Certificate Profile Commands
Client Database Commands
Internet Key Exchange (IKE) Commands
IPsec Transform Commands
RADIUS Policy Commands
IPsec Static Security Association Commands
Trust Anchor Profile/TS List Commands
Tunnel Template Commands
This command creates a text description which is stored in the configuration file to help identify the content of the entity.
The no form of the command removes the string from the configuration.
none
This command administratively disables the entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics. Many entities must be explicitly enabled using the no shutdown command.
The shutdown command administratively disables an entity. The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.
This command provisions or de-provisions an MDA to or from the device configuration for the slot.
This command enables the context to configure Integrated Services Adapter (ISA) parameters.
This command allows a tunnel group to be created or edited. A tunnel group is a set of one or more MS-ISAs that support the origination and termination of IPsec and IP/GRE tunnels. All of the MS-ISAs in a tunnel group must have isa-tunnel as their configured mda-type.
The no form of the command deletes the specified tunnel group from the configuration
This command specifies the number of active MS-ISA within all configured MS-ISA in the tunnel-group with multi-active enabled. IPsec traffic will be load balanced across all active MS-ISAs. If the number of configured MS-ISA is greater than the active-mda-number then the delta number of MS-ISA will be backup.
no
This command assigns an ISA IPsec module configured in the specified slot to this IPsec group. The backup module provides the IPsec group with warm redundancy when the primary module in the group is configured. An IPsec group must always have a primary configured.
Primary and backup modules have equal operational status and when both modules are coming up, the one that becomes operational first becomes the active module. An IPsec module can serve as a backup for multiple IPsec groups but the backup can become active for only one ISA IPsec group at a time.
All configuration information is pushed down to the backup MDA from the CPM once the CPM gets notice that the primary module has gone down. This allows multiple IPsec groups to use the same backup module. Any statistics not yet spooled will be lost. Auto-switching from the backup to primary, once the primary becomes available again, is supported.
The operator is notified through SNMP events when:
The no form of the command removes the specified module from the IPsec group.
no backup
This command specifies the MDA id of the MS-ISA as the member of tunnel-group with multi-active enabled. Up to 16 MDA could be configured under the same tunnel-group.
no
This command enables configuring multiple active MS-ISA in the tunnel-group. IPsec traffic will be load balanced to configured active MS-ISAs.
Operational notes:
no
This command assigns an ISA IPsec module configured in the specified slot to this IPsec group. The backup ISA IPsec provides the IPsec group with warm redundancy when the primary ISA IPsec in the group is configured. Primary and backup ISA IPsec have equal operational status and when both MDAs are coming up, the one that becomes operational first becomes the active ISA IPsec.
All configuration information is pushed down to the backup MDA from the CPM once the CPM gets notice that the primary module has gone down. This allows multiple IPsec groups to use the same backup module. Any statistics not yet spooled will be lost. Auto-switching from the backup to primary, once the primary becomes available again, is supported.
The operator is notified through SNMP events when:
The no form of the command removes the specified primary ID from the group’s configuration.
no primary
This command configures IP packet reassembly for IPsec and GRE tunnels supported by an MS-ISA. The reassembly command at the tunnel-group level configures IP packet reassembly for all IPsec and GRE tunnels associated with the tunnel-group. The reassembly command at the GRE tunnel level configures IP packet reassembly for that one specific GRE tunnel, overriding the tunnel-group configuration.
The no form of the command disables IP packet reassembly.
no reassembly (tunnel-group level)
reassembly (gre-tunnel level)
With this command configured, system will only act as IKE responder except for the automatic CHILD_SA re-key upon MC-IPsec switchover.
no
This command creates a new cert-profile or enters the configuration context of an existing cert-profile.
The no form of the command removes the profile name from the cert-profile configuration.
none
This command configures the certificate profile entry information
The no form of the command removes the entry-id from the cert-profile configuration.
none
This command specifies the file name of an imported certificate for the cert-profile entry.
The no form of the command removes the cert-file-name from the entry configuration.
none
This command specifies the filename of an imported key for the cert-profile entry.
The no form of the command removes the key-filename from the entry configuration.
none
This command enters the configuration context of send-chain in the cert-profile entry.
The configuration of this command is optional, by default system will only send the certificate specified by cert command in the selected entry to the peer. This command allows system to send additional CA certificates to the peer. These additional CA certificates must be in the certificate chain of the certificate specified by the cert command in the same entry.
This command specifies a CA certificate in the specified ca-profile to be sent to the peer.
Multiple configurations (up to seven) of this command are allowed in the same entry.
none
This command creates a new IPsec client-db or enters the configuration context of an existing client-db.
An IPsec client-db can be used for IKEv2 dynamic LAN-to-LAN tunnel authentication and authorization. When a new tunnel request is received, the system will match the request to the client entries configured in client-db and use credentials returned by the matched client entry for authentication. If authentication succeeds, the system could also use the IPsec configuration parameters (such as private-service-id) returned by the matched entry to set up the tunnel.
The configured client-db is referenced under the ipsec-gw configuration context using the client-db command.
The no form of the command removes the db-name from the configuration.
no client-db
This command creates a new IPsec client entry in the client-db or enters the configuration context of an existing client entry.
There may be multiple client entries defined in the same client-db. If there are multiple entries that match the new tunnel request, then the system will select the entry that has smallest client-index.
The no form of the command reverts to the default.
no client
This command enables the context to configure client ID information of this IPsec client.
If there are multiple match input are configured in the match-list of the client-db, then all corresponding match criteria must be configured for the client-entry.
none
This command specifies a match criteria that uses the peer’s identification initiator (IDi) as the input, only one IDi criteria can be configured for a given client entry. This command supports the following matching methods:
The no form of the command reverts to the default.
no idi
This command specifies match criteria that uses the peer’s tunnel IP address as the input. Only one peer-ip-prefix criteria can be configured for a given client entry.
The no form of the command reverts to the default.
no peer-ip-prefix
This command specifies the name of the client entry. The client name can be used in CLI navigation or in show commands.
none
This command enables the context to configure the parameters used to authenticate peers.
none
This command specifies a pre-shared key used to authenticate peers.
The no form of the command reverts to the default.
no pre-shared-key
This command specifies the private interface name that is used for tunnel setup.
The no form of the command reverts to the default.
no private-interface
This command specifies the private service ID that is used for tunnel setup.
The no form of the command reverts to the default.
no private-service
This command specifies the traffic selector (TS) to be used for tunnel setup.
The no form of the command reverts to the default.
no ts-negotiation
This command specifies the tunnel template to be used for tunnel setup.
The no form of the command reverts to the default.
no tunnel-template
This command enables the context of the client-db’s match list. The match list defines the match input used during IPsec’s tunnel setup. If there are multiple inputs configured in the match list, then they all must have matches before the system considers a client entry is a match.
none
This command enables the Identification Initiator (IDi) type in the IPsec client matching process.
The no form of the command disables the IDi matching process.
no idi
This command enables the use of the peer’s tunnel IP address as the match input.
