2.8. Security Configuration Command Reference

2.8.1. Command Hierarchies

2.8.1.1. Security Commands

config
— system
copy {user source-user | profile source-profile} to destination [overwrite]
[no] ftp-server
read-algorithm {hash | hash2 | custom | all-hash}
write-algorithm {hash | hash2 | custom | cleartext}
grpc
hash-algorithm {hash | hash2 | custom | cleartext}
md-cli
hash-algorithm {hash | hash2 | custom | cleartext}
hash-algorithm {hash | hash2 | custom | cleartext}
[no] allow-ftp
[no] allow-ssh
[no] allow-telnet
[no] allow-telnet6
application app [ip-int-name | ip-address]
— no application app
application6 app ipv6-address
ssh
client-cipher-list protocol-version version
cipher index name cipher-name
— no cipher index
kex index name kex-name
— no kex index
mac index name mac-name
— no mac index
client
mbytes {mbytes | disable}
— no mbytes
minutes {minutes | disable}
— no minutes
[no] shutdown
server
mbytes {mbytes | disable}
— no mbytes
minutes {minutes | disable}
— no minutes
[no] shutdown
[no] preserve-key
server-cipher-list protocol-version version
cipher index name cipher-name
— no cipher index
kex index name kex-name
— no kex index
mac index name mac-name
— no mac index
[no] version ssh-version
[no] telnet-server
vprn-network-exceptions number seconds

2.8.1.1.1. LLDP Commands

configure
— system
— lldp
reinit-delay time
tx-credit-max count
tx-hold-multiplier multiplier
tx-interval interval

2.8.1.1.2. Management Access Filter Commands

config
— system
[no] ip-filter
default-action {permit | deny | deny-host-unreachable}
[no] entry entry-id
action {permit | deny | deny-host-unreachable}
— no action
description description-string
dst-port value [mask]
— no dst-port
[no] log
protocol protocol-id
— no protocol
router service name service-name
router router-instance
— no router
src-ip {ip-prefix/mask | ip-prefix netmask}
— no src-ip
src-port {port-id | cpm | lag lag-id}
— no src-port
renum old-entry-number new-entry-number
[no] shutdown
[no] ipv6-filter
default-action {permit | deny | deny-host-unreachable}
[no] entry entry-id
action {permit | deny | deny-host-unreachable}
— no action
description description-string
dst-port value [mask]
— no dst-port
flow-label value
— no flow-label
[no] log
next-header next-header
router service name {service-name}
router {router-instance}
— no router
src-ip {ipv6-address | prefix-length}
— no src-ip
src-port {port-id | cpm | lag lag-id }
— no src-port
renum old-entry-number new-entry-number
[no] shutdown
[no] mac-filter
default-action {permit | deny}
[no] entry entry-id
action {permit | deny}
— no action
description description-string
[no] log
match frame-type frame-type
— no match
cfm-opcode {lt | gt | eq} opcode
cfm-opcode range start end
— no cfm-opcode
dot1p dot1p-value [dot1p-mask]
dsap dsap-value [dsap-mask]
dst-mac ieee-address [ieee-address-mask]
— no dst-mac
etype 0x0600..0xfff
— no etype
snap-oui {zero | non-zero}
— no snap-oui
snap-pid snap-pid
— no snap-pid
src-mac ieee-address [ieee-address-mask]
— no src-mac
ssap ssap-value [ssap-mask]
— no ssap
svc-id service-id
— no svc-id
renum old-entry-number new-entry-number
[no] shutdown

2.8.1.1.3. CLI Script Authorization Commands

config
— system
cron
cli-user user-name
— no cli-user
cli-user user-name
— no cli-user
vsd
cli-user user-name
— no cli-user

