Note: The commands listed in this section apply only to the 7450 ESS. |
Note: The commands in this section only apply to the 7750 SR. |
Note: The commands in this section apply to the 7450 ESS and 7750 SR, except the 7750 SR-1e, 7750 SR-2e, and 7750 SR-3e. |
This command administratively disables the entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics.
The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.
The no form of this command places the entity into an administratively enabled state.
shutdown
This command creates a text description stored in the configuration file for a configuration context.
The description command associates a text string with a configuration context to help identify the content in the configuration file.
The no form of this command removes the string from the configuration.
no description
This command enables the context to configure system-wide ATM parameters.
This command indicates the location ID for ATM OAM.
Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Services Overview Guide for information about ATM QoS policies and ATM-related service parameters.
no atm-location-id
Invalid values include a location ID where the first octet is: 00, FF, 6A Acceptable location-ids include values where the first octet is: 01, 03 Other values are not accepted.
This command configures system-wide ATM parameters.
This command specifies the number of seconds between periodic loopback attempts on an ATM endpoint that has periodic loopback enabled.
no loopback-period
This command specifies the number of OAM loopback attempts that must fail after the periodic attempt before the endpoint will transition to AIS-LOC state.
The retry values are configured on a system wide basis and are affective on the next period cycle of any ATM VC SAP using periodic-loopback, if changed. The timeout for receiving a loopback response from the remote peer and declaring the loopack failed is 1 second and is not configurable.
no retry-down
This command specifies the number of consecutive OAM loopback attempts that must succeed after the periodic attempt before the endpoint will transition the state to up.
no retry-up
Use this command to configure a URL for a CLI script to exec following a failure of a boot-up configuration. The command specifies a URL for the CLI scripts to be run following the completion of the boot-up configuration. A URL must be specified or no action is taken.
The commands are persistent between router (re)boots and are included in the configuration saves (admin>save).
Related Commands
exec — This command executes the contents of a text file as if they were CLI commands entered at the console.
no boot-bad-exec
Ipv6-address only applies to the 7750 SR and 7950 XRS.
file url | local-url | remote-url | 255 chars max |
local-url | [cflash-id/][file-path] | |
remote-url | [{ftp://} login:pswd@remote-locn/][file-path] | |
remote-locn | [hostname | ipv4-address | [ipv6- address]] | |
ipv4-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x[-interface] | |
x:x:x:x:x:x:d.d.d.d[-interface] | ||
x - [0 to FFFF]H | ||
d - [0 to 255]D | ||
interface - 32 chars max, for link local addresses | ||
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
Use this command to configure a URL for a CLI script to exec following the success of a boot-up configuration.
Related Commands
exec - This command executes the contents of a text file as if they were CLI commands entered at the console.
no boot-good-exec
Ipv6-address only applies to the 7750 SR and 7950 XRS and ipv4-address applies to the 7450 ESS.
file url | local-url | remote-url | 255 chars max |
local-url | [cflash-id/][file-path] | |
remote-url | [{ftp://} login:pswd@remote-locn/][file-path] | |
remote-locn | [hostname | ipv4-address | [ipv6- address]] | |
ipv4-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x[-interface] | |
x:x:x:x:x:x:d.d.d.d[-interface] | ||
x - [0 to FFFF]H | ||
d - [0 to 255]D | ||
interface - 32 chars max, for link local addresses | ||
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
This command is retained for historic reasons, and was used to control the set of features and scaling available based on the variants of IOMs present in the node. As of release 15.0, the set of supported IOMs no longer requires this differentiation using this command. The command still exists but the mode is fixed at chassis mode d.
chassis-mode d
d: This mode corresponds to scaling and feature set associated with iom3-xp.
This command creates a Common Language Location Identifier (CLLI) code string for the SR-series router. A CLLI code is an 11-character standardized geographic identifier that uniquely identifies geographic locations and certain functional categories of equipment unique to the telecommunications industry.
No CLLI validity checks other than truncating or padding the string to eleven characters are performed.
Only one CLLI code can be configured, if multiple CLLI codes are configured the last one entered overwrites the previous entry.
The no form of the command removes the CLLI code.
no clli-code
This command configures the maximum number of backup versions maintained for configuration files and BOF.
For example, assume the config-backup count is set to 5 and the configuration file is called xyz.cfg. When a save command is executed, the file xyz.cfg is saved with a 1 extension. Each subsequent config-backup command increments the numeric extension until the maximum count is reached.
xyz.cfg xyz.cfg.1 xyz.cfg.2 xyz.cfg.3 xyz.cfg.4 xyz.cfg.5 xyz.ndx
Each persistent index file is updated at the same time as the associated configuration file. When the index file is updated, then the save is performed to xyz.cfg and the index file is created as xyz.ndx. Synchronization between the active and standby CPM is performed for all configurations and their associated persistent index files.
The no form of the command returns the configuration to the default value.
no config-backup
This command creates a text string that identifies the contact name for the device.
Only one contact can be configured, if multiple contacts are configured the last one entered will overwrite the previous entry.
The no form of the command reverts to default.
no contact
This command enables the context to configure cpm-http-redirect settings for enabling or disabling the optimized-mode.
This command enables the cpm-http-redirect optimized-mode. The optimized-mode improves the scale of HTTP redirect sessions supported system wide.
optimized-mode
This command creates a text string that identifies the system coordinates for the device location. For example, the command coordinates “37.390 -122.0550" is read as latitude 37.390 north and longitude 122.0550 west.
Only one set of coordinates can be configured. If multiple coordinates are configured, the last one entered overwrites the previous entry.
The no form of the command reverts to the default value.
This command configures DNS settings.
This command configures the DNS address resolving order preference. By default DNS names are queried for A-records only (address-preference is IPv4-only).
If the address-preference is set to IPv6-first, the DNS server will be queried for AAAA-records (IPv6) first and if a successful replied is not received, then the DNS server is queried for A-records. IPv6 applies only to the 7750 SR and 7950 XRS.
address-pref ipv4-only
This command configures system Domain Name System Security Extensions (DNSSEC) settings.
This command enables validation of the presence of the AD-bit in responses from the DNS servers, and reports a warning to the SECURITY log if DNSSEC validation was not possible.
This command requires either the fall-through or drop parameters be configured. When the fall-through parameter is supplied, the system will allow DNS responses that do not pass DNSSEC validation to be accepted and logged. When the drop parameter is specified, the system will reject and log DNS responses that do not pass DNSSEC validation and the resolution will appear to fail.
no ad-validation
This command enables vendor specific extensions to ICMP.
no enable-icmp-vse
This command configures system-wide IP router parameters.
This command is a system-wide option that allows the creation of network interfaces on a QinQ encapsulated VLAN.
When enabled, the maximum number of allowed MPLS labels is reduced by 1 to allow for the additional VLAN tag at egress processing.
The no form of this command reverts the option to the default value, which is to not allow network interfaces on QinQ encapsulated VLANs.
no allow-qinq-network-interface
This command enables the options to force the creation of IP interface indexes so that they are globally unique across all routing contexts. In addition, the command ensures that any interface created using SNMP also has a system-wide unique IP interface index.
If this command is issued but the system has previously existing interface indexes that conflict, the command will be rejected until all the conflicts are removed. Pre-existing persistency tables should also be removed before enabling this system option.
The no form of the command disables this option and returns the system to the default behavior.
no enforce-unique-if-index
This command configures the Link Aggregation Control Protocol (LACP) system priority on aggregated Ethernet interfaces. LACP allows the operator to aggregate multiple physical interfaces to form one logical interface.
lacp-system-priority 32768
This command enables the load-balancing context to configure the interface per-flow load balancing options that will apply to traffic entering this interface and egressing over a LAG/ECMP on system-egress. This is a per interface setting. For load-balancing options that can also be enabled on the system level, the options enabled on the interface level overwrite system level configurations.
This command enables the inclusion of the L2TPv2 session ID into the load-balancing hash algorithm to induce more variation and better load distribution over available links and next-hops.
The no form of this command disables the inclusion of the session-id.
This command configures system-wide Layer 4 load balancing. The configuration at the system level can enable or disable load balancing based on Layer 4 fields. If enabled, the Layer 4 source and destination port fields will be included in hashing calculation for TCP/UDP packets.
The hashing algorithm addresses finer spraying granularity where many hosts are connected to the network.
To address more efficient traffic distribution between network links (forming a LAG group), a hashing algorithm extension takes into account L4 information (that is, src/dst L4-protocol port).
The hashing index can be calculated according to the following algorithm:
This algorithm will be used in all cases where IP information in per-packet hashing is included (refer to “LAG and ECMP Hashing” in the 7450 ESS, 7750 SR, 7950 XRS, and VSR Interface Configuration Guide). However, the Layer 4 information (TCP/UDP ports) will not be used for fragmented packets.
no l4-load-balancing
This command configures system-wide LSR load balancing. Hashing can be enabled on the label stack and/or IP header at an LSR for spraying labeled IP packets over multiple equal cost paths and/or over multiple links of a LAG group.
The LSR hash routine operates on the label stack and the IP header if a packet is IPv4. An LSR will consider a packet to be IPv4 if the first nibble following the bottom of the label stack is 4. The hash on label and IPv4 and IPv6 headers can be enabled or disabled at the system level or incoming network IP interface level.
no lsr-load-balancing
This command enables enhanced egress multicast load balancing behavior for Layer 3 multicast. When enabled, the router will spray the multicast traffic using as hash inputs from the packet based on lsr-load-balancing, l4-load-balancing and system-ip-load-balancing configurations. That is, an ingress LER or IP PE will spray traffic based on the IP hash criteria: SA/DA + optional Layer 4 port + optional system IP egress LER or LSR - will spray traffic based on label or IP hash criteria outlined above or both based on configuration of lsr-load-balancing, l4-load-balancing, and system-ip-load-balancing.
The no form of the command preserves the default behavior for per flow hashing of multicast traffic.
no mc-enh-load-balancing
This command enables enhanced VLL LAG service ID hashing. This command improves the LAG spraying of VLL service packets and is applied only when both ECMP and LAG hashing are performed by the same router. By default, the ECMP interface and LAG link for all packets on the VLL service are selected based on a direct modulo operation of the service ID. This command enhances distribution and hashes the service ID prior to the LAG link modulo operation when an ECMP link modulo operation is performed.
The no form of the command preserves the default behavior of VLL LAG service ID hashing.
no service-id-lag-hashing
This command enables the use of the system IP address in the ECMP hash algorithm to add a per system variable. This can help guard against cases where multiple routers, in series, will end up hashing traffic to the same ECMP/LAG path.
This command is set at a system wide basis, however if certain IOMs do not support the new load-balancing algorithm, they will continue to use the default algorithm. By default, the IPv4 system IP address is used in the hash algorithm. When no IPv4 system IP address is configured, the IPv6 system IP address, when configured, is used in the hash algorithm.
