반응형
SMALL

Step 1 부팅시 Ctrl+C 로 Aboot 모드 진입

Step 2 Aboot#cd /mnt/flash 입력

Step 3 Aboot#mv startup-config startup-config.old 입력

Step 4 Aboot#exit 입력하면 재부팅 됨

Step 5 switch#delete startup-config.old 로 컨피그 삭제

반응형
LIST
반응형
SMALL

1.부팅시 스페이스 연타로 부트로더로 들어간다.

2. loader>boot -s 
   를 누르면 싱글유저 모드로 부팅

3. 부팅 중 아래와 같이 나오면 recovery 입력
   Enter full path name of shell or 'recovery' for root password recovery or RETURN for /bin/sh:  recovery
----------------------------------------------------------------------------------------------
패스워드 설정 안해도 되는 초기화법

1. 위의 3번에서 recovery 치지말고 그냥 엔터

2. mount -a
    mkdir /config/temp
    mv /config/*.gz /config/temp
    shutdown -r now 

입력 하면 재부팅 되면서 초기설정으로 들어감.

request system zeroize    공장초기화
리부팅 

set system root-authentication plain-text-password
usb 설치 하고 부팅 
install file:///jinstall-ex-3200-12.3R6.6-domestic-signed.tgz
request system power-off at now    시스템 종료
================================================================
show chassis hardware  하드웨어 보는 명령어

반응형
LIST
반응형
SMALL

모드 버튼을 누르고 전원 연결
Step1 플래시 파일 시스템 초기화
Switch: flash_init  

Step2 다음 명령을 사용하여 시작 구성을 무시합니다.
Switch: SWITCH_IGNORE_STARTUP_CFG=1 

Step3 플래시에서 packages.conf 파일을 사용하여 스위치를 부팅합니다.
Switch: boot flash:packages.conf 

Step4 아니요로 대답하여 초기 구성 대화 상자를 종료합니다.
Would you like to enter the initial configuration dialog? [yes/no]: No 

Step5 스위치 프롬프트에서 권한 있는 EXEC 모드로 들어갑니다.
Switch> enable      
Switch#   

Step8 실행 중인 구성을 시작 구성 파일에 씁니다.
Switch# copy running-config startup-config      

Step9 수동 부팅 모드가 활성화되어 있는지 확인합니다.
Switch# show boot 
BOOT variable = flash:packages.conf; 
Manual Boot = yes 
Enable Break = yes  

Step10 스위치를 다시 로드하십시오.
Switch# reload 

Step11 부트로더 매개변수(이전에 2단계와 3단계에서 변경됨)를 원래 값으로 되돌립니다. 
Switch: SWITCH_IGNORE_STARTUP_CFG=0 

Step12 플래시에서 packages.conf 파일을 사용하여 스위치를 부팅합니다.
Switch: boot flash:packages.conf 

Step13 스위치가 부팅된 후 스위치에서 수동 부팅을 비활성화합니다.

Switch(config)# no boot manual 

[이전 컨피그를 불러오는 방법]
Step 6 시작 구성을 실행 중인 구성에 복사합니다. 
Switch# copy startup-config running-config <엔터>
            Destination filename [running-config]?  <엔터>
확인 프롬프트에 응답하여 Return 키를 누릅니다. 이제 구성 파일이 다시 로드되었으며 다음을 수행할 수 있습니다.
비밀번호를 변경하세요.