The no form of the command disables the peer IP prefix matching process.
no peer-ip-prefix
This command enables the context to configure Internet Protocol Security (IPsec) parameters. IPsec is a structure of open standards to ensure private, secure communications over Internet Protocol (IP) networks by using cryptographic security services.
This command specifies a ca-profile as a trust-anchor CA. multiple trust-anchors (up to 8) could be specified in a single trust-anchor-profile.
This command enables the context to configured an IKE policy.
The no form of the command
The command specifies which hashing algorithm to use for the IKE authentication function.
The no form of the command removes the parameter from the configuration.
This command specifies the authentication method used with this IKE policy.
The no form of the command removes the parameter from the configuration.
no auth-method
This command enables following behavior for IKEv2 remote-access tunnel when auth-method is configured as auto-eap-radius:
This command only applies when auth-method is configured as auto-eap-radius.
auto-eap-method cert
This command enables following behavior for IKEv2 remote-access tunnel when auth-method is configured as auto-eap-radius:
This command only applies when auth-method is configured as auto-eap-radius.
auto-eap-method cert
This command specifies which Diffie-Hellman group to calculate session keys. Three groups are supported with IKE-v1:
More bits provide a higher level of security, but require more processing.
5
The no form of the command removes the Diffie-Hellman group specification.
This command controls the dead peer detection mechanism.
The no form of the command removes the parameters from the configuration.
This command specifies the encryption algorithm to use for the IKE session.
The no form of the command removes the encryption algorithm from the configuration.
aes128
This command specifies one of either two modes of operation. IKE version 1 can support main mode and aggressive mode. The difference lies in the number of messages used to establish the session.
The no form of the command removes the mode of operation from the configuration.
main
This command sets the IKE version (1 or 2) that the ike-policy will use.
1
ikev1-ph1-responder-delete-notify
This command enables IKEv2 protocol level fragmentation (RFC 7383). The specified MTU is the maximum size of IKEv2 packet.
no ikev2-fragment
This parameter specifies the lifetime of a phase two SA.
The no form of the command reverts the ipsec-lifetime value to the default.
3600 (1 hour)
This command specifies the lifetime of a phase one SA. ISAKMP stands for Internet Security Association and Key Management Protocol
The no form of the command reverts the isakmp-lifetime value to the default.
86400
This command enables the lockout mechanism for the IPsec tunnel. The system will lock out an IPsec client for the configured time interval if the number of failed authentications exceeds the configured value within the specified duration. This command only applies when the system acts as a tunnel responder.
A client is defined as the tunnel IP address plus the port.
Optionally, the max-port-per-ip parameter can be configured as the maximum number of ports allowed behind the same IP address. If this threshold is exceeded, then all ports behind the IP address are blocked.
The no form of this command disables the lockout mechanism.
N/A
This command enables checking the IKE peer's ID matches the peer's certificate when performing certificate authentication.
This command specifies whether NAT-T (Network Address Translation Traversal) is enabled, disabled or in forced mode.
The no form of the command reverts the parameters to the default.
none
This command configures the authentication method used with this IKE policy on its own side.
This command enables perfect forward secrecy on the IPsec tunnel using this policy. PFS provides for a new Diffie-Hellman key exchange each time the SA key is renegotiated. After that SA expires, the key is forgotten and another key is generated (if the SA remains up). This means that an attacker who cracks part of the exchange can only read the part that used the key before the key changed. There is no advantage in cracking the other parts if they attacker has already cracked one.
The no form of the command disables PFS. If this it turned off during an active SA, when the SA expires and it is time to re-key the session, the original Diffie-Hellman primes will be used to generate the new keys.
15
Group 1: 768 bits
Group 2: 1024 bits Group 5:
Group 14: 2048 bits
Group 15: 3072 bits
This command enters relay unsolicited configuration attributes context. With this configuration, the configured attributes returned from source (such as a RADIUS server) will be returned to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
This command will return IPv4 DNS server address from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
This command will return IPv4 netmask from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
This command will return IPv6 DNS server address from source (e.g. RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
send-idr-after-eap-success
This command enables the context to create an ipsec-transform policy. IPsec transforms policies can be shared. A change to the ipsec-transform is allowed at any time. The change will not impact tunnels that have been established until they are renegotiated. If the change is required immediately the tunnel must be cleared (reset) for force renegotiation.
IPsec transform policy assignments to a tunnel require the tunnel to be shutdown.
The no form of the command removes the ID from the configuration.
The command specifies which hashing algorithm should be used for the authentication function Encapsulating Security Payload (ESP). Both ends of a manually configured tunnel must share the same configuration parameters for the IPsec tunnel to enter the operational state.
The no form of the command disables the authentication.
This command specifies the encryption algorithm to use for the IPsec session. Encryption only applies to esp configurations. If encryption is not defined, esp will not be used.
For IPsec tunnels to come up, both ends need to be configured with the same encryption algorithm.
The no form of the command removes the specified encryption algorithm.
aes128
This command configures an IPsec static SA.
This command configures the authentication algorithm to use for an IPsec manual SA.
The no form of the command reverts to the default value.
sha1
This command configures the direction for an IPsec manual SA.
The no form of the command reverts to the default value.
bidirectional
This command configures the security protocol to use for an IPsec manual SA. The no statement resets to the default value.
esp
This command configures the SPI key value for an IPsec manual SA.
This command specifies the SPI (Security Parameter Index) used to lookup the instruction to verify and decrypt the incoming IPsec packets when the value of the direction command is inbound.
The SPI value specifies the SPI that will be used in the encoding of the outgoing packets when the when the value of the direction command is outbound. The remote node can use this SPI to lookup the instruction to verify and decrypt the packet.
If no spi is selected, then this static SA cannot be used.
The no form of the command reverts to the default value.
none
The system will automatically establish phase 1 SA as soon as the tunnel is provisioned and enabled (no shutdown). This option should only be configured on one side of the tunnel.
Any associated static routes will remain up as long as the tunnel could be up, even though it may actually be Oper down according to the CLI.
None
This command specifies the trust-anchor-profile for the ipsec-tunnel or ipsec-gw. This command will override “trust-anchor” configuration under the ipsec-tunnel or ipsec-gw.
no trust-anchor-profile
This command creates a new traffic selector (TS).
The no form of the command removes the list name from the configuration.
no ts-list
This command enables the context to configure local TS-list parameters. The TS-list is the traffic selector of the local system, such as TSr, when the system acts as an IKEv2 responder.
This command enables the context to configure remote TS-list parameters. The TS-list is the traffic selector of the local system, such as TSi, when the system acts as an IKEv2 responder.
This command creates a new TS-list entry or enables the context to configure an existing TS-list entry.
The no form of the command removes the entry from the local or remote configuration.
N/A
This command specifies the address range in the IKEv2 traffic selector.
N/A
This command specifies the protocol and port range in the IKEv2 traffic selector.
The SR OS supports OPAQUE ports and port ranges for the following protocols:
For ICMP and ICMPv6, the port value takes the form icmp-type/icmp-code. For MIPv6, the port value is the mobility header type. For other protocols, only the port any configuration can be used.
