v | -vpn-instance vpn-instance-name ] * host
Views
Any view
Predefined user roles
network-admin
Parameters
-a source-ipv6: Specifies an IPv6 address of the device as the source IP address of ICMP echo requests.
If this option is not specified, the source IPv6 address of ICMP echo requests is the IPv6 address of the outbound interface. (The address selection rule is defined by RFC 3484.)
Minimum/average/maximum/standard deviation response time, in milliseconds.
5
-c count: Specifies the number of ICMPv6 echo requests that are sent to the destination. The value range is 1 to 4294967295, and the default is 5.
-i interface-type interface-number: Specifies the source interface for ICMPv6 echo requests. This option must be specified when the destination address is a multicast address or a link local address. If you do not specify this option, the system uses the primary IP address of the matching route's egress interface as the source interface for ICMPv6 echo requests.
-m interval: Specifies the interval (in milliseconds) to send an ICMPv6 echo reply. The value range is 1 to 65535, and the default is 1000.
-q: Displays only the summary statistics. If you do not specify this keyword, the system displays all the ping statistics.
-s packet-size: Specifies the length (in bytes) of ICMPv6 echo requests (excluding the IPv6 packet header and the ICMPv6 packet header). The value range is 20 to 8100, and the default is 56.
-t timeout: Specifies the timeout time (in milliseconds) of an ICMPv6 echo reply. The value range is 0 to 65535, and the default is 2000.
-tc traffic-class: Specifies the traffic class value in an ICMPv6 packet. The value range is 0 to 255 and the default is 0.
-v: Displays detailed information (including the dst field and the idx field) about ICMPv6 echo replies. If this keyword is not specified, the system only displays brief information (not including the dst field and the
idx field) about ICMPv6 echo replies.
-vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the destination belongs,
where the vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option.
host: Specifies the IPv6 address or host name of the destination. The host name is a case-insensitive string of 1 to 253 characters. It can contain letters, digits, and special characters such as hyphen (-), underscore (_), and dot (.).
Usage guidelines
To use the name of the destination host to perform the ipv6 ping operation, you must first configure DNS on the device. Otherwise, the ipv6 ping operation fails.
To abort the ping ipv6 operation during the execution of the command, press Ctrl+C.
Examples
# Test whether the IPv6 address (2001::2) is reachable.
<Sysname> ping ipv6 2001::2 Ping6(56 data bytes) 2001::1 --> 2001::2, press CTRL_C to break 56 bytes from 2001::2, icmp_seq=0 hlim=64 time=62.000 ms 56 bytes from 2001::2, icmp_seq=1 hlim=64 time=23.000 ms 56 bytes from 2001::2, icmp_seq=2 hlim=64 time=20.000 ms 56 bytes from 2001::2, icmp_seq=3 hlim=64 time=4.000 ms 56 bytes from 2001::2, icmp_seq=4 hlim=64 time=16.000 ms
--- Ping6 statistics for 2001::2 --­5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms
# Test whether the IPv6 address (2001::2) is reachable. Only the statistics are displayed.
<Sysname> ping ipv6 –q 2001::2
6
Ping6(56 data bytes) 2001::1 --> 2001::2, press CTRL_C to break
p
--- Ping6 statistics for 2001::2 --­5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms
# Test whether the IPv6 address (2001::2) is reachable. Detailed ping information is displayed.
<Sysname> ping ipv6 –v 2001::2 Ping6(56 data bytes) 2001::1 --> 2001::2, press CTRL_C to break 56 bytes from 2001::2, icmp_seq=0 hlim=64 dst=2001::1 idx=3 time=62.000 ms 56 bytes from 2001::2, icmp_seq=1 hlim=64 dst=2001::1 idx=3 time=23.000 ms 56 bytes from 2001::2, icmp_seq=2 hlim=64 dst=2001::1 idx=3 time=20.000 ms 56 bytes from 2001::2, icmp_seq=3 hlim=64 dst=2001::1 idx=3 time=4.000 ms 56 bytes from 2001::2, icmp_seq=4 hlim=64 dst=2001::1 idx=3 time=16.000 ms
--- Ping6 statistics for 2001::2 --­5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms
The output shows that:
The destination is reachable, and ICMPv6 echo requests are replied.
The minimum/average/maximum/standard deviation roundtrip time of packets is 4 milliseconds,
25 milliseconds, 62 milliseconds, and 20 milliseconds.
Table 2 Command output
Field Descri
Ping6(56 data bytes)
2001::1 --> 2001::2, press CTRL_C to break
An ICMPv6 echo reply with a data length of 56 bytes is sent from 2001::1to 2001::2.
Press Ctrl+C to abort the ping IPv6 operation.
Received ICMPv6 echo replies from the device whose IPv6 address is 2001::2.
tion
The number of data bytes is 56.
56 bytes from 2001::2,
icmp_seq=1 hlim=64 dst=2001::1 idx=3 time=62.000 ms
The packet sequence is 1.
The hop limit value is 64.
The destination address is 2001::1. Specify the -v keyword to
display this field.
The index for the packet inbound interface is 3. Specify the -v
keyword to display this field.
The response time is 62 milliseconds.
--- Ping6 statistics for 2001::2 ------ Statistics on data received and sent in an IPv6 ping operation.
5 packet(s) transmitted Number of ICMPv6 echo requests sent.
5 packet(s) received Number of ICMPv6 echo replies received.
0.0% packet loss Percentage of unacknowledged packets to the total packets sent.
round-trip min/avg/max/ std-dev =4.000/25.000/62.000/20.000 ms
Minimum/average/maximum/standard deviation response time, in milliseconds.
7

tracert

Use tracert to trace the path the packets traverse from source to destination.
Syntax
tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q packet-number | -t tos | { -topology topo-name |-vpn-instance vpn-instance-name } | -w timeout ] * host
Views
Any view
Predefined user roles
network-admin
Parameters
-a source-ip: Specifies an IP address of the device as the source IP address of probe packets. If this option
is not specified, the source IP address of probe packets is the primary IP address of the outbound interface.
-f first-ttl: Specifies the TTL of the first packet sent to the destination. The value range is 1 to 255, and the default is 1. It must be no greater than the value of the max-ttl argument.
-m max-ttl: Specifies the maximum number of hops allowed for a probe packet. The value range is 1 to 255, and the default is 30. It must be no smaller than the value of the first-ttl argument.
-p port: Specifies an invalid UDP port of the destination. The value range is 1 to 65535, and the default is 33434.
-q packet-number: Specifies the number of probe packets to send per hop. The value range is 1 to 65535, and the default is 3.
-t tos: Specifies the ToS value of probe packets. The value range is 0 to 255, and the default is 0.
-topology topo-name: Specifies the topology to which the destination belongs, where topo-name is a
case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option.
-vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the destination belongs, where the vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option.
-w timeout: Specifies the timeout time in milliseconds of the reply packet for a probe packet. The value range is 1 to 65535, and the default is 5000.
host: Specifies the IP address or host name of the destination. The host name is a case-insensitive string of 1 to 253 characters. It can contain letters, digits, and special characters such as hyphen (-), underscore (_), and dot (.).
Usage guidelines
After identifying network failure with the ping command, use the tracert command to locate failed nodes.
The output of the tracert command includes IP addresses of all the Layer 3 devices that the packets traverse from source to destination. Asterisks (* * *) are displayed if the device cannot reply with an ICMP error message. The reason might be the destination is unreachable or sending ICMP timeout/destination unreachable packets is disabled.
To abort the tracert operation during the execution of the command, press Ctrl+C.
8
Examples
p
# Display the path that the packets traverse from source to destination (1.1.2.2).
<Sysname> tracert 1.1.2.2 traceroute to 1.1.2.2 (1.1.2.2), 30 hops at most, 40 bytes each packet, press CTRL_C to
break 1 1.1.1.2 (1.1.1.2) 673 ms 425 ms 30 ms 2 1.1.2.2 (1.1.2.2) 580 ms 470 ms 80 ms
# Trace the path to destination (192.168.0.46) over an MPLS network.
<Sysname> tracert 192.168.0.46 traceroute to 192.168.0.46(192.168.0.46), 30 hops at most, 40 bytes each packet, press
CTRL_C to break 1 192.0.2.13 (192.0.2.13) 0.661 ms 0.618 ms 0.579 ms 2 192.0.2.9 (192.0.2.9) 0.861 ms 0.718 ms 0.679 ms MPLS Label=100048 Exp=0 TTL=1 S=1 3 192.0.2.5 (192.0.2.5) 0.822 ms 0.731 ms 0.708 ms MPLS Label=100016 Exp=0 TTL=1 S=1 4 192.0.2.1 (192.0.2.1) 0.961 ms 8.676 ms 0.875 ms
Table 3 Command output
Field Descri
traceroute to 1.1.2.2 (1.1.2.2)
hops at most
bytes each packet Number of bytes of a probe packet.
press CTRL_C to break
Display the route that the IP packets traverse from the current device to the device whose IP address is 1.1.2.2.
Maximum number of hops of the probe packets, which can be set by the -m keyword.
During the execution of the command, press Ctrl+C to abort the tracert operation.
Probe result of the probe packets whose TTL is 1, including the following:
tion
Domain name (or IP address, if the domain name is not configured) of the
1 1.1.1.2 (1.1.1.2) 673 ms 425 ms 30 ms
first hop.
The round-trip time of the three probe packets.
The number of packets that can be sent in each probe can be set through the
-q keyword.
ICMP timeout packets on an MPLS network, carrying MPLS label information:
Label—Label value that is used to identify a forwarding equivalence class
(FEC).
MPLS Label=100048 Exp=0 TTL=1 S=1
Exp—Reserved, usually used for class of service (CoS).
TTL—TTL value.
S—MPLS supports multiple levels of labels. Value 1 indicates that the label
is at the bottom of the label stack, and value 0 indicates that the label is in another label stack.

tracert ipv6

Use tracert ipv6 to display the path that the IPv6 packets traverse from source to destination.
9
Syntax
tracert ipv6 [ -f first-hop | -m max-hops | -p port | -q packet-number | -t traffic-class | -vpn-instance vpn-instance-name | -w timeout ] * host
Views
Any view
Predefined user roles
network-admin
Parameters
-f first-hop: Specifies the TTL value of the first packet. The value range is 1 to 255, and the default is 1. The
value must be no greater than the value of the max-hops argument.
-m max-hops: Specifies the maximum number of hops allowed for a packet. The value range is 1 to 255, and the default is 30. The value must be no smaller than the value of the first-hop argument.
-p port: Specifies an invalid UDP port of the destination. The value range is 1 to 65535, and the default is 33434.
-q packet-number: Specifies the number of probe packets sent each time. The value range is 1 to 65535, and the default is 3.
-t traffic-class: Specifies the traffic class value in an IPv6 probe packet. The value range is 0 to 255, and the default is 0.
-vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the destination belongs, where the vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option.
-w timeout: Specifies the timeout time (in milliseconds) of the reply packet of a probe packet. The value range is 1 to 65535, and the default is 5000.
host: Specifies the IPv6 address or host name of the destination. The host name is a case-insensitive string of 1 to 253 characters. It can contain letters, digits, and special characters such as hyphen (-), underscore (_), and dot (.).
Usage guidelines
After identifying network failure with the ping ipv6 command, you can use the tracert ipv6 command to locate failed nodes.
The output of the tracert ipv6 command includes IPv6 addresses of all the Layer 3 devices that the packets traverse from source to destination. Asterisks (* * *) are displayed if the device cannot reply with an ICMP error message. The reason might be the destination is unreachable or sending ICMP timeout/destination unreachable packets is disabled.
To abort the tracert operation during the execution of the command, press Ctrl+C.
Examples
# Display the path that the packets traverse from source to destination (2001:3::2).
<Sysname> tracert ipv6 2001:3::2 traceroute to 2001:3::2(2001:3::2), 30 hops at most, 60 byte packets, press CTRL_C to break 1 2001:1::2 0.661 ms 0.618 ms 0.579 ms 2 2001:2::2 0.861 ms 0.718 ms 0.679 ms 3 2001:3::2 0.822 ms 0.731 ms 0.708 ms
10
Table 4 Command output
p
Field Descri
traceroute to 2001:3::2
hops at most
byte packets Number of bytes of a probe packet.
1 2001:1::2 0.661 ms 0.618 ms 0.579 ms
Display the route that the IPv6 packets traverse from the current device to the device whose IP address is 2001:3:2.
Maximum number of hops of the probe packets, which can be set by the
-m keyword.
Probe result of the probe packets whose hoplimit is 1, including the IPv6 address of the first hop, and the roundtrip time of three probe packets. The number of packets that can be sent in each probe can be set by the -q keyword.
tion
11