Step7 글로벌 구성 모드로 들어가서 활성화 비밀번호를 변경하십시오.
Switch# configure terminal
           Switch(config)# enable password cisco

반응형
LIST
반응형
SMALL
Juniper EX2200 이중화
root@sw1# show | display set
set version 12.3R12.4
set system host-name sw1
set system root-authentication encrypted-password "$1$d0yTDOZ4$bLLpP/AQfwJFSjfGFBTjc/"
set system services ssh
set system services web-management https system-generated-certificate
set system syslog user * any emergency
set system syslog file messages any notice
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set chassis aggregated-devices ethernet device-count 1
set interfaces ge-0/0/0 unit 0 family ethernet-switching vlan members vlan10
set interfaces ge-0/0/1 unit 0 family ethernet-switching
set interfaces ge-0/0/2 unit 0 family ethernet-switching
set interfaces ge-0/0/3 unit 0 family ethernet-switching
set interfaces ge-0/0/4 unit 0 family ethernet-switching
set interfaces ge-0/0/5 unit 0 family ethernet-switching
set interfaces ge-0/0/6 unit 0 family ethernet-switching
set interfaces ge-0/0/7 unit 0 family ethernet-switching
set interfaces ge-0/0/8 unit 0 family ethernet-switching
set interfaces ge-0/0/9 unit 0 family ethernet-switching
set interfaces ge-0/0/10 unit 0 family ethernet-switching vlan members vlan20
set interfaces ge-0/0/11 unit 0 family ethernet-switching
set interfaces ge-0/1/0 ether-options 802.3ad ae0
set interfaces ge-0/1/1 ether-options 802.3ad ae0
set interfaces ae0 description "###Interlink###"
set interfaces ae0 aggregated-ether-options lacp active
set interfaces ae0 unit 0 family ethernet-switching port-mode trunk
set interfaces ae0 unit 0 family ethernet-switching vlan members all
set interfaces me0 unit 0 family inet address 10.10.11.121/24
set interfaces vlan unit 10 family inet address 7.7.1.252/24 vrrp-group 10 virtual-address 7.7.1.254
set interfaces vlan unit 10 family inet address 7.7.1.252/24 vrrp-group 10 priority 150
set interfaces vlan unit 10 family inet address 7.7.1.252/24 vrrp-group 10 accept-data
set interfaces vlan unit 20 family inet address 7.7.2.2/24 vrrp-group 20 virtual-address 7.7.2.1
set interfaces vlan unit 20 family inet address 7.7.2.2/24 vrrp-group 20 priority 150
set interfaces vlan unit 20 family inet address 7.7.2.2/24 vrrp-group 20 accept-data
set routing-options static route 0.0.0.0/0 next-hop 7.7.1.1
set routing-options static route 7.7.3.0/24 next-hop 7.7.2.254
set protocols igmp-snooping vlan all
set protocols rstp
set protocols vstp vlan all
set protocols lldp interface all
set protocols lldp-med interface all
set ethernet-switching-options storm-control interface all
set vlans vlan10 vlan-id 10
set vlans vlan10 l3-interface vlan.10
set vlans vlan20 vlan-id 20
set vlans vlan20 l3-interface vlan.20
{master:0}[edit]
root@sw1#
root@sw2# show | display set
set version 12.3R11.2
set system host-name sw2
set system root-authentication encrypted-password "$1$BUPw3//d$FEuV4FGlCQFaNJ7dADWep0"
set system services ssh
set system services web-management https system-generated-certificate
set system syslog user * any emergency
set system syslog file messages any notice
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set chassis aggregated-devices ethernet device-count 1
set interfaces ge-0/0/0 unit 0 family ethernet-switching vlan members vlan10
set interfaces ge-0/0/1 unit 0 family ethernet-switching
set interfaces ge-0/0/2 unit 0 family ethernet-switching
set interfaces ge-0/0/3 unit 0 family ethernet-switching
set interfaces ge-0/0/4 unit 0 family ethernet-switching
set interfaces ge-0/0/5 unit 0 family ethernet-switching
set interfaces ge-0/0/6 unit 0 family ethernet-switching
set interfaces ge-0/0/7 unit 0 family ethernet-switching
set interfaces ge-0/0/8 unit 0 family ethernet-switching
set interfaces ge-0/0/9 unit 0 family ethernet-switching
set interfaces ge-0/0/10 unit 0 family ethernet-switching vlan members vlan20
set interfaces ge-0/0/11 unit 0 family ethernet-switching
set interfaces ge-0/1/0 ether-options 802.3ad ae0
set interfaces ge-0/1/1 ether-options 802.3ad ae0
set interfaces ae0 description "###Interlink###"
set interfaces ae0 aggregated-ether-options lacp active
set interfaces ae0 unit 0 family ethernet-switching port-mode trunk
set interfaces ae0 unit 0 family ethernet-switching vlan members all
set interfaces me0 unit 0 family inet address 10.10.11.122/24
set interfaces vlan unit 10 family inet address 7.7.1.253/24 vrrp-group 10 virtual-address 7.7.1.254
set interfaces vlan unit 10 family inet address 7.7.1.253/24 vrrp-group 10 accept-data
set interfaces vlan unit 20 family inet address 7.7.2.3/24 vrrp-group 20 virtual-address 7.7.2.1
set interfaces vlan unit 20 family inet address 7.7.2.3/24 vrrp-group 20 accept-data
set routing-options static route 0.0.0.0/0 next-hop 7.7.1.1
set routing-options static route 7.7.3.0/24 next-hop 7.7.2.254
set protocols igmp-snooping vlan all
set protocols rstp
set protocols vstp vlan all
set protocols lldp interface all
set protocols lldp-med interface all
set ethernet-switching-options storm-control interface all
set vlans vlan10 vlan-id 10
set vlans vlan10 l3-interface vlan.10
set vlans vlan20 vlan-id 20
set vlans vlan20 l3-interface vlan.20
{master:0}[edit]
root@sw2#