The no form of the command resets the system wide algorithm to default.
no system-ip-load-balancing
This command creates a text string that identifies the system location for the device.
Only one location can be configured. If multiple locations are configured, the last one entered overwrites the previous entry.
The no form of the command reverts to the default value.
This command creates a system name string for the device.
For example, system-name parameter ALA-1 for the name command configures the device name as ALA-1.
Only one system name can be configured. If multiple system names are configured, the last one encountered overwrites the previous entry.
The no form of the command reverts to the default value.
no name
This command specifies the location and name of the CLI script file executed following a redundancy switchover from the previously active CPM card. A switchover can happen because of a fatal failure or by manual action.
The CLI script file can contain commands for environment settings, debug (excluding mirroring settings), and other commands not maintained by the configuration redundancy.
The following commands are not supported in the switchover-exec file: clear, configure, candidate, oam, tools, oam, ping, traceroute, mstat, mtrace and mrinfo.
When the file-url parameter is not specified, no CLI script file is executed.
no switch-over-exec
local-url | remote-url | |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id |
directory length 99 chars max each | |
remote-url | [{ftp:// | tftp://}login:pswd@remote-locn/][file-path] |
243 chars max | |
directory length 99 chars max each | |
remote-locn | [hostname | ipv4-address | ipv6-address] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0 to FFFF]H | |
d - [0 to 255]D | |
interface - 32 chars max, for link local addresses | |
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
This parameter creates or edits the context to configure intra-node port connections.
disabled
This command is used for satellites. It identifies to the SR OS that there is an internal connection between two ports.
Permitted pairings of the two ports are:
First port | Second port |
Router port | Satellite uplink port |
Satellite uplink port | Router port |
For satellites, this command configures the binding between a host port ID and the satellite uplink from the satellite chassis. The port topology can be configured with the host connected to a satellite uplink or the satellite uplink port connected to the specified host port. Both configurations are supported, as shown in the following examples:
The no form of the command removes the internal connection.
no port port-id
port-id | (Router port) | ||
slot/mda/port | |||
slot | The slot number of the card in the chassis. The maximum slot number is platform dependent. Refer to the Install Guides for more information. | ||
mda | [1 to 2] | ||
port | [1 to 160] (depending on the MDA type) | ||
(Ethernet satellite uplink port) | |||
esat-id/slot/uport | |||
esat | keyword | ||
id | [1 to 20] | ||
slot | [1] | ||
u | keyword for up-link port | ||
port | [1 to 4] |
This command configures information about the type of power supply used for each power feed connection on the router chassis. The information is used to populate queries made using the show>chassis detail and show>chassis power-supply commands.
This command enables the satellite configuration context. Within the satellite context, the administrator can specify the configuration details for a satellite chassis that is hosted by the associated local system.
This command enables the specified Ethernet satellite configuration context.
The no form of the command deletes the specified Ethernet satellite.
This command enables specific satellite functionality that may have specific satellite requirements, such as software version.
The no form of this command disables the specific satellite functionality.
This command creates a local-forward instance.
A local-forward instance creates a traffic bypass within the Ethernet satellite, which allows traffic to be forwarded between satellite client ports.
The no form of this command deletes the specified local-forward instance.
This command configures a satellite access point in the local-forward instance.The no form of this command removes the satellite access point from the local-forward instance.
esat | keyword |
id | 1 to 20 |
lag | keyword |
id | 1 to 800 |
This command creates a new port template context to define the port usage for a specific satellite type. A port template is specific to the specified satellite type. Port templates must be configured separately using different template names for each different satellite chassis type.
The no form of this command deletes the specified port template.
This command specifies the satellite port to be reconfigured.
The no form of this command deletes the specified port configuration.
This command configures the role that the associated port is to take on.
This command configures the uplink association to be used for the associated satellite port.
This command enters the specified TDM satellite configuration context.
The no form of the command deletes the specified TDM satellite.
This command defines a description string for the associated satellite.
The no form of the command deletes the associated description string.
no description
This command configures the MAC address for the associated satellite chassis. This MAC address is used to validate the identity of an satellite that attempts to associate with the local host.
The no form of the command deletes the MAC address for the associated satellite.
This command configures the mapping between a satellite client port and its associated uplink. This command allows both a primary and an optional secondary uplink to be configured.
If a secondary uplink is configured, it is used to forward traffic if the primary uplink is down for any reason.
Before an uplink can be used as either a primary or secondary uplink, it must be configured using the port-topology configuration command.
To return the uplink association to its default the port-map client-port-id system-default command should be used.
This command enables the ethernet satellite IEEE1588 transparent clock function. This provides increased accuracy on the PTP event messages transiting the satellite. When a IEEE1588 event message transits the ethernet satellite, the correction field of the message is updated with the residence time of that message. This is used in PTP time calculations. The ethernet satellite shall perform the transparent clock function on PTP messages with Ethernet and UDP/IP encapsulation. All ports of the satellite are enabled for this capability with the one setting. This feature must be enabled to allow the assignment of one of the satellite’s client ports as a PTP port under config>system>ptp>port. Only PTP using Ethernet encapsulation is supported from the host.
To enable this command, the satellite must have first been configured to support the feature using the config>system>satellite>eth-sat>feature transparent-clock-eth and must have been enabled for synchronous ethernet with config>system>satellite>eth-sat>sync-e.
All host ports connecting to this satellite must support 1588 port-based timestamping.
The no version of this command disables the specific satellite functionality.
no ptp-tc
This command configures the type of satellite variant for the associated satellite chassis.
The no form of the command deletes the sat-type configuration.
no sat-type
This command disables the associated satellite.
If the associated satellite is active, the satellite will not be reset but all satellite client ports will be shut down.
If the satellite is not active but attempts to associate with the host, the satellite chassis will be brought up according to the satellite configuration but all client ports will be shut down.
The no form of this command removes the shutdown state and all client ports on active satellites will be brought back up.
shutdown
This command binds the specified software repository to the associated satellite. The software repository is used to locate and serve the correct software image to the satellite at boot time.
The configured software repository is only used when the satellite boots. Changing the software repository for an active satellite does not have an effect until the next time a satellite boots.
A satellite cannot be booted if there is no software repository defined for it.
The no form of the command removes the software repository.
no software-repository
This command enables the Ethernet satellite for synchronous Ethernet operation so that the transmit timing of the satellite access ports use the frequency of the host router’s central clock.
To enable this functionality, both host ports on the router that connect to the U1 and U2 ports of the satellite must be synchronous Ethernet-capable ports.
When the Ethernet satellite is configured for synchronous Ethernet, ESMC frames are enabled on the host ports. The SSM code-type used between the host and the satellite should be manually configured on the host ports to match the code-type desired on the satellite client ports. The code-type setting on the host ports does not restrict the code-type used on the satellite client ports, as those may be configured on an individual port basis.
This command creates or deletes an instance of a software repository. The instance is identified by a repository name.
A software repository is used to obtain files to upgrade software on certain subsystems of the router (for example, Ethernet satellites).
Up to three locations can be specified within a software repository for the router to access files in the repository. The router will first attempt to access the file at the primary location. If the primary location is not configured or the files are not found at the primary location, then the router will attempt to access the files at the secondary location. If the secondary location is not configured or the files are not found at the secondary location, then the router will attempt to access the files at the tertiary location. If the tertiary location is not configured or the files are not found at the tertiary location, then the software repository access will fail.
The no form of the command removes the software repository.
This command defines a description string for the software repository.
The no form of the command deletes the associated description string.
no description
This command configures the primary location for the files in the software repository. See the software-repository command description for more information.
The no form of the command removes the primary location.
file url | local-url | remote-url | |
local-url | [cflash-id/][file-path] | 200 chars maximum, including cflash-id directory length 99 characters maximum each |
remote-url | [{ftp://} login:pswd@remote-locn/][file-path] 243 characters maximum directory length 99 characters maximum each | |
remote-locn | [hostname | ipv4-address | [ipv6- address]] | |
ipv4-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x[-interface] | |
x:x:x:x:x:x:d.d.d.d[-interface] | ||
x - [0 to FFFF]H | ||
d - [0 to 255]D | ||
interface - 32 characters max, for link local addresses | ||
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
This command configures the secondary location for the files in the software repository. See the software-repository command description for more information.
The no form of the command removes the secondary location.
file url | local-url | remote-url | |
local-url | [cflash-id/][file-path] | 200 chars maximum, including cflash-id directory length 99 characters maximum each |
remote-url | [{ftp://} login:pswd@remote-locn/][file-path] 243 characters maximum directory length 99 characters maximum each | |
remote-locn | [hostname | ipv4-address | [ipv6- address]] | |
ipv4-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x[-interface] | |
x:x:x:x:x:x:d.d.d.d[-interface] | ||
x - [0 to FFFF]H | ||
d - [0 to 255]D | ||
interface - 32 characters max, for link local addresses | ||
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
This command configures the tertiary location for the files in the software repository. See the software-repository command description for more information.
The no form of the command removes the tertiary location.
file url | local-url | remote-url | |
local-url | [cflash-id/][file-path] | 200 chars maximum, including cflash-id directory length 99 characters maximum each |
remote-url | [{ftp://} login:pswd@remote-locn/][file-path] 243 characters maximum directory length 99 characters maximum each | |
remote-locn | [hostname | ipv4-address | [ipv6- address]] | |
ipv4-address | a.b.c.d | |
ipv6-address | x:x:x:x:x:x:x:x[-interface] | |
x:x:x:x:x:x:d.d.d.d[-interface] | ||
x - [0 to FFFF]H | ||
d - [0 to 255]D | ||
interface - 32 characters max, for link local addresses | ||
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
This command allows the user to enable a supply of +24V output power on the +24VDC pin of the Alarm Interface Port of the CPM. When enabled, the power supplied through the +24VDC output pin can be used as a source voltage for the alarm contact input pins. The +24VDC output can be used to supply power for monitoring external sensor devices such as cabinet door sensors instead of using an external power source. If users want to use a separate external power source, they should disable the supply of power to the +24VDC output pin by using this CLI command.
alarm-contact-in-power off
This command provides the context to configure one of four available alarm contact input pins.
This command allows the user to configure a text message for use along with SNMP trap and log event messages that are sent when the system clears an alarm. The system generates the default message "Alarm Input Cleared" if no message is configured. The clear-alarm-msg string is included in the log event when the pin changes to the normal state.
This command describes an alarm contact input pin. The description provides an indication of the usage or attribute of the pin. It is stored in the CLI configuration file and helps the user in identifying the purpose of the pin. The description is included in the log event when the pin changes state (the string “Pin x” is used in the log events if no description is configured).
This command configures the normal state to be associated with the alarm contact input. When the system detects a transition from the normal state, an alarm is generated. The alarm is cleared when the system detects a transition back to the normal state.