2.8.1.1.4. CPM Filter Commands

config
— system
[no] cpm-filter
default-action {accept | drop}
[no] ip-filter
[no] entry entry-id
action [accept | drop | queue queue-id ]
— no action
description description-string
log log-id
— no log
match [protocol protocol-id]
— no match
dscp dscp-name
— no dscp
dst-ip {ip-address/mask | ip-address netmask | ip-prefix-list prefix-list-name}
— no dst-ip
dst-port tcp/udp port-number [mask]
dst-port port-list port-list-name
dst-port range tcp/udp port-number tcp/udp port-number
— no dst-port
fragment {true | false}
— no fragment
icmp-code icmp-code
— no icmp-code
icmp-type icmp-type
— no icmp-type
ip-option [ip-option-value] [ip-option-mask]
— no ip-option
multiple-option {true | false}
option-present {true | false}
port tcp/udp port-number [mask]
port port-list port-list-name
port range tcp/udp port-number tcp/udp port-number
— no port
router {router-instance}
router service-name {service-name}
src-ip {ip-address/mask | ip-address netmask | ip-prefix-list prefix-list-name}
— no src-ip
src-port [src-port-number] [mask]
src-port tcp/udp port-number [mask]
src-port port-list port-list-name
src-port range tcp/udp port-number tcp/udp port-number
— no src-port
tcp-ack {true | false}
— no tcp-ack
tcp-syn {true | false}
— no tcp-syn
renum old-entry-id new-entry-id
[no] shutdown
[no] ipv6-filter
[no] entry entry-id
action [accept | drop | queue queue-id ]
— no action
description description-string
log log-id
— no log
match [next-header next-header]
— no match
dscp dscp-name
— no dscp
dst-ip ipv6-address/prefix-length
dst-ip ipv6-prefix-list ipv6-prefix-list-name
— no dst-ip
dst-port [tcp/udp port-number] [mask]
dst-port port-list port-list-name
dst-port range tcp/udp port-number tcp/udp port-number
— no dst-port
flow-label value
— no flow-label
fragment {true | false}
— no fragment
hop-by-hop-opt {true | false}
icmp-code icmp-code
— no icmp-code
icmp-type icmp-type
— no icmp-type
port tcp/udp port-number [mask]
port port-list port-list-name
port range start end
— no port
router service-name service-name
router router-instance
— no router
src-ip [ipv6-address/prefix-length] [ipv6-prefix-list ipv6-prefix-list-name]
— no src-ip
src-port [src-port-number] [mask]
— no src-port
tcp-ack {true | false}
— no tcp-ack
tcp-syn {true | false}
— no tcp-syn
renum old-entry-id new-entry-id
[no] shutdown
[no] mac-filter
[no] entry entry-id
action [accept | drop | queue queue-id]
— no action
description description-string
log log-id
— no log
match [frame-type frame-type]
— no match
cfm-opcode {lt | gt | eq} opcode
cfm-opcode range start end
— no cfm-opcode
dsap dsap-value [dsap-mask]
dst-mac ieee-address [ieee-address-mask]
— no dst-mac
etype 0x0600..0xfff
— no etype
src-mac ieee-address [ieee-address-mask]
— no src-mac
ssap ssap-value [ssap-mask]
— no ssap
svc-id service-id
— no svc-id
renum old-entry-number new-entry-number
[no] shutdown

2.8.1.1.5. CPM Queue Commands

config
— system
— security
[no] cpm-queue
[no] queue queue-id
cbs cbs
— no cbs
mbs mbs
— no mbs
rate rate [cir cir]
— no rate

2.8.1.1.6. CPU Protection Commands

config
— system
— security
— ip-src-monitoring
[no] dhcp
[no] gtp
[no] icmp
[no] igmp
link-specific-rate packet-rate-limit
policy cpu-protection-policy-id [create]
— no policy cpu-protection-policy-id
[no] alarm
description description-string
eth-cfm
entry entry levels levels opcodes opcodes rate packet-rate-limit
— no eth-cfm
out-profile-rate packet-rate-limit [log-events]
overall-rate packet-rate-limit
per-source-rate packet-rate-limit
port-overall-rate packet-rate-limit [action-low-priority]
protocol-protection [allow-sham-links][block-pim-tunneled]

Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2 Services and EVPN Guide: VLL, VPLS, PBB, and EVPN, the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and VPRN and the 7450 ESS, 7750 SR, and VSR Multiservice Integrated Service Adapter and Extended Services Appliance Guide for command, syntax, and usage information about applying CPU Protection policies to interfaces.