 

반응형
LIST

'업무이야기 > Network' 카테고리의 다른 글

Cisco OSPF Basic  (1) 2023.07.26
Wireshark Filter  (0) 2023.07.06
Juniper Switch Virtual-Chassis (STACK)  (0) 2023.05.02
Juniper RestAPI Sample  (0) 2021.08.06
Juniper VRRP and Load Sharing  (0) 2021.06.14
반응형
SMALL
Juniper Switch Virtual-Chassis (STACK)
# set virtual-chassis member 0 mastership-priority 255
# set virtual-chassis member 1 mastership-priority 200
# set virtual-chassis member 2 role line-card
# run request virtual-chassis vc-port set pic-slot 0 port 1
set virtual-chassis preprovisioned
X) set virtual-chassis member 0 mastership-priority 255
set virtual-chassis member 0 role routing-engine
set virtual-chassis member 0 serial-number GP0215320225
X) set virtual-chassis member 1 mastership-priority 200
set virtual-chassis member 1 role routing-engine
set virtual-chassis member 1 serial-number GP0215320481
set virtual-chassis no-split-detection
S/N 높은게 마스터
반응형
LIST

'업무이야기 > Network' 카테고리의 다른 글

Wireshark Filter  (0) 2023.07.06
Juniper EX2200 이중화  (1) 2023.05.02
Juniper RestAPI Sample  (0) 2021.08.06
Juniper VRRP and Load Sharing  (0) 2021.06.14
Juniper show command (RSI : request support information)  (0) 2021.03.29
반응형
SMALL

https://www.juniper.net/documentation/us/en/software/junos/high-availability/topics/example/VRRP-qfx-series-load-sharing.html

 

Example: Configuring VRRP for Load Sharing | High Availability User Guide | Juniper Networks TechLibrary

This example uses two VRRP groups, each of which has its own virtual IP address. Devices on the LAN use one of these virtual IP addresses as their default gateway. If one of the switches fails, the other switch takes over for it. In the topology shown in F

www.juniper.net

 

Example: Configuring VRRP for Load Sharing

date_range17-Feb-21

Product and Release Support

arrow_backward arrow_forward

If you do not want to dedicate a switch to be a VRRP backup (and therefore leave it idle unless the primary fails), you can create a load-sharing configuration in which each participating switch simultaneously acts as a primary and a backup.

One reason to use a load-sharing (active-active) configuration is that you are more likely to actively monitor and maintain both switches and notice if a problem occurs on either of them. If you use a configuration in which one switch is only a backup (an active-backup configuration), you might be less likely to pay attention to the backup switch while it is idle. In the worst case, this could lead to the backup switch developing an undetected problem and not being able to perform adequately when a failover occurs.