Configure the normal state as closed if an external power source is used to power the inputs.
normal-state open
This command stops tracking the state changes associated with the alarm contact input. The system does not generate or clear the alarms for the alarm contact input, but if an alarm is generated, the system clears the alarm when the shutdown command is executed. The no form of the command starts tracking the state changes associated with the alarm contact input.
shutdown
This command allows the user to configure a text message for use along with SNMP trap and log event messages that are sent when the system generates an alarm. The system generates the default message "Alarm Input Triggered" if no message is configured. The trigger-alarm-msg string is included in the log event when the pin changes from the normal state.
This command enables the context to configure monitoring thresholds.
This command enables capacity monitoring of the compact flash specified in this command. The severity level is alarm. Both a rising and falling threshold can be specified.
The no form of this command removes the configured compact flash threshold alarm.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal to the falling-threshold value.
The threshold value represents units of 512 bytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold value.
The threshold value represents units of 512 bytes.
If the first sample is greater than or equal to the rising threshold value and startup-alarm is equal to rising or either, a single rising threshold crossing event is generated.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
This command enables capacity monitoring of the compact flash specified in this command. The usage is monitored as a percentage of the capacity of the compact flash. The severity level is alarm. Both a rising and falling threshold can be specified.
The no form of this command removes the configured compact flash threshold alarm.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal to the falling-threshold value.
The threshold value is the percentage of used space versus capacity for the specified compact flash.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold value.
The threshold value is the percentage of used space versus capacity for the specified compact flash.
If the first sample is greater than or equal to the rising threshold value and startup-alarm is equal to rising or either, a single rising threshold crossing event is generated.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
This command enables capacity monitoring of the compact flash specified in this command.
The severity level is warning. Both a rising and falling threshold can be specified. The no form of this command removes the configured compact flash threshold warning.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal to the falling-threshold value.
The threshold value represents units of 512 bytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold value.
The threshold value represents units of 512 bytes.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
This command enables capacity monitoring of the compact flash specified in this command. The usage is monitored as a percentage of the capacity of the compact flash.
The severity level is warning. Both a rising and falling threshold can be specified. The no form of this command removes the configured compact flash threshold warning.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal to the falling-threshold value.
The threshold value is the percentage of used space versus capacity for the specified compact flash.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold value.
The threshold value is the percentage of used space versus capacity for the specified compact flash.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
This command configures memory use, in kilobytes, alarm thresholds.
The no form of the command removes the parameters from the configuration.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
The threshold value represents units of kilobytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
The threshold value represents units of kilobytes.
This command configures memory usage, in kilobytes, for warning thresholds
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
The threshold value represents units of kilobytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
The threshold value represents units of kilobytes.
The memory thresholds are based on monitoring the TIMETRA-SYSTEM-MIB sgiMemoryUsed object. This object contains the amount of memory currently used by the system. The severity level is Alarm. The absolute sample type method is used.
The no form of this command removes the configured memory threshold warning.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
The threshold value represents units of bytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
The threshold value represents units of bytes.
The threshold value represents units of bytes.
The memory thresholds are based on monitoring MemoryUsed object. This object contains the amount of memory currently used by the system. The severity level is Alarm.
The absolute sample type method is used.
The no form of this command removes the configured compact flash threshold warning.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
The threshold value represents units of bytes.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
The threshold value represents units of bytes.
This command creates the context to configure generic RMON alarms and events.
Generic RMON alarms can be created on any SNMP object-ID that is valid for RMON monitoring (for example, an integer-based datatype).
The configuration of an event controls the generation and notification of threshold crossing events configured with the alarm command.
The alarm command configures an entry in the RMON-MIB alarmTable. The alarm command controls the monitoring and triggering of threshold crossing events. In order for notification or logging of a threshold crossing event to occur there must be at least one associated rmon>event configured.
The agent periodically takes statistical sample values from the MIB variable specified for monitoring and compares them to thresholds that have been configured with the alarm command. The alarm command configures the MIB variable to be monitored, the polling period (interval), sampling type (absolute or delta value), and rising and falling threshold parameters. If a sample has crossed a threshold value, the associated event is generated.
Use the no form of this command to remove an rmon-alarm-id from the configuration.
The oid-string has a maximum length of 255 characters
If the first sample is greater than or equal to the rising threshold value and startup-alarm is equal to rising or either, then a single rising threshold crossing event is generated.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
If there is no corresponding event configured for the specified rmon-event-id, then no association exists and no action is taken.
If the rising-event rmon-event-id has a value of zero (0), no associated event exists.
If a rising-event rmon-event-id is configured, the CLI requires a rising-threshold to also be configured.
After a rising threshold crossing event is generated, another such event will not be generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold value.
If a falling-event is configured, the CLI requires a falling-threshold to also be configured.
After a falling threshold crossing event is generated, another such event will not be generated until the sampled value rises above this threshold and reaches greater than or equal the rising-threshold value.
The event command configures an entry in the RMON-MIB event table. The event command controls the generation and notification of threshold crossing events configured with the alarm command. When a threshold crossing event is triggered, the rmon>event configuration optionally specifies if an entry in the RMON-MIB log table should be created to record the occurrence of the event. It may also specify that an SNMP notification (trap) should be generated for the event. The RMON-MIB defines two notifications for threshold crossing events: Rising Alarm and Falling Alarm.
Creating an event entry in the RMON-MIB log table does not create a corresponding entry in the TiMOS event logs. However, when the event-type is set to trap, the generation of a Rising Alarm or Falling Alarm notification creates an entry in the TiMOS event logs and that is distributed to whatever TiMOS log destinations are configured: CONSOLE, session, memory, file, syslog, or SNMP trap destination.
The TiMOS logger message includes a rising or falling threshold crossing event indicator, the sample type (absolute or delta), the sampled value, the threshold value, the RMON-alarm-id, the associated RMON-event-id and the sampled SNMP object identifier.
Use the no form of this command to remove an rmon-event-id from the configuration.
This command enables the context for configuring Bluetooth console attributes.
When the power is enabled, this timer controls the amount of time the Bluetooth device will advertise that is ready to pair. If an external device does not complete the pairing within this time, then the pairing must be re-initiated.
The no form of this command disables the timeout.
advertising-timeout 30
This command is used to add and remove devices from the Bluetooth whitelist or to enter the context to configure the MAC. The router only accepts pairing requests with devices that are in the whitelist. The devices are identified through their IEEE 802 MAC addresses. There can be up to six devices defined in the whitelist.
The create keyword must be used to add a new device.
The no form of this command removes the indicated device from the whitelist.
This command creates a text description for a configuration context to help identify the content in the configuration file.
The no form of this command removes any description string from the context.
no description
This command enters the context to define Bluetooth parameters for the specific CPM slot.
This command defines an identifier string to be used to advertise the Bluetooth module during pairing operations.
If there is no identifier specified by the user, the default is derived from the platform type, the CPM slot, and the serial number of the chassis.
For example, a device with a platform field of 7750, SR-12 chassis, and a CPM serial number of NS23456 would have a Bluetooth identifier of "7750-SR-12-CPM-A-NS23456." for the CPM in slot A.
The no form of the command resets the identifier back to the default.
This command is used to allow or block the function of the pairing button. This can be used to block the accidental triggering of a pairing operation while there is already a paired device.
The actual behavior of the Bluetooth pairing is dependent on both this command and the power command.
If normal operation is to use the pairing button on the router and on the external device to initiate the Bluetooth connection, then set:
config>system>bluetooth>power enabled-manual
config>system>bluetooth>pairing-button enable
If normal operation is to only require the pairing to be initiated by the external device, then set:
config>system>bluetooth>power enabled-automatic
config>system>bluetooth>pairing-button disable
If normal operation is to not allow the local operator to connect without permission from the central management location, then set:
config>system>bluetooth>power enabled-manual
config>system>bluetooth>pairing-button disable
Then when a connection is desired, the central management station must change the configuration to one of the two options shown above for the time the local operator is connecting. The central management station can change the setting back to block local access after the operations is complete.
pairing-button disable
This command is used to define the Bluetooth pass key that is used during paring. This passkey must match in both devices attempting the pairing operation.
passkey 123456
This command sets the operating mode of the Bluetooth module. This can be powered off or powered on but requires the pairing button to initiate the pairing operation, or powered on and continuously pairing.
The pairing-button setting also impacts how pairing operations work.
power off
This command sets the desired capability for the associated slot and card. The capability is used along with mixed-mode to enable additional features on certain cards and slots.
By default, the capability will be set to that of the base chassis type. To set this to a non-default value, the mixed-mode command must be enabled at the system level.
Changing the capability of a slot or card will result in the associated slot being reset. The card-type must first be configured before the capability command can be issued.
capability ess (on a 7450 ESS chassis)
This command enables chassis support for features with a mixture of IOMs and IMMs.
The no form of the command disables mixed mode support.
no mixed-mode
This command enables the context to configure persistence parameters on the system.
The persistence feature enables state on information learned through DHCP snooping across reboots to be retained. This information includes data such as the IP address and MAC binding information, lease-length information, and ingress sap information (required for VPLS snooping to identify the ingress interface).
If persistence is enabled when there are no DHCP relay or snooping commands enabled, it will simply create an empty file.
persistence
This command configures ANCP persistence parameters.
This command configures application assurance persistence parameters.
This command configures DHCP server persistence parameters.
This command configures NAT port forwarding persistence parameters.
This command enables the CLI context to configure persistence options parameters.
This command configures Dynamic Data Persistence (DDP) compact flash access optimization for DHCP leases.
The DHCP lease-time threshold controls the eligibility of a DHCP lease for persistency updates when no data other than the lease expiry time is to be updated. When the offered lease time of the DHCP lease is less than the configured threshold, the lease is flagged to skip persistency updates and will be installed with its full lease time upon a persistency recovery after a reboot.
The dhcp-leasetime-threshold command controls persistency updates for DHCPv4 and DHCPv6 leases for a DHCP relay or proxy and DHCPv4 leases for DHCP snooping (enabled with subscriber-mgmt) and a DHCP server (enabled with dhcp-server).
The no form of the command disables the DHCP lease time threshold.
no dhcp-leasetime-threshold
This command configures Python policy cache persistency parameters.
This command configures subscriber management persistence parameters.
This command instructs the system where to write the persistency files for the corresponding application. Each application creates two files on the flash card, one with suffix .i<version>, referencing an index file, and the other with suffix .0<version>, where <version> is a 2-digit number reflecting the file version. These versions are not related to the SROS release running on the node. The <version> can remain the same over two major releases, for example, when no format change is made to the persistency file. On boot, the system scans the file systems looking for the corresponding persistency files, and the load begins.
For example, in the subscriber management context, the location specifies the flash device on a CPM card where the data for handling subscriber management persistency is stored.
The no form of this command returns the system to the default. If there is a change in file location while persistence is running, a new file will be written on the new flash, and then the old file will be removed.
no location
This command enables the context to configure parameters for IEEE 1588-2008, Precision Time Protocol.