CPU protection policies are applied by default (and customer policies can be applied) to a variety of entities including interfaces and SAPs. Refer to the appropriate guides for command syntax and usage for applying CPU protection policies. Examples of entities that can have CPU protection policies applied to them include:

config>router>if>cpu-protection policy-id

config>service>epipe>sap>cpu-protection policy-id [mac-monitoring] | [eth-cfm-monitoring [aggregate] [car]]

config>service>epipe>spoke-sdp>cpu-protection policy-id [mac-monitoring] | [eth-cfm-monitoring [aggregate] [car]]

config>service>ies>if>cpu-protection policy-id

config>service>ies>if>sap>cpu-protection policy-id [mac-monitoring] | [eth-cfm-monitoring [aggregate] [car]]

config>service>template>vpls-sap-template>cpu-protection policy-id [mac-monitoring] | [eth-cfm-monitoring [aggregate] [car]]

config>service>vpls>sap>cpu-protection policy-id [mac-monitoring] | [eth-cfm-monitoring [aggregate] [car]]

config>service>vpls>video-interface>cpu-protection policy-id

config>service>vprn>if>cpu-protection policy-id

config>service>vprn >if>sap>cpu-protection policy-id [mac-monitoring] | [eth-cfm-monitoring [aggregate] [car]]

config>service>vprn>nw-if>cpu-protection policy-id

config>service>vprn>sub-if>grp-if>sap>cpu-protection policy-id [mac-monitoring] | [eth-cfm-monitoring [aggregate] [car]]

config>subscr-mgmt>msap-policy>cpu-protection policy-id [mac-monitoring]

2.8.1.1.7. Distributed CPU Protection Commands

config
— system
— security
policy policy-name [create]
— no policy
description description-string
[no] local-monitoring-policer policer-name [create]
[no] description description-string
exceed-action {discard | low-priority | none}
log-events [verbose]
— no log-events
rate {packets {ppi | max} within seconds [initial-delay packets] | kbps {kilobits-per-second | max} [mbs size] [bytes | kilobytes]}
— no rate
protocol name [create]
— no protocol name
detection-time seconds
exceed-action {discard [hold-down seconds] | low-priority [hold-down seconds] | none}
log-events [verbose]
— no log-events
rate {packets {ppi | max} within seconds [initial-delay packets] | kbps {kilobits-per-second | max} [mbs size] [bytes | kilobytes]}
— no rate
enforcement {static policer-name | dynamic {mon-policer-name | local-mon-bypass}}
static-policer policer-name [create]
— no static-policer policer-name
description description-string
detection-time seconds
exceed-action {discard [hold-down seconds] | low-priority [hold-down seconds] | none}
log-events [verbose]
— no log-events
rate {packets {ppi | max} within seconds [initial-delay packets] | kbps {kilobits-per-second | max} [mbs size] [bytes | kilobytes]}
— no rate
config
— card
— fp
— dist-cpu-protection
[no] dynamic-enforcement-policer-pool number-of-policers

2.8.1.1.8. Extracted Protocol Traffic Priority Commands

config
— card
— fp
init-extract-prio-mode {uniform | l3-classify}

2.8.1.1.9. Security Password Commands

config
— system
— security
admin-password password [hash | hash2]
aging days
— no aging
attempts count [time minutes1] [lockout minutes2]
— no attempts
authentication-order [method-1] [method-2] [method-3] [method-4] [exit-on-reject]
credits [lowercase credits] [uppercase credits] [numeric credits] [special-character credits]
— no credits
minimum-classes minimum
minimum-length length
required [lowercase count] [uppercase count] [numeric count] [special-character count]
— no required
dynsvc-password password [hash | hash2]
tacplus-map-to-priv-lvl admin-priv-lvl
health-check [interval interval]
history-size size
minimum-age [days days] [hrs hours] [min minutes] [sec seconds]
minimum-change distance

2.8.1.1.10. Public Key Infrastructure (PKI) Commands

The following commands apply only to the 7450 ESS and 7750 SR:

config
— system
pki
ca-profile name [create]
— no ca-profile name
cert-file filename
— no cert-file
cmpv2
key password [hash | hash2 | custom] reference reference-number
— no key reference reference-number
url url-string [service-id service-id]
url url-string [service-name service-name]
— no url
crl-file filename
— no crl-file
ocsp
responder-url url-string
service service-id
service name service-name
— no service
certificate-display-format {ascii | utf8}
certificate-expiration-warning hours [repeat repeat-hours]
common-name-list name [create]
[no] cn index type type value common-name-value
crl-expiration-warning hours [repeat repeat-hours]
imported-format {any | secure}
Note:

For information about CMPv6 admin certificate commands listed in the following tree, see the 7450 ESS, 7750 SR, and VSR Multiservice Integrated Service Adapter and Extended Services Appliance Guide.