N/A
This command enables the IKEv2 traffic selector negotiation with the specified ts-list.
This command creates a tunnel template. Up to 2,000 templates are allowed.
none
This command enables clearing of the Do-not-Fragment bit.
This command specifies the max size of encapsulated tunnel packet for the ipsec-tunnel/ip-tunnel or the dynamic tunnels terminated on the ipsec-gw. If the encapsulated v4/v6 tunnel packet exceeds the encapsulated-ip-mtu, then system will fragment the packet against the encapsulated-ip-mtu.
This command enters ICMPv6 packet generation configuration context.
This command enables system to send ICMPv6 PTB (Packet Too Big) message on private side and optionally specifies the rate.
With this command configured, system will send PTB back if received v6 packet on private side is bigger than 1280 bytes and also exceeds the private MTU of the tunnel.
The ip-mtu command (under ipsec-tunnel or tunnel-template) specifies the private MTU for the ipsec-tunnel or dynamic tunnel.
This command configures the template IP MTU.
This command sets the anti-replay window.
The no form of the command removes the parameter from the configuration.
no replay-window
This command specifies whether the node using this template will accept framed-routes sent by the RADIUS server and install them for the lifetime of the tunnel as managed routes.
The no form of the command disables sp-reverse-route.
no sp-reverse-route
This command configures IPsec transform.
This command enables the context to configure IPsec policies.
none
This command specifies the cert-profile for the ipsec-tunnel or ipsec-gw. This command will override cert and key configuration under the ipsec-tunnel or ipsec-gw.
none
This command configures a security policy to use for an IPsec tunnel.
none
This command configures an IPsec security policy entry.
This command configures the local (from the VPN) IP prefix/mask for the policy parameter entry.
Only one entry is necessary to describe a potential flow. The local-ip and remote-ip commands can be defined only once. The system will evaluate the local IP as the source IP when traffic is examined in the direction of VPN to the tunnel and as the destination IP when traffic flows from the tunnel to the VPN. The remote IP will be evaluated as the source IP when traffic flows from the tunnel to the VPN when traffic flows from the VPN to the tunnel.
This command specifies the local v6 prefix for the security-policy entry.
ipv6-address/prefix: ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
| x:x:x:x:x:x:d.d.d.d |
| x [0 to FFFF]H |
d [0 to 255]D | |
host bits must be 0 | |
:: not allowed | |
prefix-length [1 to 128] |
This command configures the remote (from the tunnel) IP prefix/mask for the policy parameter entry.
Only one entry is necessary to describe a potential flow. The local-ip and remote-ip commands can be defined only once. The system will evaluate the local IP as the source IP when traffic is examined in the direction of VPN to the tunnel and as the destination IP when traffic flows from the tunnel to the VPN. The remote IP will be evaluated as the source IP when traffic flows from the tunnel to the VPN when traffic flows from the VPN to the tunnel.
This command specifies the remote v6 prefix for the security-policy entry.
ipv6-address/prefix: ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
| x:x:x:x:x:x:d.d.d.d |
| x [0 to FFFF]H |
d [0 to 255]D | |
host bits must be 0 | |
:: not allowed | |
prefix-length [1 to 28] |
This command add an IPv6 address to the tunnel interface.
The prefix length must be 96 or higher.
ipv6-address/prefix: ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
| x:x:x:x:x:x:d.d.d.d |
| x [0 to FFFF]H |
d [0 to 255]D | |
prefix-length | 1 to 128 |
This command specifies the link-local-address for the tunnel interface.
Only one link-local-address is allowed per interface.
ipv6-address/prefix: ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
| x:x:x:x:x:x:d.d.d.d |
| x [0 to FFFF]H |
d [0 to 255]D |
This command configures the dynamic ISA tunnel redundant next-hop address.
no dynamic-tunnel-redundant-next-hop
This command specifies redundant next-hop address on public or private IPsec interface (with public or private tunnel-sap) for static IPsec tunnel. The specified next-hop address will be used by standby node to shunt IPsec traffic to master in case of it receives them.
The next-hop address will be resolved in routing table of corresponding service.
no static-tunnel-redundant-next-hop
This command creates a logical IP routing interface for a Virtual Private Routed Network (VPRN). Once created, attributes like an IP address and service access point (SAP) can be associated with the IP interface.
The interface command, under the context of services, is used to create and maintain IP routing interfaces within VPRN service IDs. The interface command can be executed in the context of an VPRN service ID. The IP interface created is associated with the service core network routing instance and default routing table. The typical use for IP interfaces created in this manner is for subscriber internet access.
Interface names are case sensitive and must be unique within the group of defined IP interfaces defined for config router interface and config service vprn interface. Interface names must not be in the dotted decimal notation of an IP address. For example, the name “1.1.1.1” is not allowed, but “int-1.1.1.1” is allowed. Show commands for router interfaces use either interface names or the IP addresses. Use unique IP address values and IP address names to maintain clarity. It could be unclear to the user if the same IP address and IP address name values are used. Although not recommended, duplicate interface names can exist in different router instances.
The available IP address space for local subnets and routes is controlled with the config router service-prefix command. The service-prefix command administers the allowed subnets that can be defined on service IP interfaces. It also controls the prefixes that may be learned or statically defined with the service IP interface as the egress interface. This allows segmenting the IP address space into config router and config service domains.
When a new name is entered, a new logical router interface is created. When an existing interface name is entered, the user enters the router interface context for editing and configuration.
By default, there are no default IP interface names defined within the system. All VPRN IP interfaces must be explicitly defined. Interfaces are created in an enabled state.
The no form of this command removes IP the interface and all the associated configuration. The interface must be administratively shutdown before issuing the no interface command.
For VPRN services, the IP interface must be shutdown before the SAP on that interface may be removed. VPRN services do not have the shutdown command in the SAP CLI context. VPRN service SAPs rely on the interface status to enable and disable them.
This command creates a Service Access Point (SAP) within a service. A SAP is a combination of port and encapsulation parameters which identifies the service access point on the interface and within the router. Each SAP must be unique.
All SAPs must be explicitly created. If no SAPs are created within a service or on an IP interface, a SAP will not exist on that object.
Enter an existing SAP without the create keyword to edit SAP parameters. The SAP is owned by the service in which it was created.
A SAP can only be associated with a single service. A SAP can only be defined on a port that has been configured as an access port using the config interface port-type port-id mode access command. Channelized TDM ports are always access ports.
If a port is shutdown, all SAPs on that port become operationally down. When a service is shutdown, SAPs for the service are not displayed as operationally down although all traffic traversing the service will be discarded. The operational state of a SAP is relative to the operational state of the port on which the SAP is defined.
The no form of this command deletes the SAP with the specified port. When a SAP is deleted, all configuration parameters for the SAP will also be deleted.
No SAPs are defined.