This command is only available on the control assemblies that support 1588.
This command configures the announceReceiptTimeout value for all peer associations. This defines the number of Announce message intervals that must expire with no received Announce messages before declaring an ANNOUNCE_RECIPT_TIMEOUT event.
The announce-rx-timeout cannot be changed unless PTP is shut down.
anno-rx-timeout 3
This command configures the type of clock. The clock-type can only be changed when PTP is shutdown.
The clock-type cannot be changed to ordinary master if the PTP reference is no shutdown. In addition, the clock-type cannot be changed to ordinary master if there are peers configured. The clock-type is restricted based on the profile. See the profile command description for the details of the restrictions.
clock-type ordinary slave
This command configures the PTP domain.
The no form of the command reverts to the default configuration. The default value is dependent upon the configured profile, as detailed below.
Note some profiles may require a domain number in a restricted range. It is up to the operator to ensure the value aligns with what is expected within the profile.
Domain cannot be changed unless PTP is shutdown. If the PTP profile is changed, the domain is changed to the default domain for the new PTP profile.
domain 0 — profile ieee1588-2008
domain 4 — profile g8265dot1-2010
domain 24 — profile g8275dot1-2014
This command configures the local priority used to choose between PTP masters in the best master clock algorithm (BMCA). This setting is relevant when the profile is set to either g8265dot1-2010 or g8275dot1-2014. The parameter is ignored when any other profile is selected.
The value 1 is the highest priority and 255 is the lowest priority. The priority of a peer cannot be configured if the PTP profile is ieee1588-2008.
For g8265dot1-2010, this parameter configures the priority used to choose between master clocks with the same quality (refer to G.8265.1 for more details).
For g8275dot1-2014, this parameter sets the value of the localPriority associated with the Announce messages received from the external clocks (ptp>peer or ptp>port), or the local clock (PTP). Refer to G.8275.1 for detailed information.
local-priority 128
This command configures the announce message interval used for both unicast and multicast messages.
For unicast messages, it defines the announce message interval that is requested during unicast negotiation to any peer. This controls the announce message rate sent from remote peers to the local node. It does not affect the announce message rate that may be sent from the local node to remote peers. Remote peers may request an announce message rate anywhere within the acceptable grant range.
For multicast messages, used on PTP Ethernet ports, this configures the message interval used for Announce messages transmitted by the local node.
This value also defines the interval between executions of the BMCA within the node.
The announce-interval cannot be changed unless the PTP is shut down.
Note: In order to minimize BMCA driven reconfigurations, the IEEE recommends that the announce-interval should be consistent across the entire 1588 network. |
log-anno-interval 1 (1 packet every 2 seconds) for ieee1588-2008
log-anno-interval 1 (1 packet every 2 seconds) for g8265dot1-2010
log-anno-interval -3 (8 packets per second) for g8275dot1-2014
This command configures the codeset to be used for the encoding of QL values into PTP clockClass values when the profile is configured for G.8265.1. The codeset is defined in Table 1/G.8265.1. This setting only applies to the range of values observed in the clockClass values transmitted out of the node in Announce messages. The router will support the reception of any valid value in Table 1/G.8265.1
network-type sdh
This command configures a remote PTP peer. It provides the context to configure parameters for the remote PTP peer.
Up to 20 remote PTP peers may be configured.
The no form of the command deletes the specified peer.
If the clock-type is ordinary slave or boundary, and PTP is no shutdown, the last peer cannot be deleted. This prevents the user from having PTP enabled without any peer configured and enabled.
Peers are created within the routing instance associated with the context of this command. All configured PTP peers must use the same routing instance.
This command configures the message interval used for unicast event messages. It defines the message interval for both Sync and Delay_Resp messages that are requested during unicast negotiation to the specific peer. This controls the Sync and Delay_Resp message rate sent from remote peers to the local node. It does not affect the Sync or Delay_Resp packet rate that may be sent from the local node to remote peers. Remote peers may request a Sync or Delay_Resp packet rate anywhere within the acceptable grant range.
The log-sync-interval cannot be changed unless the peer is shutdown.
log-sync-interval -6 (64 packets per second) for 1588-2008
log-sync-interval -6 (64 packets per second) for g8265dot1-2010
log-sync-interval -4 (16 packets per second) for g8275dot1-2014
This command disables or enables a specific PTP peer. Shutting down a peer sends cancel unicast negotiation messages on any established unicast sessions. When shutdown, all received packets from the peer are ignored.
If the clock-type is ordinary slave or boundary, and PTP is no shutdown, the last enabled peer cannot be shutdown. This prevents the user from having PTP enabled without any peer configured & enabled
no shutdown
This command specifies an upper limit to the number of discovered peers permitted within the routing instance. This can be used to ensure that a routing instance does not consume all the possible discovered peers and blocking discovered peers in other routing instances.
If it is desired to reserve a fixed number of discovered peers per router instance, then all router instances supporting PTP should have values specified with this command and the sum of all the peer-limit values must not exceed the maximum number of discovered peers supported by the system.
If the user attempts to specify a peer-limit, and there are already more discovered peers in the routing instance than the new limit being specified, the configuration will not be accepted.
no peer-limit
This command configures PTP over Ethernet on the physical port. The PTP process shall transmit and receive PTP messages through the port using Ethernet encapsulation (as opposed to UDP/IPv4 encapsulation).
The frames are transmitted with no VLAN tags even if the port is configured for dot1q or qinq modes for encap-type. In addition, the received frames from the external PTP clock must also be untagged.
There are two reserved multicast addresses allocated for PTP messages (see Annex F IEEE Std 1588™-2008). Either address can be configured for the PTP messages sent through this port.
A PTP port may not be created if the PTP profile is set g8265dot1-2010.
If the port specified in the port-id supports 1588 port based timestamping, then a side effect of enabling PTP over Ethernet on the port shall be the enabling of Synchronous Ethernet on that port.
De-provisioning of the card or MDA containing the specified port is not permitted while the port is configured within PTP.
Changing the encapsulation or the port type of the Ethernet port is not permitted when PTP Ethernet Multicast operation is configured on the port.
To allocate an ethernet satellite client port as a PTP port, the ethernet satellite must first be enabled for the transparent clock function. For more information, see the ptp-tc command.
This command allows for the specification of the mac-address to be used for the destination MAC address of the transmitted ptp messages.
IEEE Std 1588-2008 Annex F defines two reserved addresses for 1588 messages. These are:
Both addresses are supported for reception independent of the address configured by this command.
The no form of this command sets the address to the default address.
address 01-1B-19-00-00-00
This command configures the minimum interval used for multicast Delay_Req messages. This parameter is applied on a per port basis. For ports in a slave state, it shall be the interval used, unless the parent port indicates a longer interval. For a port in master state, it shall be the interval advertised to external slave ports as the minimum acceptable interval for Delay_Req messages from those slave ports.
It is a requirement of the 1588 standard that a port in Slave state shall check the logMessageInterval field of received multicast Delay_Resp messages. If the value of the logMessageInterval field of those messages is greater than the value programmed locally for the generation of Delay_Req messages, then the Slave must change to use the greater value (i.e. longer interval) for the generation of Delay_Req messages. This requirement is supported in the router.
The parameter is only applicable to ports and not to peers.
log-delay-interval -6 for ieee1588-2008
log-delay-interval -6 for g8265dot1-2010
log-delay-interval -4 for g8275dot1-2014
This command configures the message interval used for transmission of multicast Sync messages.
For multicast messages used on PTP Ethernet ports, this configures the message interval used for Sync messages transmitted by the local node when the port is in Master state.
log-sync-interval -6 (64 packets per second) for ieee1588-2008 or
log-sync-interval -6 (64 packets per second) for g8265dot1-2010 or
log-sync-interval -4 (16 packets per second) for g8275dot1-2014
This command is used to restrict the local port to never enter the slave state. Use the command to ensure that the 7750 SR never draws synchronization from the attached external device.
This parameter is only effective when the profile is set to g8275dot1-2014.
Note: The ITU-T G.8275.1 (07/2014) recommendation used the term 'notSlave' for this functionality; however, the IEEE has added this capability into the next edition of the 1588 standard using the term masterOnly. These are equivalent. |
master-only true
This command disables or enables a specific PTP port. When shutdown, all PTP Ethernet messages are dropped on the IOM They will not be counted in the PTP message statistics. No PTP packets are transmitted by the node toward this port.
If the clock-type is ordinary slave or boundary, and PTP is no shutdown, the last enabled port or peer cannot be shutdown. This prevents the user from having PTP enabled without any means to synchronize the local clock to a parent clock.
no shutdown
This command configures the priority1 value of the local clock. This parameter is only used when the profile is set to ieee1588-2008. This value is used by the Best Master Clock Algorithm to determine which clock should provide timing for the network.
This value is used for the value to advertise in the Announce messages and for the local clock value in data set comparisons.
The no form of the command reverts to the default configuration.
priority1 128
This command configures the priority2 value of the local clock. This parameter is only used when the profile is set to ieee1588-2008 or g8275dot1-2014. The parameter is ignored when any other profile is selected.
This value is used by the Best Master Clock algorithm to determine which clock should provide timing for the network.
Note: This value is used for the value to advertise in the Announce messages and for local clock value in data set comparisons. |
The no form of the command reverts to the default configuration.
priority2 128
This command configures the profile to be used for the internal PTP clock. It defines the Best Master Clock Algorithm (BMCA) behavior.
The profile cannot be changed unless PTP is shutdown.
When you change the profile, the domain changes to the default value for the new profile. The clock-type is restricted based on the profile. If the profile is ieee1588-2008, then the clock-type is not restricted. If the profile is g8265dot1-2010, then the clock type may only be ordinary slave or ordinary master; boundary clock is not allowed. If the profile is g8275dot1-2014, then the clock-type may only be boundary clock or ordinary slave; ordinary master is not allowed.
When you change the profile, if any of the command parameters are set to default for the original profile, then the parameter will be changed to the default for the new profile. This applies to the following:
If the parameter is set to a value other than the default for the original profile, then its value will remain unchanged
profile g8265dot1-2010
This command disables or enables the PTP protocol. If PTP is disabled, the router will not transmit any PTP packets, and will ignore all received PTP packets. If the user attempts execute a no shutdown command on hardware that does not support PTP, an alarm will be raised to indicate limited capabilities.
When PTP is shutdown, the PTP slave port is not operational. It shall not be considered as a source for system timing.
On assemblies supporting a 1 PPS output interface, this command controls the presentation of a signal on that interface. When PTP is enabled, the 1 PPS port is enabled, and it generates a pulse whose rising edge represented the second rollover of the internal PTP time scale (that is, whenever the fractional second of the time is exactly zero). When PTP is disabled, no signal is presented on the 1 PPS interface.
shutdown
This command sets the local system time.
The time entered should be accurate for the time zone configured for the system. The system will convert the local time to UTC before saving to the system clock which is always set to UTC. This command does not take into account any daylight saving offset if defined.
