Note: The commands listed in this section apply only to the 7450 ESS.
Note: The commands in this section apply to the 7750 SR.
Note: The commands in this section apply to the 7450 ESS and 7750 SR, except the 7750 SR-1e, 7750 SR-2e, and 7750 SR-3e.
This command administratively disables the entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics.
The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.
The no form of this command places the entity into an administratively enabled state.
no shutdown
This command creates a text description stored in the configuration file for a configuration context.
The description command associates a text string with a configuration context to help identify the content in the configuration file.
The no form of this command removes the string from the configuration.
No description associated with the configuration context.
This command enables the context to configure system-wide ATM parameters and only apply to the 7750 SR.
This command indicates the location ID for ATM OAM and only applies to the 7750 SR.
Refer to the 7750 SR Services Guide for information about ATM QoS policies and ATM-related service parameters.
no atm-location-id
Invalid values include a location ID where the first octet is: 00, FF, 6A Acceptable location-ids include values where the first octet is: 01, 03 Other values are not accepted.
This command configures system-wide ATM parameters and applies only to the 7750 SR.
This command specifies the number of seconds between periodic loopback attempts on an ATM endpoint that has periodic loopback enabled. This command only applies to the 7750 SR.
Specifies the number of OAM loopback attempts that must fail after the periodic attempt before the endpoint will transition to AIS-LOC state.
The retry values are configured on a system wide basis and are affective on the next period cycle of any ATM VC SAP using periodic-loopback, if changed. The timeout for receiving a loopback response from the remote peer and declaring the loopack failed is 1 second and is not configurable.
This command only applies to the 7750 SR.
This command specifies the number of consecutive OAM loopback attempts that must succeed after the periodic attempt before the endpoint will transition the state to up. This command only applies to the 7750 SR.
Use this command to configure a URL for a CLI script to exec following a failure of a boot-up configuration. The command specifies a URL for the CLI scripts to be run following the completion of the boot-up configuration. A URL must be specified or no action is taken.
The commands are persistent between router (re)boots and are included in the configuration saves (admin>save).
Related Commands
exec - This command executes the contents of a text file as if they were CLI commands entered at the console.
no boot-bad-exec
Ipv6-address only applies to the 7750 SR and 7950 XRS.
file url | local-url | remote-url | 255 chars max |
local-url | [cflash-id/][file-path] | |
remote-url | [{ftp://} login:pswd@remote-locn/][file-path] | |
remote-locn | [hostname | ipv4-address | [ipv6- address]] | |
ipv4-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x[-interface] | |
x:x:x:x:x:x:d.d.d.d[-interface] | ||
x - [0..FFFF]H | ||
d - [0..255]D | ||
interface - 32 chars max, for link local addresses | ||
cflash-id | cf1:, cf1-A:,cf1-B:,cf2:,cf2-A:,cf2-B:,cf3:,cf3-A:,cf3-B: |
Use this command to configure a URL for a CLI script to exec following the success of a boot-up configuration.
Related Commands
exec - This command executes the contents of a text file as if they were CLI commands entered at the console.
no boot-good-exec
Ipv6-address only applies to the 7750 SR and 7950 XRS and ipv4-address applies to the 7950 XRS.
file url | local-url | remote-url | 255 chars max |
local-url | [cflash-id/][file-path] | |
remote-url | [{ftp://} login:pswd@remote-locn/][file-path] | |
remote-locn | [hostname | ipv4-address | [ipv6- address]] | |
ipv4-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x[-interface] | |
x:x:x:x:x:x:d.d.d.d[-interface] | ||
x - [0..FFFF]H | ||
d - [0..255]D | ||
interface - 32 chars max, for link local addresses | ||
cflash-id | cf1:, cf1-A:,cf1-B:,cf2:,cf2-A:,cf2-B:,cf3:,cf3-A:,cf3-B: |
This command configures the chassis scaling and feature set and only applies to the 7450 ESS and 7750 SR.
Note that, if you are in chassis-mode d and configure an IOM type as iom2-20g and then downgrade to chassis-mode a or b (must specify force keyword), a warning appears about the IOM downgrade. In this case, the IOM provisioned type will downgrade to iom-20g-b. Once this is done, the ASAP MDA cannot be configured.
The ASAP MDA can only be configured if the iom2-20g IOM type is provisioned and equipped and the chassis mode is configured as a or b.
If this is the desired behavior for the 7750 SR, for example, chassis-mode d is configured and IPv6 is running, you can then downgrade to chassis-mode a or b if you want to disable IPv6.
For chassis mode d, the default must be changed from the default mode a which assumes the least available features. Mode d enables the new feature sets available with newer generations of IOMs. Chassis mode d supports the P2/Q2/T2-based IOMs products and the extensive queuing/policing/bandwidth. Mode d assumes that the iom3-xp is installed.
The force command is not available for chassis-mode d.
a
a: This mode corresponds to scaling and feature set associated with iom-20g.
b: This mode corresponds to scaling and feature set associated with iom-20g-b.
c: This mode corresponds to scaling and feature set associated with iom2-20g (7750 SR only).
d: This mode corresponds to scaling and feature set associated with iom3-xp.
If the chassis mode is not explicitly provisioned in the configuration file, the chassis will come up in chassis mode a by default. The behavior for the IOMs is described in the following table:
IOM | Behavior |
iom-20g-b | Comes online if provisioned as iom-20g or iom-20g-b. |
iom2-20g | Comes online if provisioned as iom-20g, iom-20g-b or iom2-20g. |
iom-10g | Comes online if provisioned as iom-10g. |
iom3-xp | Comes online if provisioned as iom3-xp. |
This command creates a Common Language Location Identifier (CLLI) code string for the SR-series router. A CLLI code is an 11-character standardized geographic identifier that uniquely identifies geographic locations and certain functional categories of equipment unique to the telecommunications industry.
No CLLI validity checks other than truncating or padding the string to eleven characters are performed.
Only one CLLI code can be configured, if multiple CLLI codes are configured the last one entered overwrites the previous entry.
The no form of the command removes the CLLI code.
none — No CLLI codes are configured.
This command configures the maximum number of backup versions maintained for configuration files and BOF.
For example, assume the config-backup count is set to 5 and the configuration file is called xyz.cfg. When a save command is executed, the file xyz.cfg is saved with a .1 extension. Each subsequent config-backup command increments the numeric extension until the maximum count is reached.
xyz.cfg xyz.cfg.1 xyz.cfg.2 xyz.cfg.3 xyz.cfg.4 xyz.cfg.5 xyz.ndx
Each persistent index file is updated at the same time as the associated configuration file. When the index file is updated, then the save is performed to xyz.cfg and the index file is created as xyz.ndx. Synchronization between the active and standby CPM is performed for all configurations and their associated persistent index files.
The no form of the command returns the configuration to the default value.
5
This command creates a text string that identifies the contact name for the device.
Only one contact can be configured, if multiple contacts are configured the last one entered will overwrite the previous entry.
The no form of the command reverts to default.
none — No contact name is configured.
This command creates a text string that identifies the system coordinates for the device location. For example, the command coordinates “37.390 -122.0550" is read as latitude 37.390 north and longitude 122.0550 west.
Only one set of coordinates can be configured. If multiple coordinates are configured, the last one entered overwrites the previous entry.
The no form of the command reverts to the default value.
none — No coordinates are configured.
This command configures DNS settings.
This command configures the DNS address resolving order preference. By default DNS names are queried for A-records only (address-preference is IPv4-only).
If the address-preference is set to IPv6-first, the DNS server will be queried for AAAA-records (IPv6) first and if a successful replied is not received, then the DNS server is queried for A-records. IPv6 applies only to the 7750 SR and 7950 XRS.
This command enables validation of the presence of the AD-bit in responses from the DNS servers, and reports a warning to the SECURITY log if DNSSEC validation was not possible.
This command requires either the fall-through or drop parameters be configured. When the fall-through parameter is supplied, the system will allow DNS responses that do not pass DNSSEC validation to be accepted and logged. When the drop parameter is specified, the system will reject and log DNS responses that do not pass DNSSEC validation and the resolution will appear to fail.
disabled
This command enables vendor specific extensions to ICMP.
This command enables the load-balancing context to configure the interface per-flow load balancing options that will apply to traffic entering this interface and egressing over a LAG/ECMP on system-egress. This is a per interface setting. For load-balancing options that can also be enabled on the system level, the options enabled on the interface level overwrite system level configurations.
This command configures system-wide Layer 4 load balancing. The configuration at the system level can enable or disable load balancing based on Layer 4 fields. If enabled, the Layer 4 source and destination port fields will be included in hashing calculation for TCP/UDP packets.
The hashing algorithm addresses finer spraying granularity where many hosts are connected to the network.
To address more efficient traffic distribution between network links (forming a LAG group), a hashing algorithm extension takes into account L4 information (that is, src/dst L4-protocol port).
The hashing index can be calculated according to the following algorithm:
This algorithm will be used in all cases where IP information in per-packet hashing is included (see LAG and ECMP Hashing in the Interfaces Guide). However, the Layer 4 information (TCP/UDP ports) will not be used for fragmented packets.
no l4-load-balancing
This command configures system-wide LSR load balancing. Hashing can be enabled on the IP header at an LSR for spraying labeled IP packets over multiple equal cost paths in ECMP in an LDP LSP and/or over multiple links of a LAG group in all types of LSPs.