This context will provide a SAP to the tunnel. The operator may associate an ingress and egress QoS policies as well as filters and virtual scheduling contexts. Internally this creates an Ethernet SAP that will be used to send and receive encrypted traffic to and from the MDA. Multiple tunnels can be associated with this SAP. The “tag” will be a dot1q value. The operator may see it as an identifier. The range is limited to 1 to 4094.
If the card in the slot has Media Dependent Adapters (MDAs) installed, the port-id must be in the slot_number/MDA_number/port_number format. For example 61/2/3 specifies port 3 on MDA 2 in slot 61.
null | port-id | lag-id | |
dot1q | {port-id | lag-id}:{qtag1 | cp-conn-prof-id | |
qinq | {port-id | lag-id}:{qtag1 | cp-conn-prof-id}.{qtag2 | cp-conn-prof-id} cp: keyword conn-prof-id: 1 to 8000 | |
port-id | slot/mda/port [.channel] | |
eth-sat-id | esat-id/slot/port | |
esat: keyword | ||
id: 1 to20 | ||
pxc-id | psc-id.sub-port | |
pxc psc-id.sub-port | ||
pxc: keyword | ||
id: 1 to 64 | ||
sub-port: a, b | ||
lag-id | lag-id | lag: keyword |
id: 1 to 800 | ||
qtag1 | 0 to 4094 | |
qtag2 | * | null | 0 to 4094 |
The port-id must reference a valid port type. When the port-id parameter represents SONET/SDH and TDM channels the port ID must include the channel ID. A period “.” separates the physical port from the channel-id. The port must be configured as an access port.
If the SONET/SDH port is configured as clear-channel then only the port is specified.
This command specifies an IPsec tunnel name. An IPsec client sets up the encrypted tunnel across public network. The 7750 SR IPsec MDA acts as a concentrator gathering, and terminating these IPsec tunnels into an IES or VPRN service. This mechanism allows as service provider to offer a global VPRN service even if node of the VPRN are on an uncontrolled or insecure portion of the network.
none
This command specifies whether this IPsec tunnel is the BFD designated tunnel.
none
This command assigns a BFD session to provide a heart-beat mechanism for a given IPsec tunnel. There can be only one BFD session assigned to any given IPsec tunnel, but there can be multiple IPsec tunnels using same BFD session. BFD controls the state of the associated tunnel. If the BFD session goes down, the system will also bring down the associated non-designated IPsec tunnel.
none
This command enables dynamic keying for the IPsec tunnel.
The no form of the command reverts to the default.
no dynamic-keying
This command specifies whether to attempt to establish a phase 1 exchange automatically.
The no form of the command disables the automatic attempts to establish a phase 1 exchange.
no auto-establish
This command associates the IPsec transform sets allowed for this tunnel. A maximum of four transforms can be specified. The transforms are listed in decreasing order of preference (the first one specified is the most preferred).
none
This command configures Security Association (SA) for manual keying. When enabled, the command specifies whether this SA entry is created manually by the user or dynamically by the IPsec sub-system.
none
This command configures the information required for manual keying SA creation.
none
This command specifies the size of the anti-replay window. The anti-replay window protocol secures IP against an entity that can inject messages in a message stream from a source to a destination computer on the Internet.
none
This command configures an IPsec security policy. The policy may then be associated with tunnels defined in the same context.
none
This command is used to configure an IP-GRE or IP-IP tunnel and associate it with a private tunnel SAP within an IES or VPRN service.
The no form of the command deletes the specified IP/GRE or IP-IP tunnel from the configuration. The tunnel must be administratively shutdown before issuing the no ip-tunnel command.
no IP tunnels are defined.
This command sets the source IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. It must be an address in the subnet of the associated public tunnel SAP interface. The GRE tunnel does not come up until a valid source address is configured.
The no form of the command deletes the source address from the GRE tunnel configuration. The tunnel must be administratively shutdown before issuing the no source command.
This command sets the primary destination IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. If this address is reachable in the delivery service (there is a route) then this is the destination IPv4 address of GRE encapsulated packets sent by the delivery service.
The no form of the command deletes the destination address from the GRE tunnel configuration.
This command sets the backup destination IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. If the primary destination address is not reachable in the delivery service (there is no route) or not defined then this is the destination IPv4 address of GRE encapsulated packets sent by the delivery service.
The no form of the command deletes the backup-destination address from the GRE tunnel configuration.
This command instructs the MS-ISA to reset the DF bit to 0 in all payload IP packets associated with the GRE or IPsec tunnel, before any potential fragmentation resulting from the ip-mtu command. (This will require a modification of the header checksum.) The no clear-df-bit command, corresponding to the default behavior, leaves the DF bit unchanged.
The no form of the command disables the DF bit reset.
none
This command sets the delivery service for GRE encapsulated packets associated with a particular GRE tunnel. This is the IES or VPRN service where the GRE encapsulated packets are injected and terminated. The delivery service may be the same service that owns the private tunnel SAP associated with the GRE tunnel. The GRE tunnel does not come up until a valid delivery service is configured.
The no form of the command deletes the delivery-service from the GRE tunnel configuration.
This command sets the DSCP code-point in the outer IP header of GRE encapsulated packets associated with a particular GRE tunnel. The default, set using the no form of the command, is to copy the DSCP value from the inner IP header (after remarking by the private tunnel SAP egress qos policy) to the outer IP header.
no dscp
This command configures a private IPv4 or IPv6 address of the remote tunnel endpoint. A tunnel can have up to 16 dest-ip commands. At least one dest-ip address is required in the configuration of a tunnel. A tunnel does not come up operationally unless all dest-ip addresses are reachable (part of a local subnet).
Unnumbered interfaces are not supported.
No default
<ip-address> | ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) | |
x:x:x:x:x:x:d.d.d.d | ||
x - [0 to FFFF]H | ||
d - [0 to 255]D |
This command configures the type of the IP tunnel. If the gre-header command is configured then the tunnel is a GRE tunnel with a GRE header inserted between the outer and inner IP headers. If the no form of the command is configured then the tunnel is a simple IP-IP tunnel.
no gre-header
This command configures the IP maximum transmit unit (packet) for this interface.
Because this connects a Layer 2 to a Layer 3 service, this parameter can be adjusted under the IES interface.
The MTU that is advertised from the IES size is:
MINIMUM((SdpOperPathMtu - EtherHeaderSize), (Configured ip-mtu))
By default (for ethernet network interface) if no ip-mtu is configured it is (1568 - 14) = 1554.
The ip-mtu command instructs the MS-ISA to perform IP packet fragmentation, prior to IPsec encryption and encapsulation, based on the configured MTU value. In particular:
If the length of a payload IP packet (including its header) exceeds the configured MTU value and the DF flag is clear (due to the presence of the clear-df-bit command or because the original DF value was 0) then the MS-ISA fragments the payload packet as efficiently as possible (i.e. it creates the minimum number of fragments each less than or equal to the configured MTU size); in each created fragment the DF bit shall be 0.
If the length of a payload IP packet (including its header) exceeds the configured MTU value and the DF flag is set (because the original DF value was 1 and the tunnel has no clear-df-bit in its configuration) then the MS-ISA discards the payload packet without sending an ICMP type 3/code 4 message back to the packet’s source address.