Requirements

This example uses the following hardware and software components:

  • Two switches
  • Junos OS Release 11.3 or later
  • Static routing or a dynamic routing protocol enabled on both switches.

Overview and Topology

This example uses two VRRP groups, each of which has its own virtual IP address. Devices on the LAN use one of these virtual IP addresses as their default gateway. If one of the switches fails, the other switch takes over for it. In the topology shown in Figure 1, for example, Switch A is the primary for VRRP group 100. If Switch A fails, Switch B takes over and forwards traffic that the end devices send to the default gateway address 10.1.1.1.

Figure 1: VRRP Load-Sharing Configuration

This example shows a simple configuration to illustrate the basic steps for configuring two switches running VRRP to back each other up.Table 1 lists VRRP settings for each switch.

Topology

Table 1: Settings for VRRP Load-Sharing ExampleSwitch ASwitch B

VRRP Group 100:
  • Interface address: 10.1.1.251
  • VIP: 10.1.1.1
  • Priority: 250
VRRP Group 100:
  • Interface address: 10.1.1.252
  • VIP: 10.1.1.1
  • Priority: 200
VRRP Group 200:
  • Interface address: 10.1.1.251
  • VIP: 10.1.1.2
  • Priority: 200
VRRP Group 200:
  • Interface address: 10.1.1.252
  • VIP: 10.1.1.2
  • Priority: 250

In addition to configuring the two switches as shown, you must configure your end devices so that some of them use one of the virtual IP addresses as their default gateway and the remaining end devices use the other virtual IP address as their default gateway.

Note that if a failover occurs, the remaining switch might be unable to handle all of the traffic, depending on the demand.

Configuring VRRP on Both Switches

Procedure

CLI Quick Configuration

Enter the following on Switch A:

content_copy zoom_out_map

[edit] set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.251/24 vrrp-group 100 virtual-address 10.1.1.1 set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.251/24 vrrp-group 100 priority 250 set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.251/24 vrrp-group 200 virtual-address 10.1.1.2 set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.251/24 vrrp-group 200 priority 200

Enter the following on Switch B:

content_copy zoom_out_map

[edit] set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.252/24 vrrp-group 100 virtual-address 10.1.1.1 set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.252/24 vrrp-group 100 priority 200 set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.252/24 vrrp-group 200 virtual-address 10.1.1.2 set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.252/24 vrrp-group 200 priority 250

Step-by-Step Procedure

Configure the VRRP groups and priorities on Switch A:

  1. Create VRRP group 100 on Switch A and configure the virtual IP address for the group:
  2. content_copy zoom_out_map
  3. [edit] user@switch# set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.252/24 vrrp-group 100 virtual-address 10.1.1.1
  4. Assign the VRRP priority for this interface in this group:
  5. content_copy zoom_out_map
  6. [edit] user@switch# set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.251/24 vrrp-group 100 priority 250
  7. Create VRRP group 200 on Switch A and configure the virtual IP address for the group:
  8. content_copy zoom_out_map
  9. [edit] user@switch# set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.251/24 vrrp-group 200 virtual-address 10.1.1.2
  10. Assign the VRRP priority for this interface in this group:
  11. content_copy zoom_out_map
  12. [edit] user@switch# set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.251/24 vrrp-group 100 priority 200

Step-by-Step Procedure

Configure the VRRP groups and priorities on Switch B:

