This section provides information about configuring system management features with the CLI.
When configuration changes are made, the modified configuration must be saved so the changes are not lost when the system is rebooted. The system uses the configuration and image files, as well as other operational parameters necessary for system initialization, according to the locations specified in the BOF parameters. See Boot Options for more information about boot option files.
Configuration files are saved by executing implicit or explicit command syntax.
Use the detail option of the save command to save both default and non-default configuration parameters.
The index option ensures that the system preserves system indexes when a save command is executed, regardless of the persistent status in the BOF. During a subsequent boot, the index file is read along with the configuration file. As a result, a number of system indexes are preserved between reboots, including the interface index, LSP IDs, and path IDs. This reduces resynchronizations of the network management system (NMS) with the affected network element.
If the save attempt fails at the destination, an error occurs and is logged. The system does not try to save the file to the secondary or tertiary configuration sources unless the path and filename are explicitly named with the save command.
This section provides information about configuring system parameters and provides configuration examples of common configuration tasks. The minimal system parameters that should be configured are the following:
The following example shows a basic system configuration.
This section provides a brief overview of the tasks that must be performed to configure system parameters and provides the CLI commands.
This section covers the basic system information parameters to configure the physical location of the router, contact information, location information for the router (for example, an address, floor or room number), global positioning system (GPS) coordinates, and system name.
Use the CLI syntax displayed in this section to configure the following system components:
This section describes the system information parameters.
General system parameters include:
Use the name command to configure a name for the device. The name is used in the prompt string. Only one system name can be configured. If multiple system names are configured, the last one encountered overwrites the previous entry.
Use the following CLI syntax to configure the system name.
The following example shows the command usage to configure the system name.
The following is a sample configuration output for the system name.
Use the contact command to specify the name of a system administrator, IT staff member, or other administrative entity.
Use the following syntax to specify the contact name.
The following example shows the command usage to specify the contact name.
Use the location command to specify the system location of the device. For example, enter the city, building address, floor, or room number where the router is located.
Use the following CLI syntax to configure the location.
The following example shows the command usage to configure the location.
The Common Language Location Code (CLLI code) is an 11-character standardized geographic identifier that is used to uniquely identify the geographic location of a router.
Use the following CLI command syntax to define the CLLI code.
The following example shows the command usage to define the CLLI code.
Use the optional coordinates command to specify the GPS location of the device. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.
Use the following CLI syntax to configure the location.
The following example shows the command usage to configure the location.
The following is a sample configuration output of the general system commands.
The system clock maintains time according to Coordinated Universal Time (UTC). Configure information time zone and summer time (daylight savings time) parameters to correctly display time according to the local time zone.
Time elements include:
The zone command sets the time zone and/or time zone offset for the device. The 7210 SAS supports system-defined and user-defined time zones. Table 33 describes system-defined time zones.
Use the following CLI syntax to configure the time zone.
The following example shows the command usage to configure the time zone.
The following is a sample zone output.
Acronym | Time Zone Name | UTC Offset |
Europe: | ||
GMT | Greenwich Mean Time | UTC |
WET | Western Europe Time | UTC |
WEST | Western Europe Summer Time | UTC +1 hour |
CET | Central Europe Time | UTC +1 hour |
CEST | Central Europe Summer Time | UTC +2 hours |
EET | Eastern Europe Time | UTC +2 hours |
EEST | Eastern Europe Summer Time | UTC +3 hours |
MSK | Moscow Time | UTC +3 hours |
MSD | Moscow Summer Time | UTC +4 hours |
US and Canada: | ||
AST | Atlantic Standard Time | UTC -4 hours |
ADT | Atlantic Daylight Time | UTC -3 hours |
EST | Eastern Standard Time | UTC -5 hours |
EDT | Eastern Daylight Saving Time | UTC -4 hours |
CST | Central Standard Time | UTC -6 hours |
CDT | Central Daylight Saving Time | UTC -5 hours |
MST | Mountain Standard Time | UTC -7 hours |
MDT | Mountain Daylight Saving Time | UTC -6 hours |
PST | Pacific Standard Time | UTC -8 hours |
PDT | Pacific Daylight Saving Time | UTC -7 hours |
HST | Hawaiian Standard Time | UTC -10 hours |
AKST | Alaska Standard Time | UTC -9 hours |
AKDT | Alaska Standard Daylight Saving Time | UTC -8 hours |
Australia and New Zealand: | ||
AWST | Western Standard Time (e.g., Perth) | UTC +8 hours |
ACST | Central Standard Time (e.g., Darwin) | UTC +9.5 hours |
AEST | Eastern Standard/Summer Time (e.g., Canberra) | UTC +10 hours |
NZT | New Zealand Standard Time | UTC +12 hours |
NZDT | New Zealand Daylight Saving Time | UTC +13 hours |
The config>system>time>dst-zone context configures the start and end dates and offset for summer time or daylight savings time to override system defaults or for user-defined time zones.