NQA commands

NQA client commands

advantage-factor

Use advantage-factor to set the advantage factor to be used for calculation of Mean Opinion Scores (MOS) and Calculated Planning Impairment Factor (ICPIF) values.
Use undo advantage-factor to restore the default.
Syntax
advantage-factor factor
undo advantage-factor
Default
The advantage factor is 0.
Views
Voice operation view
Predefined user roles
network-admin
Parameters
factor: Specifies the advantage factor in the range of 0 to 20.
Usage guidelines
The evaluation of voice quality depends on users' tolerance for voice quality. For users with higher tolerance for voice quality, use the advantage-factor command to set an advantage factor. When the system calculates the ICPIF value, it subtracts the advantage factor to modify ICPIF and MOS values for voice quality evaluation.
Examples
# Set the advantage factor to 10 for voice operations.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] advantage-factor 10

codec-type

Use codec-type to configure the codec type for a voice operation.
Use undo codec-type to restore the default.
12
Syntax
codec-type { g711a | g711u | g729a }
undo codec-type
Default
The codec type for the voice operation is G.711 A-law.
Views
Voice operation view
Predefined user roles
network-admin
Parameters
g711a: Specifies G.711 A-law codec type.
g711u: Specifies G.711 μ-law codec type
g729a: Specifies G.729 A-law codec type.
Examples
# Set the codec type to g729a for the voice operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] codec-type g729a

community read

Use community read to specify the community name for SNMPv1 and SNMPv2c probe packets.
Use undo community read to restore the default.
Syntax
community read { cipher | simple } community-name
undo community read
Default
The SNMPv1 and SNMPv2c probe packets use the community name public.
Views
SNMP operation view
Predefined user roles
network-admin
Parameters
cipher: Sets a ciphertext community name.
simple: Sets a plaintext community name.
community-name: Specifies the community name. This argument is case sensitive. If you specify the
simple keyword, the name must be a string of 1 to 32 characters. If you specify the cipher keyword, the name must be a string of 33 to 73 characters.
13
Usage guidelines
Execute this command to specify the community name on the NQA client if the SNMP agent runs SNMPv1 or SNMPv2c. The specified community name must be the read-only community name that has been configured on the SNMP agent.
If the SNMP agent runs SNMPv3, you do not need to specify the community name on the NQA client.
For security purposes, the community name configured in plain text or cipher text is saved in cipher text.
Examples
# Specify readaccess as the community name for SNMPv1 and SNMPv2c probe packets.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type snmp [Sysname-nqa-admin-test-snmp] community read simple readaccess

data-fill

Use data-fill to configure the payload fill string for probe packets.
Use undo data-fill to restore the default.
Syntax
data-fill string
undo data-fill
Default
The string is 0123456789.
Views
ICMP/UDP echo operation view
Path/UDP jitter operation view
Voice operation view
Predefined user roles
network-admin
Parameters
string: Specifies a case-sensitive string of 1 to 200 characters.
Usage guidelines
If the payload length is smaller than the string length, only the first part of the string is filled. For example, if you configure the string as abcd and set the payload size to 3 bytes, abc is filled.
If the payload length is greater than the string length, the system fills the payload with the string cyclically until the payload is full. For example, if you configure the string as abcd and the payload size as 6 bytes, abcdab is filled.
How the string is filled depends on the operation type.
For the ICMP echo operation, the string fills the whole payload of an ICMP echo request.
For the UDP echo operation, the first five bytes of the payload of a UDP packet are for special
purpose. The string fills the remaining part of payload.
14
p
For the UDP jitter operation, the first 68 bytes of the payload of a UDP packet are for special
purpose. The string fills the remaining part of the payload.
For the voice operation, the first 16 bytes of the payload of a UDP packet are for special purpose.
The string fills the remaining part of the payload.
For the path jitter operation, the first four bytes of the payload of an ICMP echo request are for
special purpose. The string fills the remaining part of payload.
Examples
# Specify abcd as the payload fill string for ICMP echo requests.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] data-fill abcd

data-size

Use data-size to set the payload size for each probe packet.
Use undo data-size to restore the default.
Syntax
Default
Views
data-size size
undo data-size
The default payload size of a probe packet for different operations is described in Table 5.
Table 5 Default payload size of a probe packet
O
eration type Codec type
ICMP echo N/A 100
UDP echo N/A 100
UDP jitter N/A 100
UDP tracert N/A 100
Path jitter N/A 100
Voice G.711 A-law 172
Voice G.711 μ-law 172
Voice G.729 A-law 32
Default size (bytes)
ICMP/UDP echo operation view
Path/UDP jitter operation view
UDP tracert operation view
Voice operation view
15
Predefined user roles
network-admin
Parameters
size: Specifies the payload size. Available value ranges include:
20 to 8100 bytes for the ICMP echo, UDP echo, or UDP tracert operation.
68 to 8100 bytes for the UDP jitter or path jitter operation.
16 to 1500 bytes for the voice operation.
Usage guidelines
In ICMP echo and path jitter operations, the command sets the payload size for each ICMP echo request.
In UDP echo, UDP jitter, UDP tracert, and voice operations, the command sets the payload size for each UDP packet.
Examples
# Set the payload size to 80 bytes for each ICMP echo request.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] data-size 80

description (any NQA operation type view)

Use description to configure a description for an NQA operation, such as the operation type or purpose.
Use undo description to remove the description.
Syntax
description text
undo description
Default
No description is configured for an NQA operation.
Views
Any NQA operation type view
Predefined user roles
network-admin
Parameters
text: Specifies a case-sensitive string of 1 to 200 characters.
Examples
# Configure the description as icmp-probe for an NQA operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] description icmp-probe
16

destination ip

Use destination ip to configure the destination IP address for the operation.
Use undo destination ip to remove the destination IP address.
Syntax
destination ip ip-address
undo destination ip
Default
No destination IP address is configured for the operation.
Views
DHCP/DLSw/DNS/SNMP/TCP/voice operation view
ICMP/UDP echo operation view
Path/UDP jitter operation view
UDP tracert operation view
Predefined user roles
network-admin
Parameters
ip-address: Specifies the destination IP address for the operation.
Examples
# Specify 10.1.1.1 as the destination IP address for the ICMP echo operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] destination ip 10.1.1.1

destination ipv6

Use destination ipv6 to configure the destination IPv6 address for the operation.
Use undo destination ipv6 to remove the destination IPv6 address.
Syntax
destination ipv6 ipv6-address
undo destination ipv6
Default
No destination IPv6 address is configured for the operation.
Views
ICMP echo operation view
Predefined user roles
network-admin
17
Parameters
ipv6-address: Specifies the destination IPv6 address for the operation. IPv6 link-local addresses are not supported.
Examples
# Specify 1::1 as the destination IPv6 address for the ICMP echo operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] destination ipv6 1::1

destination port

Use destination port to configure the destination port number for the operation.
Use undo destination port to remove the destination port number.
Syntax
destination port port-number
undo destination port
Default
The destination port number is 33434 for the UDP tracert operation.
No destination port number is configured for other types of operations.
Views
TCP/voice operation view
UDP echo operation view
UDP jitter operation view
UDP tracert operation view
Predefined user roles
network-admin
Parameters
port-number: Specifies the destination port number for the operation, in the range of 1 to 65535.
Examples
# Set the destination port number to 9000 for the UDP echo operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-echo [Sysname-nqa-admin-test-udp-echo] destination port 9000

display nqa history

Use display nqa history to display the history records of NQA operations.
18
Syntax
display nqa history [ admin-name operation-tag ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
admin-name operation-tag: Specifies an NQA operation by its administrator name and operation tag. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-). If you do not specify an NQA operation, the command displays the history records of all NQA operations.
Usage guidelines
The display nqa history command does not display the results or statistics of UDP jitter and voice operations. Use the display nqa result or display nqa statistics command to verify the UDP jitter and voice operations.
Examples
# Display the history records of the UDP tracert operation with the administrator name administrator and the operation tag tracert.
<Sysname> display nqa history administrator tracert NQA entry (admin administrator, tag tracert) history records: Index TTL Response Hop IP Status Time 1 2 328 4.1.1.1 Succeeded 2013-09-09 14:46:06.2 1 2 328 4.1.1.1 Succeeded 2013-09-09 14:46:05.2 1 2 328 4.1.1.1 Succeeded 2013-09-09 14:46:04.2 1 1 328 3.1.1.2 Succeeded 2013-09-09 14:46:03.2 1 1 328 3.1.1.1 Succeeded 2013-09-09 14:46:02.2 1 1 328 3.1.1.1 Succeeded 2013-09-09 14:46:01.2
# Display the history records of the NQA operation with the administrator name administrator and the operation tag test.
<Sysname> display nqa history administrator test NQA entry (admin administrator, tag test) history records: Index Response Status Time 10 329 Succeeded 2011-04-29 20:54:26.5 9 344 Succeeded 2011-04-29 20:54:26.2 8 328 Succeeded 2011-04-29 20:54:25.8 7 328 Succeeded 2011-04-29 20:54:25.5 6 328 Succeeded 2011-04-29 20:54:25.1 5 328 Succeeded 2011-04-29 20:54:24.8 4 328 Succeeded 2011-04-29 20:54:24.5 3 328 Succeeded 2011-04-29 20:54:24.1 2 328 Succeeded 2011-04-29 20:54:23.8 1 328 Succeeded 2011-04-29 20:54:23.4
19
Table 6 Command output
Field Description
Index
TTL TTL value in the probe packet.
Response
Hop IP IP address of the node that sent the reply packet.
History record ID.
The history records in one UDP tracert operation have the same ID.
Round-trip time if the operation succeeds, timeout time upon timeout, or 0 if the operation cannot be completed, in milliseconds.
Status of the operation result:
Succeeded.
Status
Unknown error.
Internal error.
Timeout.
Time Time when the operation was completed.

display nqa reaction counters

Use display nqa reaction counters to display the current monitoring results of reaction entries.
Syntax
display nqa reaction counters [ admin-name operation-tag [ item-number ] ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
admin-name operation-tag: Specifies an NQA operation by its administrator name and operation tag. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-). If you do not specify an NQA operation, the command displays the current monitoring results of reaction entries for all NQA operations.
item-number: Specifies a reaction entry by its ID in the range of 1 to 10. If you do not specify a reaction entry, the command displays the results of all reaction entries.
Usage guidelines
The result fields display hyphens (-) in one of the following conditions:
The threshold type is the average value.
The monitored performance metric is ICPIF or MOS of the voice operation.
The monitoring results of an operation are accumulated, and are not cleared after the operation completes.
20
p
Examples
# Display the monitoring results of all reaction entries of the ICMP echo operation with the administrator name admin and the operation tag test.
<Sysname> display nqa reaction counters admin test NQA entry (admin admin, tag test) reaction counters: Index Checked Element Threshold Type Checked Num Over-threshold Num 1 probe-duration accumulate 12 4 2 probe-duration average - ­ 3 probe-duration consecutive 160 56 4 probe-fail accumulate 12 0 5 probe-fail consecutive 162 2
Table 7 Command output
Field Descri
Index ID of a reaction entry.
Checked Element Monitored performance metric.
Threshold Type Threshold type.
Checked Num Number of targets that have been monitored for data collection.
Over-threshold Num Number of threshold violations.
tion
Table 8 Description of the threshold monitoring fields
Monitored performance metric
probe-duration
probe-fail
Threshold type
accumulate
average N/A N/A N/A
consecutive
accumulate
consecutive
Collect data in Checked Num Over-threshold Num
Probes after the operation starts.
Probes after the operation starts.
Probes after the operation starts.
Probes after the operation starts.
Number of completed probes.
Number of completed probes.
Number of completed probes.
Number of completed probes.
Number of probes with duration exceeding the threshold.
Number of probes with duration exceeding the threshold.
Number of probe failures.
Number of probe failures.
Packets sent after
RTT
jitter-DS/jitter-SD
accumulate
average N/A N/A N/A
accumulate
average N/A N/A N/A
the operation starts.
Packets sent after the operation starts.
21
Number of sent packets.
Number of sent packets.
Number of packets with round-trip time exceeding threshold.
Number of packets with the one-way jitter exceeding the threshold.
Monitored performance metric
OWD-DS/OWD-SD N/A
packet-loss accumulate
ICPIF N/A N/A N/A N/A
MOS N/A N/A N/A N/A