The LSR hash routine operates on the label stack and the IP header if a packet is IPv4. An LSR will consider a packet to be IPv4 if the first nibble following the bottom of the label stack is 4. IPv4 is supported only and on IOM-3 and IMMs. IPv6 packets are hashed on label stack only. The hash on label and IPv4 header can be enabled or disabled at the system level only.
disabled
This command enables enhanced egress multicast load balancing behavior for Layer 3 multicast. When enabled, the router will spray the multicast traffic using as hash inputs from the packet based on lsr-load-balancing, l4-load-balancing and system-ip-load-balancing configurations. That is, an ingress LER or IP PE will spray traffic based on the IP hash criteria: SA/DA + optional Layer 4 port + optional system IP egress LER or LSR - will spray traffic based on label or IP hash criteria outlined above or both based on configuration of lsr-load-balancing, l4-load-balancing, and system-ip-load-balancing.
The no form of the command preserves the default behavior for per flow hashing of multicast traffic.
This command enables enhanced VLL LAG service ID hashing. This command improves the LAG spraying of VLL service packets and is applied only when both ECMP and LAG hashing are performed by the same router. By default, the ECMP interface and LAG link for all packets on the VLL service are selected based on a direct modulo operation of the service ID. This command enhances distribution and hashes the service ID prior to the LAG link modulo operation when an ECMP link modulo operation is performed.
The no form of the command preserves the default behavior of VLL LAG service ID hashing.
This command enables the use of the system IP address in the ECMP hash algorithm to add a per system variable. This can help guard against cases where multiple routers, in series, will end up hashing traffic to the same ECMP/LAG path.
This command is set at a system wide basis, however if certain IOMs do not support the new load-balancing algorithm, they will continue to use the default algorithm. By default, the IPv4 system IP address is used in the hash algorithm. When no IPv4 system IP address is configured, the IPv6 system IP address, when configured, is used in the hash algorithm.
The no form of the command resets the system wide algorithm to default.
no system-ip-load-balancing
This command enables the options to force the creation of IP interface indexes so that they are globally unique across all routing contexts. In addition, the command ensures that any interface created using SNMP also has a system-wide unique IP interface index.
If this command is issued but the system has previously existing interface indexes that conflict, the command will be rejected until all the conflicts are removed. Pre-existing persistency tables should also be removed before enabling this system option.
The no form of the command disables this option and returns the system to the default behavior.
no enforce-unique-if-index
This command configures the Link Aggregation Control Protocol (LACP) system priority on aggregated Ethernet interfaces. LACP allows the operator to aggregate multiple physical interfaces to form one logical interface.
32768
This command creates a text string that identifies the system location for the device.
Only one location can be configured. If multiple locations are configured, the last one entered overwrites the previous entry.
The no form of the command reverts to the default value.
none — No system location is configured.
This command creates a system name string for the device.
For example, system-name parameter ALA-1 for the name command configures the device name as ALA-1.
Only one system name can be configured. If multiple system names are configured, the last one encountered overwrites the previous entry.
The no form of the command reverts to the default value.
The default system name is set to the chassis serial number which is read from the backplane EEPROM.
This command specifies the location and name of the CLI script file executed following a redundancy switchover from the previously active CPM card. A switchover can happen because of a fatal failure or by manual action.
The CLI script file can contain commands for environment settings, debug (excluding mirroring settings), and other commands not maintained by the configuration redundancy.
The following commands are not supported in the switchover-exec file: clear, configure, candidate, oam, tools, oam, ping, traceroute, mstat, mtrace and mrinfo.
When the file-url parameter is not specified, no CLI script file is executed.
none
This command configures the binding between a host port ID and the satellite uplink from the satellite chassis. The port-topology can be configured with the host connected to a satellite uplink or the satellite uplink port connected to the specified host port. Both configurations are supported, as shown in the following usage examples:
port-id | slot/mda/port | |
eth-sat-id | esat-id/slot/[u]port | |
esat | keyword | |
id | [1..20] | |
u | keyword for up-link port |
This command is used to enter the satellite configuration context. Within the satellite context, the administrator can specify the configuration details for a satellite chassis that is hosted by the associated local system.
none
This command defines a description string that is tied to the associated Ethernet satellite.
The no form of the command deletes the associated description string.
no description
This command creates the specified Ethernet satellite configuration context. Specific parameters including software-repository, satellite-type, satellite MAC address and sync-e can be configured or modified within this context.
The no form of the command deletes the specified Ethernet satellite.
none
This command configures the MAC address for the associated Ethernet satellite chassis. This MAC address is used to validate the identity of an Ethernet satellite that attempts to associate with the local host.
The no form of the command deletes the MAC address for the associated Ethernet satellite.
none
This command configures the type of Ethernet satellite variant for the associated satellite chassis.
The no form of the command deletes the sat-type configuration.
no sat-type
This command disables the associated Ethernet satellite.
If the associated Ethernet satellite is active, the satellite will not be reset but all satellite client ports will be shut down.
If the Ethernet satellite is not active but attempts to associate with the host, the Ethernet satellite chassis will be brought up according to the satellite configuration but all client ports will be shut down.
The no form of this command removes the shutdown state and all client ports on active Ethernet satellites will be brought back up.
shutdown
This command binds the specified software repository to the associated Ethernet satellite. The software repository is used to locate and serve the correct software image to the Ethernet satellite at boot time.
The configured software repository is only used when the satellite boots. Changing the software repository for an active satellite does not have an effect until the next time a satellite boots.
An Ethernet satellite cannot be booted if there is no software repository defined for it.
The no form of the command removes the software repository.
no software-repository
This command enables the Ethernet satellite for synchronous Ethernet operation so that the transmit timing of the satellite access ports use the frequency of the host router’s central clock.
To enable this functionality, both host ports on the router that connect to the U1 and U2 ports of the satellite must be synchronous Ethernet-capable ports.
When the Ethernet satellite is configured for synchronous Ethernet, ESMC frames are enabled on the host ports. The SSM code-type used between the host and the satellite should be manually configured on the host ports to match the code-type desired on the satellite client ports. The code-type setting on the host ports does not restrict the code-type used on the satellite client ports, as those may be configured on an individual port basis.
This command creates or deletes an instance of a software repository. The instance is identified by a repository name.
A software repository is used to obtain files to upgrade software on certain subsystems of the router (for example, Ethernet satellites).
Up to three locations can be specified within a software repository for the router to access files in the repository. The router will first attempt to access the file at the primary location. If the primary location is not configured or the files are not found at the primary location, then the router will attempt to access the files at the secondary location. If the secondary location is not configured or the files are not found at the secondary location, then the router will attempt to access the files at the tertiary location. If the tertiary location is not configured or the files are not found at the tertiary location, then the software repository access will fail.
The no form of the command removes the software repository.
This command defines a description string for the software repository.
The no form of the command deletes the associated description string.
no description
This command configures the primary location for the files in the software repository. See the software-repository command description for more information.
The no form of the command removes the primary location.
file url | local-url | remote-url | |
local-url | [cflash-id/][file-path] | 200 chars maximum, including cflash-id directory length 99 characters maximum each |
remote-url | [{ftp://} login:pswd@remote-locn/][file-path] 243 characters maximum directory length 99 characters maximum each | |
remote-locn | [hostname | ipv4-address | [ipv6- address]] | |
ipv4-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x[-interface] | |
x:x:x:x:x:x:d.d.d.d[-interface] | ||
x - [0..FFFF]H | ||
d - [0..255]D | ||
interface - 32 characters max, for link local addresses | ||
cflash-id | cf1:, cf1-A:,cf1-B:,cf2:,cf2-A:,cf2-B:,cf3:,cf3-A:,cf3-B: |
This command configures the secondary location for the files in the software repository. See the software-repository command description for more information.
The no form of the command removes the secondary location.
file url | local-url | remote-url | |
local-url | [cflash-id/][file-path] | 200 chars maximum, including cflash-id directory length 99 characters maximum each |
remote-url | [{ftp://} login:pswd@remote-locn/][file-path] 243 characters maximum directory length 99 characters maximum each | |
remote-locn | [hostname | ipv4-address | [ipv6- address]] | |
ipv4-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x[-interface] | |
x:x:x:x:x:x:d.d.d.d[-interface] | ||
x - [0..FFFF]H | ||
d - [0..255]D | ||
interface - 32 characters max, for link local addresses | ||
cflash-id | cf1:, cf1-A:,cf1-B:,cf2:,cf2-A:,cf2-B:,cf3:,cf3-A:,cf3-B: |
This command configures the tertiary location for the files in the software repository. See the software-repository command description for more information.
The no form of the command removes the tertiary location.
file url | local-url | remote-url | |
local-url | [cflash-id/][file-path] | 200 chars maximum, including cflash-id directory length 99 characters maximum each |
remote-url | [{ftp://} login:pswd@remote-locn/][file-path] 243 characters maximum directory length 99 characters maximum each | |
remote-locn | [hostname | ipv4-address | [ipv6- address]] | |
ipv4-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x[-interface] | |
x:x:x:x:x:x:d.d.d.d[-interface] | ||
x - [0..FFFF]H | ||
d - [0..255]D | ||
interface - 32 characters max, for link local addresses | ||
cflash-id | cf1:, cf1-A:,cf1-B:,cf2:,cf2-A:,cf2-B:,cf3:,cf3-A:,cf3-B: |
This command allows the user to enable a supply of +24V output power on the +24VDC pin of the Alarm Interface Port of the CPM. When enabled, the power supplied through the +24VDC output pin can be used as a source voltage for the alarm contact input pins. The +24VDC output can be used to supply power for monitoring external sensor devices such as cabinet door sensors instead of using an external power source. If users want to use a separate external power source, they should disable the supply of power to the +24VDC output pin by using this CLI command.
off
This command provides the context to configure one of four available alarm contact input pins.