  1. Create VRRP group 100 on Switch B and configure the virtual IP address for the group:
  2. content_copy zoom_out_map
  3. [edit] user@switch# set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.252/24 vrrp-group 100 virtual-address 10.1.1.1
  4. Assign the VRRP priority for this interface in this group:Switch A remains the primary for group 100 because it has the highest priority for this group.
  5. content_copy zoom_out_map
  6. [edit] user@switch# set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.252/24 vrrp-group 100 priority 200
  7. Create VRRP group 200 on Switch A and configure the virtual IP address for the group:
  8. content_copy zoom_out_map
  9. [edit] user@switch# set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.252/24 vrrp-group 200 virtual-address 10.1.1.2
  10. Assign the VRRP priority for this interface in this group:Switch B becomes the primary for group 200 because it has the highest priority for this group.
  11. content_copy zoom_out_map
  12. [edit] user@switch# set interfaces xe-0/0/0 unit 0 family inet address 10.1.1.251/24 vrrp-group 100 priority 250

Results

Display the results of the configuration on Switch A:

content_copy zoom_out_map

user@switch> show configuration interfaces { xe-0/0/0 { unit 0 { family inet { address 10.1.1.251 { vrrp-group 100 { virtual address 10.1.1.1 priority 250 } vrrp-group 200 { virtual address 10.1.1.2 priority 200 } } } } } }

Display the results of the configuration on Switch B:

content_copy zoom_out_map

user@switch> show configuration interfaces { xe-0/0/0 { unit 0 { family inet { address 10.1.1.252 { vrrp-group 100 { virtual address 10.1.1.1 priority 200 } vrrp-group 200 { virtual address 10.1.1.2 priority 250 } } } } } }

Verification

Verifying that VRRP Is Working on Switch A

Purpose

Verify that VRRP is active on Switch A and that the primary and backup roles are correct.

Action

Use the following command to verify that VRRP is active on Switch A and that the switch is primary for group 100 and backup for group 200.

content_copy zoom_out_map

user@switch> show vrrp Interface State Group VR state Timer Type Address xe-0/0/0.0 up 100 master A .0327 lcl 10.1.1.251 vip 10.1.1.1 xe-0/0/0.0 up 200 backup A .0327 lcl 10.1.1.251 vip 10.1.1.2

Meaning

The show vrrp command displays fundamental information about the VRRP configuration. This output shows that both VRRP groups are active and that this switch has assumed the correct primary and backup roles. The lcl address is the physical address of the interface and the vip address is the virtual address shared by both switches. The Timer value (A .0327) indicates the remaining time (in seconds) in which this switch expects to receive a VRRP advertisement from the other switch. If an advertisement for group 200 does not arrive before the timer expires, Switch A asserts itself as the primary for this group.

Verifying that VRRP Is Working on Switch B

Purpose

Verify that VRRP is active on Switch B and that the primary and backup roles are correct.

Action

Use the following command to verify that VRRP is active on Switch B and that the switch is backup for group 100 and primary for group 200.

content_copy zoom_out_map

user@switch> show vrrp Interface State Group VR state Timer Type Address xe-0/0/0.0 up 100 backup A .0327 lcl 10.1.1.252 vip 10.1.1.1 xe-0/0/0.0 up 200 master A .0327 lcl 10.1.1.252 vip 10.1.1.2

Meaning

The show vrrp command displays fundamental information about the VRRP configuration. This output shows that both VRRP groups are active and that this switch has assumed the correct primary and backup roles. The lcl address is the physical address of the interface and the vip address is the virtual address shared by both switches. The Timer value (A .0327) indicates the remaining time (in seconds) in which this switch expects to receive a VRRP advertisement from the other switch. If an advertisement for group 100 does not arrive before the timer expires, Switch B asserts itself as the primary for this group.

 

 

반응형
LIST
반응형
SMALL

Alteon config 기본 설정

 

 

>> Main# /cfg/stp off

             Spanning Tree protocol 을 사용하겠냐는 명령어 입니다.

             •기본 값이 enable되어 있기에, 작업환경에 따라 설정하면 된다.

             •설정 후 반듯이 reboot 이 필요하다.

 

-- Interface 설정하기

>> Main# /cfg/ip/if 1/mask 255.255.255.0/addr 61.33.250.x/br 61.33.250.255/ena

             •장비의 Interface를 넣어주는 명령어 입니다.

             interface number를 확인 후 IP address, mask, broad 를 정확히 넣어주면 된다.