display nqa result

Use display nqa result to display the most recent result of the specified NQA operation.
Syntax
display nqa result [ admin-name operation-tag ]
Views
Any view
Threshold type
Collect data in Checked Num Over-threshold Num
Packets sent after the operation starts.
Packets sent after the operation starts.
Number of sent packets.
Number of sent packets.
Number of packets with the one-way delay exceeding the threshold.
Total packet loss.
Predefined user roles
network-admin
network-operator
Parameters
admin-name operation-tag: Specifies an NQA operation by its administrator name and operation tag. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-). If you do not specify an NQA operation, the command displays the most recent results of all NQA operations.
Examples
# Display the most recent result of the TCP operation.
<Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Send operation times: 1 Receive response times: 1 Min/Max/Average round trip time: 35/35/35 Square-Sum of round trip time: 1225 Last succeeded probe time: 2011-05-29 10:50:33.2 Extended results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to internal error: 0 Failures due to other errors: 0
22
# Display the most recent result of the UDP jitter operation.
<Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 15/46/26 Square-Sum of round trip time: 8103 Last packet received time: 2011-05-29 10:56:38.7 Extended results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 UDP-jitter results: RTT number: 10 Min positive SD: 8 Min positive DS: 8 Max positive SD: 18 Max positive DS: 8 Positive SD number: 5 Positive DS number: 2 Positive SD sum: 75 Positive DS sum: 32 Positive SD average: 15 Positive DS average: 16 Positive SD square-sum: 1189 Positive DS square-sum: 640 Min negative SD: 8 Min negative DS: 1 Max negative SD: 24 Max negative DS: 30 Negative SD number: 4 Negative DS number: 7 Negative SD sum: 56 Negative DS sum: 99 Negative SD average: 14 Negative DS average: 14 Negative SD square-sum: 946 Negative DS square-sum: 1495 One way results: Max SD delay: 22 Max DS delay: 23 Min SD delay: 7 Min DS delay: 7 Number of SD delay: 10 Number of DS delay: 10 Sum of SD delay: 125 Sum of DS delay: 132 Square-Sum of SD delay: 1805 Square-Sum of DS delay: 1988 SD lost packets: 0 DS lost packets: 0 Lost packets for unknown reason: 0
# Display the most recent result of the voice operation.
<Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Send operation times: 1000 Receive response times: 0 Min/Max/Average round trip time: 0/0/0 Square-Sum of round trip time: 0 Last packet received time: 0-00-00 00:00:00.0 Extended results: Packet loss ratio: 100% Failures due to timeout: 1000 Failures due to internal error: 0 Failures due to other errors: 0
23
Packets out of sequence: 0 Packets arrived late: 0 Voice results: RTT number: 0 Min positive SD: 0 Min positive DS: 0 Max positive SD: 0 Max positive DS: 0 Positive SD number: 0 Positive DS number: 0 Positive SD sum: 0 Positive DS sum: 0 Positive SD average: 0 Positive DS average: 0 Positive SD square-sum: 0 Positive DS square-sum: 0 Min negative SD: 0 Min negative DS: 0 Max negative SD: 0 Max negative DS: 0 Negative SD number: 0 Negative DS number: 0 Negative SD sum: 0 Negative DS sum: 0 Negative SD average: 0 Negative DS average: 0 Negative SD square-sum: 0 Negative DS square-sum: 0 One way results: Max SD delay: 0 Max DS delay: 0 Min SD delay: 0 Min DS delay: 0 Number of SD delay: 0 Number of DS delay: 0 Sum of SD delay: 0 Sum of DS delay: 0 Square-Sum of SD delay: 0 Square-Sum of DS delay: 0 SD lost packets: 0 DS lost packets: 0 Lost packets for unknown reason: 1000 Voice scores: MOS value: 0.99 ICPIF value: 87
# Display the most recent result of the path jitter operation.
<Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Hop IP 192.168.40.210 Basic Results: Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 1/1/1 Square-Sum of round trip time: 10 Extended Results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 Path-Jitter Results: Jitter number: 9 Min/Max/Average jitter: 0/0/0 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0
24
p
Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0 Hop IP 192.168.50.209 Basic Results: Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 1/1/1 Square-Sum of round trip time: 10 Extended Results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 Path-Jitter Results: Jitter number: 9 Min/Max/Average jitter: 0/0/0 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0
# Display the most recent result of the UDP tracert operation.
<Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Send operation times: 6 Receive response times: 6 Min/Max/Average round trip time: 35/35/35 Square-Sum of round trip time: 1225 Last succeeded probe time: 2013-09-09 14:23:24.5 Extended results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 UDP-tracert results: TTL Hop IP Time 1 3.1.1.1 2013-09-09 14:23:24.5 2 4.1.1.1 2013-09-09 14:23:24.5
Table 9 Command output
Field Descri
Send operation times Number of operations.
Receive response times Number of response packets received.
tion
Min/Max/Average round trip time Minimum/maximum/average round-trip time in milliseconds.
25
Field Description
Square-Sum of round trip time Square sum of round-trip time.
Time when the last successful probe was completed. If no probes are
Last succeeded probe time
Last packet received time
Packet loss ratio Average packet loss ratio.
Failures due to timeout Number of timeout occurrences in an operation.
Failures due to disconnect Number of disconnections by the peer.
Failures due to no connection Number of failures to connect with the peer.
Failures due to internal error Number of failures due to internal errors.
Failures due to other errors Failures due to other errors.
Packets out of sequence Number of failures due to out-of-sequence packets.
successful in an operation, the field displays 0.
This field is not available for UDP jitter, path jitter, and voice operations.
Time when the last response packet was received. If no response packets in a probe were received, the field displays 0.
This field is available only for UDP jitter and voice operations.
Packets arrived late Number of response packets received after a probe times out.
UDP-jitter results
Voice results
RTT number Number of response packets received.
Min positive SD Minimum positive jitter from source to destination.
Min positive DS Minimum positive jitter from destination to source.
Max positive SD Maximum positive jitter from source to destination.
Max positive DS Maximum positive jitter from destination to source.
Positive SD number Number of positive jitters from source to destination.
Positive DS number Number of positive jitters from destination to source.
Positive SD sum Sum of positive jitters from source to destination.
Positive DS sum Sum of positive jitters from destination to source.
Positive SD average Average positive jitters from source to destination.
Positive DS average Average positive jitters from destination to source.
UDP jitter operation results.
This field is available only for the UDP jitter operation.
Voice operation results.
This field is available only for the voice operation.
Positive SD square-sum Square sum of positive jitters from source to destination.
Positive DS square-sum Square sum of positive jitters from destination to source.
Min negative SD
Min negative DS
Minimum absolute value among negative jitters from source to destination.
Minimum absolute value among negative jitters from destination to source.
26
Field Description
Max negative SD
Max negative DS
Negative SD number Number of negative jitters from source to destination.
Negative DS number Number of negative jitters from destination to source.
Negative SD sum Sum of absolute values of negative jitters from source to destination.
Negative DS sum Sum of absolute values of negative jitters from destination to source.
Negative SD average Average absolute value of negative jitters from source to destination.
Negative DS average Average absolute value of negative jitters from destination to source.
Negative SD square-sum Square sum of negative jitters from source to destination.
Negative DS square-sum Square sum of negative jitters from destination to source.
One way results
Max SD delay Maximum delay from source to destination.
Max DS delay Maximum delay from destination to source.
Maximum absolute value among negative jitters from source to destination.
Maximum absolute value among negative jitters from destination to source.
Unidirectional delay.
This field is available only for the UDP jitter and voice operations.
Min SD delay Minimum delay from source to destination.
Min DS delay Minimum delay from destination to source.
Number of SD delay Number of delays from source to destination.
Number of DS delay Number of delays from destination to source.
Sum of SD delay Sum of delays from source to destination.
Sum of DS delay Sum of delays from destination to source.
Square-Sum of SD delay Square sum of delays from source to destination.
Square-Sum of DS delay Square sum of delays from destination to source.
SD lost packets Number of lost packets from the source to the destination.
DS lost packets Number of lost packets from the destination to the source.
Lost packets for unknown reason Number of lost packets for unknown reasons.
Voice scores
MOS value MOS value calculated for the voice operation.
ICPIF value ICPIF value calculated for the voice operation.
Hop IP
Voice parameters.
This field is available only for the voice operation.
IP address of the hop.
This field is available only for the path jitter operation.
Path-jitter results
Path jitter operation results.
This field is available only for the path jitter operation.
27
Field Description
Jitter number
Min/Max/Average jitter
Positive jitter number
Min/Max/Average positive jitter
Sum/Square-Sum positive jitter
Negative jitter number
Min/Max/Average negative jitter
Sum/Square-Sum negative jitter
TTL TTL value in the received reply packet.
Number of jitters.
This field is available only for the path jitter operation.
Minimum/maximum/average jitter in milliseconds.
This field is available only for the path jitter operation.
Number of positive jitter.
This field is available only for the path jitter operation.
Minimum/maximum/average positive jitter in milliseconds.
This field is available only for the path jitter operation.
Sum/square sum of the positive jitter.
This field is available only for the path jitter operation.
Number of negative jitter.
This field is available only for the path jitter operation.
Minimum/maximum/average negative jitter in milliseconds.
This field is available only for the path jitter operation.
Sum/square sum of the negative jitter.
This field is available only for the path jitter operation.
Hop IP IP address of the node that sent the reply packet.
Time Time when the NQA client received the reply packet.

display nqa statistics

Use display nqa statistics to display NQA operation statistics.
Syntax
display nqa statistics [ admin-name operation-tag ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
admin-name operation-tag: Specifies an NQA operation by its administrator name and operation tag. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-). If you do not specify an NQA operation, the command displays statistics for all NQA operations.
28
Usage guidelines
The statistics are generated after the NQA operation completes. If you execute the display nqa statistics command before the operation completes, the statistics are displayed as all 0s.
If a reaction entry is configured, the command displays the monitoring results of the reaction entry in the period specified by the statistics internal command. The result fields display hyphens (-) in one of the following conditions:
The threshold type is average value.
The monitored performance metric is ICPIF or MOS for the voice operation.
The command is not available for the UDP tracert operation.
Examples
# Display the statistics for the TCP operation.
<Sysname> display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO. : 1 Start time: 2007-01-01 09:30:20.0 Life time: 2 seconds Send operation times: 1 Receive response times: 1 Min/Max/Average round trip time: 13/13/13 Square-Sum of round trip time: 169 Extended results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to internal error: 0 Failures due to other errors: 0
# Display the statistics for the UDP jitter operation.
<Sysname> display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO. : 1 Start time: 2007-01-01 09:33:22.3 Life time: 23 seconds Send operation times: 100 Receive response times: 100 Min/Max/Average round trip time: 1/11/5 Square-Sum of round trip time: 24360 Extended results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 UDP-jitter results: RTT number: 550 Min positive SD: 1 Min positive DS: 1 Max positive SD: 7 Max positive DS: 1
29
Positive SD number: 220 Positive DS number: 97 Positive SD sum: 283 Positive DS sum: 287 Positive SD average: 1 Positive DS average: 2 Positive SD square-sum: 709 Positive DS square-sum: 1937 Min negative SD: 2 Min negative DS: 1 Max negative SD: 10 Max negative DS: 1 Negative SD number: 81 Negative DS number: 94 Negative SD sum: 556 Negative DS sum: 191 Negative SD average: 6 Negative DS average: 2 Negative SD square-sum: 4292 Negative DS square-sum: 967 One way results: Max SD delay: 5 Max DS delay: 5 Min SD delay: 1 Min DS delay: 1 Number of SD delay: 550 Number of DS delay: 550 Sum of SD delay: 1475 Sum of DS delay: 1201 Square-Sum of SD delay: 5407 Square-Sum of DS delay: 3959 SD lost packets: 0 DS lost packets: 0 Lost packets for unknown reason: 0 Reaction statistics: Index Checked Element Threshold Type Checked Num Over-threshold Num 1 jitter-DS accumulate 90 25 2 jitter-SD average - ­ 3 OWD-DS - 100 24 4 OWD-SD - 100 13 5 packet-loss accumulate 0 0 6 RTT accumulate 100 52
# Display the statistics for the voice operation.
<Sysname> display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO. : 1 Start time: 2007-01-01 09:33:45.3 Life time: 120 seconds Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 1/12/7 Square-Sum of round trip time: 620 Extended results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 Voice results: RTT number: 10 Min positive SD: 3 Min positive DS: 1 Max positive SD: 10 Max positive DS: 1 Positive SD number: 3 Positive DS number: 2 Positive SD sum: 18 Positive DS sum: 2
30
Positive SD average: 6 Positive DS average: 1 Positive SD square-sum: 134 Positive DS square-sum: 2 Min negative SD: 3 Min negative DS: 1 Max negative SD: 9 Max negative DS: 1 Negative SD number: 4 Negative DS number: 2 Negative SD sum: 25 Negative DS sum: 2 Negative SD average: 6 Negative DS average: 1 Negative SD square-sum: 187 Negative DS square-sum: 2 One way results: Max SD delay: 0 Max DS delay: 0 Min SD delay: 0 Min DS delay: 0 Number of SD delay: 0 Number of DS delay: 0 Sum of SD delay: 0 Sum of DS delay: 0 Square-Sum of SD delay: 0 Square-Sum of DS delay: 0 SD lost packets: 0 DS lost packets: 0 Lost packets for unknown reason: 0 Voice scores: Max MOS value: 4.40 Min MOS value: 4.40 Max ICPIF value: 0 Min ICPIF value: 0 Reaction statistics: Index Checked Element Threshold Type Checked Num Over-threshold Num 1 ICPIF - - ­ 2 MOS - - -
# Display the statistics for the path jitter operation.
<Sysname> display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO. : 1 Path 1: Hop IP 192.168.40.210 Basic Results: Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 1/1/1 Square-Sum of round trip time: 10 Extended Results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 Path-Jitter Results: Jitter number: 9 Min/Max/Average jitter: 0/0/0 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0
31
p
Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0 Hop IP 192.168.50.209 Basic Results: Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 1/1/1 Square-Sum of round trip time: 10 Extended Results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 Path-Jitter Results: Jitter number: 9 Min/Max/Average jitter: 0/0/0 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0
Table 10 Command output
Field Descri
No. Statistics group ID.
Start time Time when the operation started.
Life time Duration of the operation in seconds.
Send operation times Number of probe packets sent.
Receive response times Number of response packets received.
Min/Max/Average round trip time Minimum/maximum/average round-trip time in milliseconds.
Square-Sum of round trip time Square sum of round-trip time.
Packet loss ratio Average packet loss ratio.
Failures due to timeout Number of timeout occurrences in an operation.
Failures due to disconnect Number of disconnections by the peer.
Failures due to no connection Number of failures to connect with the peer.
Failures due to internal error Number of failures due to internal errors.
Failures due to other errors Failures due to other errors.
Packets out of sequence Number of failures due to out-of-sequence packets.
tion
Packets arrived late Number of response packets received after a probe times out.
32
Field Description
UDP-jitter results
Voice results
RTT number Number of response packets received.
Min positive SD Minimum positive jitter from source to destination.
Min positive DS Minimum positive jitter from destination to source.
Max positive SD Maximum positive jitter from source to destination.
Max positive DS Maximum positive jitter from destination to source.
Positive SD number Number of positive jitters from source to destination.
Positive DS number Number of positive jitters from destination to source.
Positive SD sum Sum of positive jitters from source to destination.
Positive DS sum Sum of positive jitters from destination to source.
Positive SD average Average positive jitters from source to destination.
Positive DS average Average positive jitters from destination to source.
Positive SD square-sum Square sum of positive jitters from source to destination.
UDP jitter operation results.
This field is available only for the UDP jitter operation.
Voice operation results.
This field is available only for the voice operation.
Positive DS square-sum Square sum of positive jitters from destination to source.
Min negative SD
Min negative DS
Max negative SD
Max negative DS
Negative SD number Number of negative jitters from source to destination.
Negative DS number Number of negative jitters from destination to source.
Negative SD sum
Negative DS sum
Negative SD average
Negative DS average
Minimum absolute value among negative jitters from source to destination.
Minimum absolute value among negative jitters from destination to source.
Maximum absolute value among negative jitters from source to destination.
Maximum absolute value among negative jitters from destination to source.
Sum of absolute values of negative jitters from source to destination.
Sum of absolute values of negative jitters from destination to source.
Average absolute value of negative jitters from source to destination.
Average absolute value of negative jitters from destination to source.
Negative SD square-sum Square sum of negative jitters from source to destination.
Negative DS square-sum Square sum of negative jitters from destination to source.
33
Field Description
One way results
Max SD delay Maximum delay from source to destination.
Max DS delay Maximum delay from destination to source.
Min SD delay Minimum delay from source to destination.
Min DS delay Minimum delay from destination to source.
Number of SD delay Number of delays from source to destination.
Number of DS delay Number of delays from destination to source.
Sum of SD delay Sum of delays from source to destination.
Sum of DS delay Sum of delays from destination to source.
Square-Sum of SD delay Square sum of delays from source to destination.
Square-Sum of DS delay Square sum of delays from destination to source.
SD lost packets Number of lost packets from the source to the destination.
DS lost packets Number of lost packets from the destination to the source.
Lost packets for unknown reason Number of lost packets for unknown reasons.
Voice scores
Unidirectional delay result.
This field is available only for the UDP jitter and voice operations.
Voice parameters.
This field is available only for the voice operation.
Max MOS value Maximum MOS value.
Min MOS value Minimum MOS value.
Max ICPIF value Maximum ICPIF value.
Min ICPIF value Minimum ICPIF value.
Reaction statistics Statistics about the reaction entry in the counting interval.
Index ID of a reaction entry.
Checked Element Monitored element.
Threshold Type Threshold type.
Checked Num Number of targets that have been monitored for data collection.
Over-threshold Num Number of threshold violations.
Path
Hop IP
Path-jitter results
Serial number for the path in the path jitter operation.
This field is available only for the path jitter operation.
IP address of the hop.
This field is available only for the path jitter operation.
Path jitter operation results.
This field is available only for the path jitter operation.
Jitter number
Number of jitters.
This field is available only for the path jitter operation.
34
Field Description
Min/Max/Average jitter
Positive jitter number
Min/Max/Average positive jitter
Sum/Square-Sum positive jitter
Negative jitter number
Min/Max/Average negative jitter
Sum/Square-Sum negative jitter
Minimum/maximum/average positive jitter in milliseconds.
This field is available only for the path jitter operation.
Number of positive jitters.
This field is available only for the path jitter operation.
Minimum/maximum/average positive jitter in milliseconds.
This field is available only for the path jitter operation.
Sum/square sum of positive jitters.
This field is available only for the path jitter operation.
Number of negative jitters.
This field is available only for the path jitter operation.
Minimum/maximum/average negative jitter in milliseconds.
This field is available only for the path jitter operation.
Sum/square sum of negative jitters.
This field is available only for the path jitter operation.
Table 11 Description of the threshold monitoring fields
Monitored performance metric
Threshold type
Collect data in Checked Num Over-threshold Num
accumulate
probe-duration
probe-fail
RTT
jitter-DS/jitter-SD
OWD-DS/OWD-SD N/A
average N/A N/A N/A
consecutive
accumulate
consecutive
accumulate
average N/A N/A N/A
accumulate
average N/A N/A N/A
Probes in the counting interval.
Probes in the counting interval.
Probes in the counting interval.
Probes in the counting interval.
Packets sent in the counting interval.
Packets sent in the counting interval.
Packets sent in the counting interval.
Number of completed probes.
Number of completed probes.
Number of completed probes.
Number of completed probes.
Number of sent packets.
Number of sent packets.
Number of sent packets.
Number of probes of which the duration exceeds the threshold.
Number of probes of which the duration exceeds the threshold.
Number of probe failures.
Number of probe failures.
Number of packets of which the round-trip time exceeds the threshold.
Number of packets of which the one-way jitter exceeds the threshold.
Number of packets of which the one-way delay exceeds the threshold.
35
Monitored performance metric
packet-loss accumulate
ICPIF N/A N/A N/A N/A
MOS N/A N/A N/A N/A
Related commands
statistics interval