The no ip-mtu command, corresponding to the default behavior, disables fragmentation of IP packets by the MS-ISA; all IP packets, regardless of size or DF bit setting, are allowed into the tunnel.
The effective MTU for packets entering a tunnel is the minimum of the private tunnel SAP interface IP MTU value (used by the IOM) and the tunnel IP MTU value (configured using the above command and used by the MS-ISA). So if it desired to fragment IP packets larger than X bytes with DF set, rather than discarding them, the tunnel IP MTU should be set to X and the private tunnel SAP interface IP MTU should be set to a value larger than X.
no ip-mtu
This command configures the reassembly wait time.
This command configures an IPsec gateway.
This command specifies a service ID or service name of the default security service used by this SAP IPsec gateway.
This command configures a default tunnel policy template for the gateway.
This command enters the context of DHCPv4-based address assignment for IKEv2 remote-access tunnels.
The system will act as a DHCPv4 client on behalf of the IPsec client, and also a relay agent to relay DHCPv4 packets to the DHCPv4 server.
DHCPv4 DORA(Discovery/Offer/Request/Ack) exchange happens during IKEv2 remote-access tunnel setup. And system also supports standard renew
In order to use this feature, the relay-proxy must be enabled on the corresponding interface (either the private interface or the interface that has the gi-address as the interface address.
no dhcp
This command enters the context of DHCPv6-based address assignment for IKEv2 remote-access tunnels.
The system will act as a DHCPv6 client on behalf of the IPsec client, and will also act as a relay agent to relay DHCPv6 packets to the DHCPv6 server.
DHCPv6 exchange happens during IKEv2 remote-access tunnel setup. The system also supports standard renew.
no dhcp6
This command specifies the gateway IP address of the DHCPv4 packets sent by the system. IPsec DHCP Relay uses only the gi-address configuration found under the IPsec gateway and does not take into account gi-address with src-ip-addr configuration below other interfaces
no gi-address
This command specifies the link address of the relayed DHCPv6 packets sent by the system.
no link-address
This command enables the system to send a DHCPv4/v6 release message when the IPsec tunnel is removed.
no send-release
This command specifies up to eight DHCPv4/v6 server addresses for DHCPv4/v6-based address assignment. If multiple server addresses are specified, the first advertised DHCPv4/v6 address received will be chosen.
no server
This command configures IKE policy for the gateway.
This command enables the context to configure local address assignments for the IPsec gateway.
This command enables the context to configure IPv4 local address assignment parameters for the IPsec gateway.
This command specifies the IPv4 or IPv6 source of the local address assignment for the IPsec gateway, which is a pool of a local DHCPv4 or DHCPv6 server. The system will assign an internal address to an IKEv2 remote-access client from the specified pool.
Beside the IP address, netmask and DNS server can also be returned. For IPv4, the netmask and DNS server address can be returned from the specified pool, as well as the IP address. The netmask returned to the IPsec client is derived from the subnet length from the subnet x.x.x.x/m create configuration, not the subnet-mask configuration in the subnet context. For IPv6, the DNS server address can be returned from the specified pool, as well as the IP address.
For IPv4, a secondary pool can be optionally specified. The secondary pool is used if the system is unable to assign addresses from the primary pool.
no address-source
This command enables the context to configure IPv6 local address assignment parameters for the IPsec gateway.
This command configures local gateway address of the IPsec gateway.
none
This command specifies the local gateway address used for the tunnel and the address of the remote security gateway at the other end of the tunnel remote peer IP address to use.
The base routing context is used if the delivery-router option is not specified.
This command specifies the local ID for 7750 SRs used for IDi or IDr for IKEv2 tunnels.
The no form of the command removes the parameters from the configuration.
Depends on local-auth-method like following:
This command configures the pre-shared key for the IPsec gateway or IPsec tunnel.
no pre-shared-key
This command specifies the radius-accounting-policy to be used for the IKEv2 remote-access tunnels terminated on the ipsec-gw. The radius-accounting-policy is defined under config>ipsec context.
none
This command specifies the radius-authentication-policy to be used for the IKEv2 remote-access tunnels terminated on the ipsec-gw. The radius-authentication-policy is defined under config>ipsec context.
none
This command configures cert parameters used by this SAP IPsec gateway.
This command specifies the certificate that 7750 SR used to identify itself in case peer need it. 7750 SR will load (reload) the certificate from the configured URL when the ipsec-tunnel/ipsec-gw is “no shutdown”.
When system is loading the certificate, it will check if it is a valid X.509v3 certificate by performing following:
If any of above checks fails, then the no shutdown command will fail.
Configured certificate file url can only be changed or removed when tunnel or gw is shutdown.
The same certificate can be used for multiple ipsec-tunnels or ipsec-gws. However for each certificate file, there is only one memory instance. If a certificate file has been updated, no shutdown in any of tunnel that uses the certificate file will cause the memory instance to be updated. This will not impact the current up and running tunnels that use the certificate file, but afterwards the new authentication will use the updated memory instance. Use cert-profile command.
None
This command specifies the key pair file 7750 SR will use for X.509 certificate authentication. The system will load the key file when the ipsec-tunnel/gw is no shutdown.
When the system is loading the key file, it will check to determine if it is a valid 7750 SR formatted key file.
The key file URL can only be changed or removed when the tunnel or gateway is shutdown.
The same key can be used for multiple ipsec-tunnels or ipsec-gws. However for each key file, there is only one memory instance. If a key file has been updated, no shutdown in any of tunnel that uses the key file will cause the memory instance updated. This will not impact the current up and running tunnels that uses the key file. Use the cert-profile command.
None
This command enables the context to configure certificate revocation status verification parameters.
none
This command specifies the default result when both the primary and secondary method failed to provide an answer.
default-result revoked
This command specifies the primary method that used to verify revocation status of the peer’s certificate; could be either CRL or OCSP
OCSP or CRL will use the corresponding configuration in the ca-profile of the issuer of the certificate in question.
primary crl
This command specifies the secondary method that used to verify revocation status of the peer’s certificate; could be either CRL or OCSP.
OCSP or CRL will use the corresponding configuration in the ca-profile of the issuer of the certificate in question.
secondary method will only be used when the primary method failed to provide an answer:
no secondary
This command configures trust anchor with a CA profile used by this SAP IPsec gateway.
This command enables the use of an IPsec client-db. The system will use specified client-db to authenticate IKEv2 dynamic LAN-to-LAN tunnel.
no client-db
This command specifies an existing RADIUS accounting policy to use to collect accounting statistics on this subscriber profile by RADIUS. This command is used independently of the collect-stats command.
This command specifies the radius authentication policy associated with this IPsec gateway.
This command enables the context to specify the RADIUS parameters that the system should include into RADIUS authentication-request messages.
This command includes called station id attributes.
The no form of the command excludes called station id attributes.