This command allows the user to configure a text message for use along with SNMP trap and log event messages that are sent when the system clears an alarm. The system generates the default message "Alarm Input Cleared" if no message is configured. The clear-alarm-msg string is included in the log event when the pin changes to the normal state.
This command describes an alarm contact input pin. The description provides an indication of the usage or attribute of the pin. It is stored in the CLI configuration file and helps the user in identifying the purpose of the pin. The description is included in the log event when the pin changes state (the string “Pin x” is used in the log events if no description is configured).
This command configures the normal state to be associated with the alarm contact input. When the system detects a transition from the normal state, an alarm is generated. The alarm is cleared when the system detects a transition back to the normal state.
Configure the normal state as closed if an external power source is used to power the inputs.
open
This command stops tracking the state changes associated with the alarm contact input. The system does not generate or clear the alarms for the alarm contact input, but if an alarm is generated, the system clears the alarm when the shutdown command is executed. The no form of the command starts tracking the state changes associated with the alarm contact input.
shutdown
This command allows the user to configure a text message for use along with SNMP trap and log event messages that are sent when the system generates an alarm. The system generates the default message "Alarm Input Triggered" if no message is configured. The trigger-alarm-msg string is included in the log event when the pin changes from the normal state.
The alarm command configures an entry in the RMON-MIB alarmTable. The alarm command controls the monitoring and triggering of threshold crossing events. In order for notification or logging of a threshold crossing event to occur there must be at least one associated rmon>event configured.
The agent periodically takes statistical sample values from the MIB variable specified for monitoring and compares them to thresholds that have been configured with the alarm command. The alarm command configures the MIB variable to be monitored, the polling period (interval), sampling type (absolute or delta value), and rising and falling threshold parameters. If a sample has crossed a threshold value, the associated event is generated.
Use the no form of this command to remove an rmon-alarm-id from the configuration.
The oid-string has a maximum length of 255 characters
If the first sample is greater than or equal to the rising threshold value and startup-alarm is equal to rising or either, then a single rising threshold crossing event is generated.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
If there is no corresponding event configured for the specified rmon-event-id, then no association exists and no action is taken.
If the rising-event rmon-event-id has a value of zero (0), no associated event exists.
If a rising-event rmon-event-id is configured, the CLI requires a rising-threshold to also be configured.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
If a falling-event is configured, the CLI requires a falling-threshold to also be configured.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
This command enables capacity monitoring of the compact flash specified in this command. The severity level is alarm. Both a rising and falling threshold can be specified.
The no form of this command removes the configured compact flash threshold alarm.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal to the falling-threshold value.
The threshold value represents units of 512 bytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold value.
The threshold value represents units of 512 bytes.
If the first sample is greater than or equal to the rising threshold value and startup-alarm is equal to rising or either, a single rising threshold crossing event is generated.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
This command enables capacity monitoring of the compact flash specified in this command. The usage is monitored as a percentage of the capacity of the compact flash. The severity level is alarm. Both a rising and falling threshold can be specified.
The no form of this command removes the configured compact flash threshold alarm.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal to the falling-threshold value.
The threshold value is the percentage of used space versus capacity for the specified compact flash.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold value.
The threshold value is the percentage of used space versus capacity for the specified compact flash.
If the first sample is greater than or equal to the rising threshold value and startup-alarm is equal to rising or either, a single rising threshold crossing event is generated.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
This command enables capacity monitoring of the compact flash specified in this command.
The severity level is warning. Both a rising and falling threshold can be specified. The no form of this command removes the configured compact flash threshold warning.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal to the falling-threshold value.
The threshold value represents units of 512 bytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold value.
The threshold value represents units of 512 bytes.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
This command enables capacity monitoring of the compact flash specified in this command. The usage is monitored as a percentage of the capacity of the compact flash.
The severity level is warning. Both a rising and falling threshold can be specified. The no form of this command removes the configured compact flash threshold warning.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal to the falling-threshold value.
The threshold value is the percentage of used space versus capacity for the specified compact flash.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold value.
The threshold value is the percentage of used space versus capacity for the specified compact flash.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
This command configures memory use, in kilobytes, alarm thresholds.
The no form of the command removes the parameters from the configuration.
none
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
The threshold value represents units of kilobytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
The threshold value represents units of kilobytes.
This command configures memory usage, in kilobytes, for warning thresholds
none
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
The threshold value represents units of kilobytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
The threshold value represents units of kilobytes.
The event command configures an entry in the RMON-MIB event table. The event command controls the generation and notification of threshold crossing events configured with the alarm command. When a threshold crossing event is triggered, the rmon>event configuration optionally specifies if an entry in the RMON-MIB log table should be created to record the occurrence of the event. It may also specify that an SNMP notification (trap) should be generated for the event. The RMON-MIB defines two notifications for threshold crossing events: Rising Alarm and Falling Alarm.
Creating an event entry in the RMON-MIB log table does not create a corresponding entry in the TiMOS event logs. However, when the event-type is set to trap, the generation of a Rising Alarm or Falling Alarm notification creates an entry in the TiMOS event logs and that is distributed to whatever TiMOS log destinations are configured: CONSOLE, session, memory, file, syslog, or SNMP trap destination.
The TiMOS logger message includes a rising or falling threshold crossing event indicator, the sample type (absolute or delta), the sampled value, the threshold value, the RMON-alarm-id, the associated RMON-event-id and the sampled SNMP object identifier.
Use the no form of this command to remove an rmon-event-id from the configuration.
The memory thresholds are based on monitoring the TIMETRA-SYSTEM-MIB sgiMemoryUsed object. This object contains the amount of memory currently used by the system. The severity level is Alarm. The absolute sample type method is used.
The no form of this command removes the configured memory threshold warning.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
The threshold value represents units of bytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
The threshold value represents units of bytes.
The threshold value represents units of bytes.
The memory thresholds are based on monitoring MemoryUsed object. This object contains the amount of memory currently used by the system. The severity level is Alarm.
The absolute sample type method is used.
The no form of this command removes the configured compact flash threshold warning.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
This command creates the context to configure generic RMON alarms and events.
Generic RMON alarms can be created on any SNMP object-ID that is valid for RMON monitoring (for example, an integer-based datatype).
The configuration of an event controls the generation and notification of threshold crossing events configured with the alarm command.
This command enables the context to configure monitoring thresholds.
This command sets the local system time.
The time entered should be accurate for the time zone configured for the system. The system will convert the local time to UTC before saving to the system clock which is always set to UTC. This command does not take into account any daylight saving offset if defined.
If SNTP or NTP is enabled (no shutdown) then this command cannot be used.
This command enables the context to configure the system time zone and time synchronization parameters.
This command enables the context to configure Network Time Protocol (NTP) and its operation. This protocol defines a method to accurately distribute and maintain time for network elements. Furthermore this capability allows for the synchronization of clocks between the various network elements. Use the no form of the command to stop the execution of NTP and remove its configuration.
none
This command provides the option to skip the rejection of NTP PDUs that do not match the authentication key-id, type or key requirements. The default behavior when authentication is configured is to reject all NTP protocol PDUs that have a mismatch in either the authentication key-id, type or key.
When authentication-check is enabled, NTP PDUs are authenticated on receipt. However, mismatches cause a counter to be increased, one counter for type and one for key-id, one for type, value mismatches. These counters are visible in a show command.
The no form of this command allows authentication mismatches to be accepted; the counters however are maintained.
authentication-check — Rejects authentication mismatches.
This command sets the authentication key-id, type and key used to authenticate NTP PDUs sent to or received by other network elements participating in the NTP protocol. For authentication to work, the authentication key-id, type and key value must match.
The no form of the command removes the authentication key.
none
Entering the authentication-key command with a key-id value that matches an existing configuration key will result in overriding the existing entry.
Recipients of the NTP packets must have the same authentication key-id, type, and key value in order to use the data transmitted by this node. This is an optional parameter.
The key can be any combination of ASCII characters up to 32 characters in length for message-digest (md5) or 8 characters in length for des (length limits are unencrypted lengths). If spaces are used in the string, enclose the entire string in quotation marks (“.”).
This is a required parameter; either DES or message-digest must be configured.
This command configures the node to transmit NTP packets on a given interface. Broadcast and multicast messages can easily be spoofed, thus, authentication is strongly recommended.
The no form of this command removes the address from the configuration.
When configuring NTP, the node can be configured to receive broadcast packets on a given subnet. Broadcast and multicast messages can easily be spoofed, thus, authentication is strongly recommended. If broadcast is not configured then received NTP broadcast traffic will be ignored. Use the show command to view the state of the configuration.
The no form of this command removes the address from the configuration.
This command configures NTP the node to transmit multicast packets on the CPM/CCM MGMT port. Broadcast and multicast messages can easily be spoofed; authentication is strongly recommended.
The no form of this command removes the multicast address from the configuration.
This command configures the node to receive multicast NTP messages on the CPM MGMT port. If multicastclient is not configured, received NTP multicast traffic will be ignored. Use the show command to view the state of the configuration.
The no construct of this message removes the multicast client for the specified interface from the configuration.
This command configures the node to assume the role of an NTP server. Unless the server command is used, this node will function as an NTP client only and will not distribute the time to downstream network elements.
no ntp-server
The authentication key from the received messages will be used for the transmitted messages.
Configuration of an NTP peer configures symmetric active mode for the configured peer. Although any system can be configured to peer with any other NTP node it is recommended to configure authentication and to configure known time servers as their peers.
The no form of the command removes the configured peer.
Specify the key-id that identifies the configured authentication key and authentication type used by this node to transmit NTP packets to an NTP peer. If an NTP packet is received by this node, the authentication key-id, type, and key value must be valid otherwise the packet will be rejected and an event/trap generated.