admin
clear-ocsp-cache [entry-id]
crl-update ca ca-profile-name
display type {cert | key | crl | cert-request} url-string format {pkcs10 | pkcs12 | pkcs7-der | pkcs7-pem | pem | der} [password [32 chars max]]
export type {cert | key | crl} input filename output url-string format output-format [password [32 chars max]] [pkey filename]
gen-keypair url-string curve {secp256r1 | secp384r1 | secp521r1}
gen-keypair url-string [size {512 | 1024 | 2048}] [type {rsa | dsa}]
gen-local-cert-req keypair url-string subject-dn subject-dn [domain-name name] [ip-addr ip-address] file url-string [hash-alg hash-algorithm]
import type {cert | key | crl} input url-string output filename format input-format [password [32 chars max]]
reload type {cert | key | cert-key-pair} filename [key-file filename]
secure-nd-import input url-string format input-format [password password] [key-rollover]

2.8.1.1.11. Profile Commands

config
— system
[no] profile user-profile-name
combined-max-sessions session-limit
default-action {deny-all | permit-all | none | read-only-all}
[no] entry entry-id
action {deny | permit | read-only}
description description-string
match command-string
— no match
grpc
gnmi-capabilities {deny | permit}
gnmi-get {deny | permit}
gnmi-set {deny | permit}
gnmi-subscribe {deny | permit}
gnoi-cert-mgmt-cangenerate {deny | permit}
gnoi-cert-mgmt-getcert {deny | permit}
gnoi-cert-mgmt-install {deny | permit}
gnoi-cert-mgmt-revoke {deny | permit}
gnoi-cert-mgmt-rotate {deny | permit}
rib-api-getversion {deny | permit}
rib-api-modify {deny | permit}
[no] li
renum old-entry-number new-entry-number
ssh-max-sessions session-limit
telnet-max-sessions session-limit

2.8.1.1.12. CLI Session Commands

config
— system
cli-session-group session-group-name [create]
combined-max-sessions number-of-sessions
ssh-max-sessions number-of-sessions
telnet-max-sessions number-of-sessions

2.8.1.1.13. RADIUS Commands

config
— system
[no] radius
access-algorithm {direct | round-robin}
[no] accounting
[no] authorization
port port
— no port
retry count
— no retry
server server-index address ip-address secret key [hash | hash2 | custom]
— no server server-index
[no] shutdown
timeout seconds
— no timeout

2.8.1.1.14. TACACS+ Client Commands

config
— system
[no] tacplus
accounting [record-type {start-stop | stop-only}]
— no accounting
[no] authorization [use-priv-lvl]
[no] priv-lvl-map
priv-lvl priv-lvl user-profile-name
— no priv-lvl priv-lvl
server server-index address ip-address secret key [hash | hash2 | custom] [port port]
— no server server-index
[no] shutdown
timeout seconds
— no timeout

2.8.1.1.15. LDAP Commands

config
— system
[no] ldap
retry count
— no retry
server server-index [create]
— no server server index
address ip-address [port port]
— no address
bind-authentication root-dn [password password] [hash | hash2 | custom]
ldap-server server-name
search base-dn
— no search
[no] shutdown
tls-profile tls-profile-name
[no] shutdown
timeout seconds
— no timeout

2.8.1.1.16. User Management Commands

config
— system
[no] user user-name
[no] access [ftp] [snmp] [console] [li] [netconf] [grpc]
login-exec url-prefix::source-url
— no login-exec
member user-profile-name [user-profile-name(up to 8 max)]
— no member user-profile-name
home-directory url-prefix [directory] [directory/directory…]
password [password]
ecdsa
[no] ecdsa-key key-id [create]
description description-string
key-value public-key-value
— no key-value
rsa
[no] rsa-key key-id [create]
description description-string
key-value public-key-value
— no key-value
snmp
authentication {[none] | [[hash] {md5 key-1 | sha key-1} privacy {none | des-key key-2| aes-128-cfb-key key-2}]}
group group-name
— no group

2.8.1.1.17. User Template Commands

config
— system
user-template {tacplus_default | radius_default | ldap-default}
[no] access [ftp] [console] [grpc]
login-exec url-prefix:source-url
— no login-exec
home-directory url-prefix [directory] [directory/directory..]
profile user-profile-name
— no profile