This command enables the inclusion of the calling-station-id attribute in RADIUS authentication requests and RADIUS accounting messages.
no calling-station-id
This command enables the inclusion of the Subject Key Identifier of the peer's certificate in the RADIUS Access-Request packet as VSA: Alc-Subject-Key-Identifier. Refer to the SROS RADIUS Attributes Reference Guide for more information.
no client-cert-subject-key-id
This command enables the inclusion of the framed-ip-addr attribute.
This command enables the generation of the nas-identifier RADIUS attribute.
This command enables the generation of the NAS ip-address attribute.
This command enables the generation of the nas-port-id RADIUS attribute. Optionally, the value of this attribute (the SAP-id) can be prefixed by a fixed string and suffixed by the circuit-id or the remote-id of the client connection. If a suffix is configured, but no corresponding data is available, the suffix used will be 0/0/0/0/0/0.
This command references an existing radius-server-policy (available under the config>aaa context) for use in subscriber management authentication and accounting.
When configured in an authentication-policy, following CLI commands are ignored in the policy to avoid conflicts:
When configured in a radius-accounting-policy, following CLI commands are ignored in the policy to avoid conflicts:
The no form of the command removes the radius-server-policy reference from the configuration
no radius-server-policy
This command enables the system to send RADIUS interim-update packets for IKEv2 remote-access tunnels. The RADIUS attributes in the interim-update packet are the as same as acct-start. The value of the Acct-status-type in the interim-update message is 3.
none
This command specifies the password that is used in the RADIUS access requests.It shall be specified as a string of up to 32 characters in length.
The no form of the command resets the password to its default of ALU and will be stored using hash/hash2 encryption.
ALU
This command enables the context to configure PKI related parameters.
none
This command creates a new ca-profile or enter the configuration context of an existing ca-profile. Up to 128 ca-profiles could be created in the system. A shutdown the ca-profile will not affect the current up and running ipsec-tunnel or ipsec-gw that associated with the ca-profile. But authentication afterwards will fail with a shutdown ca-profile.
Executing a no shutdown command in this context will cause system to reload the configured cert-file and crl-file.
A ca-profile can be applied under the ipsec-tunnel or ipsec-gw configuration.
The no form of the command removes the name parameter from the configuration. A ca-profile can not be removed until all the associated entities (ipsec-tunnel/gw) have been removed.
This command enables the context to configure X.509 certificate related operational parameters.
This command specifies the certificate subject display format.
ascii
This command enables the context to configure CMPv2 parameters. Changes are not allowed when the CA profile is enabled (no shutdown).
This command enables the system to accept both protected and unprotected CMPv2 error message. Without this command, system will only accept protected error messages.
The no form of the command causes the system to only accept protected PKI confirmation message.
no
This command enables the system to accept both protected and unprotected CMPv2 PKI confirmation messages. Without this command, system will only accept protected PKI confirmation message.
The no form of the command causes the system to only accept protected PKI confirmation message.
none
This command specifies to always set the sender field in CMPv2 header of all Initial Registration (IR) messages with the subject name. By default, the sender field is only set if an optional certificate is specified in the CMPv2 request.
no always-set-sender-for-ir
This command enables the context to configure pre-shared key list parameters.
This command specifies a pre-shared key used for CMPv2 initial registration. Multiples of key commands are allowed to be configured under this context.
The password and reference-number is distributed by the CA via out-of-band means.
The configured password is stored in configuration file in an encrypted form by using SR OS hash2 algorithm.
The no form of the command removes the parameters from the configuration.
none
This command specifies HTTP URL of the CMPv2 server. The URL must be unique across all configured ca-profiles.
The URL will be resolved by the DNS server configured (if configured) in the corresponding router context.
If the service-id is 0 or omitted, then system will try to resolve the FQDN via DNS server configured in bof.cfg. After resolution, the system will connect to the address in management routing instance first, then base routing instance.
If the service is VPRN, then the system only allows HTTP ports 80 and 8080.
none
This command specifies the revocation method system used to check the revocation status of certificate issued by the CA, the default value is crl, which will use CRL. But if it is crl-optional, then it means when the user disables the ca-profile, then the system will try to load the configured CRL (specified by the crl-file command). But if the system fails to load it for following reasons, then the system will still bring ca-profile oper-up, but leave the CRL as non-exist.
If the system needs to use the CRL of a specific ca-profile to check the revocation status of an end-entity cert, and the CRL is non-existent due to the above reasons, then the system will treat it as being unable to get an answer from CRL and fall back to the next status-verify method or default-result.
If the system needs to check the revocation of a CA cert in cert chain, and if the CRL is non-existent due to the above reasons, then the system will skip checking the revocation status of the CA cert. For example, if CA1 is issued by CA2, if CA2’s revocation-check is crl-optional and the CA2’s CRL is non-existent, then the system will not check CA1 cert’s revocation status and consider it as “good”.
![]() | Note: Users must shutdown the ca-profile to change the revocation-check configuration. |
revocation-check crl
This command specifies the timeout value for HTTP response that is used by CMPv2.
The no form of the command reverts to the default.
30 seconds
This command configures the HTTP version for CMPv2 messages.
1.1
This command specifies a imported certificate that is used to verify the CMP response message if they are protected by signature. If this command is not configured, then CA’s certificate will be used.
none
This command enables the system to use same recipNonce as the last CMPv2 response for poll request.
none
This command requests an additional certificate after the system has obtained the initial certificate from the CA.
The request is authenticated by a signature signed by the current-key, along with the current-cert. The hash algorithm used for signature is depends on the key type:
In some cases, the CA may not return a certificate immediately, due to reasons such as request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command can be used to poll the status of the request.
none
This command clears current pending CMPv2 requests toward the specified CA. If there are no pending requests, it will clear the saved result of prior request.
none
This command request initial certificate from CA by using CMPv2 initial registration procedure.
The ca parameter specifies a CA-profile which includes CMP server information.
The key-to-certify is an imported key file to be certified by the CA.
The protection-key is an imported key file used to for message protection if protection-alg is signature.
The request is authenticated either of following methods:
Optionally, the system could also send a certificate or a chain of certificates in extraCerts field. Certificate is specified by the “cert” parameter, it must include the public key of the key used for message protection.
Sending a chain is enabled by specify the send-chain parameter.
subject-dn specifies the subject of the requesting certificate.
save-as specifies full path name of saving the result certificate.
In some cases, CA may not return certificate immediately, due to reason like request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command could be used to poll the status of the request. If key-list is not configured in the corresponding ca-profile, then the system will use the existing password to authenticate the CMPv2 packets from server if it is in password protection.
If key-list is configured in the corresponding ca-profile and server doesn't send SenderKID, then the system will use lexicographical first key in the key-list to authenticate the CMPv2 packets from server in case it is in password protection.
none
This command requests a new certificate from the CA to update an existing certificate due to reasons such as key refresh or replacing compromised key.
In some cases, the CA may not return certificate immediately, due to reasons such as request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command can be used to poll the status of the request.
This command polls the status of the pending CMPv2 request toward the specified CA.