When configured, the time is adjusted by adding the configured offset when summer time starts and subtracting the configured offset when summer time ends.
Use the following CLI syntax to configure summer time conditions.
The following example shows the command usage to configure summer time conditions.
If the time zone configured is listed in Table 33, then the starting and ending parameters and offset do not need to be configured with this command unless there is a need to override the system defaults. The command will return an error if the start and ending dates and times are not available either in Table 33 or entered as optional parameters in this command.
The following is a sample output for the configured parameters.
Network Time Protocol (NTP) is defined in RFC 1305, Network Time Protocol (Version 3) Specification, Implementation and Analysis. It enables participating network nodes to keep time more accurately and maintain time in a synchronized manner between all participating network nodes.
The authentication-check command provides the option to skip the rejection of NTP PDUs that do not match the authentication key or authentication type requirements. The default behavior when authentication is configured is to reject all NTP PDUs that have a mismatch in either the authentication key ID, type, or key.
When authentication-check is configured, NTP PDUs are authenticated on receipt. However, mismatches cause a counter to be incremented, one counter for the key ID, one for the type, and one for key value mismatches.
Use the following CLI syntax to authenticate NTP PDUs on receipt.
The following example shows the command usage to authenticate NTP PDUs on receipt.
The authentication-key command configures an authentication key ID, key type, and key used to authenticate NTP PDUs sent to and received from other network elements participating in the NTP protocol. For authentication to work, the authentication key ID, authentication type, and authentication key values must match.
Use the following CLI syntax to configure an authentication key ID, key type, and key.
The following example shows the command usage to configure an authentication key ID, key type, and key.
The following sample configuration shows NTP disabled with the authentication-key parameter enabled.
The broadcast command is used to transmit broadcast packets on a specific subnet.
Use the following CLI syntax to transmit broadcast packets.
The following example shows the command usage to transmit broadcast packets.
The following sample configuration of the system>time context shows NTP enabled with the broadcast command configured.
The following sample configuration shows NTP enabled in the config context with the broadcast command configured. At this level, the NTP broadcast commands are displayed at the end of the output after the router interfaces are shown.
The broadcastclient command enables listening to NTP broadcast messages on the specified interface.
Use the following CLI syntax to enable listening to NTP broadcast messages.
The following example shows the command usage to enable listening to NTP broadcast messages.
The following is a sample configuration of NTP enabled with the broadcastclient parameter enabled.
This command configures the node to assume the role of an NTP server. Unless the server command is used, this node will function as an NTP client only and will not distribute the time to downstream network elements. If an authentication key ID is specified in this command, the NTP server requires client packets to be authenticated.
Use the following CLI syntax to configure the node to function as an NTP client.
The following example shows the command usage to configure the node to function as an NTP client.
The following is a sample configuration output of NTP enabled with the ntp-server command configured.
Configuration of an NTP peer configures symmetric active mode for the configured peer. Although any system can be configured to peer with any other NTP node, Nokia recommends to configure authentication and to configure known time servers as their peers. Use the no form of the command to remove the configured peer.
Use the following CLI syntax to configure symmetric active mode.
The following example shows the command usage to configure symmetric active mode.
The following is a sample configuration output of NTP enabled with the peer command configured.
The server command is used when the node operates in client mode with the NTP server specified in the address field. Use the no form of this command to remove the server with the specified address from the configuration. Up to five NTP servers can be configured.