filename

Use filename to specify a file to be transferred between the FTP server and the FTP client.
Use undo filename to restore the default.
Syntax
filename filename
undo filename
Threshold type
Collect data in Checked Num Over-threshold Num
Packets sent in the counting interval.
Number of sent packets.
Number of packet loss.
Default
No file is specified.
Views
FTP operation view
Predefined user roles
network-admin
Parameters
filename: Specifies the name of a file, a case-sensitive string of 1 to 200 characters that cannot contain slashes (/).
Examples
# Specify config.txt as the file to be transferred between the FTP server and the FTP client.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] filename config.txt

frequency

Syntax
Use frequency to specify the interval at which the NQA operation repeats.
Use undo frequency to restore the default.
frequency interval
36
undo frequency
Default
In NQA operation view, the interval between two consecutive voice or path jitter operations is 60000 milliseconds. The interval between two consecutive operations of other types is 0 milliseconds. Only one operation is performed.
Views
Any NQA operation view
Predefined user roles
network-admin
Parameters
interval: Specifies the interval between two consecutive operations, in the range of 0 to 604800000 milliseconds. An interval of 0 milliseconds sets NQA to perform the operation only once, and not to generate any statistics.
Usage guidelines
If an operation is not completed when the interval is reached, the next operation does not start.
Examples
# Configure the ICMP echo operation to repeat at an interval of 1000 milliseconds.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] frequency 1000

history-record enable

Use history-record enable to enable the saving of history records for the NQA operation.
Use undo history-record enable to disable the saving of history records.
Syntax
history-record enable
undo history-record enable
Default
The saving of history records is enabled only for the UDP tracert operation.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view
ICMP/UDP echo operation view
UDP tracert operation view
Predefined user roles
network-admin
Usage guidelines
To display the history records of the NQA operation, use the display nqa history command.
37
The undo form of the command also removes existing history records of an NQA operation.
Examples
# Enable the saving of history records for the NQA operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record enable
Related commands
display nqa history

history-record keep-time

Use history-record keep-time to set the lifetime of history records for an NQA operation.
Use undo history-record keep-time to restore the default.
Syntax
history-record keep-time keep-time
undo history-record keep-time
Default
The history records of an NQA operation are kept for 120 minutes.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view
ICMP/UDP echo operation view
UDP tracert operation view
Predefined user roles
network-admin
Parameters
keep-time: Specifies how long the history records can be saved. The value is in the range of 1 to 1440 minutes.
Usage guidelines
When an NQA operation completes, the timer starts. All records are removed when the lifetime is reached.
Examples
# Set the lifetime of the history records to 100 minutes for an NQA operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record keep-time 100
38

history-record number

Use history-record number to set the maximum number of history records that can be saved for an NQA operation.
Use undo history-record number to restore the default.
Syntax
history-record number number
undo history-record number
Default
A maximum of 50 records can be saved for an NQA operation.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view
ICMP/UDP echo operation view
UDP tracert operation view
Predefined user roles
network-admin
Parameters
number: Specifies the maximum number of history records that can be saved for an NQA operation. The value is in the range of 0 to 50.
Usage guidelines
If the number of history records for an NQA operation exceeds the maximum number, earliest history records are removed.
Examples
# Set the maximum number of history records to 10 for an NQA operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record number 10

init-ttl

Use init-ttl to set the TTL value for UDP packets in the start round of the UDP tracert operation.
Use undo init-ttl to restore the default.
Syntax
Default
init-ttl value
undo init-ttl
The NQA client sends a UDP packet with the TTL value 1 to start the UDP tracert operation.
39
Views
UDP tracert operation view
Predefined user roles
network-admin
Parameters
value: Specifies the TTL value in the range of 1 to 255.
Examples
# Set the TTL value to 5 for the UDP packets in the start round.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-tracert [Sysname-nqa-admin-test-udp-tracert] init-ttl 5

lsr-path

Use lsr-path to specify a loose source routing (LSR) path.
Use undo lsr-path to restore the default.
Syntax
lsr-path ip-address&<1-8 >
undo lsr-path
Default
No LSR path is configured.
Views
Path jitter operation view
Predefined user roles
network-admin
Parameters
ip-address&<1-8 >: Specifies a space-separated list of up to eight IP addresses. Each IP address represents a hop on the path.
Usage guidelines
The path jitter operation first uses tracert to detect each hop to the destination. It then sends ICMP echo re ques ts t o me asu re th e de lay a nd j itt ers from t he s ource to each node. If m ult ipl e rou tes exi st b etwe en t he source and destination, the operation uses the path specified by using lsr-path command.
Examples
# Specify 10.1.1.20 and 10.1.2.10 as the hops on the LSR path for the path jitter operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type path-jitter [Sysname-nqa-admin-test- path-jitter] lsr-path 10.1.1.20 10.1.2.10
40

max-failure

Use max-failure to set the maximum number of consecutive probe failures in a UDP tracert operation.
Use undo max-failure to restore the default.
Syntax
max-failure value
undo max-failure
Default
A UDP tracert operation stops and fails when it detects five consecutive probe failures.
Views
UDP tracert operation view
Predefined user roles
network-admin
Parameters
value: Specifies the maximum number in the range of 0 to 255. When this argument is set to 0 or 255, the UDP tracert operation does not stop when consecutive probe failures occur.
Usage guidelines
When a UDP tracert operation detects the maximum number of consecutive probe failures, the operation fails and stops probing the path.
Examples
# Set the maximum number of consecutive probe failures to 20 in a UDP tracert operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-tracert [Sysname-nqa-admin-test-udp-tracert] max-failure 20

mode

Use mode to set the data transmission mode for the FTP operation.
Use undo mode to restore the default.
Syntax
mode { active | passive }
undo mode
Default
The FTP operation uses the data transmission mode active.
Views
FTP operation view
Predefined user roles
network-admin
41
Parameters
active: Sets the data transmission mode to active. The FTP server initiates a connection request.
passive: Sets the data transmission mode to passive. The FTP client initiates a connection request.
Examples
# Set the data transmission mode to passive for the FTP operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] mode passive

next-hop

Use next-hop to specify the next hop for the ICMP echo operation.
Use undo next-hop to remove the next hop IP address.
Syntax
next-hop ip-address
undo next-hop
Default
No next hop IP address is configured for the ICMP echo operation.
Views
ICMP echo operation view
Predefined user roles
network-admin
Parameters
ip-address: Specifies the IP address of the next hop.
Examples
# Specify 10.1.1.1 as the next hop IP address for the ICMP echo operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] next-hop 10.1.1.1

next-hop ipv6

Use next-hop ipv6 to specify the next hop IPv6 address for the ICMP echo operation.
Syntax
Use undo next-hop ipv6 to remove the next hop IPv6 address.
next-hop ipv6 ipv6-address
undo next-hop ipv6
42
Default
No next hop IPv6 address is configured for the ICMP echo operation.
Views
ICMP echo operation view
Predefined user roles
network-admin
Parameters
ipv6-address: Specifies the IPv6 address of the next hop. IPv6 link-local addresses are not supported.
Examples
# Specify 10::1 as the next hop IPv6 address for the ICMP echo operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] next-hop ipv6 10::1

no-fragment enable

Use no-fragment enable to enable the no-fragmentation function.
Use undo no-fragment enable to disable the no-fragmentation function.
Syntax
no-fragment enable
undo no-fragment enable
Default
The no-fragmentation function is disabled.
Views
UDP tracert operation view
Predefined user roles
network-admin
Usage guidelines
The no-fragmentation function sets the DF field to 1. Packets with the DF field set cannot be fragmented during the forwarding process.
You can use this command to test the path MTU of a link.
Examples
# Enable the no-fragmentation function for the UDP tracert operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-tracert [Sysname-nqa-admin-test-udp-tracert] no-fragment enable
43
nqa
Use nqa to create an NQA operation and enter its view.
Use undo nqa to remove the operation.
Syntax
nqa entry admin-name operation-tag
undo nqa { all | entry admin-name operation-tag }
Default
No NQA operation is created.
Views
System view
Predefined user roles
network-admin
Parameters
admin-name operation-tag: Specifies an NQA operation by its administrator name and operation tag. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-).
all: Removes all NQA operations.
Usage guidelines
If the operation type has been configured for the operation, the command directly places you to NQA operation view.
Examples
# Create an NQA operation with administrator name admin and operation tag test, and enter NQA operation view.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test]

nqa agent enable

Use nqa agent enable to enable the NQA client.
Use undo nqa agent enable to disable the NQA client and stop all operations being performed.
Syntax
nqa agent enable
undo nqa agent enable
Default
The NQA client is enabled.
44
Views
System view
Predefined user roles
network-admin
Examples
# Enable the NQA client.
<Sysname> system-view [Sysname] nqa agent enable
Related commands
nqa server enable

nqa schedule

Use nqa schedule to configure scheduling parameters for an NQA operation.
Use undo nqa schedule to stop the operation.
Syntax
nqa schedule admin-name operation-tag start-time { hh:mm:ss [ yyyy/mm/dd | mm/dd/yyyy ] | now } lifetime { lifetime | forever } [ recurring ]
undo nqa schedule admin-name operation-tag
Default
No schedule is configured for an NQA operation.
Views
System view
Predefined user roles
network-admin
Parameters
admin-name operation-tag: Specifies an NQA operation by its administrator name and operation tag. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-).
start-time: Specifies the start time and date of the NQA operation.
hh:mm:ss: Specifies the start time of an NQA operation.
yyyy/mm/dd: Specifies the start date of an NQA operation. The default value is the current system time, and the value for the yyyy argument is in the range of 2000 to 2035.
mm/dd/yyyy: Specifies the start date of an NQA operation. The default value is the current system time, and the value for the yyyy argument is in the range of 2000 to 2035.
now: Starts the operation immediately.
lifetime: Specifies the duration of an operation.
lifetime: Specifies the duration of an operation in seconds, in the range of 1 to 2147483647.
45
forever: Performs the operation until you stop it by using the undo nqa schedule command.
recurring: Runs the operation automatically at the start time and for the specified duration.
Usage guidelines
You cannot enter the operation view or operation type view of a scheduled NQA operation.
Specify a lifetime long enough for an operation to complete.
Examples
# Schedule the operation with the administrator name admin and operation tag test to start on 08:08:08 2008/08/08 and last 1000 seconds.
<Sysname> system-view [Sysname] nqa schedule admin test start-time 08:08:08 2008/08/08 lifetime 1000 recurring
Related commands
destination ip
nqa entry
type

operation (FTP operation view)