If the response is ready, this command will resume the CMPv2 protocol exchange with server as the original command would do. The requests could be also still be pending as a result, then this command could be used again to poll the status.
SR OS allows only one pending CMP request per CA, which means no new request is allowed when a pending request is present.
none
This command displays current the CMPv2 pending request toward the specified CA. If there is no pending request, the last pending request is displayed including the status (success/fail/rejected) and the receive time of last CMPv2 message from server.
The following information is included in the output:
none
This command creates a new file transmission profile or enters the configuration context of an existing file-transmission-profile.
The file-transmission-profile context defines transport parameters for protocol such as HTTP, include routing instance, source address, timeout value, etc.
N/A
This command specifies the IPv4 source address used for transport protocol.
The no form of this command uses the default source address which typically is the address of the egress interface.
no ipv4-source-address
This command specifies the IPv6 source address used for transport protocol.
The no form of this command uses the default source address which typically is the address of egress interface.
no ipv6-source-address
This command enables system to accept HTTP redirection response, along with the max level of redirection. The virtual router may send a new request to another server if the requested resources are not available (e.g., temporarily available to another server).
no redirection
This command specifies the number of retries on transport protocol level.
When the virtual router does not receive any data from a server (e.g., FTP or HTTP server) after the configured timeout seconds, the router may repeat the request to the server. The number of retries specifies the maximum number of repeated requests.
The no form of this command disables the retry.
no retry
This command specifies the routing instance that the transport protocol uses.
Base
<router-instance> : | <router-name> | <service-id> | |
router-name | Base, management, vpls-management | |
service-id | [1 to 2147483647] |
This command specifies timeout value in seconds for transport protocol. The timeout is the maximum waiting time to receive any data from the server (e.g., FTP or HTTP server).
60
This command creates an auto CRL update configuration context with the create parameter, or enters the auto-crl-update configuration context without the create parameter.
This mechanism auto downloads a CRL file from a list of configured HTTP URLs either periodically or before existing CRL expires. If the downloaded CRL is more recent than the existing one, then the existing one will be replaced.
![]() | Note: The configured URL must point to a DER encoded CRL file. |
no auto-crl-update
This command enables the context to configure crl-urls parameters. The system allows up to eight URL entries to be configured and will try each URL in order and stop when a qualified CRL is successfully downloaded. A qualified CRL is a valid CRL signed by the CA and is more recent than the existing CRL.
If none of the configured URLs returns a qualified CRL, then:
If the user wants to manually stop the download, shutting down of auto-crl-retrieval could be used to achieve this.
N/A
This command creates a new crl-url entry with the create parameter, or enters an existing url-entry configuration context without create parameter.
The no form of this command removes the specified entry.
N/A
This command specifies the file-transmission-profile for the url-entry. When the system downloads a CRL from the configured URL in the url-entry it will use the transportation parameter configured in the file-transmission-profile. auto-crl-update supports Base/Management/VPRN routing instance. vpls-management is not supported. In case of VPRN, the HTTP server port can only be 80 or 8080.
The no form of the command removes the specified profile name.
N/A
This command specifies the HTTP URL of the CRL file for the url-entry. The system supports both IPv4 and IPv6 HTTP connections.
![]() | Note: The URL must point to a DER encoded CRL. |
N/A
This command specifies the interval for periodic updates. The minimal interval is 1 hour. The maximum interval is 366 days.
days 1
This command specifies the interval, in seconds, that the system waits before retrying the configured url-entry list when schedule-type is next-update-based and none of the URLs return a qualified CRL.
The no form of the command causes the system to retry immediately without waiting.
3600
This command specifies the pre-download time for next-update-based update.
hrs 1
This command specifies the schedule type for auto CRL update. The system supports two types:
next-update-based
This command disables the auto CRL update.
The no form of this command enables an auto CRL update. Upon no shutdown, if the configured CRL file does not exist, is invalid or is expired or if the schedule-type is next-update-based and current time passed (Next-Update_of_existing_CRL - pre-update-time), then system will start downloading CRL right away.
shutdown
This command manually triggers the CRL update for the specified ca-profile.
Using this command requires shutting down the auto-crl-update.
none
The commands described in this section are supported on the 7750 SR only.
This command enables the context to configure multi-chassis parameters.
This command configures a multi-chassis redundancy peer.
This command enables the context to configure multi-chassis peer parameters.
This command enables tracking a central BFD session, if the BFD session goes down, then system consider the peer is down and change the mc-ipsec status of configured tunnel-group accordingly.
The BFD session uses specified the loopback interface (in the specified service) address as the source address and uses specified dst-ip as the destination address. Other BFD parameters are configured with the bfd command on the specified interface.
300
This command specifies the time interval of tunnel-group stays in the Discovery state. Interval-1 is used as discovery-interval when a new tunnel-group is added to multi-chassis redundancy (mp-ipsec); interval-2 is used as discovery-interval when system boot-up, it is optional, when it is not specified, the interval-1 will be used.
300
This command specifies the number of keep-alive failures before the peer is considered to be down.
The no form of the command reverts to the default.
3
This command specifies the time interval of the mastership election protocol sending keep-alive packet.
The no form of the command reverts to the default.
10
This command enables multi-chassis redundancy for specified tunnel-group; or enters an already configured tunnel-group context. The configured tunnel-group could failover independently.
The no form of the command removes the tunnel group ID from the configuration.
none
This command specifies the corresponding tunnel-group id on peer node. The peer tunnel-group id does not necessary equals to local tunnel-group id.
The no form of the command removes the tunnel group ID from the configuration.
none
This command specifies the local priority of the tunnel-group, this is used to elect master, higher number win. If priority are same, then the peer has more active ISA win; and priority and the number of active ISA are same, then the peer with higher IP address win.
The no form of the command removes the priority value from the configuration.
100
This command configures a routing protocol as a match criterion for a route policy statement entry. This command is used for both import and export policies depending how it is used.
When the ipsec is specified this means IPsecroutes.
If no protocol criterion is specified, any protocol is considered a match.
The no form of the command removes the protocol match criterion.
no protocol — Matches any protocol.
This command will configure a match criteria on the state attribute. The state attribute carries the state of an SRRP instance and it can be applied to:
Based on the state attribute of the route we can manipulate the route advertisement into the network.
We can enable or disable (in case there is no SRRP running) tracking of SRRP state by routes.
This is done on a per subscriber-interface route basis, where a subscriber-interface route is tracking a single SRRP instance state (SRRP instance might be in a Fate Sharing Group).
For subscriber-management and managed-routes, tracking is enabled per group interface under which SRRP is enabled.
none
srrp-master | Track routes with the state attribute carrying srrp-master state |
srrp-non-master | Track routes with the state attribute carrying srrp-non-master state. |
ipsec-master-with-peer | Track routes with the state attribute carrying ipsec-master-with-peer state. |
ipsec-non-master | Track routes with the state attribute carrying ipsec-non-master state. |
ipsec-master-without-peer | Track routes with the state attribute carrying ipsec-master-without-peer state. |
This command enables multi-chassis synchronization of IPsec states of specified tunnel-groups with a peer. The sync-tag parameter is used to match corresponding tunnel-group on both peers. IPsec states will be synchronized between tunnel-groups with same sync-tag.
no
This command enables multi-chassis synchronization of IPsec states on system level.
no
This command displays IPsec certificate profile information.