Use the following CLI syntax to configure the node to operate in client mode.
The following example shows the command usage to configure the node to operate in client mode.
The following is a sample configuration output of NTP enabled with the server command configured.
SNTP is a compact, client-only version of the NTP. SNTP can only receive the time from SNTP/NTP servers; it cannot be used to provide time services to other systems. SNTP can be configured in either broadcast or unicast client mode.
SNTP time elements include:
Use the following CLI syntax to configure the SNTP.
The broadcast-client command enables listening at the global device level to SNTP broadcast messages on interfaces with broadcast client enabled.
Use the following CLI syntax to enable listening to SNTP broadcast messages.
The following example shows the command usage to enable listening to SNTP broadcast messages:
The following is a sample configuration output of SNTP enabled with the broadcast-client command enabled.
The server-address command configures an SNTP server for SNTP unicast client mode.
Use the following CLI syntax to configure an SNTP server for unicast client mode.
The following example shows the command usage to configure an SNTP server for unicast client mode.
The following is a sample configuration output of SNTP enabled with the server-address command configured.
The cron command supports the Service Assurance Agent (SAA) functions and the ability to schedule turning on and off policies to meet “Time of Day” requirements. CRON functionality includes the ability to specify the commands that need to be run, when they will be scheduled, including one-time only functionality (oneshot), interval and calendar functions, as well as where to store the output of the results. In addition, CRON can specify the relationship between input, output, and schedule. Scheduled reboots, peer turn ups, service assurance agent tests and more can all be scheduled with CRON, as well as OAM events, such as connectivity checks, or troubleshooting runs.
CRON elements include:
The schedule command configures the type of schedule to run, including one-time only (oneshot), periodic, or calendar-based runs. All runs are determined by month, day of month or weekday, hour, minute, and interval (seconds). If end-time and interval are both configured, whichever condition is reached first is applied.
Use the following CLI syntax to configure the type of schedule to run.
The following example shows the command usage to configure the type of schedule to run.
The following is a sample configuration output that schedules a script named “test2” to run every 15 minutes on the 17th of each month and every Friday until noon on July 17, 2007.
The script command opens a new nodal context, which contains information about a script.
Use the following CLI syntax to create a nodal context.
The following example shows the command usage to create a nodal context called “test”.
The following is a sample configuration output that names a script “test”.
ACLs and QoS policy configurations may be enhanced to support time-based matching. CRON configuration includes time matching with the 'schedule' subcommand. Schedules are based on events; time-range defines an end-time that is used as a match criteria.
Time range elements include:
Use this command to enable the time-range context.
Use the following syntax to create a time range.
The following example shows the command usage to create a time-range called "test1".
The absolute command configures a start and end time that will not repeat.
Use the following syntax to configure a time range that will not repeat.
The following example shows the command usage to configure a non-repetitive time range.
The following is a sample configuration output of an absolute time range beginning on May 5, 2006 at 11:00 and ending May 6, 2006 at 11:01.
The daily command configures the start and end of a periodic schedule for every day of the week (Sunday through Saturday).
Use the following syntax to configure a time range that is repeated daily.
The following example shows the command usage to create a time range that is repeated daily.
The following is a sample configuration output of a daily time range beginning at 11:00 and ending at 12:00.
The weekdays command configures the start and end of a periodic schedule for weekdays (Monday through Friday).
Use the following syntax to configure a time range that is repeated on weekdays.
The following example shows the command usage to create a time range that is repeated on weekdays.
The following is a sample configuration output of a time range beginning at 11:00 and ending at 12:00. This schedule runs all weekdays during this time period.
The weekend command configures the start and end of a periodic schedule for weekends (Saturday and Sunday). The resolution must be at least one minute apart, for example, start at 11:00 and end at 11:01. A start time and end time of 11:00 is invalid.
Use the following syntax to configure a time range that is repeated on weekends.
The following example shows the command usage to create a time range that is repeated on weekends.
The following is a sample configuration output of a weekend time range beginning at 11:00am and ending at 12:00pm, both Saturday and Sunday.