2.8.1.1.18. Dot1x Commands

config
— system
dot1x
radius-plcy name [create]
retry count
— no retry
server server-index address ip-address secret key] [hash | hash2 | custom] [auth-port auth-port] [acct-port acct-port] [type server-type]
source-address ip-address
[no] shutdown
timeout seconds
— no timeout
[no] shutdown

2.8.1.1.19. Keychain Commands

config
— system
[no] keychain keychain-name
description description-string
bi
entry entry-id [key authentication-key | hash-key | hash2-key | custom-key] [hash | hash2 | custom] algorithm algorithm]
— no entry entry-id
begin-time date hours-minutes [UTC]
begin-time {now | forever}
— no begin-time
option {basic | isis-enhanced}
— no option
[no] shutdown
tolerance [seconds | forever]
— no tolerance
uni
entry entry-id [key authentication-key | hash-key | hash2-key | custom-key] [hash | hash2 | custom] algorithm algorithm]
— no entry entry-id
begin-time date hours-minutes [UTC
begin-time {now | forever}
— no begin-time
end-time date hours-minutes [UTC]
end-time {now | forever}
— no end-time
[no] shutdown
tolerance [seconds | forever]
— no tolerance
send
entry entry-id [key authentication-key | hash-key | hash2-key | custom-key] [hash | hash2 | custom] algorithm algorithm]
— no entry entry-id
begin-time date hours-minutes [UTC]
begin-time {now | forever}
— no begin-time
[no] shutdown
[no] shutdown
receive option-number
— no receive
send option-number
— no send

2.8.1.1.20. TTL Security Commands

config
— router
— bgp
— group
ttl-security min-ttl-value
— neighbor
ttl-security min-ttl-value
config
— router
— ldp
— tcp-session-parameters
— peer-transport
ttl-security min-ttl-value
config
— system
— login-control
— ssh
config
— system
— login-control
— telnet

2.8.1.1.21. gRPC Commands

config
— system
grpc
gnmi
[no] shutdown
max-msg-size number
rib-api
purge-timeout seconds
[no] shutdown
[no] shutdown
idle-time idle
— no idle-time
interval interval
— no interval
retries count
— no retries
[no] shutdown

2.8.1.2. Login Control Commands

config
— system
ftp
inbound-max-sessions number-of-sessions
idle-timeout {minutes | disable}
[no] login-banner
global file-url
— no global
per-user user-directory file-url file-name file-name
— no per-user
motd {url url-prefix: source-url | text motd-text-string}
— no motd
pre-login-message login-text-string [name]
ssh
inbound-max-sessions number-of-sessions
outbound-max-sessions number-of-sessions
ttl-security min-ttl-value
telnet
inbound-max-sessions number-of-sessions
outbound-max-sessions number-of-sessions
ttl-security min-ttl-value

2.8.2. Command Descriptions

This section provides the CLI command descriptions. Topics include:

2.8.2.1. General Security Commands

description

Syntax 
description description-string
no description
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
config>sys>sec>cpm>ip-filter>entry
config>sys>sec>cpm>ipv6-filter>entry
config>sys>sec>cpm>mac-filter>entry
config>system>security>dist-cpu-protection>policy
config>system>security>keychain
config>system>security>keychain>direction>bi>entry
config>system>security>keychain>direction>uni>receive>entry
config>system>security>keychain>direction>uni>send>entry
config>system>security>pki>ca-profile
config>sys>security>cpu-protection>policy
config>system>security>mgmt-access-filter>mac-filter>entry
config>system>security>cpm-filter>mac-filter>entry
config>system>security>user>public-keys>ecdsa>ecdsa-key
config>system>security>user>public-keys>rsa>rsa-key
Description 

This command creates a text description stored in the configuration file for a configuration context.

This command associates a text string with a configuration context to help identify the context in the configuration file.

The no form of this command removes the string.

Default 

No description associated with the configuration context.

Parameters 
description-string—
The description character string. Allowed values are any string up to 80 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed within double quotes.