The following is an example output of the show ipsec cert-profile command.
This command displays certificate-related information.
The following is an example output of the show certificate command.
In the following example, the "cert-1.der" is the certificate-profile name, where as above the cert-1.der is the actual file in use.
This commands displays client-db related information. Using this command without any parameters will list all configured client-db.
The following is an example output of the show client-db command.
This command displays IPsec gateway information.
The following is an example output of the show ipsec gateway command.
This command displays information about a particular GRE tunnel or all GRE tunnels.
Table 26 lists the information displayed for each GRE tunnel.
Label | Description |
TunnelName (Tunnel Name) | The name of the GRE tunnel. |
SvcID (Service ID) | The service ID of the IES or VPRN service that owns the GRE tunnel. |
SapId (Sap ID) | The ID of the private tunnel SAP that owns the GRE tunnel. |
Description | The description for the GRE tunnel. |
LocalAddress (Source Address) | The source address of the GRE tunnel (public/outer IP) |
RemoteAddress (Remote Address) | The destination address of the GRE tunnel (public/outer IP) |
Bkup RemAddr (Backup Address) | The backup destination address of the GRE tunnel (public/outer IP) |
To (Target Address) | The remote address of the GRE tunnel (private/inner IP). This is the peer’s IP address to the GRE tunnel. This comes from the tunnel configuration. |
DlvrySvcId (Delivery Service) | The service ID of the IES or VPRN service that handles the GRE encapsulated packets belonging to the tunnel. |
DSCP | The forced DSCP codepoint in the outer IP healer of GRE encapsulated packets belonging to the tunnel. |
Admn (Admin State) | Admin state of the tunnel (up/down). |
Oper (Operational State) | Operational state of the tunnel (up/down). |
Oper Rem Addr (Oper Remote Addr) | The destination address of the GRE tunnel (public/outer IP) that is currently being used. |
Pkts Rx | Number of GRE packts received belonging to the tunnel. |
Pkts Tx | Number of GRE packets transmitted belonging to the tunnel. |
Bytes Rx | Number of bytes in received GRE packets associated with the tunnel. |
Bytes Tx | Number of bytes in transmitted GRE packets associated with the tunnel. |
Key Ignored Rx | Incremented every time a GRE packet is received with a GRE key field. |
Too Big Tx | Incremented every time an IP packet with DF=1 is to be forwarded into the GRE tunnel and its size exceeds the interface IP MTU. |
Seq Ignored Rx | Incremented every time a GRE packet is received with a sequence number. |
Vers Unsup. Rx | Incremented every time a GRE packet is dropped because the GRE version is unsupported. |
Invalid Chksum Rx | Incremented every time a GRE packet is dropped because the checksum is invalid. |
Loops Rx | Incremented every time a GRE packet is dropped because the destination IP address of the un-encapsulated packet would cause it be re-encapsulated into the same tunnel. |
This command displays
The following is an example output for the show ipsec ike-policy command.
This command displays the lockout status for the specified IPsec clients. If remote address information is not specified, the system will display a list of clients that have been locked out on the specified ISA, along with the IPsec gateway if local-gateway-address is specified.
The following output is an example of lockout information.
This command displays RADIUS accounting-policy related information.
The following is an example output for the show ipsec radius-acounting-policy command.
This command displays IPsec RADIUS authentication policy information.
This command displays
The following is an example output for the show ipsec security-policy command.
This command displays IPsec static-SA information.
This command displays IPsec transforms.
The following is an example output for the show ipsec transform command.
This command displays trust anchor profile information.
The following is an example output for the show ipsec trust-anchor-profile command.
This command displays IPsec traffic-selector list (TS-list) information.
Entering this command without a parameter will list all configured TS-lists.
Entering this command with the association parameter will list all IPsec gateways that use the specified TS-list.
Entering this command with the local or local-entry parameter will list all or specified local entries of the specified TS-list.
Entering this command with the remote or remote-entry parameter will list all or specified remote entries of the specified TS-list.
The following output is an example of TS-list information.
This command displays
This command displays
The following is an example output for the show ipsec tunnel-template command.
This command displays the 7750 SR IPsec multi-chassis states. Optionally, only state of specified tunnel-group will be displayed.
Table 27 describes show redundancy multi-chassis mc-ipsec output fields.
Label | Description |
Admin State | Displays the admin state of mc-ipsec. |
Mastership/Master State | Displays the current MIMP state. |
Protection Status | Displays nominal or notReady. notReady means the system is not ready for a switchover. There could be major traffic impact if switchover happens in case of notReady. nominal means the tunnel-group is in a better situation to switchover than notReady. However there still might be traffic impact. |
Installed | Displays the number of tunnels that has been successfully installed on MS-ISA |
Installing | Displays the number of tunnels that are being installed on MS-ISA. |
Awaiting Config | Displays the number of synced tunnels that do not have corresponding configuration ready |
Failed | Displays the number of tunnels that have been failed to installed on MS-ISA. |
This command enables debugging for dynamic IPsec tunnels that terminate on the specified IPsec gateway.
The tunnel to be debugged can be specified by either its source address or source subnet. If a subnet is specified, the system will enable debugging for all tunnels with source addresses in the specified subnet.
This command enables debugging for specified IPsec tunnel.
![]() | Note: Only one IPsec tunnel is allowed to enable debugging at a time. |
This command enables debug for certificate chain computation in cert-profile.
This command enables debugging for the specified IPsec client-db.
This command enables the context to perform CMPv2 operations.
This command debugs output of the specified CA profile.
This command enable debug output of OCSP protocol for the specified CA.
no ocsp
This command enables the 7750 SR mc-ipsec context.
This command manually switches over the 7750 SR mc-ipsec mastership of specified tunnel-group.
This command performs a lookup in the specified client-db by using specified input and displays the matching result.
Sample Output
This command initiates tunnel setup for the specified LAN-to-LAN tunnel or for all static LAN-to-LAN tunnels in the specified tunnel group. This command initiates tunnel setup regardless of the configuration of the ipsec-responder-only command under the specified tunnel group.
The command only initiates tunnel setup when the tunnel group is in the MC-IPsec master state, or if MC-IPsec is not enabled for the tunnel group. If MC-IPsec is enabled and the tunnel group is not in the master state, the system will abort tunnel setup if MIMP goes down or if mastership changes during the tunnel setup.
Operationally up tunnels are not affected by this command. The system will not try to initiate a tunnel setup if the tunnel’s operation flags are not clear.
The system does not automatically retry tunnel setup if a tunnel setup fails.
N/A
This command clears the lockout state for the specified clients. If remote address information is not specified, the system will clear the lockout state for all clients within the specified routing instance, along with all clients within the specified IPsec gateway if local-gateway-address is specified.