This command is used when the node should operate in client mode with the ntp server specified in the address field of this command. The no construct of this command removes the server with the specified address from the configuration.
If the internal PTP process is to be used as a source of time for System Time and OAM time then it must be specified as a server for NTP. If PTP is specified then the prefer parameter must also be specified. Once PTP has established a UTC traceable time from an external grandmaster then it shall always be the source for time into NTP even if PTP goes into time holdover. PTP applies only to the 7450 ESS and 7750 SR.
Use of the internal PTP time source for NTP will promote the internal NTP server to stratum 1 level. This may impact the NTP network topology.
This command creates the context to edit the Simple Network Time Protocol (SNTP).
SNTP can be configured in either broadcast or unicast client mode. SNTP is a compact, client-only version of the NTP. SNTP can only receive the time from SNTP/NTP servers. It cannot be used to provide time services to other systems.
The system clock is automatically adjusted at system initialization time or when the protocol first starts up.
When the time differential between the SNTP/NTP server and the system is more than 2.5 seconds, the time on the system is gradually adjusted.
SNTP is created in an administratively enabled state (no shutdown).
The no form of the command removes the SNTP instance and configuration. SNTP does not need to be administratively disabled when removing the SNTP instance and configuration.
no sntp
This command enables listening to SNTP/NTP broadcast messages on interfaces with broadcast client enabled at global device level.
When this global parameter is configured then the ntp-broadcast parameter must be configured on selected interfaces on which NTP broadcasts are transmitted.
SNTP must be shutdown prior to changing either to or from broadcast mode.
The no form of the command disables broadcast client mode.
no broadcast-client
This command creates an SNTP server for unicast client mode.
This command creates the context to create scripts, script parameters and schedules which support the Service Assurance Agent (SAA) functions.
CRON features are saved to the configuration file on both primary and backup control modules. If a control module switchover occurs, CRON events are restored when the new configuration is loaded. If a control module switchover occurs during the execution of a cron script, the failover behavior will be determined by the contents of the script.
This command configures the type of schedule to run, including one-time only (oneshot), periodic or calendar-based runs. All runs are determined by month, day of month or weekday, hour, minute and interval (seconds).
The no form of the command removes the context from the configuration.
none
This command configures the total number of times a CRON “interval” schedule is run. For example, if the interval is set to 600 and the count is set to 4, the schedule runs 4 times at 600 second intervals.
This command specifies which days of the month that the schedule will occur. Multiple days of the month can be specified. When multiple days are configured, each of them will cause the schedule to trigger. If a day-of-month is configured without configuring month, weekday, hour and minute, the event will not execute.
Using the weekday command as well as the day-of-month command will cause the script to run twice. For example, consider that today is Monday January 1. If Tuesday January 5 is configured, the script will run on Tuesday (tomorrow) as well as January 5 (Friday).
The no form of this command removes the specified day-of-month from the list.
Integer values must map to a valid day for the month in question. For example, February 30 is not a valid date.
This command is used concurrently with type periodic or calendar. Using the type of periodic, end-time determines at which interval the schedule will end. Using the type of calendar, end-time determines on which date the schedule will end.
When no end-time is specified, the schedule runs forever.
This command specifies which hour to schedule a command. Multiple hours of the day can be specified. When multiple hours are configured, each of them will cause the schedule to trigger. Day-of-month or weekday must also be specified. All days of the month or weekdays can be specified. If an hour is configured without configuring month, weekday, day-of-month, and minute, the event will not execute.
The no form of this command removes the specified hour from the configuration.
This command specifies the interval between runs of an event.
This command specifies the minute to schedule a command. Multiple minutes of the hour can be specified. When multiple minutes are configured, each of them will cause the schedule to occur. If a minute is configured, but no hour or day is configured, the event will not execute. If a minute is configured without configuring month, weekday, day-of-month, and hour, the event will not execute.
The no form of this command removes the specified minute from the configuration.
This command specifies the month when the event should be executed. Multiple months can be specified. When multiple months are configured, each of them will cause the schedule to trigger. If a month is configured without configuring weekday, day-of-month, hour and minute, the event will not execute.
The no form of this command removes the specified month from the configuration.
This command specifies how the system should interpret the commands contained within the schedule node.
This command specifies which days of the week that the schedule will fire on. Multiple days of the week can be specified. When multiple days are configured, each of them will cause the schedule to occur. If a weekday is configured without configuring month, day-of-month, hour and minute, the event will not execute.
Using the weekday command as well as the day-of month command will cause the script to run twice. For example, consider that today is Monday January 1. If Tuesday January 5 is configured, the script will run on Tuesday (tomorrow) as well as January 5 (Friday).
The no form of this command removes the specified weekday from the configuration.
This command enables the context to configure command script parameters.
This command is used to configure the CLI script policy.
This command is used to configure the maximum amount of time to keep the run history status entry from a script run.
This command is used to configure the maximum amount of time that a script may run.
This command is used to configure the maximum number of script run history status entries to keep.
This command is used to specify the location where the system writes the output of an event script’s execution.
The no form of the command removes the file location from the configuration. Scripts will not execute if there is no result location defined.
This command is used to configure a script to be run.
The no form of the command removes the script.
This command is used to identify the location of a script to be scheduled.
The no form of the command removes the location.
This command configures the start and end dates and offset for summer time or daylight savings time to override system defaults or for user defined time zones.
When configured, the time is adjusted by adding the configured offset when summer time starts and subtracting the configured offset when summer time ends.
If the time zone configured is listed in Table 29, then the starting and ending parameters and offset do not need to be configured with this command unless it is necessary to override the system defaults. The command returns an error if the start and ending dates and times are not available either in Table 29 on or entered as optional parameters in this command.
Up to five summer time zones may be configured, for example, for five successive years or for five different time zones. Configuring a sixth entry will return an error message. If no summer (daylight savings) time is supplied, it is assumed no summer time adjustment is required.
The no form of the command removes a configured summer (daylight savings) time entry.
none — No summer time is configured.
This command configures start of summer time settings.
This command specifies the number of minutes that will be added to the time when summer time takes effect. The same number of minutes will be subtracted from the time when the summer time ends.
This command configures start of summer time settings.
This command sets the time zone and/or time zone offset for the device.
The SR-series router OS supports system-defined and user-defined time zones. The system-defined time zones are listed in Table 29.
For user-defined time zones, the zone and the UTC offset must be specified.
The no form of the command reverts to the default of Coordinated Universal Time (UTC). If the time zone in use was a user-defined time zone, the time zone will be deleted. If a dst-zone command has been configured that references the zone, the summer commands must be deleted before the zone can be reset to UTC.
zone utc - The time zone is set for Coordinated Universal Time (UTC).
For system-defined time zones, a different offset cannot be specified. If a new time zone is needed with a different offset, the user must create a new time zone. Note that some system-defined time zones have implicit summer time settings which causes the switchover to summer time to occur automatically; configuring the dst-zone parameter is not required.
A user-defined time zone name is case-sensitive and can be up to 5 characters in length.
This command creates or edits the context to create or modify timing reference parameters.
Disabled
This command is required to discard changes that have been made to the synchronous interface timing configuration during a session.
No default
This command is required in order to enter the mode to create or edit the system synchronous interface timing configuration.
No default
This command enables the context to configure parameters for the Building Integrated Timing Supply (BITS). The settings specified under this context apply to both the BITS input and BITS output ports and to both the bits1 and bits2 ports on the 7750 SR-c4.
The bits command subtree is only available on the 7450 ESS-7, 7450 ESS-12, 7750 SR-7, 7750 SR-12, 7750 SR-12e, 7750 SR-c4, 7950 XRS-20, 7950 XRS-40, 7950 XRS-16c, 7750 SR-a4, 7750 SR-a8, 7750 SR-1e, 7750 SR-2e, and 7750 SR-3e.
disabled
This command saves changes made to the system synchronous interface timing configuration.
No default
This command configures the Building Integrated Timing Source (BITS) timing reference.
The no form of the command reverts to the default configuration.
ds1 esf
This command configures the interface type of the BITS timing reference.
This command is only supported on the 7750 SR-c12.
The no form of the command reverts to the default configuration
ds1 esf
This command provides a context to enable or disable the external BITS timing reference inputs to the central clock of the router. In redundant systems with BITS ports, there are two possible BITS-in interfaces, one for each CPM or CCM. In the 7750 SR-c4 system, there are two bits ports on the CFM. The two BITS-in interfaces are configured together, but they are displayed separately in the show command.
shutdown
This command provides a context to configure and enable or disable the external BITS timing reference output to the central clock of the router. On redundant systems, there are two possible BITS-out interfaces, one for each CPM or CCM. On the 7750 SR-c4 system, there are two possible BITS-out interfaces on the chassis front panel. The two BITS-out interfaces are configured together, but they are displayed separately in the show command.
shutdown
This command configures the line-length parameter of the BITS output, This is the distance in feet between the network element and the office clock (BITS/SSU). There are two possible BITS-out interfaces, one for each CPM. They are configured together, but they are displayed separately in the show command. This command is only applicable when the interface-type is DS1.
110
This command configures the values used to identity the source of the BITS (Building Integrated Timing Supply) output. This is either the signal recovered directly from ref1, ref2 or ptp, or it is the output of the node’s central clock. The directly recovered signal would be used when the BITS output signal is feeding into an external stand alone timing distribution device (BITS/SASE). The specific directly recovered signal used is the best of the available signals based of the QL and/or the ref-order. The central clock output would be used when no BITS/SASE device is present and the BITS output signal is used to monitor the quality of the recovered clock within the system.
line-ref
This command configures which sa-bit to use for conveying SSM information when the interface-type is E1.