Use operation to specify the operation type for the FTP operation.
Use undo operation to restore the default.
Syntax
operation { get | put }
undo operation
Default
The FTP operation type is get.
Views
FTP operation view
Predefined user roles
network-admin
Parameters
get: Gets a file from the FTP server.
put: Transfers a file to the FTP server.
Usage guidelines
When you perform the put operation with the filename command configured, make sure the file exis ts on the NQA client.
If you get a file from the FTP server, make sure the file specified in the URL exists on the FTP server. The NQA client does not save the file obtained from the FTP server.
Use a small file for the FTP operation. A big file might result in transfer failure because of timeout, or might affect other services for occupying much network bandwidth.
46
Examples
# Set the operation type to put for the FTP operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] operation put

operation (HTTP operation view)

Use operation to specify the operation type for the HTTP operation.
Use undo operation to restore the default.
Syntax
operation { get | post | raw }
undo operation
Default
The HTTP operation type is get.
Views
HTTP operation view
Predefined user roles
network-admin
Parameters
get: Gets data from the HTTP server.
post: Transfers data to the HTTP server.
raw: Sends the HTTP request specified by the raw-request command to the HTTP server.
Usage guidelines
For the HTTP get or post operation, the content in the HTTP request is obtained from the URL specified by the url command.
For the HTTP raw operation, the content in the HTTP request is specified by the raw-request command.
Examples
# Set the operation type to raw for the HTTP operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] operation raw

out interface

Use out interface to specify the output interface for probe packets.
Use undo out interface to restore the default.
47
Syntax
out interface interface-type interface-number
undo out interface
Default
The output interface for probe packets is not specified. The NQA client determines the output interface based on the routing table lookup.
Views
DHCP operation view, ICMP echo operation view, UDP tracert operation view
Predefined user roles
network-admin
Parameters
interface-type interface-number: Specifies an interface by its type and number.
Usage guidelines
For successful operation, the specified output interface must be up.
If the next-hop command i s configured for an ICM P echo operation, the out interface command does not take effect.
Examples
# Specify GigabitEthernet 2/0/1 as the output interface for probe packets in the UDP tracert operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-tracert [Sysname-nqa-admin-test-udp-tracert] out interface gigabitethernet 2/0/1

password

Use password to specify the FTP or HTTP login password.
Use undo password to remove the configuration.
Syntax
password { cipher | simple } password
undo password
Default
No FTP or HTTP login password is configured.
Views
FTP/HTTP operation view
Predefined user roles
network-admin
Parameters
cipher: Sets a ciphertext password.
simple: Sets a plaintext password.
48
password: Specifies the password string. This argument is case sensitive. If you specify the simple keyword, the password must be a string of 1 to 32 characters. If you specify the cipher keyword, the password must be a string of 1 to 73 characters.
Usage guidelines
For security purposes, all passwords, including passwords configured in plain text, are saved in cipher text.
Examples
# Set the FTP login password to ftpuser.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] password simple ftpuser
Related commands
operation
username

probe count

Use probe count to specify the probe times.
Use undo probe count to restore the default.
Syntax
probe count times
undo probe count
Default
In an UDP tracert operation, the NQA client performs three probes to each hop along the path.
In other types of operations, the NQA client performs one probe to the destination per operation.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view
ICMP/UDP echo operation view
UDP jitter operation view
UDP tracert operation view
Predefined user roles
network-admin
Parameters
times: Specifies the probe times.
For the UDP tracert operation, this argument specifies the times of probes to each hop along the
path. The value range for this argument is 1 to 10.
For other types of operations, this argument specifies the times of probes to the destination per
operation. The value range for this argument is 1 to 15.
49
Usage guidelines
The following describes how NQA performs different types of operations:
A TCP or DLSw operation sets up a connection.
A UDP jitter or voice operation sends a number of probe packets. The number of probe packets is
set by using the probe packet-number command.
An FTP operation uploads or downloads a file.
An HTTP operation gets a Web page.
A DHCP operation gets an IP address through DHCP.
A DNS operation translates a domain name to an IP address.
An ICMP echo sends an ICMP echo request.
A UDP echo operation sends a UDP packet.
An SNMP operation sends one SNMPv1 packet, one SNMPv2c packet, and one SNMPv3 packet.
A path jitter operation is accomplished in the following steps:
a. The operation uses tracert to obtain the path from the NQA client to the destination. A
b. The NQA client sends ICMP echo requests to each hop along the path. The number of ICMP
maximum of 64 hops can be detected.
echo requests is set by using the probe packet-number command.
A UDP tracert operation determines the routing path from the source to the destination. The number
of probes to each hop is set by using the probe count command.
If an operation is to perform multiple probes, the NQA client starts a new probe in one of the following conditions:
The NQA client receives responses to packets sent in the last probe.
The probe timeout time expires.
This command is not available for the voice and path jitter operations. Each of these operations performs only one probe.
Examples
# Configure the ICMP echo operation to perform 10 probes.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] probe count 10

probe packet-interval

Use probe packet-interval to configure the interval for sending packets in the probe.
Use undo probe packet-interval to restore the default.
Syntax
Default
probe packet-interval packet-interval
undo probe packet-interval
The interval is 20 milliseconds.
50
Views
Path jitter operation view, UDP jitter operation view, voice operation view
Predefined user roles
network-admin
Parameters
packet-interval: Specifies the interval for sending packets, in the range of 10 to 60000 milliseconds.
Examples
# Configure the UDP jitter operation to send packets at an interval of 100 milliseconds.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] probe packet-interval 100

probe packet-number

Use probe packet-number to set the number of packets to be sent in a UDP jitter, path jitter, or voice probe.
Use undo probe packet-number to restore the default.
Syntax
probe packet-number packet-number
undo probe packet-number
Default
A UDP jitter or path jitter probe sends 10 packets and a voice probe sends 1000 packets.
Views
Path jitter operation view, UDP jitter operation view, voice operation view
Predefined user roles
network-admin
Parameters
packet-number: Specifies the number of packets to be sent per probe. Available value ranges include:
10 to 1000 for the UDP jitter or path jitter operation.
10 to 60000 for the voice operation.
Examples
# Configure the UDP jitter probe to send 100 packets.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] probe packet-number 100
51

probe packet-timeout

Use probe packet-timeout to set the timeout time for waiting for a response in the UDP jitter, path jitter, or voice operation.
Use undo probe packet-timeout to restore the default.
Syntax
probe packet-timeout packet-timeout
undo probe packet-timeout
Default
The response timeout time in the UDP jitter or path jitter operation is 3000 milliseconds.
The response timeout time in the voice operation is 5000 milliseconds.
Views
Path jitter operation view, UDP jitter operation view, voice operation view
Predefined user roles
network-admin
Parameters
packet-timeout: Specifies the timeout time in milliseconds. The value is in the range of 10 to 3600000.
Examples
# Set the timeout time to 100 milliseconds for waiting for a response in the UDP jitter operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] probe packet-timeout 100

probe timeout

Use probe timeout to set the probe timeout time.
Use undo probe timeout to restore the default.
Syntax
probe timeout timeout
undo probe timeout
Default
The timeout time of a probe is 3000 milliseconds.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view
ICMP/UDP echo operation view
UDP tracert operation view
52
Predefined user roles
network-admin
Parameters
timeout: Specifies the probe timeout time in milliseconds. Available value ranges include:
10 to 86400000 for the FTP or HTTP operation.
10 to 3600000 for the DHCP, DNS, DLSw, ICMP echo, SNMP, TCP, UDP echo, or UDP tracert
operation.
Usage guidelines
If a probe does not complete within the period, the probe is timed out.
Examples
# Set the probe timeout time to 10000 milliseconds for the DHCP operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type dhcp [Sysname-nqa-admin-test-dhcp] probe timeout 10000

raw-request

Use raw-request to enter raw-request view and specify the content of an HTTP request.
Use undo raw-request to delete the content of an HTTP request.
Syntax
raw-request
undo raw-request
Default
No contents are specified.
Views
HTTP operation view
Predefined user roles
network-admin
Usage guidelines
This command places you in raw request view and deletes the content of the previously configured GET request.
Examples
# Enter raw request view and specify the content of a request for the HTTP operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] raw-request [Sysname-nqa-admin-test-http-raw-request]
53

reaction checked-element { jitter-ds | jitter-sd }

Use reaction checked-element { jitter-ds | jitter-sd } to configure a reaction entry for monitoring one-way jitter in the NQA operation.
Use undo reaction to delete the specified reaction entry.
Syntax
reaction item-number checked-element { jitter-ds | jitter-sd } threshold-type { accumulate
accumulate-occurrences | average } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ]
undo reaction item-number
Default
No reaction entry for monitoring one-way jitter is configured.
Views
UDP jitter operation view, voice operation view
Predefined user roles
network-admin
Parameters
item-number: Assigns an ID to the reaction entry, in the range of 1 to 10.
jitter-ds: Specifies the destination-to-source jitter of each probe packet as the monitored element (or performance metric).
jitter-sd: Specifies source-to-destination jitter of each probe packet as the monitored element.
threshold-type: Specifies a threshold type.
accumulate accumulate-occurrences: Checks the total number of threshold violations in the operation.
The value is in the range of 1 to 14999 for the UDP jitter operation, and 1 to 59999 for the voice operation.
average: Checks the average one-way jitter.
threshold-value: Specifies threshold range in milliseconds.
upper-threshold: Specifies the upper limit in the range of 0 to 3600000.
lower-threshold: Specifies the lower limit in the range of 0 to 3600000. It must not be greater than the
upper limit.
action-type: Specifies what action to be triggered. The default action is none.
none: Specifies the action of displaying results on the terminal display.
trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending
SNMP trap messages to the NMS.
Usage guidelines
You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the undo reaction command to delete the entry, and then configure a new one.
Only successful probe packets are monitored. Statistics about failed probe packets are not collected.
54
Examples
# Create reaction entry 1 for monitoring the average destination-to-source jitter of UDP jitter packets, and set the upper limit to 50 milliseconds and the lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the average destination-to-source jitter is checked against the threshold range. If it exceeds the upper limit, the state of the reaction entry is set to over-threshold. If it is below the lower limit, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element jitter-ds threshold-type
average threshold-value 50 5 action-type trap-only
# Create reaction entry 2 for monitoring the destination-to-source jitter of UDP jitter probe packets, and set the upper limit to 50 milliseconds, and the lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the destination-to-source jitter is checked against the threshold range. If the total number of threshold violations reaches or exceeds 100, the state of the entry is set to over-threshold. Otherwise, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 2 checked-element jitter-ds threshold-type
accumulate 100 threshold-value 50 5 action-type trap-only

reaction checked-element { owd-ds | owd-sd }

Use reaction checked-element { owd-ds | owd-sd } to configure a reaction entry for monitoring the one-way delay.
Use undo reaction to delete the specified reaction entry.
Syntax
reaction item-number checked-element { owd-ds | owd-sd } threshold-value upper-threshold
lower-threshold
undo reaction item-number
Default
No reaction entry for monitoring the one-way delay is configured.
Views
UDP jitter operation view, voice operation view
Predefined user roles
network-admin
Parameters
item-number: Assigns an ID to the reaction entry, in the range of 1 to 10.
owd-ds: Specifies the destination-to-source delay of each probe packet as the monitored element.
owd-sd: Specifies the source-to-destination delay of each probe packet as the monitored element.
55
threshold-value: Specifies threshold range in milliseconds.
upper-threshold: Specifies the upper limit in the range of 0 to 3600000.
lower-threshold: Specifies the lower limit in the range of 0 to 3600000. It must not be greater than the upper limit.
Usage guidelines
You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the undo reaction command to delete the entry, and then configure a new one.
Only successful probe packets are monitored. Statistics about failed probe packets are not collected.
No actions can be configured for a reaction entry of monitoring one-way delays. To display the monitoring results and statistics, use the display nqa reaction counters and display nqa statistics commands.
Examples
# Create reaction entry 1 for monitoring the destination-to-source delay of every UDP jitter packet, and set the upper limit to 50 milliseconds and lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. The destination-to-source delay is calculated after the response to the probe packet arrives. If the delay exceeds the upper limit, the state of the reaction entry is set to over-threshold. If it is below the lower limit, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element owd-ds threshold-value 50
5

reaction checked-element icpif

Use reaction checked-element icpif to configure a reaction entry for monitoring the ICPIF value in the voice operation.
Use undo reaction to delete the specified reaction entry.
Syntax
reaction item-number checked-element icpif threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ]
undo reaction item-number
Default
No reaction entry for monitoring ICPIF values is configured.
Views
Voice operation view
Predefined user roles
network-admin
Parameters
item-number: Assigns an ID to the reaction entry, in the range of 1 to 10.
threshold-value: Specifies threshold range.
56
upper-threshold: Specifies the upper limit in the range of 1 to 100.
lower-threshold: Specifies the lower limit in the range of 1 to 100. It must not be greater than the upper limit.
action-type: Specifies what action to be triggered. The default action is none.
none: Specifies the action of displaying results on the terminal display.
trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending
SNMP trap messages to the NMS.
Usage guidelines
You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the
undo reaction command to delete the entry, and then configure a new one.
Examples
# Create reaction entry 1 for monitoring the ICPIF value in the voice operation, and set the upper limit to 50 and lower limit to 5. Before the voice operation starts, the initial state of the reaction entry is invalid. After the operation, the ICPIF value is checked against the threshold range. If it exceeds the upper limit, the state of the reaction entry is set to over-threshold. If it is below the lower limit, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] reaction 1 checked-element icpif threshold-value 50 5
action-type trap-only