To specify 11:00am to 12:00pm on Saturday or Sunday only, use the absolute parameter for one day, or the weekly parameter for every Saturday or Sunday accordingly. In addition, see the schedule parameter to schedule oneshot or periodic events in the config>system>cron context.
The weekly command configures the start and end of a periodic schedule for the same day every week, for example, every Friday. The start and end dates must be the same. The resolution must be at least one minute apart, for example, start at 11:00 and end at 11:01. A start time and end time of 11:00 is invalid.
Use the following syntax to create a time range that is repeated weekly.
The following example shows the command usage to create a time range that is repeated weekly.
The following is a sample configuration output of a weekly time range beginning on Friday at 1:01am ending Friday at 1:02am.
Time of Day (TOD) suites are useful when configuring many types of time-based policies or when a large number of subscribers or SAPs require the same type of TOD changes. The TOD suite may be configured while using specific ingress or egress ACLs or QoS policies, and is an enhancement of the ingress and egress CLI trees.
This command is an enhancement for specific egress policies. Use this command to create time range based associations of previously created filter lists, QoS and scheduler policies. Multiple policies may be included and each must be assigned a different priority; in case time ranges overlap, the priority will be used to determine the prevailing policy. Only a single reference to a policy may be included without a time range.
In a TOD suite, filters that have entries with time ranges may not be selected. Similarly, filter entries with a time range may not be created while a TOD suite refers to that filter. QoS policies and filters referred to by a TOD suite must have the scope “template” (default).
Use the following syntax to configure TOD-suite egress parameters.
The following example shows the command usage to configure TOD-suite egress parameters.
The following is a sample configuration outpur of an egress IP filter association with filter ID 100.
This command is an enhancement for specific ingress policies including filter lists and QoS policies. Use this command to create time range based associations of previously created filter lists and QoS policies. Multiple policies may be included and each must be assigned a different priority; in case time ranges overlap, the priority will be used to determine the prevailing policy. Only a single reference to a policy may be included without a time range. To configure a daily time range across midnight, use a combination of two entries. An entry that starts at hour zero will take over from an entry that ends at hour 24.
Use the following syntax to configure time range based associations.
The following example shows the command usage to configure an IP filter association.
The following is a sample configuration output of an ingress IP filter association with filter ID 100.
The following example shows the command usage to configure an association with a SAP ingress QoS policy.
The following is a sample configuration output of an association with a SAP ingress QoS policy.
The config-backup command allows you to specify the maximum number of backup versions of the configuration and index files kept in the primary location.
For example, assume the config-backup count is set to 5 and the configuration file is named xyz.cfg. When a save command is issued, the xyz.cfg file is saved with a .1 extension. Each subsequent config-backup command increments the numeric extension until the maximum count is reached. The oldest file (5) is deleted as more recent files are saved.
xyz.cfg
xyz.cfg.1
xyz.cfg.2
xyz.cfg.3
xyz.cfg.4
xyz.cfg.5
xyz.ndx
Each persistent index file is updated at the same time as the associated configuration file. When the index file is updated, the save is performed to xyz .cfg and the index file is created as xyz.ndx. Synchronization between the active and standby is performed for all configurations and their associated persistent index files.
Use the following CLI syntax to specify the maximum number of backup versions of the configuration and index files kept in the primary location.
The following example shows the command usage to set the maximum number of backup versions of the configuration and index files kept in the primary location to 7.
The following is a sample configuration output for the config-backup command.
This section describes the CLI syntax to configure the following system administration parameters.
The admin>check-golden-bootstrap command validates the current golden bootstrap image and displays its version.
Use the following syntax to validate the current golden boot strap image.
The following example shows the command usage to validate the current bootstrap image.
The following is a sample output.
The admin>update-golden-bootstrap command validates the input file and updates the golden bootstrap image with the contents of this file.
Use the following syntax to update the golden boot strap image.
The following example shows the command usage to update the bootstrap image.
The following is a sample output.
The disconnect command immediately disconnects a user from a console, Telnet, FTP, or SSH session.
![]() | Note: Configuration modifications are saved to the primary image file. |
Use the following syntax to disconnect a user from a session.
The following example shows the command usage to disconnect a user from a session.
The following is a sample output of the disconnect command.