8
This command configures the QL value to be used for the reference for SETS input selection and BITS output. This value overrides any value received by that reference's SSM process.
no ql-overide
When enabled the selection of system timing reference and BITS output timing reference takes into account quality level. Quality level is conveyed via the SSM or forced using the ql-override command.
no ql-selection
This command enables the context to configure parameters for system timing via IEEE 1588-2008, Precision Time Protocol. This command only applies to the 7450 ESS-7, 7450 ESS-12, and all 7750 SRs except for the 7750 SR-1e, 7750 SR-2e, and 7750 SR-3e.
The synchronous equipment timing subsystem can lock to different timing reference inputs, those specified in the ref1, ref2, bits and ptp (ptp applies only to the 7450 ESS and 7750 SR) command configuration. This command organizes the priority order of the timing references.
If a reference source is disabled, then the clock from the next reference source as defined by ref-order is used. If all reference sources are disabled, then clocking is derived from a local oscillator.
If a sync-if-timing reference is linked to a source port that is operationally down, the port is no longer qualified as a valid reference.
For 7450 ESS and 7750 SR systems with two SF/CPM modules, the system distinguishes between the BITS inputs on the active and standby CPMs. The active CPM will use its BITS input port providing that port is qualified. If the local port is not qualified, then the active CPM will use the BITS input port from the standby CPM as the next priority reference. For example, the normal ref-order of bits ref1 ref2 will actually be bits (active CPM), followed by bits (standby CPM), followed by ref1, followed by ref2.
For 7750 SR-c4 systems, the system distinguishes between the two BITS inputs on the CFM. The CFM will use its BITS input port bits1 providing that port is qualified. If port bits1 is not qualified, then the CFM will use the BITS input port bits2 as the next priority reference. For example, the normal ref-order of bits ref1 ref2 will actually be bits1 followed by bits2, followed by ref1, followed by ref2.
For 7950 XRS systems with two SF/CPMs and two CCMs, the system distinguishes between the BITS inputs on the CCMs associated with the active and standby CPMs. The active CPM will use the BITS input port on the associated CCM, provided that the port is qualified. If the local port is not qualified, then the active CPM will use the BITS input port from the CCM associated with the standby CPM as the next priority reference. For example, the normal ref-order of bits ref1 ref2 will actually be bits (active CCM), followed by bits (standby CCM), followed by ref1, followed by ref2.
The no form of the command resets the reference order to the default values.
The bits option is not supported on the 7750 SR-c12 chassis.
bits ref1 ref2 ptp (7750 SR and 7450 ESS)
bits ref1 ref2 (7950 XRS)
This command enables the context to configure parameters for the first timing reference. The source ports for ref1 and ref2 must be on different slots. Note that for the 7750 SR-a4, 7750 SR-c4, and 7750 SR-c12, the source ports for ref1 and ref2 may be on the same slot.
The ref1 and ref2 cannot be configured on the same MDA/CMA for the 7750 SR-a, 7750 SR-c12, or 7750 SR-c4. On a 7950 XRS-40 system, the source ports for ref1 and ref2 must reside on the master chassis.
The restrictions on the location for the source-port or source-bits for ref1 and ref2 are listed in Table 42.
Platform | Ref1 Slots | Ref2 Slots | Notes |
7450 ESS-6/6v | 1 to 2 | 3 to 4 | — |
7450 ESS-7 | 1 to 2 | 3 to 5 | — |
7450 ESS-12 | 1 to 5 | 6 to 10 | — |
7750 SR-7 | 1 to 2 | 3 to 5 | — |
7750 SR-12 | 1 to 5 | 6 to 10 | — |
7750 SR-12e | 1 to 5 | 6 to 10 | — |
7750 SR-a4 | 1 | 1 | — |
7750 SR-a8 | 1 to 2 | 1 to 2 | Ref1 and ref2 cannot be on the same slot |
7750 SR-1e | 1 | 1 | Ref1 and ref2 cannot be on the same MDA |
7750 SR-2e | 1 to 2 | 1 to 2 | Ref1 and ref2 cannot be on the same MDA |
7750 SR-3e | 1 to 3 | 1 to 3 | Ref1 and ref2 cannot be on the same MDA |
7950 XRS-16c | 1 to 8 | 1 to 8 | Ref1 and ref2 cannot be on the same slot |
7950 XRS-20 | 1 to 10 | 1 to 10 | Ref1 and ref2 cannot be on the same slot |
7950 XRS-40 | 1 to 10 | 1 to 10 | Ref1 and ref2 cannot be on the same slot |
This command enables the context to configure parameters for the second timing reference. There are restrictions on the source-port and source-bits locations for ref2 based on the platform. The restrictions on the location for the source-port or source-bits for ref1 and ref2 are listed in Table 42.
This command allows the clock to revert to a higher priority reference if the current reference goes offline or becomes unstable. When the failed reference becomes operational, it is eligible for selection. When the mode is non-revertive, a failed clock source is not selected again.
no revert
This command configures the source bits for the first (ref1) or second (ref2) timing reference. This command is only applicable to the 7750 SR-c12 chassis. There are restrictions on the source-bits location for ref1 and ref2 based on platform. Refer to the description of the ref1 command for details.
This command configures the source port for timing reference ref1 or ref2. If the port is unavailable or the link is down, then the reference sources are re-evaluated according to the reference order configured in the ref-order command.
In addition to physical port on the 7750 SR, T1 or E1 channels on a Channelized OC3/OC12/STM1/STM4 Circuit Emulation Service port can be specified if they are using adaptive timing.
There are restrictions on the source-port location for ref1 and ref2 based on platform. Refer to the description of the ref1 command for details.
The context to configure administrative system commands. Only authorized users can execute the commands in the admin context.
none
This command enables the context to perform application-assurance operations and only applies to the 7450 ESS and 7750 SR.
This command loads a new protocol list from the isa-aa.tim file into the CPM and only applies to the 7450 ESS and 7750 SR.
This command requires an ISA-AA reboot.
This command allows an authorized administrator to clear an exclusive policy lock. This will reset the lock flag and end the policy editing session in progress, aborting any policy edits.
This command saves existing debug configuration (configuration done under the debug branch of CLI). Debug configurations are not saved by the admin save command and not preserved across a node reboot. The debug-save command makes the debug configuration available for the operator to execute after a reboot by using the exec command, if desired.
none
Note:
Ipv6-address applies only to the 7750 SR and 7950 XRS. |
file url | local-url | remote-url: 255 chars max |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id directory length 99 chars max each |
remote-url | [ftp://login:pswd@remote-locn/][file-path] |
247 chars max | |
directory length 99 chars max each | |
remote-locn | [hostname | ipv4-address | [ipv6-address] ] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0..FFFF]H | |
d - [0..255]D | |
interface - 32 chars max, for link local addresses 255 | |
cflash-id | cf1:|cf1-A:|cf1-B:|cf2:|cf2-A:|cf2-B:|cf3:|cf3-A:|cf3-B: |
This command disconnects a user from a session.
Disconnect without any parameters will disconnect the session in which the command was executed.
If any of the session type options (for example, console, telnet, FTP, SSH) are specified, then only the respective sessions are affected.
If no session type options are specified, then all sessions from the IP address or from the specified user are disconnected.
Any task that the user is executing is terminated. FTP files accessed by the user will not be removed.
A major severity security log event is created specifying what was terminated and by whom.
none — No disconnect options are configured.
Note:
Ipv6 is supported on the 7750 SR and 7950 XRS. |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0..FFFF]H | |
d - [0..255]D |
This command displays the system’s running configuration.
By default, only non-default settings are displayed.
Specifying the detail option displays all default and non-default configuration parameters.
This command reboots the router or one CPM and can also be used to force an upgrade of the system boot ROMs.
If no options are specified, the user is prompted to confirm the reboot operation. Answering yes (y) will result in both CPMs and all IOMs rebooting.
When the upgrade keyword is specified, a chassis flag is set for the BOOT Loader (boot.ldr) and on the subsequent boot of the OS on the chassis, firmware images on CPMs, XCMs, or IOMs will be upgraded automatically.
Any CPMs, XCMs, or IOMs that are installed in the chassis will be upgraded automatically. For example, if a card is inserted with down revision firmware as a result of a card hot swap with the latest OS version running, the firmware on the card will be automatically upgraded before the card is brought online.
If the card firmware is upgraded automatically, a chassis cardUpgraded (event 2032) log event is generated. The corresponding SNMP trap for this log event is tmnxEqCardFirmwareUpgraded.
During any firmware upgrade, automatic or manual, it is imperative that during the upgrade procedure:
Any of the above conditions may render cards inoperable requiring a return of the card for resolution.
The time required to upgrade the firmware on the cards in the chassis depends on the number of cards to be upgraded. The progress of a firmware upgrade can be monitored at the console.
This command saves the running configuration to a configuration file. For example:
An admin save operation initiated by a user is aborted if another user initiates another admin save from another session.
By default, the running configuration is saved to the primary configuration file.
local-url | remote-url | |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id |
directory length 99 chars max each | |
remote-url | [ftp://login:pswd@remote-locn/][file-path] |
247 chars max | |
directory length 99 chars max each | |
remote-locn | [hostname | ipv4-address | "["ipv6-address"]" ] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0..FFFF]H | |
d - [0..255]D | |
interface - 32 chars max, for link local addresses | |
cflash-id | cf1:|cf1-A:|cf1-B:|cf2:|cf2-A:|cf2-B:|cf3:|cf3-A:|cf3-B: |
This command enables the shell and kernel commands.