If SNTP or NTP is enabled (no shutdown) then this command cannot be used.
This command enables the context to configure the system time zone and time synchronization parameters.
This command enables the context to configure Network Time Protocol (NTP) and its operation. This protocol defines a method to accurately distribute and maintain time for network elements. Furthermore this capability allows for the synchronization of clocks between the various network elements. Use the no form of the command to stop the execution of NTP and remove its configuration.
ntp
This command sets the preference to use local or UTC time in the system. This preference is applied to objects such as log file names, created and completed times reported in log files, and rollback times displayed in show routines.
Note: The format used for the date-time strings may change when the prefer-local-time option is enabled. For example, when enabled, all date-time strings include a suffix of three to five characters that indicates the timezone used for the presentation. This suffix may not be present if the option in not enabled. |
Note: The time format for timestamps on log events is controlled on a per-log basis using the config>log>log-id>time-format {utc | local} CLI command and not via prefer-local-time. Also an operator may force the timezone used for show outputs during a CLI session using an environment variable in the environment>time-display {utc | local} command. |
The no form of this command indicates preference for UTC time.
no prefer-local-time
This command provides the option to skip the rejection of NTP PDUs that do not match the authentication key-id, type or key requirements. The default behavior when authentication is configured is to reject all NTP protocol PDUs that have a mismatch in either the authentication key-id, type or key.
When authentication-check is enabled, NTP PDUs are authenticated on receipt. However, mismatches cause a counter to be increased, one counter for type and one for key-id, one for type, value mismatches. These counters are visible in a show command.
The no form of this command allows authentication mismatches to be accepted; the counters however are maintained.
authentication-check
This command sets the authentication key-id, type and key used to authenticate NTP PDUs sent to or received by other network elements participating in the NTP protocol. For authentication to work, the authentication key-id, type and key value must match.
The no form of the command removes the authentication key.
Entering the authentication-key command with a key-id value that matches an existing configuration key will result in overriding the existing entry.
Recipients of the NTP packets must have the same authentication key-id, type, and key value in order to use the data transmitted by this node. This is an optional parameter.
The key can be any combination of ASCII characters up to 32 characters for message-digest (md5) or 8 characters for des (length limits are unencrypted lengths). If spaces are used in the string, enclose the entire string in quotation marks (“.”).
This is a required parameter; either DES or message-digest must be configured.
This command configures the node to transmit NTP packets on a given interface. Broadcast and multicast messages can easily be spoofed, thus, authentication is strongly recommended.
The no form of this command removes the address from the configuration.
When configuring NTP, the node can be configured to receive broadcast packets on a specified subnet. This command configures a specific interface to listen for broadcast NTP messages. The interface may exist within a VPRN service.
Broadcast and multicast messages can easily be spoofed, so authentication is strongly recommended. If broadcast is not configured, then any received NTP broadcast traffic will be ignored. Use the show command to view the state of the configuration.
The no form of this command removes the interface from the configuration.
This command configures NTP the node to transmit multicast packets on the CPM/CCM MGMT port. Broadcast and multicast messages can easily be spoofed; authentication is strongly recommended.
The no form of this command removes the multicast address from the configuration.
This command configures the node to receive multicast NTP messages on the CPM MGMT port. If multicastclient is not configured, received NTP multicast traffic will be ignored. Use the show command to view the state of the configuration.
The no construct of this message removes the multicast client for the specified interface from the configuration.
This command configures the node to assume the role of an NTP server. Unless the server command is used, this node will function as an NTP client only and will not distribute the time to downstream network elements.
no ntp-server
The authentication key from the received messages will be used for the transmitted messages.
This command configures symmetric active mode for an NTP peer. It is recommended to configure authentication and to only configure known time servers as peers. Peers may exist within a VPRN service.
Note: For symmetric peering to operate correctly with a peer accessible through a VPRN, local NTP server functionality must be enabled within the VPRN using the config>service>vprn>ntp command. |
The no form of the command removes the configured peer.
Specify the key-id that identifies the configured authentication key and authentication type used by this node to transmit NTP packets to an NTP peer. If an NTP packet is received by these nodes, the authentication key-id, type, and key value must be valid, otherwise the packet will be rejected and an event or trap will be generated.
This command configures the node to operate in client mode with the NTP server specified in the address field of this command.
If the internal PTP process is to be used as a source of time for System Time and OAM time then it must be specified as a server for NTP. If PTP is specified, then the prefer parameter must also be specified. After PTP has established a UTC traceable time from an external grandmaster then it will always be the source for time into NTP, even if PTP goes into time holdover. PTP applies only to the 7450 ESS and 7750 SR.
Use of the internal PTP time source for NTP will promote the internal NTP server to stratum 1 level, which may impact the NTP network topology.
The no form of this command removes the server with the specified address from the configuration.
This command creates the context to edit the Simple Network Time Protocol (SNTP).
SNTP can be configured in either broadcast or unicast client mode. SNTP is a compact, client-only version of the NTP. SNTP can only receive the time from SNTP/NTP servers. It cannot be used to provide time services to other systems.
The system clock is automatically adjusted at system initialization time or when the protocol first starts up.
When the time differential between the SNTP/NTP server and the system is more than 2.5 seconds, the time on the system is gradually adjusted.
SNTP is created in an administratively enabled state (no shutdown).
The no form of the command removes the SNTP instance and configuration. SNTP does not need to be administratively disabled when removing the SNTP instance and configuration.
sntp
This command enables listening to SNTP/NTP broadcast messages on interfaces with broadcast client enabled at global device level.
SNTP must be shutdown prior to changing either to or from broadcast mode.
The no form of the command disables broadcast client mode.
no broadcast-client
This command creates an SNTP server for unicast client mode.
This command configures the start and end dates and offset for summer time or daylight savings time to override system defaults or for user defined time zones.
When configured, the time is adjusted by adding the configured offset when summer time starts and subtracting the configured offset when summer time ends.
If the time zone configured is listed in the Time Zones section, then the starting and ending parameters and offset do not need to be configured with this command unless it is necessary to override the system defaults. The command returns an error if the start and ending dates and times are not available either the Time Zones section on or entered as optional parameters in this command.
Up to five summer time zones may be configured, for example, for five successive years or for five different time zones. Configuring a sixth entry will return an error message. If no summer (daylight savings) time is supplied, it is assumed no summer time adjustment is required.
The no form of the command removes a configured summer (daylight savings) time entry.
This command configures start of summer time settings.
end first sunday january 00:00
This command specifies the number of minutes that will be added to the time when summer time takes effect. The same number of minutes will be subtracted from the time when the summer time ends.
offset 60
This command configures start of summer time settings.
start first sunday january 00:00
This command sets the time zone and/or time zone offset for the device.
The SR-series router OS supports system-defined and user-defined time zones. The system-defined time zones are listed in the Time Zones section.
For user-defined time zones, the zone and the UTC offset must be specified.
The no form of the command reverts to the default of Coordinated Universal Time (UTC). If the time zone in use was a user-defined time zone, the time zone will be deleted. If a dst-zone command has been configured that references the zone, the summer commands must be deleted before the zone can be reset to UTC.
zone UTC 00
For system-defined time zones, a different offset cannot be specified. If a new time zone is needed with a different offset, the user must create a new time zone. Note that some system-defined time zones have implicit summer time settings which causes the switchover to summer time to occur automatically; configuring the dst-zone parameter is not required.
A user-defined time zone name is case-sensitive and can be up to 5 characters in length.
This command creates the context to create scripts, script parameters and schedules which support the Service Assurance Agent (SAA) functions.
CRON features are saved to the configuration file on both primary and backup control modules. If a control module switchover occurs, CRON events are restored when the new configuration is loaded. If a control module switchover occurs during the execution of a cron script, the failover behavior will be determined by the contents of the script.
This command configures the type of schedule to run, including one-time only (oneshot), periodic or calendar-based runs. All runs are determined by month, day of month or weekday, hour, minute and interval (seconds).
The no form of the command removes the context from the configuration.
This command configures the total number of times a CRON “interval” schedule is run. For example, if the interval is set to 600 and the count is set to 4, the schedule runs 4 times at 600 second intervals.
no count
This command specifies which days of the month that the schedule will occur. Multiple days of the month can be specified. When multiple days are configured, each of them will cause the schedule to trigger. If a day-of-month is configured without configuring month, weekday, hour and minute, the event will not execute.
Using the weekday command as well as the day-of-month command will cause the script to run twice. For example, consider that today is Monday January 1. If Tuesday January 5 is configured, the script will run on Tuesday (tomorrow) as well as January 5 (Friday).
The no form of this command removes the specified day-of-month from the list.
no day-of-month
Integer values must map to a valid day for the month in question. For example, February 30 is not a valid date.
This command is used concurrently with type periodic or calendar. Using the type of periodic, end-time determines at which interval the schedule will end. Using the type of calendar, end-time determines on which date the schedule will end.
When no end-time is specified, the schedule runs forever.
no end-time
This command specifies which hour to schedule a command. Multiple hours of the day can be specified. When multiple hours are configured, each of them will cause the schedule to trigger. Day-of-month or weekday must also be specified. All days of the month or weekdays can be specified. If an hour is configured without configuring month, weekday, day-of-month, and minute, the event will not execute.
The no form of this command removes the specified hour from the configuration.
no hour
This command specifies the interval between runs of an event.
no interval
This command specifies the minute to schedule a command. Multiple minutes of the hour can be specified. When multiple minutes are configured, each of them will cause the schedule to occur. If a minute is configured, but no hour or day is configured, the event will not execute. If a minute is configured without configuring month, weekday, day-of-month, and hour, the event will not execute.
The no form of this command removes the specified minute from the configuration.
no minute
This command specifies the month when the event should be executed. Multiple months can be specified. When multiple months are configured, each of them will cause the schedule to trigger. If a month is configured without configuring weekday, day-of-month, hour and minute, the event will not execute.
The no form of this command removes the specified month from the configuration.
no month
This command is used to configure the CLI script policy.
The owner is an arbitrary name and not necessarily a user name. Commands in the scripts are not authorized against the owner. The configure system security cli-script authorization x cli-user command determines the user context against which commands in the scripts are authorized.
This command specifies how the system should interpret the commands contained within the schedule node.
type periodic
This command specifies which days of the week that the schedule will fire on. Multiple days of the week can be specified. When multiple days are configured, each of them will cause the schedule to occur. If a weekday is configured without configuring month, day-of-month, hour and minute, the event will not execute.
Using the weekday command as well as the day-of month command will cause the script to run twice. For example, consider that today is Monday January 1. If Tuesday January 5 is configured, the script will run on Tuesday (tomorrow) as well as January 5 (Friday).
The no form of this command removes the specified weekday from the configuration.
no weekday
This command enables the context to configure command script parameters.
This command is used to configure the CLI script policy.
