1-11
<Sysname> display rmon statistics GigabitEthernet 2/0/1
EtherStatsEntry 1 owned by user1-rmon is VALID.
Interface : GigabitEthernet2/0/1<ifIndex.3>
etherStatsOctets : 57329 , etherStatsPkts : 455
etherStatsBroadcastPkts : 53 , etherStatsMulticastPkts : 353
etherStatsUndersizePkts : 0 , etherStatsOversizePkts : 0
etherStatsFragments : 0 , etherStatsJabbers : 0
etherStatsCRCAlignErrors : 0 , etherStatsCollisions : 0
etherStatsDropEvents (insufficient resources): 0
Packets received according to length:
64 : 7 , 65-127 : 413 , 128-255 : 35
256-511: 0 , 512-1023: 0 , 1024-1518: 0
After completing the configuration, you may query alarm events on the NMS. On the monitored device,
alarm event messages are displayed when events occur. The following is a sample output:
[Sysname]
#Aug 27 16:31:34:12 2005 Sysname RMON/2/ALARMFALL:Trap 1.3.6.1.2.1.16.0.2 Alarm table 1
monitors 1.3.6.1.2.1.16.1.1.1.4.1 with sample type 2,has sampled alarm value 0 less than(or
=) 50.
Private Alarm Group Configuration Example
Network requirements
As shown in
Figure 1-4
, monitor the utilization rate of interface GigabitEthernet 2/0/1 when it is receiving
packets. When the utilization rate is higher than 80%, the system logs the event locally and sends a trap
to the NMS; when the utilization rate is lower than 5%, the system only logs the event locally.
Figure 1-4
Network diagram for RMON
Configuration procedure
# Configure the SNMP parameters. (Note that, parameter values configured on the agent must be the
same with the following configured on the NMS: suppose SNMPv3 is enabled on the NMS, the user
name is
v3user
, the IP address of the NMS is
1.1.1.2
, authentication protocol is
MD5
, authorization
password is
authkey
, the privacy protocol is
DES56
, and the privacy password is
prikey
.)
<Sysname> system-view
[Sysname] snmp-agent
[Sysname] snmp-agent sys-info version v3
[Sysname] snmp-agent group v3 v3group
[Sysname] snmp-agent usm-user v3 v3user v3group authentication-mode md5 authkey privacy-mode
des56 prikey
Summary of Contents for S7902E
Page 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1 ...
Page 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist ...
Page 598: ...ii ...
Page 1757: ...4 9 ...
Page 1770: ...6 4 ...
Page 2017: ...2 11 Figure 2 3 SFTP client interface ...
Page 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002 ...