Note:
This command should only be used with authorized direction from the Alcatel-Lucent Technical Assistance Center (TAC). |
This command performs RADIUS discovery operations.
When enabled, the server is immediately contacted to attempt discovery.
This command creates a system core dump. If the file-url is omitted, and a ts-location is defined, then the tech support file will have an automatic SR OS generated file name based on the system name and the date and time and will be saved to the directory indicated by the configured ts-location.
The format of the auto-generated filename is ts-XXXXX.YYYYMMDD.HHMMUTC.dat where:
Note:
This command should only be used with authorized direction from the Alcatel-Lucent Technical Assistance Center (TAC). |
local-url | remote-url | |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id |
directory length 99 chars max each | |
remote-url | [ftp://login:pswd@remote-locn/][file-path] |
247 chars max | |
directory length 99 chars max each | |
remote-locn | [hostname | ipv4-address | "["ipv6-address"]" ] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0..FFFF]H | |
d - [0..255]D | |
interface - 32 chars max, for link local addresses | |
cflash-id | cf1:|cf1-A:|cf1-B:|cf2:|cf2-A:|cf2-B:|cf3:|cf3-A:|cf3-B: |
The ts-location command is used (along with an automatic system generated file name) when no file-url parameter is provided for the admin tech-support command. If no ts-location is defined then the operator must provide a file-url with the admin tech-support command itself.
The directory specified for the ts-location is not auto-created by SR OS. The operator must ensure that it exists.
Please see the 'admin tech-support' command for more details about the system generated file name.
local-url | remote-url | |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id |
directory length 99 chars max each | |
remote-url | [ftp://login:pswd@remote-locn/][file-path] |
247 chars max | |
directory length 99 chars max each | |
remote-locn | [hostname | ipv4-address | "["ipv6-address"]" ] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0..FFFF]H | |
d - [0..255]D | |
interface - 32 chars max, for link local addresses | |
cflash-id | cf1:|cf1-A:|cf1-B:|cf2:|cf2-A:|cf2-B:|cf3:|cf3-A:|cf3-B: |
The context to configure administrative system viewing parameters. Only authorized users can execute the commands in the admin context.
none
This command sets the desired capability for the associated slot and card. The capability is used along with mixed-mode to enable additional features on certain cards and slots.
By default, the capability will be set to that of the base chassis type. To set this to a non-default value, the mixed-mode command must be enabled at the system level.
Changing the capability of a slot or card will result in the associated slot being reset. The card-type must first be configured before the capability command can be issued.
capability ess on a 7450 ESS chassis
This command enables chassis support for features with a mixture of IOMs and IMMs.
The no form of the command disables mixed mode support.
Note: The commands described in this section apply only to the 7450 ESS and 7750 SR.
This command enables the context to configure persistence parameters on the system.
The persistence feature enables state on information learned through DHCP snooping across reboots to be retained. This information includes data such as the IP address and MAC binding information, lease-length information, and ingress sap information (required for VPLS snooping to identify the ingress interface).
If persistence is enabled when there are no DHCP relay or snooping commands enabled, it will simply create an empty file.
no persistence
This command configures ANCP persistence parameters.
This command configures application assurance persistence parameters.
This command configures DHCP server persistence parameters.
This command configures NAT port forwarding persistence parameters.
This command enables the CLI context to configure persistence options parameters.
This command configures Dynamic Data Persistence (DDP) compact flash access optimization for DHCP leases.
The DHCP lease-time threshold controls the eligibility of a DHCP lease for persistency updates when no data other than the lease expiry time is to be updated. When the offered lease time of the DHCP lease is less than the configured threshold, the lease is flagged to skip persistency updates and will be installed with its full lease time upon a persistency recovery after a reboot.
The dhcp-leasetime-threshold command controls persistency updates for DHCPv4 and DHCPv6 leases for a DHCP relay or proxy and DHCPv4 leases for DHCP snooping (enabled with subscriber-mgmt) and a DHCP server (enabled with dhcp-server).
The no form of the command disables the DHCP lease time threshold.
no dhcp-leasetime-threshold
This command configures Python policy cache persistency parameters.
This command configures subscriber management persistence parameters.
This command instructs the system where to write the file. The name of the file is: dhcp-persistence.db. On boot the system scans the file systems looking for dhcp-persistence.db, if it finds it starts to load it.
In the subscriber management context, the location specifies the flash device on a CPM card where the data for handling subscriber management persistency is stored.
The no form of this command returns the system to the default. If there is a change in file location while persistence is running, a new file will be written on the new flash, and then the old file will be removed.
no location
Note: The commands described in this section apply only to the 7450 ESS and 7750 SR.
This command enables the context to configure parameters for IEEE 1588-2008, Precision Time Protocol.
This command is only available on the control assemblies that support 1588.
This command disables or enables the PTP protocol. If PTP is disabled, the router will not transmit any PTP packets, and will ignore all received PTP packets. If the user attempts execute a no shutdown command on hardware that does not support PTP, an alarm will be raised to indicate limited capabilities.
When PTP is shutdown, the PTP slave port is not operational. It shall not be considered as a source for system timing.
On assemblies supporting a 1 PPS output interface, this command controls the presentation of a signal on that interface. When PTP is enabled, the 1 PPS port is enabled, and it generates a pulse whose rising edge represented the second rollover of the internal PTP time scale (that is, whenever the fractional second of the time is exactly zero). When PTP is disabled, no signal is presented on the 1 PPS interface.
shutdown
This command configures the announceReceiptTimeout value for all peer associations. This defines the number of Announce message intervals that must expire with no received Announce messages before declaring an ANNOUNCE_RECIPT_TIMEOUT event.
The announce-rx-timeout cannot be changed unless PTP is shut down.
3
This command configures the type of clock. The clock-type can only be changed when PTP is shutdown.
The clock-type cannot be changed to ordinary master if the PTP reference is no shutdown. In addition, the clock-type cannot be changed to ordinary master if there are peers configured. The clock-type is restricted based on the profile. See the profile command description for the details of the restrictions.
ordinary slave
This command configures the PTP domain.
The no form of the command reverts to the default configuration. The default value is dependent upon the configured profile, as detailed below.
Note some profiles may require a domain number in a restricted range. It is up to the operator to ensure the value aligns with what is expected within the profile.
Domain cannot be changed unless PTP is shutdown. If the PTP profile is changed, the domain is changed to the default domain for the new PTP profile.
0 — profile ieee1588-2008
4 — profile g8265dot1-2010 or
24 — profile g8275dot1-2014
This command configures the announce message interval used for both unicast and multicast messages.
For unicast messages, it defines the announce message interval that is requested during unicast negotiation to any peer. This controls the announce message rate sent from remote peers to the local node. It does not affect the announce message rate that may be sent from the local node to remote peers. Remote peers may request an announce message rate anywhere within the acceptable grant range.
For multicast messages, used on PTP Ethernet ports, this configures the message interval used for Announce messages transmitted by the local node.
This value also defines the interval between executions of the BMCA within the node.
The announce-interval cannot be changed unless the PTP is shut down.
Note: In order to minimize BMCA driven reconfigurations, the IEEE recommends that the announce-interval should be consistent across the entire 1588 network.
1 (1 packet every 2 seconds) for ieee1588-2008 or
1 (1 packet every 2 seconds) for g8265dot1-2010 or
-3 (8 packets per second) for g8275dot1-2014
This command configures the codeset to be used for the encoding of QL values into PTP clockClass values when the profile is configured for G.8265.1. The codeset is defined in Table 1/G.8265.1. This setting only applies to the range of values observed in the clockClass values transmitted out of the node in Announce messages. The router will support the reception of any valid value in Table 1/G.8265.1
sdh
This command configures the priority1 value of the local clock. This parameter is only used when the profile is set to ieee1588-2008. This value is used by the Best Master Clock Algorithm to determine which clock should provide timing for the network.
This value is used for the value to advertise in the Announce messages and for the local clock value in data set comparisons.
The no form of the command reverts to the default configuration.
128
This command configures the priority2 value of the local clock. This parameter is only used when the profile is set to ieee1588-2008 or g8275dot1-2014. The parameter is ignored when any other profile is selected.
This value is used by the Best Master Clock algorithm to determine which clock should provide timing for the network.
Note: This value is used for the value to advertise in the Announce messages and for local clock value in data set comparisons.
The no form of the command reverts to the default configuration.
128
This command configures the profile to be used for the internal PTP clock. It defines the Best Master Clock Algorithm (BMCA) behavior.
The profile cannot be changed unless PTP is shutdown.
When you change the profile, the domain changes to the default value for the new profile. The clock-type is restricted based on the profile. If the profile is ieee1588-2008 then the clock-type is not restricted. If the profile is g8265dot1-2010 then the clock type may only be ordinary slave or ordinary master; boundary clock is not allowed. If the profile is g8275dot1-2014 then the clock type may only be boundary clock; ordinary slave and ordinary master is not allowed.
When you change the profile, if any of the command parameters are set to default for the original profile, then the parameter will be changed to the default for the new profile. This applies to the following:
If the parameter is set to a value other than the default for the original profile, then its value will remain unchanged
g8265dot1-2010
This command specifies an upper limit to the number of discovered peers permitted within the routing instance. This can be used to ensure that a routing instance does not consume all the possible discovered peers and blocking discovered peers in other routing instances.
If it is desired to reserve a fixed number of discovered peers per router instance, then all router instances supporting PTP should have values specified with this command and the sum of all the peer-limit values must not exceed the maximum number of discovered peers supported by the system.