reaction checked-element mos

Use reaction checked-element mos to configure a reaction entry for monitoring the MOS value in the voice operation.
Use undo reaction to delete the specified reaction entry.
Syntax
reaction item-number checked-element mos threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ]
undo reaction item-number
Default
No reaction entry for monitoring the MOS value is configured.
Views
Voice operation view
Predefined user roles
network-admin
Parameters
item-number: Assigns an ID to the reaction entry, in the range of 1 to 10.
threshold-value: Specifies threshold range.
57
upper-threshold: Specifies the upper limit in the range of 1 to 500.
lower-threshold: Specifies the lower limit in the range of 1 to 500. It must not be greater than the upper limit.
action-type: Specifies what action to be triggered. The default action is none.
none: Specifies the action of displaying results on the terminal display.
trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending
SNMP trap messages to the NMS.
Usage guidelines
You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the undo reaction command to delete the entry, and then configure a new one.
For the MOS threshold, the number is expressed in three digits representing ones, tenths, and hundredths. For example, to express a MOS threshold of 1, enter 100.
Examples
# Create reaction entry 1 for monitoring the MOS value of the voice operation, and set the upper limit to 2 and lower limit to 1. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the MOS value is checked against the threshold range. If it exceeds the upper limit, the state of the reaction entry is set to over-threshold. If it is below the lower limit, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] reaction 1 checked-element mos threshold-value 200 100
action-type trap-only

reaction checked-element packet-loss

Use reaction checked-element packet-loss to configure a reaction entry for monitoring packet loss in UDP jitter or voice operation.
Use undo reaction to delete the specified reaction entry.
Syntax
reaction item-number checked-element packet-loss threshold-type accumulate accumulate-occurrences [ action-type { none | trap-only } ]
undo reaction item-number
Default
No reaction entry for monitoring packet loss is configured.
Views
UDP jitter operation view, voice operation view
Predefined user roles
network-admin
Parameters
item-number: Assigns an ID to the reaction entry, in the range of 1 to 10.
58
threshold-type: Specifies a threshold type.
accumulate accumulate-occurrences: Specifies the total number of lost packets in the operation. The
value is in the range of 1 to 15000 for the UDP jitter operation and 1 to 60000 for the voice operation.
action-type: Specifies what action to be triggered. The default action is none.
none: Specifies the action of displaying results on the terminal display.
trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending
SNMP trap messages to the NMS.
Usage guidelines
You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the
undo reaction command to delete the entry, and then configure a new one.
Examples
# Create reaction entry 1 for monitoring packet loss in the UDP jitter operation. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the total number of the lost packets is checked against the threshold. If the number reaches or exceeds 100, the state of the reaction entry is set to over-threshold. Otherwise, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element packet-loss
threshold-type accumulate 100 action-type trap-only

reaction checked-element probe-duration

Use reaction checked-element probe-duration to configure a reaction entry for monitoring the probe duration.
Use undo reaction to delete the specified reaction entry.
Syntax
reaction item-number checked-element probe-duration threshold-type { accumulate
accumulate-occurrences | average | consecutive consecutive-occurrences } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ]
undo reaction item-number
Default
No reaction entry for monitoring the probe duration is configured.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view
ICMP/UDP echo operation view
Predefined user roles
network-admin
Parameters
item-number: Assigns an ID to the reaction entry, in the range of 1 to 10.
59
threshold-type: Specifies a threshold type.
accumulate accumulate-occurrences: Checks the total number of threshold violations. The value is in the
range of 1 to 15.
average: Checks the average probe duration.
consecutive consecutive-occurrences: Specifies the number of consecutive threshold violations after the
NQA operation starts. The value is in the range of 1 to 16.
threshold-value: Specifies threshold range in milliseconds.
upper-threshold: Specifies the upper limit in the range of 0 to 3600000.
lower-threshold: Specifies the lower limit in the range of 0 to 3600000. It must not be greater than the
upper threshold.
action-type: Specifies what action to be triggered. The default action is none.
none: Specifies the action of displaying results on the terminal display.
trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending
SNMP trap messages to the NMS. This keyword is not available for the DNS operation.
Usage guidelines
You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the
undo reaction command to delete the entry, and then configure a new one.
Examples
Only successful probe packets are monitored. Statistics about failed probe packets are not collected.
# Create reaction entry 1 for monitoring the average probe duration of ICMP echo operation, and set the upper limit to 50 milliseconds and lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the average probe duration is checked. If it exceeds the upper limit, the state is set to over-threshold. If it is below the lower limit, the state of the reaction entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 1 checked-element probe-duration
threshold-type average threshold-value 50 5 action-type trap-only
# Create reaction entry 2 for monitoring the probe duration of ICMP echo operation, and set the upper limit to 50 milliseconds and the lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the accumulated probe duration is checked against the threshold range. If the total number of threshold violations reaches or exceeds 10, the state of the entry is set to over-threshold. If it is below the lower threshold, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 2 checked-element probe-duration
threshold-type accumulate 10 threshold-value 50 5 action-type trap-only
# Create reaction entry 3 for monitoring the probe duration time of ICMP echo operation, and set the upper limit to 50 milliseconds and the lower limit to 5 milliseconds. Before the NQA operation starts, the
60
initial state of the reaction entry is invalid. After the operation, the consecutive probe duration is checked against the threshold range. If the total number of consecutive threshold violations reaches or exceeds 10, the state of the entry is set to over-threshold. If it is below the lower threshold, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 3 checked-element probe-duration
threshold-type consecutive 10 threshold-value 50 5 action-type trap-only

reaction checked-element probe-fail (for trap)

Use reaction checked-element probe-fail to configure a reaction entry for monitoring the probe failures of the operation.
Use undo reaction to delete the specified reaction entry.
Syntax
reaction item-number checked-element probe-fail threshold-type { accumulate accumulate-occurrences | consecutive consecutive-occurrences } [ action-type { none | trap-only } ]
undo reaction item-number
Default
No reaction entry for monitoring probe failures is configured.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view
ICMP/UDP echo operation view
Predefined user roles
network-admin
Parameters
item-number: Assigns an ID to the reaction entry, in the range of 1 to 10.
threshold-type: Specifies a threshold type.
accumulate accumulate-occurrences: Checks the total number of probe failures. The value is in the range
of 1 to 15.
consecutive consecutive-occurrences: Checks the maximum number of consecutive probe failures. The value is in the range of 1 to 16.
action-type: Specifies what action to be triggered. The default action is none.
none: Specifies the action of displaying results on the terminal display.
trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending
SNMP trap messages to the NMS. This keyword is not available for the DNS operation.
Usage guidelines
You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the undo reaction command to delete the entry, and then configure a new one.
61
Examples
# Create reaction entry 1 for monitoring the probe failures in ICMP echo operation. Before the NQA operation starts, the initial state of the reaction entry is invalid. If the total number of probe failures reaches or exceeds 10, the state of the entry is set to over-threshold. If it is below the threshold, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 1 checked-element probe-fail threshold-type
accumulate 10 action-type trap-only
# Create reaction entry 2 for monitoring the probe failures in ICMP echo operation. Before the NQA operation starts, the initial state of the reaction entry is invalid. If the number of consecutive probe failures reaches or exceeds 10, the state of the entry is set to over-threshold. If it is below the threshold, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 2 checked-element probe-fail threshold-type
consecutive 10 action-type trap-only

reaction checked-element probe-fail (for trigger)

Use reaction checked-element probe-fail to configure a reaction entry for monitoring probe failures.
Use undo reaction to remove the specified reaction entry.
Syntax
reaction item-number checked-element probe-fail threshold-type consecutive consecutive-occurrences action-type trigger-only
undo reaction item-number
Default
No reaction entry for monitoring probe failures is configured.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view
ICMP/UDP echo operation view
Predefined user roles
network-admin
Parameters
item-number: Assigns an ID to the reaction entry, in the range of 1 to 10.
threshold-type: Specifies a threshold type.
consecutive consecutive-occurrences: Checks the maximum number of consecutive probe failures, in the
range of 1 to 16.
action-type: Specifies what action to be triggered.
62
trigger-only: Triggers other modules to react to certain conditions.
Usage guidelines
You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the
undo reaction command to delete the entry, and then configure a new one.
Examples
# Create reaction entry 1. If the number of consecutive probe failures reaches 3, collaboration is triggered.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type tcp [Sysname-nqa-admin-test-tcp] reaction 1 checked-element probe-fail threshold-type
consecutive 3 action-type trigger-only
Related commands
track (High Availability Command Reference)

reaction checked-element rtt

Use reaction checked-element rtt to configure a reaction entry for monitoring packet round-trip time.
Use undo reaction to delete the specified reaction entry.
Syntax
reaction item-number checked-element rtt threshold-type { accumulate accumulate-occurrences | average } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ]
undo reaction item-number
Default
No reaction entry for monitoring packet round-trip time is configured.
Views
UDP jitter operation view, voice operation view
Predefined user roles
network-admin
Parameters
item-number: Assigns an ID to the reaction entry, in the range of 1 to 10.
threshold-type: Specifies a threshold type.
accumulate accumulate-occurrences: Checks the total number of threshold violations. Available value
ranges include:
1 to 15000 for the UDP jitter operation.
1 to 60000 for the voice operation.
average: Checks the packet average round-trip time.
threshold-value: Specifies threshold range in milliseconds.
upper-threshold: Specifies the upper limit in the range of 0 to 3600000.
63
lower-threshold: Specifies the lower limit in the range of 0 to 3600000. It must not be greater than the upper limit.
action-type: Specifies what action to be triggered. The default action is none.
none: Specifies the action of displaying results on the terminal display.
trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending
SNMP trap messages to the NMS.
Usage guidelines
You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the undo reaction command to delete the entry, and then configure a new one.
Only successful probe packets are monitored. Statistics about failed probe packets are not collected.
Examples
# Create reaction entry 1 for monitoring the average round-trip time of UDP jitter probe packets, and set the upper limit to 50 milliseconds and lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the average packet round-trip time is checked. If it exceeds the upper limit, the state is set to over-threshold. If it is below the lower limit, the state is set to below-threshold. Once the reaction entry state changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element rtt threshold-type
average threshold-value 50 5 action-type trap-only
# Create reaction entry 2 for monitoring the round-trip time of UDP jitter probe packets, and set the upper limit to 50 milliseconds and lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the packet round-trip time is checked. If the total number of threshold violations reaches or exceeds 100, the state of the entry is set to over-threshold. Otherwise, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element rtt threshold-type
accumulate 100 threshold-value 50 5 action-type trap-only

reaction trap

Use reaction trap to configure the sending of traps to the NMS under specific conditions.
Use undo reaction trap to restore the default.
Syntax
reaction trap { path-change | probe-failure consecutive-probe-failures | test-complete | test-failure [ cumulate-probe-failures ] }
undo reaction trap { path-change | probe-failure | test-complete | test-failure }
Default
No traps are sent to the NMS.
64
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view
ICMP/UDP echo operation view
UDP jitter operation view
UDP tracert operation view
Predefined user roles
network-admin
Parameters
path-change: Sends a trap when the UDP tracert operation detects a different path to the destination.
probe-failure consecutive-probe-failures: Sends a trap to the NMS if the number of consecutive probe
failures in an operation is greater than or equal to consecutive-probe-failures. The value range for the consecutive-probe-failures argument is 1 to 15. The system counts the number of consecutive probe
failures for each operation, so multiple traps might be sent.
test-complete: Sends a trap to indicate that the operation is completed.
test-failure: Sends a trap when an operation fails. For operations other than UDP tracert operation, the
system counts the total number of probe failures in an operation. If the number reaches or exceeds the value for the cumulate-probe-failures argument, a trap is sent for the operation failure.
cumulate-probe-failures: Specifies the total number of probe failures in an operation. The value range for the cumulate-probe-failures argument is 1 to 15. This argument is not supported by the UDP tracert operation.
Usage guidelines
The UDP jitter and voice operations support only the test-complete keyword.
The UDP tracert operation supports the path-change, test-complete, and test-failure keywords.
Examples
# Configure the system to send a trap if five or more consecutive probe failures occur in an ICMP echo operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction trap probe-failure 5

resolve-target

Use resolve-target to specify the domain name for the DNS operation.
Use undo resolve-target to restore the default.
Syntax
Default
resolve-target domain-name
undo resolve-target
No domain name is configured.
65
Views
DNS operation view
Predefined user roles
network-admin
Parameters
domain-name: Specifies the domain name to be resolved. It is a dot-separated case-sensitive string of 1 to 255 characters including letters, digits, hyphens (-), and underscores (_) (for example, aabbcc.com). Each part consists of 1 to 63 characters, and consecutive dots (.) are not allowed.
Examples
# Specify domain1 as the domain name to be resolved.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type dns [Sysname-nqa-admin-test-dns] resolve-target domain1

route-option bypass-route

Use route-option bypass-route to enable the routing table bypass function to test the connectivity to the direct destination.
Use undo route-option bypass-route to disable the routing table bypass function.
Syntax
route-option bypass-route
undo route-option bypass-route
Default
The routing table bypass function is disabled.
Views
DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view
ICMP/UDP echo operation view
UDP jitter operation view
UDP tracert operation view
Predefined user roles
network-admin
Usage guidelines
Examples
When the routing table bypass function is enabled, the following events occur:
The routing table is not searched. Packets are sent directly to the destination in a directly connected
network.
The TTL value in the probe packet is set to 1. The TTL set in the ttl command does not take effect.
# Enable the routing table bypass function.
<Sysname> system-view
66
[Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] route-option bypass-route

source interface

Use source interface to specify the IP address of the specified interface as the source IP address of probe packets.
Use undo source interface to restore the default.
Syntax
source interface interface-type interface-number
undo source interface
Default
No source IP address is specified for probe packets. The probe packets take the primary IP address of the outgoing interface as their source IP address.
Views
ICMP echo operation view, UDP tracert operation view
Predefined user roles
network-admin
Parameters
interface-type interface-number: Specifies an interface by its type and number.
Usage guidelines
If you configure the source interface command with the source ip or source ipv6 command, the most recent configuration takes effect.
The specified source interface must be up. Otherwise, no probe requests can be sent out.
Examples
# Specify the IP address of interface GigabitEthernet 2/0/1 as the source IP address of ICMP echo request packets.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] source interface gigabitethernet 2/0/1
Related commands