The owner is an arbitrary name and not necessarily a user name. Commands in the scripts are not authorized against the owner. The configure system security cli-script authorization x cli-user command determines the user context against which commands in the scripts are authorized.
This command is used to configure the maximum amount of time to keep the run history status entry from a script run.
expire-time 3600
This command is used to configure the maximum amount of time that a script may run.
lifetime 3600
This command is used to configure the maximum number of script run history status entries to keep.
max-completed 1
This command is used to specify the location where the system writes the output of an event script’s execution.
The no form of the command removes the file location from the configuration. Scripts will not execute if there is no result location defined.
no results
This command is used to configure a script to be run.
The no form of the command removes the script.
no script
The owner is an arbitrary name and not necessarily a user name. Commands in the scripts are not authorized against the owner. The configure system security cli-script authorization x cli-user command determines the user context against which commands in the scripts are authorized.
This command is used to identify the location of a script to be scheduled.
The no form of the command removes the location.
no location
This command creates or edits the context to create or modify timing reference parameters.
This command is required to discard changes that have been made to the synchronous interface timing configuration during a session.
This command is required in order to enter the mode to create or edit the system synchronous interface timing configuration.
This command enables the context to configure parameters for the Building Integrated Timing Supply (BITS). The settings specified under this context apply to both the BITS input and BITS output ports and to both the bits1 and bits2 ports on the 7750 SR-c4.
The bits command subtree is only available on the 7450 ESS-7, 7450 ESS-12, 7750 SR-7, 7750 SR-12, 7750 SR-12e, 7750 SR-c4, 7950 XRS-20, 7950 XRS-40, 7950 XRS-16c, 7750 SR-a4, 7750 SR-a8, 7750 SR-1e, 7750 SR-2e, and 7750 SR-3e.
This command provides a context to enable or disable the external BITS timing reference inputs to the central clock of the router. In redundant systems with BITS ports, there are two possible BITS-in interfaces, one for each CPM or CCM. In the 7750 SR-c4 system, there are two bits ports on the CFM. The two BITS-in interfaces are configured together, but they are displayed separately in the show command.
This command configures the Building Integrated Timing Source (BITS) timing reference.
The no form of the command reverts to the default configuration.
interface-type ds1 esf
This command provides a context to configure and enable or disable the external BITS timing reference output to the central clock of the router. On redundant systems, there are two possible BITS-out interfaces, one for each CPM or CCM. On the 7750 SR-c4 system, there are two possible BITS-out interfaces on the chassis front panel. The two BITS-out interfaces are configured together, but they are displayed separately in the show command.
This command configures the line-length parameter of the BITS output, This is the distance in feet between the network element and the office clock (BITS/SSU). There are two possible BITS-out interfaces, one for each CPM. They are configured together, but they are displayed separately in the show command. This command is only applicable when the interface-type is DS1.
line-length 110
This command configures the minimum acceptable QL value that a signal must have in order to be selected for the BITSout port. This ensures that the signal has traceability to a source with at least this quality level so that attached equipment can function properly.
The no form of this command disables this check.
no ql-minimum
This command configures the minimum acceptable QL value that a signal must have in order to be considered for selection by the system timing module.
The no form of this command disables this check.
no ql-minimum
This command configures the values used to identify the source of the BITS (Building Integrated Timing Supply) output. This is either the signal recovered directly from ref1, ref2 or ptp, or it is the output of the node’s central clock. The directly recovered signal would be used when the BITS output signal is feeding into an external stand alone timing distribution device (BITS/SASE). The specific directly recovered signal used is the best of the available signals based of the QL and/or the ref-order. The central clock output would be used when no BITS/SASE device is present and the BITS output signal is used to monitor the quality of the recovered clock within the system.
source line-ref
This command configures the behavior of the BITSout port when there is no valid reference selected. When enabled with no valid reference, no signal is sent out the port. When disabled with no valid reference, an AIS signal is presented along with the QL-DNU/TL-DUS SSM code if the signal format supports SSM.
no squelch
This command configures which sa-bit to use for conveying SSM information when the interface-type is E1.
ssm-bit 8
This command saves changes made to the system synchronous interface timing configuration.
The synchronous equipment timing subsystem can lock to different timing reference inputs, those specified in the ref1, ref2, bits and ptp (ptp applies only to the 7450 ESS and 7750 SR) command configuration. This command organizes the priority order of the timing references.
If a reference source is disabled, then the clock from the next reference source as defined by ref-order is used. If all reference sources are disabled, then clocking is derived from a local oscillator.
If a sync-if-timing reference is linked to a source port that is operationally down, the port is no longer qualified as a valid reference.
For 7450 ESS and 7750 SR systems with two SF/CPM modules, the system distinguishes between the BITS inputs on the active and standby CPMs. The active CPM will use its BITS input port providing that port is qualified. If the local port is not qualified, then the active CPM will use the BITS input port from the standby CPM as the next priority reference. For example, the normal ref-order of bits ref1 ref2 will actually be bits (active CPM), followed by bits (standby CPM), followed by ref1, followed by ref2.
For 7750 SR-c4 systems, the system distinguishes between the two BITS inputs on the CFM. The CFM will use its BITS input port bits1 providing that port is qualified. If port bits1 is not qualified, then the CFM will use the BITS input port bits2 as the next priority reference. For example, the normal ref-order of bits ref1 ref2 will actually be bits1 followed by bits2, followed by ref1, followed by ref2.
For 7950 XRS systems with two SF/CPMs and two CCMs, the system distinguishes between the BITS inputs on the CCMs associated with the active and standby CPMs. The active CPM will use the BITS input port on the associated CCM, provided that the port is qualified. If the local port is not qualified, then the active CPM will use the BITS input port from the CCM associated with the standby CPM as the next priority reference. For example, the normal ref-order of bits ref1 ref2 will actually be bits (active CCM), followed by bits (standby CCM), followed by ref1, followed by ref2.
The no form of the command resets the reference order to the default values.
The bits option is not supported on the 7750 SR-c12 chassis.
bits ref1 ref2 ptp (7750 SR and 7450 ESS)
bits ref1 ref2 (7950 XRS)
This command enables the context to configure parameters for system timing via IEEE 1588-2008, Precision Time Protocol. This command only applies to the 7450 ESS-7, 7450 ESS-12, and all 7750 SRs except for the 7750 SR-1e, 7750 SR-2e, and 7750 SR-3e.
This command configures the QL value to be used for the reference for SETS input selection and BITS output. This value overrides any value received by that reference's SSM process.
no ql-override
This command configures the QL value to be used for the reference for SETS input selection and BITS output. This value overrides any value received by that reference's SSM process.
no ql-override
When enabled the selection of system timing reference and BITS output timing reference takes into account quality level. Quality level is conveyed via the SSM or forced using the ql-override command.
no ql-selection
This command enables the context to configure parameters for the first timing reference.
The restrictions on the location for the source port or source bits for ref1 and ref2 are listed in Ref1 and Ref2 Timing References.
This command configures the interface type of the BITS timing reference.
The no form of the command reverts to the default configuration
This command configures the source bits for ref1 or ref2 timing reference. There are restrictions on the source-bits location for ref1 and ref2 based on platform. Refer to the description of the ref1 command for details. This command is only applicable to the 7750 SR-c12 chassis.
This command configures the source port for timing reference ref1 or ref2. If the port is unavailable or the link is down, then the reference sources are re-evaluated according to the reference order configured in the ref-order command.
In addition to physical port on the 7750 SR, T1 or E1 channels on a channelized OC3/OC12/STM1/STM4 Circuit Emulation Service port can be specified if they are using adaptive timing.
There are restrictions on the source-port location for ref1 and ref2 based on platform. Refer to the description of the ref1 command for details.
no source-port
This command enables the context to configure parameters for the second timing reference. There are restrictions on the source-port and source-bits locations for ref2 based on the platform. The restrictions on the location for the source-port or source-bits for ref1 and ref2 are listed in Revertive, non-Revertive Timing Reference Switching Operation.
This command allows the clock to revert to a higher priority reference if the current reference goes offline or becomes unstable. When the failed reference becomes operational, it is eligible for selection. When the mode is non-revertive, a failed clock source is not selected again.
no revert
This command configures the time for the Wait to Restore timer. A previously failed input reference must be valid for the time specified before it is used for either the BITSout or the central clock input reference.
The no form of this command disables the timer.
no wait-to-restore
The context to configure administrative system commands. Only authorized users can execute the commands in the admin context.
This command enables the context to perform application-assurance operations.
This command enables the context to perform a group-specific upgrade.
This command upgrades the URL list.
This command loads a new protocol list from the isa-aa.tim file into the CPM.
This command requires an ISA-AA reboot.
This command saves existing debug configuration (configuration done under the debug branch of CLI). Debug configurations are not saved by the admin save command and not preserved across a node reboot or CPM switchover. The debug-save command makes the debug configuration available for the operator to execute after a reboot by using the exec command or after a CPM switchover by using the switchover-exec command, if desired.
Note: IPv6-address applies only to 7750 SR and 7950 XRS. |
file url | local-url | remote-url: 255 chars max |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id file-path 199 chars max |
remote-url | [{ftp:// | tftp://}login:pswd@remote-locn/][file-path] |
255 chars max | |
directory length 99 chars max each | |
remote-locn | {hostname | ipv4-address | [ipv6-address]} |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0 to FFFF]H | |
d - [0 to 255]D | |
interface - 32 chars max, for link local addresses 255 | |
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
This command disconnects a user from a session.
Issuing the disconnect command without any parameters will disconnect the session in which the command was executed.
If any of the session type options (for example, console, bluetooth, telnet, FTP, SSH) are specified, then only the respective sessions are affected.
If no session type options are specified, then all sessions from the IP address or from the specified user are disconnected.
Any task that the user is executing is terminated. FTP files accessed by the user will not be removed.
A major severity security log event is created specifying what was terminated and by whom.
Note: IPv6 is supported on the 7750 SR and 7950 XRS. |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x (eight 16-bit pieces) |
x:x:x:x:x:x:d.d.d.d | |
x - [0 to FFFF]H | |
d - [0 to 255]D |
This command displays the system’s running configuration.
By default, only non-default settings are displayed.
Specifying the detail option displays all default and non-default configuration parameters.
This command enables the shell and kernel commands.
Note: This command should only be used with authorized direction from the Nokia Technical Assistance Center (TAC). |
This command performs NAT operations.
This command saves the script that calculates deterministic NAT map entries.
This command reboots the router or one CPM and can also be used to force an upgrade of the system boot ROMs.
If no options are specified, the user is prompted to confirm the reboot operation. Answering yes (y) will result in both CPMs and all IOMs rebooting.
When the upgrade keyword is specified, a chassis flag is set for the BOOT Loader (boot.ldr) and on the subsequent boot of the OS on the chassis, firmware images on CPMs, XCMs, or IOMs will be upgraded automatically.