If the user attempts to specify a peer-limit, and there are already more discovered peers in the routing instance than the new limit being specified, the configuration will not be accepted.
no limit
This command configures a remote PTP peer. It provides the context to configure parameters for the remote PTP peer.
Up to 20 remote PTP peers may be configured.
The no form of the command deletes the specified peer.
If the clock-type is ordinary slave or boundary, and PTP is no shutdown, the last peer cannot be deleted. This prevents the user from having PTP enabled without any peer configured and enabled.
Peers are created within the routing instance associated with the context of this command. All configured PTP peers must use the same routing instance.
none
This command configures PTP over Ethernet on the physical port. The PTP process shall transmit and receive PTP messages through the port using Ethernet encapsulation (as opposed to UDP/IPv4 encapsulation).
The frames are transmitted with no VLAN tags even if the port is configured for dot1q or qinq modes for encap-type. In addition, the received frames from the external PTP clock must also be untagged.
There are two reserved multicast addresses allocated for PTP messages (see Annex F IEEE Std 1588™-2008). Either address can be configured for the PTP messages sent through this port.
A PTP port may not be created if the PTP profile is set g8265dot1-2010.
If the port specified in the port-id supports 1588 port based timestamping, then a side effect of enabling PTP over Ethernet on the port shall be the enabling of Synchronous Ethernet on that port.
De-provisioning of the card or MDA containing the specified port is not permitted while the port is configured within PTP.
Changing the encapsulation or the port type of the Ethernet port is not permitted when PTP Ethernet Multicast operation is configured on the port.
none
This command allows for the specification of the mac-address to be used for the destination MAC address of the transmitted ptp messages.
IEEE Std 1588-2008 Annex F defines two reserved addresses for 1588 messages. These are:
Both addresses are supported for reception independent of the address configured by this command.
The no form of this command sets the address to the default address.
address 01-1B-19-00-00-00
This command configures the minimum interval used for multicast Delay_Req messages. This parameter is applied on a per port basis. For ports in a slave state, it shall be the interval used, unless the parent port indicates a longer interval. For a port in master state, it shall be the interval advertised to external slave ports as the minimum acceptable interval for Delay_Req messages from those slave ports.
It is a requirement of the 1588 standard that a port in Slave state shall check the logMessageInterval field of received multicast Delay_Resp messages. If the value of the logMessageInterval field of those messages is greater than the value programmed locally for the generation of Delay_Req messages, then the Slave must change to use the greater value (i.e. longer interval) for the generation of Delay_Req messages. This requirement is supported in the router.
The parameter is only applicable to ports and not to peers.
-6 for ieee1588-2008
-6 for g8265dot1-2010
-4 for g8275dot1-2014
This command configures the message interval used for transmission of multicast Sync messages.
For multicast messages used on PTP Ethernet ports, this configures the message interval used for Sync messages transmitted by the local node when the port is in Master state.
-6 (64 packets per second) for ieee1588-2008 or
-6 (64 packets per second) for g8265dot1-2010 or
-4 (16 packets per second) for g8275dot1-2014
This command configures the message interval used for unicast event messages. It defines the message interval for both Sync and Delay_Resp messages that are requested during unicast negotiation to the specific peer. This controls the Sync and Delay_Resp message rate sent from remote peers to the local node. It does not affect the Sync or Delay_Resp packet rate that may be sent from the local node to remote peers. Remote peers may request a Sync or Delay_Resp packet rate anywhere within the acceptable grant range.
The log-sync-interval cannot be changed unless the peer is shutdown.
-6 (64 packets per second) for 1588-2008 or
-6 (64 packets per second) for g8265dot1-2010 or
-4 (16 packets per second) for g8275dot1-2014
This command configures the local priority used to choose between PTP masters in the best master clock algorithm (BMCA). This setting is relevant when the profile is set to either g8265dot1-2010 or g8275dot1-2014. The parameter is ignored when any other profile is selected.
The value 1 is the highest priority and 255 is the lowest priority. The priority of a peer cannot be configured if the PTP profile is ieee1588-2008.
For g8265dot1-2010, this parameter configures the priority used to choose between master clocks with the same quality (see G.8265.1 for more details).
For g8275dot1-2014, this parameter sets the value of the localPriority associated with the Announce messages received from the external clocks (ptp>peer or ptp>port), or the local clock (PTP). See G.8275.1 for detailed information.
128
This command is used to restrict the local port to never enter the slave state. Use the command to ensure that the 7750 SR never draws synchronization from the attached external device.
This parameter is only effective when the profile is set to g8275dot1-2014.
Note: The ITU-T G.8275.1 (07/2014) recommendation used the term 'notSlave' for this functionality; however, the IEEE has added this capability into the next edition of the 1588 standard using the term masterOnly. These are equivalent.
true
This command disables or enables a specific PTP peer. Shutting down a peer sends cancel unicast negotiation messages on any established unicast sessions. When shutdown, all received packets from the peer are ignored.
If the clock-type is ordinary slave or boundary, and PTP is no shutdown, the last enabled peer cannot be shutdown. This prevents the user from having PTP enabled without any peer configured & enabled
no shutdown
This command disables or enables a specific PTP port. When shutdown, all PTP Ethernet messages are dropped on the IOM They will not be counted in the PTP message statistics. No PTP packets are transmitted by the node toward this port.
If the clock-type is ordinary slave or boundary, and PTP is no shutdown, the last enabled port or peer cannot be shutdown. This prevents the user from having PTP enabled without any means to synchronize the local clock to a parent clock.
no shutdown
This command configures BGP multi-homing parameters.
This command configures the time the service manger waits after a node reboot before running the DF election algorithm. The boot-timer value should be configured to allow for the BGP sessions to come up and for the NLRI information to be refreshed/exchanged.
The no form of the command reverts the default.
no boot-timer
This command automatically synchronizes the certificate/CRL/key when importing or generating (for the key). Also if a new CF card is inserted into slot3 into the backup CPM, the system will sync the whole system-pki directory from the active CPM. This command applies only to the 7450 ESS and 7750 SR.
enabled
This command forces a switchover to the standby CPM card. The primary CPM reloads its software image and becomes the secondary CPM.
If the management Ethernet port on the active CPM goes down, this command allows the active CPM to be configured to use the management Ethernet port of the standby CPM.
The revert option allows the administrator to control when to revert back to the management Ethernet port of the primary CPM once it comes up again.
The no form of the command disables redundancy, so that connectivity to the active CPM is lost if its Ethernet port goes down.
This feature is not supported on the 7750 SR-a, 7750 SR-c and the VSR platforms.
5 seconds
This command enables the context to configure multi-chassis parameters.
This command enters the context to allow the user to perform redundancy operations.
This command copies the entire set of rollback checkpoint files from the active CPM CF to the inactive CPM CF.
None.
The operator can enable automatic synchronization of rollback checkpoint files between the active CPM and inactive CPM. When this automatic synchronization is enabled, a rollback save will cause the new checkpoint file to be saved on both the active and standby CPMs. The suffixes of the old checkpoint files on both active and standby CPMs are incremented. Note that automatic sync only causes the ONE new checkpoint file to be copied to both CFs (the other 9 checkpoints are not automatically copied from active to standby but that can be done manually with admin red rollback-sync).
Automatic synchronization of rollback checkpoint files across CPMs is only performed if the rollback-location is configured as a local file-url (for example, "cf3:/rollback-files/rollback). Synchronization is not done if the rollback-location is remote.
The config red sync {boot-env | config} and admin red sync {boot-env | config} do not apply to rollback checkpoint files. These commands do not manually or automatically sync rollback checkpoint files. The dedicated rollback-sync commands must be used to sync rollback checkpoint files.
This command defines the amount of time the service manager will keep the local sites in standby status, waiting for BGP updates from remote PEs before running the DF election algorithm to decide whether the site should be unblocked. The timer is started when one of the following events occurs if the site is operationally up:
no site-activation-timer
This command configures the BGP multi-homing site minimum down time. When set to a non-zero value, if the site goes operationally down it will remain operationally down for at least the length of time configured for the site-min-down-timer, regardless of whether other state changes would have caused it to go operationally up. This timer is restarted every time that the site transitions from up to down.
The above operation is optimized in the following circumstances:
The no form of the command reverts to default value.
no site-min-down-timer
This command performs a synchronization of the standby CPM’s images and/or configuration files to the active CPM. Either the boot-env or config parameter must be specified.
In the admin>redundancy context, this command performs a manually triggered standby CPM synchronization. When the standby CPM takes over operation following a failure or reset of the active CPM, it is important to ensure that the active and standby CPM have identical operational parameters. This includes the saved configuration, CPM, XCM, and IOM images.
The active CPM ensures that the active configuration is maintained on the standby CPM. However, to ensure smooth operation under all circumstances, runtime images and system initialization configurations must also be automatically synchronized between the active and standby CPM. If synchronization fails, alarms and log messages that indicate the type of error that caused the failure of the synchronization operation are generated. When the error condition ceases to exist, the alarm is cleared.
Only files stored on the router are synchronized. If a configuration file or image is stored in a location other than on a local compact flash, the file is not synchronized (for example, storing a configuration file on an FTP server).
The no form of the command removes the parameter from the configuration.
none
This command performs a synchronization of the standby CPMs images and/or config files to the active CPM. Either the boot-env or config parameter must be specified. In the config>redundancy context, this command performs an automatically triggered standby CPM synchronization. When the standby CPM takes over operation following a failure or reset of the active CPM, it is important to ensure that the active and standby CPMs have identical operational parameters. This includes the saved configuration, CPM, XCM, and IOM images.
The active CPM ensures that the active configuration is maintained on the standby CPM. However, to ensure smooth operation under all circumstances, runtime images and system initialization configurations must also be automatically synchronized between the active and standby CPM.