Use the set-time command to set the system date and time. The time entered should be accurate for the time zone configured for the system. The system will convert the local time to UTC before saving to the system clock, which is always set to UTC. If SNTP or NTP is enabled (no shutdown), this command cannot be used. The set-time command does not take into account any daylight saving offset, if defined.
Use the following syntax to set the system date and time.
The following example shows the command usage to set the system date and time.
The following is a sample output of the set-time command.
The display-config command displays the running configuration of the system.
Use the following syntax to display the running configuration of the system.
The following example shows the command usage to display the detailed running configuration of the system.
The following is a portion of the sample configuration output of the display-config detail command.
![]() | Note: This command should only be used with explicit authorization and direction from the Nokia Technical Assistance Center (TAC). |
The save command saves the running configuration to a configuration file. If the debug-save parameter is specified, debug configurations are saved in the configuration file; otherwise, the debug configurations are not saved between reboots.
Use the following syntax to save the running configuration and debug configurations to a configuration file.
The following example shows the command usage to save the running configuration and the debug configurations to a configuration file.
The following is a sample output of the save command.
The reboot command reboots the router, including redundant cards in redundant systems. If the now option is not specified, you are prompted to confirm the reboot operation.
Use the following syntax to reboot the router.
The following example shows the command usage to reboot the router.
The following is a sample output of the reboot command.
When an admin reboot auto-init command is issued, the system resets the existing BOF and reboots. The system startup process after the admin reboot auto-init command is executed is the same as the first-time system boot described in System Initialization.
![]() | Note: After the BOF is reset, the system may not boot up with the last saved system configuration unless the new BOF also uses the same configuration file. If you require the system to boot up with the last saved system configuration, Nokia recommends that you should run the admin>save file-url command to save the current system configuration and modify the BOF to use this configuration. |
Use the following CLI to reset the BOF and reboot.
The following is a sample output of the admin reboot auto-init command.
Two post-boot configuration extension files are supported and are triggered when either a successful or failed boot configuration file is processed. The commands specify URLs for the CLI scripts that are run following the completion of the boot-up configuration. A URL must be specified or no action is taken. The commands are persistent between router reboots and are included in the configuration saves (admin save).
Use the following syntax to specify the CLI scripts that are tun following the completion of the boot-up configuration.
The following example shows the command usage to specify the CLI scripts that are tun following the completion of the boot-up configuration.
The following is a sample command output.
The show system information command displays the current value of the bad and good exec URLs and indicates whether a post-boot configuration extension file was executed when the system was booted. If an extension file was executed, the show system information command also indicates if it completed successfully.
When executing a post-boot configuration extension file, status messages are output to the console screen before the “Login” prompt.
The following is sample output of a failed boot-up configuration that caused a boot-bad-exec file containing another error to be executed.
When synchronous Ethernet is enabled, the operator can select an Ethernet port as a candidate for timing reference. The timing information recovered from this port is used to time the system.
This section describes the CLI command syntax to enable synchronous Ethernet on specific 7210 SAS platforms.
The following is a sample CLI configuration for the 7210 SAS-D.
The following is a sample CLI configuration for the 7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-K 2F1C2T.
To enter edit mode and edit timing references, enter the begin keyword at the config>system>sync-if-timing# prompt.
Use the following CLI syntax to enter edit mode.
The following is a sample error message that is displayed if you try to modify sync-if-timing parameters without entering the begin keyword.
![]() | Note: Use commit to save or abort to discard the changes made in a session. |
On the 7210 SAS-D, ref1 must be configured to use one of ports 1/1/1 to 1/1/4 and ref2 must be configured to use either port 1/1/5 or 1/1/6. The software enforces this check. Ports 1/1/7 to 1/1/10 can be configured as either ref1 or ref2.
There is no port restriction on the 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, or 7210 SAS-K 3SFP+ 8C; any port can be configured for ref1 or ref2.
The following is a sample configuration of timing reference parameters.
Example:
The following displays the timing reference parameters.
The revert command allows the clock to revert to a higher-priority reference if the current reference goes offline or becomes unstable.
If revertive switching is enabled, the highest-priority valid timing reference is used. If a reference with a higher priority becomes valid, a switchover to that reference is initiated. If a failure on the current reference occurs, the next highest reference takes over.