source ip

source ip
Use source ip to configure the source IP address for probe packets.
Use undo source ip to remove the configured source address. The IP address of the interface that sends a probe packet is the source IP address of the probe packet.
67
Syntax
source ip ip-address
undo source ip
Default
No source IP address is configured for probe packets.
Views
DHCP/DLSw/FTP/HTTP/SNMP/TCP/voice operation view
ICMP/UDP echo operation view
Path/UDP jitter operation view
UDP tracert operation view
Predefined user roles
network-admin
Parameters
ip-address: Specifies the source IP address for probe packets.
Usage guidelines
If you configure both the source interface and source ip commands for an ICMP echo or UDP tracert operation, the most recent configuration takes effect.
The specified source IP address must be the IP address of a local interface, and the local interface must be up. Otherwise, no probe packets can be sent out.
Examples
# Specify 10.1.1.1 as the source IP address for ICMP echo requests.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] source ip 10.1.1.1
Related commands
source interface

source ipv6

Use source ipv6 to configure the source IPv6 address for probe packets.
Use undo source ipv6 to remove the configured source IPv6 address. The IPv6 address of the interface that sends a probe packet is the source IPv6 address of the probe packet.
Syntax
Default
source ipv6 ipv6-address
undo source ipv6
No source IPv6 address is configured for probe packets.
68
Views
ICMP echo operation view
Predefined user roles
network-admin
Parameters
ipv6-address: Specifies the source IPv6 address for probe packets. IPv6 link-local addresses are not supported.
Usage guidelines
If you configure both the source interface and source ipv6 commands for an ICMP echo operation, the most recent configuration takes effect.
The specified source IPv6 address must be the IPv6 address of a local interface. The local interface must be up. Otherwise, no probe packets can be sent out.
Examples
# Specify 1::1 as the source IPv6 address for ICMP echo requests.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] source ipv6 1::1
Related commands
source interface

source port

Use source port to configure the source port number for probe packets.
Use undo source port to remove the configured source port number.
Syntax
source port port-number
undo source port
Default
No source port number is configured for probe packets.
Views
SNMP/voice operation view
UDP echo operation view
UDP jitter operation view
UDP tracert operation view
Predefined user roles
network-admin
Parameters
port-number: Specifies the source port number in the range of 1 to 65535.
69
Examples
# Set the source port number to 8000 for probe packets in the UDP echo operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-echo [Sysname-nqa-admin-test-udp-echo] source port 8000

statistics hold-time

Use statistics hold-time to set the hold time of statistics groups for an NQA operation.
Use undo statistics hold-time to restore the default.
Syntax
statistics hold-time hold-time
undo statistics hold-time
Default
The hold time of statistics groups is 120 minutes.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view
ICMP/UDP echo operation view
Path/UDP jitter operation view
Predefined user roles
network-admin
Parameters
hold-time: Specifies the hold time in minutes, in the range of 1 to 1440.
Usage guidelines
A statistics group is deleted when its hold time expires.
Examples
# Set the hold time to 3 minutes for statistics groups.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] statistics hold-time 3

statistics interval

Syntax
Use statistics interval to set the interval for collecting statistics for an NQA operation.
Use undo statistics interval to restore the default.
statistics interval interval
undo statistics interval
70
Default
The interval is 60 minutes.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view
ICMP/UDP echo operation view
Path/UDP jitter operation view
Predefined user roles
network-admin
Parameters
interval: Specifies the interval in minutes, in the range of 1 to 35791394.
Usage guidelines
NQA forms statistics within the same collection interval as a statistics group. To display information about the statistics groups, use the display nqa statistics command.
Examples
# Configure the system to collect the ICMP echo operation statistics at 2-minute intervals.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] statistics interval 2

statistics max-group

Use statistics max-group to set the maximum number of statistics groups that can be saved.
Use undo statistics max-group to restore the default.
Syntax
statistics max-group number
undo statistics max-group
Default
A maximum of two statistics groups can be saved.
Views
DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view
ICMP/UDP echo operation view
Path/UDP jitter operation view
Predefined user roles
network-admin
Parameters
number: Specifies the maximum number of statistics groups, in the range of 0 to 100. To disable statistics collection, set the value to 0.
71
Usage guidelines
When the maximum number of statistics groups is reached and a new statistics group is to be saved, the earliest statistics group is deleted.
Examples
# Configure the NQA to save up to five statistics groups for the ICMP operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] statistics max-group 5

target-only

Use target-only to perform the path jitter operation only on the destination address.
Use undo target-only to restore the default.
Syntax
target-only
undo target-only
Default
NQA performs the path jitter operation to the destination hop by hop.
Views
Path jitter operation view
Predefined user roles
network-admin
Examples
# Perform the path jitter operation only on the destination address.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type path-jitter [Sysname-nqa-admin-test-path-jitter] target-only
tos
Use tos to set the ToS value in the IP header for probe packets.
Use undo tos to restore the default.
Syntax
Default
tos value
undo tos
The ToS value in the IP header of probe packets is 0.
72
Views
Any operation view
Predefined user roles
network-admin
Parameters
value: Specifies the ToS value in the range of 0 to 255.
Examples
# Set the ToS value to 1 in the IP header for probe packets.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] tos 1
ttl
Use ttl to set the maximum number of hops that the probe packets can traverse.
Use undo ttl to restore the default.
Syntax
ttl value
undo ttl
Default
The maximum number of hops is 30 for probe packets of the UDP tracert operation, and is 20 for probe packets of other types of operations.
Views
DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view
ICMP/UDP echo operation view
UDP jitter operation view
UDP tracert operation view
Predefined user roles
network-admin
Parameters
value: Specifies the maximum number of hops that the probe packets can traverse, in the range of 1 to
255.
Usage guidelines
The route-option bypass-route command sets the TTL to 1 for probe packets. The ttl command does not take effect.
For a successful UDP tracert operation, make sure the maximum number of hops is not smaller than the value set in the init-ttl command.
73
Examples

type

Syntax
Default
Views
# Set the maximum number of hops to 16 for probe packets.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] ttl 16
Use type to specify the operation type of the NQA operation and enter operation type view.
type { dhcp | dlsw | dns | ftp | http | icmp-echo | path-jitter | snmp | tcp | udp-echo | udp-jitter | udp-tracert | voice }
No operation type is specified.
NQA operation view
Predefined user roles
network-admin
Parameters
dhcp: Specifies the DHCP operation type.
dlsw: Specifies the DLSw operation type.
dns: Specifies the DNS operation type.
ftp: Specifies the FTP operation type.
http: Specifies the HTTP operation type.
icmp-echo: Specifies the ICMP echo operation type.
path-jitter: Specifies the path jitter operation type.
snmp: Specifies the SNMP operation type.
tcp: Specifies the TCP operation type.
udp-echo: Specifies the UDP echo operation type.
udp-jitter: Specifies the UDP jitter operation type.
udp-tracert: Specifies the UDP tracert operation type.
voice: Specifies the voice operation type.
Examples
# Specify the type of FTP operation and enter FTP operation view.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp]
74
url
Use url to specify the URL of the destination HTTP or FTP server.
Use undo url to remove the URL.
Syntax
url url
undo url
Default
No URL is configured for the destination server.
Views
FTP/HTTP operation view
Predefined user roles
network-admin
Parameters
url: Specifies the URL of the destination server, a case-sensitive string of 1 to 255 characters. The following table describes the URL format and parameters for different operations.
Operation URL format Parameter description
HTTP operation
FTP operation
Examples
# Configure the URL that the HTTP operation visits as http://www.company.com/index.htm.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] url http://www.company.com/index.html

username

Use username to specify an FTP or HTTP login username.
Use undo username to remove the configuration.
http://host/resource
http://host:port/resource
ftp://host/filename
ftp://host:port/filename
The host parameter represents a dot-separated case-sensitive string of 1 to 255 characters including letters, digits, hyphens (-), and underscores (_), aabbcc.com for example. Each part consists of 1 to 63 characters, and consecutive dots (.) are not allowed.
For description about the filename parameter, see Fundamentals Configuration Guide.
Syntax
username username
undo username
Default
No FTP or HTTP login username is configured.
75
Views
FTP/HTTP operation view
Predefined user roles
network-admin
Parameters
username: Specifies the username, a case-sensitive string of 1 to 32 characters.
Examples
# Set the FTP login username to administrator.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] username administrator
Related commands
operation
password

version

Use version to specify the HTTP version used in the HTTP operation.
Use undo version to restore the default.
Syntax
version { v1.0 | v1.1 }
undo version
Default
HTTP 1.0 is used in the HTTP operation.
Views
HTTP operation view
Predefined user roles
network-admin
Parameters
v1.0: Uses HTTP version 1.0.
v1.1: Uses HTTP version 1.1.
Examples
# Configure the HTTP operation to use the HTTP version 1.1.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] version v1.1
76

vpn-instance

Use vpn-instance to apply the operation to a VPN.
Use undo vpn-instance to restore the default.
Syntax
vpn-instance vpn-instance-name
undo vpn-instance
Default
The operation applies to the public network.
Views
Any operation view
Predefined user roles
network-admin
Parameters
vpn-instance-name: Specifies the name of a VPN instance, a case-sensitive string of 1 to 31 characters.
Usage guidelines
After you specify the VPN, the NQA operation tests the connectivity in the specified VPN.
Examples
# Apply the ICMP echo operation to vpn1.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] vpn-instance vpn1

NQA server commands

IMPORTANT:
Configure the NQA server only for UDP jitter, TCP, UDP echo, and voice operations.

display nqa server

Use display nqa server status to display NQA server status.
Syntax
display nqa server
Views
Any view
Predefined user roles
network-admin
77
Examples
network-operator
# Display NQA server status.
<Sysname> display nqa server NQA server status: Enabled TCP connect: IP Address Port ToS Vpn-instance
2.2.2.2 2000 200 ­UDP echo: IP Address Port ToS Vpn-instance
3.3.3.3 3000 255 vpn1
Table 12 Command output
Field Description
NQA server status Whether the NQA server is enabled.
TCP connect Information about the TCP listening service on the NQA server.
UDP echo Information about the UDP listening service on the NQA server.
IP Address IP address specified for the TCP/UDP listening service on the NQA server.
Port Port number specified for the TCP/UDP listening service on the NQA server.
ToS ToS value in reply packets sent by the NQA server.
Vpn-instance Name of the VPN instance to which the NQA server belongs.

nqa server enable

Use nqa server enable to enable the NQA server.
Use undo nqa server enable to disable the NQA server.
Syntax
nqa server enable
undo nqa server enable
Default
The NQA server is disabled.
Views
System view
Predefined user roles
network-admin
Examples
# Enable the NQA server.
<Sysname> system-view [Sysname] nqa server enable
78
Related commands
display nqa server
nqa server tcp-connect
nqa server udp-echo

nqa server tcp-connect

Use nqa server tcp-connect to configure a TCP listening service to enable the NQA server to listen and respond to the specified IP address and port.
Use undo nqa server tcp-connect to remove a TCP listening service.
Syntax
nqa server tcp-connect ip-address port-number [ vpn-instance vpn-instance-name ] [ tos tos ]
undo nqa server tcp-connect ip-address port-number
Default
No TCP listening service is configured on the NQA server.
Views
System view
Predefined user roles
network-admin
Parameters
ip-address: Specifies the IP address for the TCP listening service.
port-number: Specifies the port number for the TCP listening service, in the range of 1 to 65535.
vpn-instance vpn-instance-name: Specifies a VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the NQA server listens on a public IP address.
tos tos: Specifies the ToS value in the IP header for reply packets. The value range for this argument is 0 to 255, and the default value is 0.
Usage guidelines
Use this command on the NQA server only for the TCP operation.
When you configure the IP address and port number for a TCP listening service on the NQA server, follow these restrictions and guidelines:
The IP address and port number must be unique on the NQA server and match the configuration on
the NQA client.
The IP address must be the address of an interface on the NQA server.
Examples
To ensure successful NQA operations and avoid affecting existing services, do not configure the
TCP listening service on well-known ports from 1 to 1023.
# Configure a TCP listening service to enable the NQA server to listen and respond to the IP address
169.254.10.2 and port 9000.
<Sysname> system-view [Sysname] nqa server tcp-connect 169.254.10.2 9000
79
Related commands
display nqa server
nqa server enable

nqa server udp-echo

Use nqa server udp-echo to configure a UDP listening service to enable the NQA server to listen and respond on the specified IP address and port.
Use undo nqa server udp-echo to remove the UDP listening service created.
Syntax
nqa server udp-echo ip-address port-number [ vpn-instance vpn-instance-name ] [ tos tos ]
undo nqa server udp-echo ip-address port-number
Default
No UDP listening service is configured on the NQA server.
Views
System view
Predefined user roles
network-admin
Parameters
ip-address: Specifies the IP address for the UDP listening service.
port-number: Specifies the port number for the UDP listening service, in the range of 1 to 65535.
vpn-instance vpn-instance-name: Specifies a VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the NQA server listens on a public IP address.
tos tos: Specifies the ToS value in the IP header for reply packets. The value range for this argument is 0 to 255, and the default value is 0.
Usage guidelines
Use this command on the NQA server only for the UDP jitter, UDP echo, and voice operations.
When you configure the IP address and port number for a UDP listening service on the NQA server, follow these restrictions and guidelines:
The IP address and port number must be unique on the NQA server and match the configuration on
the NQA client.
The IP address must be the address of an interface on the NQA server.
To ensure successful NQA operations and avoid affecting existing services, do not configure the
UDP listening service on well-known ports from 1 to 1023.
Examples
# Configure a UDP listening service to enable the NQA server to listen and respond on the IP address
169.254.10.2 and port 9000.
<Sysname> system-view [Sysname] nqa server udp-echo 169.254.10.2 9000
80
Related commands
display nqa server
nqa server enable
81