If synchronization fails, alarms and log messages that indicate the type of error that caused the failure of the synchronization operation are generated. When the error condition ceases to exist, the alarm is cleared.
Only files stored on the router are synchronized. If a configuration file or image is stored in a location other than on a local compact flash, the file is not synchronized (for example, storing a configuration file on an FTP server).
enabled
This command configures a multi-chassis redundancy peer.
This command configures the authentication key used between this node and the multi-chassis peer. The authentication key can be any combination of letters or numbers.
This command specifies whether IGMP protocol information should be synchronized with the multi-chassis peer.
no igmp
This command specifies whether IGMP snooping information should be synchronized with the multi-chassis peer.
no igmp-snooping
This command synchronizes DHCP server information.
This command is not supported. It is not blocked for backwards-compatibility reasons but has no effect on the system if configured.
This command specifies a peer name.
This command specifies whether PIM snooping for IPv4 information should be synchronized with the multi-chassis peer. Entering only pim-snooping (without any parameter) results in the synchronization being applicable only to SAPs.
no pim-snooping
This command specifies the port to be synchronized with the multi-chassis peer and a synchronization tag to be used while synchronizing this port with the multi-chassis peer.
This command enables syncing of python-policy cached entries to the peer.
Use the mcs-peer command in the python-policy to enable syncing for a specific python-policy.
no python
This command configures a range of encapsulation values.
This command specifies the source address used to communicate with the multi-chassis peer.
This command specifies whether subscriber routed redundancy protocol (SRRP) information should be synchronized with the multi-chassis peer. This command applies to the 7450 ESS and 7750 SR.
no srrp
This command enables the context to configure synchronization parameters.
This command specifies whether subscriber management information should be synchronized with the multi-chassis peer. This command applies to the 7450 ESS and 7750 SR.
no sub-mgmt
This command specifies whether subscriber host tracking information should be synchronized with the multi-chassis peer. This command applies to the 7450 ESS and 7750 SR.
no sub-mgmt
This command enables Oversubscribed Multi-Chassis Redundancy (OMCR). Subscriber hosts are synchronized between two chassis only in the control plane and are kept there (as part of the Multi-Chassis Synchronization (MCS) state) until the switchover occurs. Link or nodal failure will trigger the switchover at which point the subscriber hosts are being fully instantiated in the control and the forwarding plane. This approach allows oversubscription of the resources in the central standby (or protecting) node that is backing-up a number of other active nodes. The total number of protected subscribers in the OMCR cluster exceeds the forwarding capacity of the protecting node. This is achievable by not fully occupying the resources for the subscriber hosts until the failure occurs.
The restoration times depend on the amount of the subscriber hosts that are affected by the switchover and it is related to the time needed for the full instantiation of the subscribers in the forwarding plane.
Although this command is configured on a peer level, the warm-standby property is a nodal characteristic. In other words, mixing of N:1 and 1:1 (hot standby) mode in the central standby node is not supported. Consequently all peers on the central standby node must be configured for warm-standby (N:1), or all peers must be configured for hot-standby (1:1) by omitting the warm-standby keyword from the configuration.
The peer of the central-backup node is not aware of the redundancy model supported. In in other words, the peer of the central-backup node does not know whether it peers with a warm-standby peer or host-standby-peer. All nodes participating in this protection model must run SR OS R12.0 or higher.
This command applies only to the 7450 ESS and 7750 SR.
no warm-standby
This command specifies that the endpoint is multi-chassis. This value should be the same on both MC-EP peers for the pseudowires that must be part of the same group.
The no form of this command removes the endpoint from the MC-EP. Single chassis behavior applies.
This command enables the use of bi-directional forwarding (BFD) to control the state of the associated protocol interface. By enabling BFD on a given protocol interface, the state of the protocol interface is tied to the state of the BFD session between the local node and the remote node. The parameters used for the BFD are set via the BFD command under the IP interface.
The no form of this command disables BFD.
no bfd-enable
This command configures the boot timer interval. This command applies only when the node reboots. It specifies the time the MC-EP protocol keeps trying to establish a connection before assuming a failure of the remote peer. This is different from the keep-alives mechanism which is used just after the peer-peer communication was established. After this time interval passed all the mc-endpoints configured under services will revert to single chassis behavior, activating the best local PW.
The no form of this command sets the interval to default.
300
This command specifies the number of keep-alive intervals that the local node will wait for packets from the MC-EP peer before assuming failure. After this time interval passed the all the mc-endpoints configured under services will revert to single chassis behavior, activating the best local pseudowire.
The no form of this command sets the multiplier to default value.
3
This command sets the interval at which keep-alive messages are exchanged between two systems participating in MC-EP when bfd is not enabled or is down. These fast keep-alive messages are used to determine remote-node failure and the interval is set in deci-seconds.
The no form of this command sets the interval to default value
5 (0.5s)
This command configures the passive mode behavior for the MC-EP protocol. When in passive mode the MC-EP pair will be dormant until two of the pseudowires in a MC-EP will be signaled as active by the remote PEs, being assumed that the remote pair is configured with regular MC-EP. As soon as more than one pseudowire is active, dormant MC-EP pair will activate. It will use the regular exchange to select the best pseudowire between the active ones and it will block the Rx and Tx directions of the other pseudowires.
The no form of this command will disable the passive mode behavior.
no passive-mode
This command allows the operator to set the system priority. The peer configured with the lowest value is chosen to be the master. If system-priority are equal then the one with the highest system-id (chassis MAC address) is chosen as the master.
The no form of this command sets the system priority to default.
This command enables the context to configure multi-chassis LAG operations and related parameters.
The no form of this command administratively disables multi-chassis LAG. MC-LAG can only be issued only when mc-lag is shutdown.
This command specifies the interval that the standby node will wait for packets from the active node before assuming a redundant-neighbor node failure. This delay in switch-over operation is required to accommodate different factors influencing node failure detection rate, such as IGP convergence, or HA switch-over times and to prevent the standby node to take action prematurely.
The no form of this command sets this parameter to default value.
3
This command sets the interval at which keep-alive messages are exchanged between two systems participating in MC-LAG. These keep-alive messages are used to determine remote-node failure and the interval is set in deciseconds.
The no form of this command sets the interval to default value
1s (10 hundreds of milliseconds means interval value of 10)
This command defines a LAG which is forming a redundant-pair for MC-LAG with a LAG configured on the given peer. The same LAG group can be defined only in the scope of 1 peer. The same lacp-key, system-id, and system-priority must be configured on both nodes of the redundant pair in order to MC-LAG to become operational. In order MC-LAG to become operational, all parameters (lacp-key, system-id, system-priority) must be configured the same on both nodes of the same redundant pair.
The partner system (the system connected to all links forming MC-LAG) will consider all ports using the same lacp-key, system-id, system-priority as the part of the same LAG. In order to achieve this in MC operation, both redundant-pair nodes have to be configured with the same values. In case of the mismatch, MC-LAG is kept operationally down.
none
This command enables the context to configure the multi-chassis ring parameters.
This command configures a multi-chassis ring.
This command enables the context to configure multi-chassis ring inband control path parameters.
This command specifies the destination IP address used in the inband control connection. If the address is not configured, the ring cannot become operational.
This command specifies the name of the IP interface used for the inband control connection. If the name is not configured, the ring cannot become operational.
This command specifies the service ID if the interface used for the inband control connection belongs to a VPRN service. If not specified, the service-id is zero and the interface must belong to the Base router.
The no form of the command removes the service-id from the IBC configuration.
This command specifies the set of upper-VLAN IDs associated with the SAPs that belong to path B with respect to load-sharing. All other SAPs belong to path A.
If not specified, the default is an empty set.
This command configures a MCR b-path VLAN range.
This command specifies the set of upper-VLAN IDs associated with the SAPs that are to be excluded from control by the multi-chassis ring.
If not specified, the default is an empty set.
This command specifies the unique name of a multi-chassis ring access node.
This command enables the context to configure node connectivity check parameters.
This command configures the node cc destination IP address.
no dst-ip
This command specifies the polling interval of the ring-node connectivity verification of this ring node.
5
This command specifies the service ID of the SAP used for the ring-node connectivity verification of this ring node.
no service-id
This command specifies the source IP address used in the ring-node connectivity verification of this ring node.
no src-ip
This command specifies the source MAC address used for the Ring-Node Connectivity Verification of this ring node.
A value of all zeros (000000000000 H (0:0:0:0:0:0)) specifies that the MAC address of the system management processor (CPM) is used.
no src-mac
This command specifies the VLAN tag of the SAP used for the ring-node connectivity verification of this ring node. It is only meaningful if the value of service ID is not zero. A zero value means that no VLAN tag is configured.
no vlan
This command enables the context to configure system-wide Link Layer Discovery Protocol parameters.
This command configures the duration of the fast transmission period.
This command configures the number of LLDPDUs to send during the fast transmission period.
This command configures the minimum time between change notifications.
This command configures the time before re-initializing LLDP on a port.
This command configures the maximum consecutive LLDPDUs transmitted.
This command configures the multiplier of the tx-interval.
This command configures the LLDP transmit interval time.
This command enables the context to configure Link Layer Discovery Protocol (LLDP) parameters on the specified port.
This command configures destination MAC address parameters.
This command specifies the administratively desired status of the local LLDP agent.
This command enables LLDP notifications.
The no form of the command disables LLDP notifications.
This command specifies which management address to transmit.
The no form of the command resets value to the default.
no tx-mgmt-address
This command specifies which LLDP TLVs to transmit.
The no form of the command resets the value to the default.
no tx-tlvs