             •최대 256개까지 만들 수 있다.

 

-- Gate way 설정하기

>> Main# /cfg/ip/gw 1/addr 61.33.250.x/ena

             Gateway를 설정해 주는 명령어 입니다.

             •최대 4개까지 만들 수 있다.

             /cfg/ip/gw 1/intr 2 è 2sec 마다 ping Test

             /cfg/ip/gw 1/retry 8  è 8 try후 응답이 없으면 fail로 선언.

             /cfg/ip/gw 1/arp disable  è gw에 대한 health check arp를 이용하여 할 것 인지 아닌지를 선택.

             èarp disable ICMP를 이용하여 health check를 하지만, Router에서 ping(ICMP)을 막았을 경우에는 arp option enable 하여 arp table을 이용하여 health check를 한다.

 

 

 

-- Port link 100 Fix 설정하기

>> Main# /cfg/port /fast/speed 100/mode full/fctl none/auto off

             link 100M Fix 시켜 준다.

             fctl (flow control) 각각의 연결된 장비가(Alteon ó 타장비) 다를 경우 buffer size의 차이로 인하여 흐름이 원활하지 못하는 경우가 있다. 이때에 fctl을 이용하여 흐름을 원활하게 해줄 수가 있는데 이 option을 설정을 해준다. 이는 Alteon buffer 가 타 장비보다 적기에 발생할 수 있다. 이 현상의 발생시 overflow가 발생할수 있기 때문이다. 그러나 일반적인 경우에는 장비간의 차이가 없기에 fctl none으로 설정하여 사용을 한다.

 

 

-- localnetwork 설정하기

>> Main# /cfg/ip/frwd/local/add xxx.xxx.xxx.xxx

             local network 를 만드는 명령어 입니다. 반듯이 필요한 사항은 아닙니다.

             Alteon 장비는 4096개의 arp를 갖고 있을 수 있는데 이 수치를 arp table full날 경우를 대비하여

local-network를 설정을 해줍니다.

 

 

-- telnet 허용하기

>> Main# /cfg/sys/tnet ena

             telnet 접속여부 판단.

 

 

-- Password 변경하기

>> Main# /cfg/sys/user/admpw

             admin password 변경여부.

             Password를 분실시 remote에서 recovery하기가 어려우니 주의 하시기 바랍니다.

 

 

 

SLB 만들기

-- Real server 설정하기

>> Main# /cfg/slb/real /ena

             real server를 설정한다.

             ~real 1/rip 61.33.250.x  è real server IP address 를 지정한다.

            ~real 1/weight 1  è leastcon/roundrobin 이용시 해당 group안의 real server에 대한 portion을 정해준다. 기본값은 1 이다.

             ~real 1/backup none  è real server fail backup server가 이를 대신할수 있게 지정. 기본값은 none이다.

             ~real 1/maxcon 200000  è real server에 처리할수 있는 session을 지정할 수 있다.

             ~real 1/inter 3  è 3sec 마다 health check

             ~real 1/retry 5  è health check 5번 시도 후 무응답시 fail 처리 한다.

             ~real 1/tmout 10  è 한번 맺은 session 10min 간 무응답(또는 서비스를 안 할 때) 시 자동적으로 session clear 한다.

 

-- Real server group로 설정하기

>> Main# /cfg/slb/group /add ... /add

             group ⓝ에 생성한 real server를 포함시켜준다.

             group 에서 real server 제거시 ... /rem ⓝ 을 이용한다.

 

-- Virtaul IP 설정하기

>>Main#/cfg/slb/virt /vip 61.33.250.xx/ena

             virt number ⓝ에 vip 를 설정해주고 enable 해 줍니다.

>>Main#/cfg/slb/virt /service http/group

             Vip 에 해당하는 적절한 서비스를 지정해 주고(서비스가 http라면 http..) 이 서비스에 적용할 group를 지정해 줍니다. 

 

-- Server, Client physical port 지정.