Any CPMs, XCMs, or IOMs that are installed in the chassis will be upgraded automatically. For example, if a card is inserted with down revision firmware as a result of a card hot swap with the latest OS version running, the firmware on the card will be automatically upgraded before the card is brought online.
If the card firmware is upgraded automatically, a chassis cardUpgraded (event 2032) log event is generated. The corresponding SNMP trap for this log event is tmnxEqCardFirmwareUpgraded.
During any firmware upgrade, automatic or manual, it is imperative that during the upgrade procedure:
Any of the above conditions may render cards inoperable requiring a return of the card for resolution.
The time required to upgrade the firmware on the cards in the chassis depends on the number of cards to be upgraded. The progress of a firmware upgrade can be monitored at the console.
This command allows an authorized administrator to reset the exclusive policy editing lock. This will reset the lock flag and end the policy editing session in progress, discarding any policy edits.
This command can be used to perform administrative functions on the specified Ethernet-satellite chassis.
If the reboot keyword is specified, the command initiates an administrative reboot of the specified Ethernet-satellite chassis.
If the sync-boot-env keyword is specified, the command forces the specified Ethernet-satellite chassis to synchronize the boot image.
If the tech-support keyword is specified, the command creates a system core dump. If the file-url parameter is omitted and a ts-location is defined, the SR OS automatically generates a file name for the tech-support file based on the system name, date and time. The file is saved to the directory indicated by the configured ts-location. See the command description of ts-location on page 494 for more information.
The format of the auto-generated filename is ts-XXXXX.YYYYMMDD.HHMMUTC.dat where:
Note: The satellite [eth-sat sat-id] [tech-support file-url] command should only be used with authorized direction from the Nokia Technical Assistance Center (TAC). |
local-url | remote-url | |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id |
directory length 99 chars max each | |
remote-url | [ftp://login:pswd@remote-locn/][file-path] |
247 chars max | |
directory length 99 chars max each |
This command saves the running configuration to a configuration file. For example:
An admin save operation initiated by a user is aborted if another user initiates another admin save from another session.
By default, the running configuration is saved to the primary configuration file.
local-url | remote-url | |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id |
directory length 99 chars max each | |
remote-url | [{ftp:// | tftp://}login:pswd@remote-locn/][file-path] |
243 chars max | |
directory length 99 chars max each | |
remote-locn | [hostname | ipv4-address | ipv6-address] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0 to FFFF]H | |
d - [0 to 255]D | |
interface - 32 chars max, for link local addresses | |
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
This command saves the running configuration to a configuration file. For example:
An admin save operation initiated by a user is aborted if another user initiates another admin save from another session.
By default, the running configuration is saved to the primary configuration file.
local-url | remote-url | |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id |
directory length 99 chars max each | |
remote-url | [ftp://login:pswd@remote-locn/][file-path] |
247 chars max | |
directory length 99 chars max each | |
remote-locn | [hostname | ipv4-address | "["ipv6-address"]"] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0 to FFFF]H | |
d - [0 to 255]D | |
interface - 32 chars max, for link local addresses | |
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
This command can be used to perform administrative functions on the specified Ethernet-satellite chassis.
If the reboot keyword is specified, the command initiates an administrative reboot of the specified Ethernet-satellite chassis.
If the sync-boot-env keyword is specified, the command forces the specified Ethernet-satellite chassis to synchronize the boot image.
If the tech-support keyword is specified, the command creates a system core dump. If the file-url parameter is omitted and a ts-location is defined, the SR OS automatically generates a file name for the tech-support file based on the system name, date and time. The file is saved to the directory indicated by the configured ts-location. See the command description of ts-location on page 494 for more information.
The format of the auto-generated filename is ts-XXXXX.YYYYMMDD.HHMMUTC.dat where:
Note: The satellite [eth-sat sat-id] [tech-support file-url] command should only be used with authorized direction from the Nokia Technical Assistance Center (TAC). |
local-url | remote-url | |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id |
directory length 99 chars max each | |
remote-url | [ftp://login:pswd@remote-locn/][file-path] |
247 chars max | |
directory length 99 chars max each |
This command creates a system core dump. If the file-url is omitted, and a ts-location is defined, then the tech support file will have an automatic SR OS generated file name based on the system name and the date and time and will be saved to the directory indicated by the configured ts-location.
The format of the auto-generated filename is ts-XXXXX.YYYYMMDD.HHMMUTC.dat where:
Note: This command should only be used with authorized direction from the Nokia Technical Assistance Center (TAC). |
local-url | remote-url | |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id |
directory length 99 chars max each | |
remote-url | [{ftp:// | tftp://}login:pswd@remote-locn/][file-path] |
199 chars max | |
remote-locn | [hostname | ipv4-address | ipv6-address] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0 to FFFF]H | |
d - [0 to 255]D | |
interface - 32 chars max, for link local addresses | |
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
Enters a context for administrative commands related to licensing.
This command performs an activation on the license file pointed to by the command line argument. The file is first validated as described in the admin>system>license>validate command and upon success, replaces the existing license attributes in the system with the information in the new license file.
The license attributes that are active on a system can be viewed with the show>licensing>entitlements command.
Note: If the CLM tool is being used for license management, it shall perform the validation and activation and there is no need to enter these commands manually. |
Note: IPv6 address apply only to 7750 SR and 7950 XRS. |
This command performs a validation on the license file pointed to by the command line argument. A validation ensures that the license is compatible with the current state of the target system but it does not change the existing license. Aspects that can cause a failure in the validation include:
Note: If the CLM tool is being used for license management, it shall perform the validation and activation and there is no need to enter these commands manually. |
Note: IPv6 address apply only to 7750 SR and 7950 XRS. |
The ts-location command is used (along with an automatic system generated file name) when no file-url parameter is provided for the admin tech-support command. If no ts-location is defined then the operator must provide a file-url with the admin tech-support command itself.
The directory specified for the ts-location is not auto-created by SR OS. The operator must ensure that it exists.
See the admin tech-support command for more details about the system generated file name.
no ts-location
local-url | remote-url | |
local-url | [cflash-id/][file-path] 200 chars max, including cflash-id |
directory length 99 chars max each | |
remote-url | [ftp://login:pswd@remote-locn/][file-path] |
247 chars max | |
directory length 99 chars max each | |
remote-locn | [hostname | ipv4-address | "["ipv6-address"]" ] |
ipv4-address | a.b.c.d |
ipv6-address | x:x:x:x:x:x:x:x[-interface] |
x:x:x:x:x:x:d.d.d.d[-interface] | |
x - [0 to FFFF]H | |
d - [0 to 255]D | |
interface - 32 chars max, for link local addresses | |
cflash-id | cf1:, cf1-A:, cf1-B:, cf2:, cf2-A:, cf2-B:, cf3:, cf3-A:, cf3-B: |
The context to configure administrative system viewing parameters. Only authorized users can execute the commands in the admin context.
This command enters the context to allow the user to perform redundancy operations.
This command automatically synchronizes the certificate/CRL/key when importing or generating (for the key). Also if a new CF card is inserted into slot3 into the backup CPM, the system will sync the whole system-pki directory from the active CPM.
enabled
This command forces a switchover to the standby CPM card. The primary CPM reloads its software image and becomes the secondary CPM.
This command copies the entire set of rollback checkpoint files from the active CPM CF to the standby CPM CF.
This command performs a synchronization of the standby CPM’s images and/or configuration files to the active CPM. Either the boot-env or config parameter must be specified.
In the admin>redundancy context, this command performs a manually triggered standby CPM synchronization. When the standby CPM takes over operation following a failure or reset of the active CPM, it is important to ensure that the active and standby CPM have identical operational parameters. This includes the saved configuration, CPM, XCM, and IOM images.
The active CPM ensures that the active configuration is maintained on the standby CPM. However, to ensure smooth operation under all circumstances, runtime images and system initialization configurations must also be automatically synchronized between the active and standby CPM. If synchronization fails, alarms and log messages that indicate the type of error that caused the failure of the synchronization operation are generated. When the error condition ceases to exist, the alarm is cleared.
Only files stored on the router are synchronized. If a configuration file or image is stored in a location other than on a local compact flash, the file is not synchronized (for example, storing a configuration file on an FTP server).
The no form of the command removes the parameter from the configuration.
no synchronize
If the management Ethernet port on the active CPM goes down, this command allows the active CPM to be configured to use the management Ethernet port of the standby CPM.
The revert option allows the administrator to control when to revert back to the management Ethernet port of the primary CPM once it comes up again.
The no form of the command disables redundancy, so that connectivity to the active CPM is lost if its Ethernet port goes down.
This feature is not supported on the 7750 SR-a, 7750 SR-c, 7750-e, and the VSR platforms.
no mgmt-ethernet
This command enables the context to configure multi-chassis parameters.
This command configures BGP multi-homing parameters.
This command configures the time the service manager waits after a node reboot before running the DF election algorithm. The boot-timer value should be configured to allow for the BGP sessions to come up and for the NLRI information to be refreshed/exchanged.
The no form of the command reverts the default.
no boot-timer
This command defines the amount of time the service manager will keep the local sites in standby status, waiting for BGP updates from remote PEs before running the DF election algorithm to decide whether the site should be unblocked. The timer is started when one of the following events occurs if the site is operationally up:
no site-activation-timer
This command configures the BGP multi-homing site minimum down time. When set to a non-zero value, if the site goes operationally down it will remain operationally down for at least the length of time configured for the site-min-down-timer, regardless of whether other state changes would have caused it to go operationally up. This timer is restarted every time that the site transitions from up to down.
The above operation is optimized in the following circumstances:
The no form of the command reverts to default value.
no site-min-down-timer
This command configures BGP EVPN multi-homing parameters.
This command configures the time the service manager waits after a node reboot before running the DF election algorithm. The boot-timer value should be configured to allow for the BGP sessions to come up and for the NLRI information to be refreshed/exchanged.
The no form of the command reverts the default.
no boot-timer
This command defines the amount of time the service manager will keep the local sites in standby status, waiting for BGP updates from remote PEs before running the DF election algorithm to decide whether the site should be unblocked. The timer is started when one of the following events occurs if the site is operationally up:
The operator can enable automatic synchronization of rollback checkpoint files between the active CPM and standby CPM. When this automatic synchronization is enabled, a rollback save will cause the new checkpoint file to be saved on both the active and standby CPMs. The suffixes of the old checkpoint files on both active and standby CPMs are incremented. Note that automatic sync only causes the one new checkpoint file to be copied to both CFs (the other 9 checkpoints are not automatically copied from active to standby but that can be done manually with admin red rollback-sync).
Automatic synchronization of rollback checkpoint files across CPMs is only performed if the rollback-location is configured as a local file-url (for example, "cf3:/rollback-files/rollback). Synchronization is not done if the rollback-location is remote.