If non-revertive switching is enabled, the active reference always remains selected while its valid, even if a higher priority reference becomes available. If the active reference becomes invalid, a reference switchover to a valid reference with the highest priority is initiated. The failed reference is eligible for selection once it becomes operational.
Other editing commands are:
Use the following syntax to abort or commit changes made to a timing reference.
You can force the system synchronous timing output to use a specific reference.
![]() | Note: The debug sync-if-timing force-reference command should only be used to test and debug problems. After the system timing reference input has been forced, it will not revert to another reference unless explicitly reconfigured, if the forced reference fails, or if the received QL code is QL-DNU/DUS and QL selection is enabled. |
When the debug sync-if-timing force-reference command is run, the current system synchronous timing output is immediately referenced from the specified reference input. The reference must be qualified.
Debug configurations are not saved between reboots.
Use the following syntax to reference the current system synchronous timing output from the specifies reference input.
The following example shows the command usage to reference the current system synchronous timing output from the specifies reference input.
This section describes how to configure system monitoring thresholds.
The event command controls the generation and notification of threshold crossing events configured with the alarm command. When a threshold crossing event is triggered, the rmon event configuration optionally specifies whether an entry in the RMON-MIB log table will be created to record the occurrence of the event. It can also specify whether an SNMP notification (trap) will be generated for the event. There are two notifications for threshold crossing events: a rising alarm and a falling alarm.ping-address.
Creating an event entry in the RMON-MIB log table does not create a corresponding entry in the 7210 SAS event logs. However, when the event is set to trap, the generation of a rising alarm or falling alarm, a notification creates an entry in the event logs and is distributed to the configured log destinations, including: console, session, memory, file, syslog, or SNMP trap destination. The logger message includes a rising or falling threshold crossing event indicator, the sample type (absolute or delta), the sampled value, the threshold value, the rmon-alarm-id, the associated rmon-event-id, and the sampled SNMP object identifier.
The alarm command configures an entry in the RMON-MIB alarm table. The alarm command controls the monitoring and triggering of threshold crossing events. To trigger the notification or logging of a threshold crossing event, at least one associated rmon event must be configured.
The agent periodically takes statistical sample values from the MIB variable specified for monitoring and compares them to thresholds that have been configured with the alarm command. The alarm command configures the MIB variable to be monitored, the polling period (interval), sampling type (absolute or delta value), and rising and falling threshold parameters. If a sample has crossed a threshold value, the associated event is generated.
Preconfigured CLI threshold commands are available. Preconfigured commands hide some of the complexities of configuring RMON alarm and event commands and perform the same function. In particular, the preconfigured commands do not require the user to know the SNMP object identifier to be sampled. The preconfigured threshold configurations include memory warnings, alarms, and compact flash usage warnings and alarms.
To create events, use the following sample CLI configuration.
The following is a sample command output.
The 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C do not support alarm contact inputs; instead, they provide an option to configure the console port as an alarm input pin. A single alarm input pin can be enabled for use with the console port, allowing operators to monitor external events and alert the operator.
You can configure generation of events when alarm input pins transition between the open and close states. For each generated event, you can specify the following:
The RXD and TXD pins of the console input is used to provide a single alarm input pin functionality. The RXD and TXD pins of the console port is used by software to detect external events. The operating system detects an open or closed circuit, triggers an alarm, and logs it when an event is detected.
By default, the console port does not provide alarm input pin functionality. The CLI command configure>system>console>use-console-alarm-input is used to enable the use of console port as an alarm input pin. After this command is executed, the console port can no longer be used as a console port, and the system generates a log message to convey this restriction. Additionally, the user must configure the alarm-contact-input parameters for the console by using the CLI command config> system>alarm-contact-input console-1.
![]() | Note: The user must enable a Telnet session with the node before enabling the console as an alarm input. Once the alarm input functionality is enabled, the user can configure the alarm-contact-input no shutdown using the Telnet session. |
The following output displays system resource profile defaults:
Use the following syntax to configure LLDP.
The following is a sample LLDP port configuration.
The following is a sample global system LLDP configuration.