>>Main#/cfg/slb/port /server ena

>>Main#/cfg/slb/port /client ena

             Server가 연결되어있는 downlink port Server enable를 해 줍니다.

             Client , 인터넷상에서 Vip로 서비스를 받고자 하는 물리적인 port client enable 를 해 줍니다.

 

--SLB enable

>> Main# /cfg/slb/on

             SLB enable

 

-- 현재 서비스중인 session clear 하기

>> Main# /op/slb/clear

             •현재의 session clear.

 

 

 

 

 모니터링 방법

 

 

Information

>> Main# /info/slb/dump

             slb가 진행중인 real server, virtual server, Filter state, Port state 전체를 한눈으로 볼 수가 있습니다.

             •그 외에 ~/real , ~/virt , ~/filt , ~/port 는 개별적으로 해당 번호를 알면 부분적으로 상세한 정보를

볼 수 있다.

 

>> Main# /info/slb/sess/dump

             slb를 통하는 Session Table 전체를 볼 수가 있다. 

             ~/sess/find : 특정 Source IP를 잡아서 볼 수 있다. 

~/sess/Port : 특정 Port에 들어오는 session을 볼 수가 있다.

 

 

>> Main# /info/arp/dump

             •이는 Alteon switch에 관련된 arp table을 전체를 볼 수 있다.

             IP address, MAC address, VLAN, Port 등의 정보를 알 수 있다.

             •그 외에 ~/find, ~/port, ~/vlan, ~/refpt, ~/addr 로 세부적인 정보를 얻을 수 있다.  

 

 

>> Main# /info/sys

             •간단한 System Information 알 수 있다.

             Alteon switch 장비명, MAC address, IP address, OS version 등을 알 수 있다.

 

 

>> Main# /info/log

             • 시간대별로 log를 생성하므로 장비의 상태를 알 수 있다.

             • 단, Alteon switch에서 보여주는 log 10여줄 밖에 볼 수가 없으므로 log host 지정하여 host에서 관리가 가능하다. ==> /cfg/sys/syslog 에서 host를 지정하여 주면 된다. 또한 log를 받는 서버에서는 syslog 데몬이 있어야 한다.

 

 

>> Main# /info/link

             Port , Speed , Duplex , Flow ctrl , Link 의 상태를 알 수 있다.

             •강제로 fix 가 되어 있는지의 여부도 파악하기 쉽다.

 

>> Main# /info/ip

             •기본적인 IP, gateway, local network 의 상태를 알 수가 있다.

            

 

>> Main# /info/dump

             information에 있는 모든 정보를 나열한다.

             •이 정보는 작업자가 설정된 값 기준으로 표시 되기에

 

Statistics

 

 

>> Main# /stats/port /brg

             •대표적으로 해당 Port 에서 PortInFrames, PortOutFrames 등의 값을 알 수 가 있다.

             Discards 관련 값을 알 수가 있다.

 

>> Main# /stats/port /ether

             •대표적으로 해당 Port 에서 StatsSingleCollisionFrames 등의 값을 알 수 가 있다.

             CollisionFrames 관련 값을 알 수가 있다.

 

 

>> Main# /stats/port /maint

             •대표적으로 해당 Port 에서 CRC, Ovflo 등의 값을 알 수 가 있다.

            

 

>> Main# /stats/slb/

             ~/Port , ~/real , ~/group , ~/virt , ~/filt ⓝ 등의 값을 알 수 있다.

             Current Sessions 수를 알 수 있기에 작동 중인 값을 정확하게 이해할 수 있다.

             • 그 외에 각 옵션 별루 정확한 Sessions 수를 알 수 있다..

 

Maintenance

>> Main# /maint/tsdmp

             •장비의 전체적인 dump를 받는 내용입니다

발췌 :

http://blog.naver.com/hjc7669/31726476
반응형
LIST
반응형
SMALL

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 



47.TCPdump사용법.pdf
다운로드

 

반응형
LIST

+ Recent posts