EasyManua.ls Logo

HP JD320B User Manual

HP JD320B
189 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #172 background imageLoading...
Page #172 background image
Follow these steps to set to output system information to the web interface:
To do… Use the command… Remarks
Enter system view system-view
Enable information center info-center enable
Optional
Enabled by default.
Name the channel with a specified
channel number
info-center channel
channel-number name
channel-name
Optional
See Table 5 for default channel
names.
Configure the channel through
which system information can be
output to the web interface
info-center syslog channel
{ channel-number |
channel-name }
Optional
By default, system information is
output to the web interface through
channel 6.
Configure the output rules of the
system information
info-center source { module-name |
default } channel { channel-number
| channel-name } [ debug { level
severity | state state }* | log { level
severity | state state }* | trap
{ level severity | state state }* ]*
Optional
See “Default output rules of system
information.”
Configure the format of the time
stamp
info-center timestamp { debugging
| log | trap } { boot | date | none }
Optional
The time stamp format for log, trap
and debugging information is date
by default.
NOTE:
You can configure to output log, trap and debugging information to a channel. However, when this
channel is bound with the output destination web interface, after logging in through the web interface,
view log information of specific types only, and other types of information will be filtered out.
Saving security logs into the security log file
Introduction
You can understand the device status, locate and troubleshoot network problems by viewing system
information, especially the security logs. Generally, all kinds of system information including security logs
is output into one folder, and it is difficult to recognize and check the security logs among all kinds of
system information.
This function enables the system to save the security logs into the security log file in a specific directory
without affecting the current output rules of the system information. It means that the system picks up all
security logs from the system information, copies and saves them into the security log file in a specified
directory when outputting the system information to different destinations. You can perform centralized
management to the security logs and view the security logs conveniently.
The configuration of this feature and the management of the security log file are separated, and the
security log file is managed by a privileged user. After logging in to the device, the administrator can
enable the saving of security logs into the security log file and configure related parameters by executing
the commands listed in Table 8; however, only the privileged user, which is the security log administrator,
can perform operationssee Table 9 for detailsto the security log file after passing the AAA local
165

Table of Contents

Other manuals for HP JD320B

Question and Answer IconNeed help?

Do you have a question about the HP JD320B and is the answer not in the manual?

HP JD320B Specifications

General IconGeneral
ModelJD320B
CategorySwitch
Switching Capacity56 Gbps
Forwarding Rate41.7 Mpps
Power SupplyInternal
Ports24 x 10/100/1000 + 4 x SFP
Form FactorRack-mountable
MAC Address Table Size16, 000 entries
Jumbo Frame SupportYes
VLAN SupportYes
Quality of Service (QoS)Yes

Summary

Legal and notice information

System maintenance and debugging

Ping

Verifies device reachability and examines network connectivity using ICMP.

Tracert

Traces Layer 3 devices in IP packet delivery to identify network availability.

System debugging

Provides debugging functions and information to help diagnose system errors.

NQA configuration

NQA overview

Explains Network Quality Analyzer (NQA) for testing network performance and service quality.

NQA configuration task list

Outlines the tasks required to enable NQA server and client for tests.

Configuring the NQA server

Steps to configure the NQA server for TCP, UDP echo, UDP jitter, and voice tests.

Creating an NQA test group

Process for creating an NQA test group and configuring test parameters.

Displaying and maintaining NQA

Commands for viewing NQA history, results, statistics, and server status.

NTP configuration

NTP overview

Defines Network Time Protocol (NTP) for synchronizing distributed time servers and clients.

How NTP works

Explains the basic workflow of NTP for time synchronization between devices.

Operation modes of NTP

Details NTP operation modes: client/server, symmetric peers, broadcast, and multicast.

NTP configuration task list

Lists the essential tasks for configuring NTP on network devices.

PoE configuration

PoE overview

Introduction to Power over Ethernet (PoE) and its components.

PoE configuration task list

Lists tasks for configuring PoE interfaces, detecting PDs, and power management.

Enabling PoE for a PoE interface

Steps to enable the PoE function on a specific interface.

Displaying and maintaining PoE

Commands to display PoE device information and interface power states.

SNMP configuration

SNMP overview

Introduces SNMP as a protocol for network management and monitoring.

SNMP protocol versions

Describes SNMPv1, SNMPv2c, and SNMPv3 protocol versions and their features.

SNMP configuration task list

Outlines the tasks for configuring SNMP, including basic parameters and logging.

Displaying and maintaining SNMP

Commands for monitoring SNMP agent status, community information, and MIB views.

RMON configuration

RMON overview

Introduces Remote Monitoring (RMON) for traffic analysis and device management.

Working mechanism

Explains how RMON monitors traffic using probes and agents.

RMON groups

Details RMON groups: statistics, history, event, alarm, and private alarm.

Displaying and maintaining RMON

Commands for viewing RMON statistics, history, and alarm configurations.

Cluster management configuration

Cluster management overview

Explains cluster management for large-scale distributed device management.

Cluster configuration task list

Lists tasks for configuring cluster roles, communication, and functions.

Establishing a cluster

Steps for manually or automatically establishing a cluster.

Displaying and maintaining cluster management

Commands for displaying NDP, NTDP, cluster, blacklist, and member information.

Port mirroring configuration

Introduction to port mirroring

Defines port mirroring for packet analysis and monitoring traffic.

Local port mirroring

Details configuring local mirroring groups with ports, CPUs, and monitor ports.

Layer 2 remote port mirroring

Describes configuring remote mirroring groups for source and destination devices.

Displaying and maintaining port mirroring

Commands to display port mirroring group configurations.

Traffic mirroring configuration

Traffic mirroring overview

Explains traffic mirroring for packet analysis and monitoring.

Configuring traffic mirroring

Steps to configure traffic mirroring to an interface or the CPU.

Mirroring traffic to an interface

Process for mirroring traffic to a specific destination interface using classifiers and behaviors.

Displaying and maintaining traffic mirroring

Commands to display traffic behavior and QoS policy configurations.

Stack configuration

Stack configuration overview

Introduces stack configuration for managing network devices as a whole.

Establishing a stack

Steps to create a stack by configuring master and slave devices.

Stack configuration task list

Lists tasks for configuring stack master, ports, and slave devices.

Displaying and maintaining stack configuration

Commands to view stack member information and verify configuration.

Information center configuration

Information center overview

Explains the information center's role in managing and classifying system information.

Levels of system information

Details the eight severity levels used for classifying system information.

Outputting system information to the console

Steps to configure the system to output information to the console.

Saving security logs into the security log file

Feature to save security logs into a dedicated file for easier management.

Displaying and maintaining information center

Commands for displaying information channels, output destinations, and log buffers.

PoE configuration

PoE overview

Introduction to Power over Ethernet (PoE) and its components.

PoE configuration task list

Lists tasks for configuring PoE interfaces, detecting PDs, and power management.

Enabling PoE for a PoE interface

Steps to enable the PoE function on a specific interface.

Displaying and maintaining PoE

Commands to display PoE device information and interface power states.

Related product manuals