NTP commands

NTP is supported on the following Layer 3 interfaces:
Layer 3 Ethernet interfaces.
Layer 3 Ethernet subinterfaces.
Layer 3 aggregate interfaces.
Layer 3 aggregate subinterfaces.
VLAN interfaces.
Tunnel interfaces.
RPR logical interface.

display ntp-service ipv6 sessions

Use display ntp-service ipv6 sessions to display information about all IPv6 NTP associations.
Syntax
display ntp-service ipv6 sessions [ verbose ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
verbose: Displays detailed information about all IPv6 NTP associations. If you do not specify this
keyword, the command displays only brief information about the IPv6 NTP associations.
Examples
# Display brief information about all IPv6 NTP associations.
<Sysname> display ntp-service ipv6 sessions Notes: 1 source(master), 2 source(peer), 3 selected, 4 candidate, 5 configured.
Source: [125]3000::32 Reference: 127.127.1.0 Clock stratum: 2 Reachabilities: 1 Poll interval: 64 Last receive time: 6 Offset: -0.0 Roundtrip delay: 0.0 Dispersion: 0.0
Total sessions : 1
82
p
Table 13 Command output
Field Descri
1—Clock source selected by the system (the current reference source). It has
a system clock stratum level less than or equal to 15.
2—The stratum level of the clock source is less than or equal to 15.
[12345]
3—The clock source has survived the clock selection algorithm.
4—The clock source is a candidate clock source.
5—The clock source was created by a command.
Source
IPv6 address of the NTP server. If this field displays ::, the IPv6 address of the NTP server has not been resolved successfully.
Reference clock ID of the NTP server:
If the reference clock is the local clock, the value of this field is related to the
value of the Clock stratum field:
{ When the value of the Clock stratum field is 0 or 1, this field displays
Reference
{ When the Clock stratum field has another value, this field displays the
If the reference clock is the clock of another device on the network, this field
displays the MD5 digest value of the first 32 bits of the IPv6 address. The MD5 digest value is in dotted decimal format. If this field displays INIT, the local device has not established a connection with the NTP server.
tion
LOCL.
MD5 digest value of the first 32 bits of the IPv6 address. The MD5 digest value is in dotted decimal format.
Stratum level of the NTP server, which determines the clock accuracy. The
Clock stratum
Reachabilities
Poll interval
value is in the range of 1 to 16. A lower stratum level represents higher clock accuracy. A stratum 16 clock is not synchronized and cannot be used as a reference clock.
Reachability count of the NTP server. 0 indicates that the NTP server is unreachable.
Polling interval in seconds. It is the maximum interval between successive NTP messages.
Length of ti m e from when t h e last NTP me s sage was rec e ived or when t h e local clock was last updated to the current time.
Time is in seconds by default.
If the time length is greater than 2048 seconds, it is displayed in minutes
(m).
Last receive time
If the time length is greater than 300 minutes, it is displayed in hours (h).
If the time length is greater than 96 hours, it is displayed in days (d).
If the time length is greater than 999 days, it is displayed in years (y).
If the time when the most recent NTP message was received or when the local clock was updated most recently is behind the current time, this field displays a hyphen (-).
Offset Offset of the system clock relative to the reference clock, in milliseconds.
Roundtrip delay Roundtrip delay from the local device to the clock source, in milliseconds.
Dispersion Maximum error of the system clock relative to the reference source.
Total sessions Total number of associations.
83
p
# Display detailed information about all IPv6 NTP associations.
<Sysname> display ntp-service ipv6 sessions verbose
Clock source: 1::1 Session ID: 36144 Clock stratum: 16 Clock status: configured, insane, valid, unsynced Reference clock ID: INIT VPN instance: Not specified Local mode: sym_active, local poll interval: 6 Peer mode: unspec, peer poll interval: 10 Offset: 0.0000ms, roundtrip delay: 0.0000ms, dispersion: 15937ms Root roundtrip delay: 0.0000ms, root dispersion: 0.0000ms Reachabilities:0, sync distance: 15.938 Precision: 2^10, version: 4, source interface: Not specified Reftime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Orgtime: d17cbb21.0f318106 Tue, May 17 2011 9:15:13.059 Rcvtime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Xmttime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Roundtrip delay samples: 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 Offset samples: 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 Filter order: 0 1 2 3 4 5 6 7
Total sessions: 1
Table 14 Command output
Field Descri
Clock source
Clock stratum
IPv6 address of the clock source. If this field displays ::, the IPv6 address of the NTP server has not been resolved successfully.
Stratum level of the NTP server, which determines the clock precision. The value is in the range of 1 to 16. A lower stratum level represents higher clock accuracy. A stratum 16 clock is not synchronized and cannot be used as a reference clock.
tion
84
Field Description
Status of the clock source corresponding to this association:
configured—The association was created at the CLI.
dynamic—The association is established dynamically.
master—The clock source is the primary reference source of the
current system.
selected—The clock source has survived the clock selection
algorithm.
candidate—The clock source is the candidate reference source.
Clock status
sane—The clock source is available for this association.
insane—The clock source is not available for this association.
valid—The clock source is valid, which means the clock source
meets the following requirements: it has passed the authentication and is being synchronized. Its stratum level is valid, and its root delay and root dispersion values are within their ranges.
invalid—The clock source is invalid.
unsynced—The clock source has not been synchronized or the
value of the stratum level is invalid.
If the reference clock is the local clock, the value of this field is
related to the value of the Clock stratum field:
{ When the value of the Clock stratum field is 0 or 1, this field
displays LOCL.
{ When the Clock stratum field has another value, this field
Reference clock ID
displays the MD5 digest value of the first 32 bits of the IPv6 address. The MD5 digest value is in dotted decimal format.
If the reference clock is the clock of another device on the
network, this field displays the MD5 digest value of the first 32 bits of the IPv6 address. The MD5 digest value is in dotted decimal format. If this field displays INIT, the local device has not established a connection with the NTP server.
VPN instance
Local mode
local poll interval
VPN instance of the NTP server. If the NTP server is in a public network, the field is displayed as Not specified.
Operation mode of the local device:
unspec—The mode is unspecified.
sym_active—Active mode.
sym_passive—Passive mode.
client—Client mode.
server—Server mode.
broadcast—Broadcast or multicast server mode.
bclient—Broadcast or multicast client mode.
Polling interval for the local device, in seconds. The value displayed is a power of 2. For example, if the displayed value is 6, the poll interval of the local device is 2
85
6
, or 64 seconds.
Field Description
Operation mode of the peer device:
unspec—The mode is unspecified.
sym_active—Active mode.
peer mode
sym_passive—Passive mode.
client—Client mode.
server—Server mode.
broadcast—Broadcast or multicast server mode.
bclient—Broadcast or multicast client mode.
Polling interval for the peer device, in seconds. The value displayed
peer poll interval
is a power of 2. For example, if the displayed value is 6, the polling interval of the local device is 2
6
, or 64 seconds.
Offset
roundtrip delay
dispersion Maximum error of the system clock relative to the reference clock.
Root roundtrip delay
root dispersion
Reachabilities
sync distance
Precision Accuracy of the system clock.
version NTP version in the range of 1 to 4.
source interface
Reftime Reference timestamp in the NTP message.
Offset of the system clock relative to the reference clock, in milliseconds.
Roundtrip delay from the local device to the clock source, in milliseconds.
Roundtrip delay from the local device to the primary reference source, in milliseconds.
Maximum error of the system clock relative to the primary reference clock, in milliseconds.
Reachability count of the clock source. 0 indicates that the clock source is unreachable.
Synchronization distance relative to the upper-level clock, in seconds, and calculated from dispersion and roundtrip delay values.
Source interface.
If the source interface is not specified, this field is Not specified.
Orgtime Originate timestamp in the NTP message.
Rcvtime Receive timestamp in the NTP message.
Xmttime Transmit timestamp in the NTP message.
Filter order Dispersion information.
Status of the local clock. The field is displayed only when you use the ntp-service refclock-master command to set the local clock as a
Reference clock status
Total sessions Total number of associations.
reference clock.
When the reach field of the local clock is 255, the field is displayed as working normally. Otherwise, the field is displayed as working abnormally.
86
p

display ntp-service sessions

Use display ntp-service sessions to display information about all IPv4 NTP associations.
Syntax
display ntp-service sessions [ verbose ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
verbose: Displays detailed information about all IPv4 NTP associations. If you do not specify this
keyword, the command displays only brief information about the NTP associations.
Usage guidelines
When a device is operating in NTP broadcast or multicast server mode, the display ntp-service sessions command does not display the IPv4 NTP association information corresponding to the broadcast or multicast server. However, the associations are counted in the total number of associations.
Examples
# Display brief information about all IPv4 NTP associations.
<Sysname> display ntp-service sessions source reference stra reach poll now offset delay disper ******************************************************************************** [12345]LOCAL(0) LOCL 0 1 64 - 0.0000 0.0000 7937.9 [5]0.0.0.0 INIT 16 0 64 - 0.0000 0.0000 0.0000 Notes: 1 source(master), 2 source(peer), 3 selected, 4 candidate, 5 configured. Total sessions: 1
Table 15 Command output
Field Descri
tion
When the reference clock is the local clock, the field displays LOCAL
(number). It indicates that the IP address of the local clock is 12 7.127.1. number, where number represents the NTP process number in the
source
range of 0 to 3.
When the reference clock is the clock of another device, the field displays
the IP address of the NTP server. If this field displays 0.0.0.0, the IP address of the NTP server has not been resolved successfully.
87
Field Description
Reference clock ID of the NTP server:
If the reference clock is the local clock, the value of this field is related to the
value of the stra field:
{ When the value of the stra field is 0 or 1, this field displays LOCL.
reference
{ When the stra field has another value, this field displays the IP address
of the local clock.
If the reference clock is the clock of another device on the network, this field
displays the IP address of the device. If the device supports IPv6, this field displays the MD5 digest of the first 32 bits of the IPv6 address of the device. If this field displays INIT, the local device has not established a connection with the NTP server.
Stratum level of the clock source, which determines the clock accuracy. The
stra
value is in the range of 1 to 16. The clock accuracy decreases from stratum 1 to stratum 16. A stratum 1 clock has the highest precision, and a stratum 16 clock is not synchronized and cannot be used as a reference clock.
reach
poll
Reachability count of the clock source. 0 indicates that the clock source is unreachable.
Polling interval in seconds. It is the maximum interval between successive NTP messages.
Length of ti m e from when t h e last NTP me s sage was rec e ived or when t h e local clock was last updated to the current time.
Time is in seconds by default.
If the time length is greater than 2048 seconds, it is displayed in minutes
(m).
now
If the time length is greater than 300 minutes, it is displayed in hours (h).
If the time length is greater than 96 hours, it is displayed in days (d).
If the time length is greater than 999 days, it is displayed in years (y).
If the time when the most recent NTP message was received or when the local clock was updated most recently is behind the current time, this field displays a hyphen (-).
offset Offset of the system clock relative to the reference clock, in milliseconds.
delay Roundtrip delay from the local device to the NTP server, in milliseconds.
disper
Maximum error of the system clock relative to the reference source, in milliseconds.
1—Clock source selected by the system (the current reference source). It has
a system clock stratum level less than or equal to 15.
2—The stratum level of the clock source is less than or equal to 15.
[12345]
3—The clock source has survived the clock selection algorithm.
4—The clock source is a candidate clock source.
5—The clock source was created by a configuration command.
Total sessions Total number of associations.
# Display detailed information about all IPv4 NTP associations.
<Sysname> display ntp-service sessions verbose Clock source: 192.168.1.40 Session ID: 35888
88
p
Clock stratum: 2 Clock status: configured, master, sane, valid Reference clock ID: 127.127.1.0 VPN instance: Not specified Local mode: client, local poll interval: 6 Peer mode: server, peer poll interval: 6 Offset: 0.2862ms, roundtrip delay: 3.2653ms, dispersion: 4.5166ms Root roundtrip delay: 0.0000ms, root dispersion: 10.910ms Reachabilities:31, sync distance: 0.0194 Precision: 2^18, version: 3, source interface: Not specified Reftime: d17cbba5.1473de1e Tue, May 17 2011 9:17:25.079 Orgtime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Rcvtime: d17cbbc0.b1959a30 Tue, May 17 2011 9:17:52.693 Xmttime: d17cbbc0.b1959a30 Tue, May 17 2011 9:17:52.693 Roundtrip delay samples: 0.007 0.010 0.006 0.011 0.010 0.005 0.007 0.003 Offset samples: 5629.55 3913.76 5247.27 6526.92 31.99 148.72 38.27 0.29 Filter order: 7 5 2 6 0 4 1 3
Total sessions: 1
Table 16 Command output
Field Descri
Clock source
Clock stratum
IP address of the NTP server. If this field displays 0.0.0.0, the IP address of the NTP server has not been resolved successfully.
Stratum level of the NTP server, which determines the clock accuracy. The value is in the range of 1 to 16. A lower stratum level represents greater clock accuracy. A stratum 16 clock is not synchronized and cannot be used as a reference clock.
Status of the clock source corresponding to this association:
configured—The association was created by a configuration
dynamic—The association is established dynamically.
master—The clock source is the primary reference source of the
selected—The clock source has survived the clock selection
Clock status
candidate—The clock source is the candidate reference source.
sane—The clock source has passed the sane authentication.
insane—The clock source has failed the sane authentication.
valid—The clock source is valid, which means the clock source
invalid—The clock source is invalid.
unsynced—The clock source has not been synchronized or the
tion
command.
current system.
algorithm.
meets the following requirements: it has passed authentication and is being synchronized. Its stratum level is valid, and its root delay and root dispersion values are within their ranges.
value of the stratum level is invalid.
89
Loading...