The config red sync {boot-env | config} and admin red sync {boot-env | config} do not apply to rollback checkpoint files. These commands do not manually or automatically sync rollback checkpoint files. The dedicated rollback-sync commands must be used to sync rollback checkpoint files.
no rollback-sync
This command performs a synchronization of the standby CPMs images and/or config files to the active CPM. Either the boot-env or config parameter must be specified. In the config>redundancy context, this command performs an automatically triggered standby CPM synchronization. When the standby CPM takes over operation following a failure or reset of the active CPM, it is important to ensure that the active and standby CPMs have identical operational parameters. This includes the saved configuration, CPM, XCM, and IOM images.
The active CPM ensures that the active configuration is maintained on the standby CPM. However, to ensure smooth operation under all circumstances, runtime images and system initialization configurations must also be automatically synchronized between the active and standby CPM.
If synchronization fails, alarms and log messages that indicate the type of error that caused the failure of the synchronization operation are generated. When the error condition ceases to exist, the alarm is cleared.
Only files stored on the router are synchronized. If a configuration file or image is stored in a location other than on a local compact flash, the file is not synchronized (for example, storing a configuration file on an FTP server).
no synchronize
This command configures a multi-chassis redundancy peer.
This command configures the authentication key used between this node and the multi-chassis peer. The authentication key can be any combination of letters or numbers.
no authentication-key
This command synchronizes diameter proxy.
no diameter-proxy
This command specifies whether IGMP protocol information should be synchronized with the multi-chassis peer.
no igmp
This command specifies whether IGMP snooping information should be synchronized with the multi-chassis peer.
no igmp-snooping
This command synchronizes IPsec information.
no ipsec
This command synchronizes L2TP.
no l2tp
This command synchronizes DHCP server information.
no local-dhcp-server
This command synchronizes multi-chassis ring information.
no mc-ring
This command is not supported. It is not blocked for backwards-compatibility reasons but has no effect on the system if configured.
no mld-snooping
This command specifies a peer name.
no peer-name
This command specifies whether PIM snooping for IPv4 information should be synchronized with the multi-chassis peer. Entering only pim-snooping (without any parameter) results in the synchronization being applicable only to SAPs.
no pim-snooping
This command specifies the port to be synchronized with the multi-chassis peer and a synchronization tag to be used while synchronizing this port with the multi-chassis peer.
port-id | slot/mda/port | |
lag-id | lag-id | |
lag | keyword | |
id | 1 to 200 | |
pw-id | pw-id | |
pw | keyword | |
id | 1 to 10239 |
This command configures a range of encapsulation values.
Dot1Q | start-qtag-end-qtag | |
start-qtag | 0 to 4094 | |
end-qtag | 0 to 4094 | |
QinQ | qtag1.start-qtag2.end-qtag2-start-qtag1.*-end-qtag1.* | |
qtag1 | 1 to 4094 | |
start-qtag1 | 1 to 4094 | |
end-qtag1 | 1 to 4094 | |
start-qtag2 | 0 to 4094 | |
end-qtag2 | 0 to 4094 |
This command enables syncing of python-policy cached entries to the peer.
Use the mcs-peer command in the python-policy to enable syncing for a specific python-policy.
no python
This command specifies the SDP to be synchronized with multi-chassis peer.
This command configures a range of VC-ID values.
vc-id-range | start-vc-id-end-vc-id | |
start-vc-id | 1 to 4294967295 | |
end-vc-id | 1 to 4294967295 |
This command specifies the source address used to communicate with the multi-chassis peer.
no source-address
This command enables the context to configure synchronization parameters.
This command specifies whether subscriber routed redundancy protocol (SRRP) information should be synchronized with the multi-chassis peer.
no srrp
This command specifies whether subscriber management information should be synchronized with the multi-chassis peer.
no sub-mgmt
This command specifies whether subscriber host tracking information should be synchronized with the multi-chassis peer.
no sub-host-trk
This command enables Oversubscribed Multi-Chassis Redundancy (OMCR). Subscriber hosts are synchronized between two chassis only in the control plane and are kept there (as part of the Multi-Chassis Synchronization (MCS) state) until the switchover occurs. Link or nodal failure will trigger the switchover at which point the subscriber hosts are being fully instantiated in the control and the forwarding plane. This approach allows oversubscription of the resources in the central standby (or protecting) node that is backing-up a number of other active nodes. The total number of protected subscribers in the OMCR cluster exceeds the forwarding capacity of the protecting node. This is achievable by not fully occupying the resources for the subscriber hosts until the failure occurs.
The restoration times depend on the amount of the subscriber hosts that are affected by the switchover and it is related to the time needed for the full instantiation of the subscribers in the forwarding plane.
Although this command is configured on a peer level, the warm-standby property is a nodal characteristic. In other words, mixing of N:1 and 1:1 (hot standby) mode in the central standby node is not supported. Consequently all peers on the central standby node must be configured for warm-standby (N:1), or all peers must be configured for hot-standby (1:1) by omitting the warm-standby keyword from the configuration.
The peer of the central-backup node is not aware of the redundancy model supported. In in other words, the peer of the central-backup node does not know whether it peers with a warm-standby peer or host-standby-peer. All nodes participating in this protection model must run SR OS 12.0 or higher.
This command applies only to the 7450 ESS and 7750 SR.
no warm-standby
This command specifies that the endpoint is multi-chassis. This value should be the same on both MC-EP peers for the pseudowires that must be part of the same group.
The no form of this command removes the endpoint from the MC-EP. Single chassis behavior applies.
no mc-endpoint
This command enables the use of bi-directional forwarding (BFD) to control the state of the associated protocol interface. By enabling BFD on a given protocol interface, the state of the protocol interface is tied to the state of the BFD session between the local node and the remote node. The parameters used for the BFD are set via the BFD command under the IP interface.
The no form of this command disables BFD.
no bfd-enable
This command configures the boot timer interval. This command applies only when the node reboots. It specifies the time the MC-EP protocol keeps trying to establish a connection before assuming a failure of the remote peer. This is different from the keep-alives mechanism which is used just after the peer-peer communication was established. After this time interval passed all the mc-endpoints configured under services will revert to single chassis behavior, activating the best local PW.
The no form of this command sets the interval to default.
no boot-timer
This command specifies the number of keep-alive intervals that the local node will wait for packets from the MC-EP peer before assuming failure. After this time interval passed the all the mc-endpoints configured under services will revert to single chassis behavior, activating the best local pseudowire.
The no form of this command sets the multiplier to default value.
no hold-on-neighbor-failure
This command sets the interval at which keep-alive messages are exchanged between two systems participating in MC-EP when bfd is not enabled or is down. These fast keep-alive messages are used to determine remote-node failure and the interval is set in deci-seconds.
The no form of this command sets the interval to default value
no keep-alive-interval
This command configures the passive mode behavior for the MC-EP protocol. When in passive mode the MC-EP pair will be dormant until two of the pseudowires in a MC-EP will be signaled as active by the remote PEs, being assumed that the remote pair is configured with regular MC-EP. As soon as more than one pseudowire is active, dormant MC-EP pair will activate. It will use the regular exchange to select the best pseudowire between the active ones and it will block the Rx and Tx directions of the other pseudowires.
The no form of this command will disable the passive mode behavior.
no passive-mode
This command allows the operator to set the system priority. The peer configured with the lowest value is chosen to be the master. If system-priority are equal then the one with the highest system-id (chassis MAC address) is chosen as the master.
The no form of this command sets the system priority to default.
no system-priority
This command enables the context to configure multi-chassis LAG operations and related parameters.
The no form of this command administratively disables multi-chassis LAG. MC-LAG can only be issued only when mc-lag is shutdown.
no mc-lag
This command specifies the interval that the standby node will wait for packets from the active node before assuming a redundant-neighbor node failure. This delay in switch-over operation is required to accommodate different factors influencing node failure detection rate, such as IGP convergence, or HA switch-over times and to prevent the standby node to take action prematurely.
The no form of this command sets this parameter to default value.
hold-on-neighbor-failure 3
This command sets the interval at which keep-alive messages are exchanged between two systems participating in MC-LAG. These keep-alive messages are used to determine remote-node failure and the interval is set in deciseconds.
The no form of this command sets the interval to default value
keep-alive-interval 1s (10 hundreds of milliseconds means interval value of 10)
This command defines a LAG which is forming a redundant-pair for MC-LAG with a LAG configured on the given peer. The same LAG group can be defined only in the scope of 1 peer. The same lacp-key, system-id, and system-priority must be configured on both nodes of the redundant pair in order to MC-LAG to become operational. In order MC-LAG to become operational, all parameters (lacp-key, system-id, system-priority) must be configured the same on both nodes of the same redundant pair.
The partner system (the system connected to all links forming MC-LAG) will consider all ports using the same lacp-key, system-id, system-priority as the part of the same LAG. In order to achieve this in MC operation, both redundant-pair nodes have to be configured with the same values. In case of the mismatch, MC-LAG is kept operationally down.
The command will fail if the value is the same with any of the following configured attributes:
This command enables the context to configure system-wide Link Layer Discovery Protocol parameters.
This command configures the duration of the fast transmission period.
no message-fast-tx
This command configures the number of LLDPDUs to send during the fast transmission period.
no message-fast-tx-init
This command configures the minimum time between change notifications.
no notification-interval
This command configures the time before re-initializing LLDP on a port.
no reinit-delay
This command configures the maximum consecutive LLDPDUs transmitted.
no tx-credit-max
This command configures the multiplier of the tx-interval.
no tx-hold-multiplier
This command configures the LLDP transmit interval time.
no tx-interval
This command enables the context to configure Link Layer Discovery Protocol (LLDP) parameters on the specified port.
This command configures destination MAC address parameters.
dest-mac nearest-bridge
This command specifies the administratively desired status of the local LLDP agent.
admin-status disabled
This command enables LLDP notifications.
The no form of the command disables LLDP notifications.
no notification
This command configures the encoding of the port identifier TLVs transmitted to the peer.
port-id-subtype tx-local
The command allows LLDP packets received on the port with the destination address of the nearest bridge to be tunneled without being intercepted on the local port. The dest-mac nearest-bridge must be disable for tunneling to occur. This is applicable to NULL SAP Epipe and VPLS services only.
no tunnel-nearest-bridge
This command specifies which management address to transmit.
The no form of the command resets value to the default.
no tx-mgmt-address
This command specifies which LLDP TLVs to transmit.
The no form of the command resets the value to the default.
no tx-tlvs
This command enables the context in which to configure router parameters including interfaces, route policies and protocols. This command is also used to create CPM router instances.
For CPM router instances, this command enters or creates a user-created CPM router instance. A CPM router instance is not a VPRN router instance. VPRN router instances are configured under configure service vprn. CPM router instances are the only type of non-VPRN router instances that can be created by a user, and have a user-defined name. CPM router instances only use CPM/CFM/CCM ethernet ports as interfaces.
router-instance: router name | ||
router-name | Base | management | cpm-vr-name | |
cpm-vr-name | [32 characters maximum] |