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>mgmt-access-filter>ip-filter
config>system>security>mgmt-access-filter>ipv6-filter
config>sys>sec>cpm>ip-filter
config>system>security>keychain
config>system>security>keychain>direction>bi>entry
config>system>security>keychain>direction>uni>receive>entry
config>system>security>keychain>direction>uni>send>entry
config>system>security>dot1x
config>system>security>dot1x>radius-plcy
config>system>security>pki>ca-profile
config>sys>sec>cpm>ipv6-filter
config>sys>sec>cpm>mac-filter>entry
Description 

This command administratively disables the entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics. Many entities must be explicitly enabled using the no shutdown command. The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.

The no form of this command puts an entity into the administratively enabled state.

Default 

no shutdown

2.8.2.2. Security Commands

security

Syntax 
security
Context 
config>system
Description 

This command enables the context to configure security settings.

Security commands manage user profiles and user membership. Security commands also manage user login registrations.

copy

Syntax 
copy {user source-user | profile source-profile} to destination [overwrite]
Context 
config>system>security
Description 

This command copies a profile or user from a source profile to a destination profile.

Parameters 
source-profile—
Specifies the profile to copy. The profile must exist.
dest-profile—
Specifies the copied profile is copied to the destination profile.
overwrite—
Specifies that the destination profile configuration will be overwritten with the copied source profile configuration. A profile will not be overwritten if the overwrite command is not specified.

ftp-server

Syntax 
[no] ftp-server
Context 
config>system>security
Description 

This command enables FTP servers running on the system.

FTP servers are disabled by default. At system startup, only SSH servers are enabled.

The no form of this command disables FTP servers running on the system.

management-interface

Syntax 
management-interface
Context 
config>system>security
Description 

This command enables the context for choosing a management interface for hash configuration. The management interfaces are classic-cli, md-cli, netconf, or grpc.

classic-cli

Syntax 
classic-cli
Context 
config>system>security>management-interface
Description 

This command enables the context to configure hash-control for the classic CLI interface.

read-algorithm

Syntax 
read-algorithm {hash | hash2 | custom| all-hash}
no read-algorithm
Context 
config>system>security>management-interface>classic-cli
Description 

This command assigns a global read algorithm for the system. The read algorithm is used to read the input phrase in a module.

The no form of this command reverts to the default value.

Default 

read-algorithm all-hash

Parameters 
hash—
Specifies hash. Use this option to transport a phrase between modules and nodes. In this case the write-algorithm should be hash as well.
hash2—
Specifies hash2 which is module-specific.
custom—
Specifies the custom encryption to management interface.
all-hash—
Specifies that the system accepts hash or hash2.

write-algorithm

Syntax 
write-algorithm {hash | hash2 | custom | cleartext}
no write-algorithm
Context 
config>system>security>management-interface>classic-cli
Description 

This command assigns a global write algorithm for the system. The write algorithm is used to display the phrase in the config file, info, show commands, and so on.

The no form of this command reverts to the default value.

Default 

write-algorithm hash2

Parameters 
hash—
Specifies hash. Use this option to transport a phrase between modules and nodes. In this case the read-algorithm should be hash as well.
hash2—
Specifies hash2 which is module-specific.
custom—
Specifies the custom encryption to management interface.
cleartext —
Specifies that the phrase is displayed as clear text everywhere.

grpc

Syntax 
grpc
Context 
config>system>security>management-interface
Description 

This command enters the context to configure hash-control for the gRPC interface.

hash-algorithm

Syntax 
hash-algorithm {hash | hash2 | custom| cleartext}
no hash-algorithm
Context 
config>system>security>management-interface>grpc
config>system>security>management-interface>md-cli
config>system>security>management-interface>netconf
Description 

This command assigns a global read and write algorithm for the system. When the hash algorithm is set, the system will read and write the phrase based on the chosen algorithm.

The no form of this command reverts to the default value.

Default 

hash-algorithm hash2

Parameters 
hash—
Specifies hash. Use this option to transport a phrase between modules and nodes.
hash2—
Specifies hash2 which is module-specific.
custom—
Specifies the custom encryption to management interface.
cleartext—
Specifies that the phrase is displayed as clear text everywhere.

md-cli

Syntax 
md-cli
Context 
config>system>security>management-interface
Description 

This command enables the context to configure hash-control for the MD-CLI interface.

netconf

Syntax 
netconf
Context 
config>system>security>management-interface
Description 

This command enables the context to configure hash-control for the Netconf interface.

management

Syntax 
management
Context 
config>system>security
Description 

This command enables the context to allow access to management servers.

allow-ftp

Syntax 
[no] allow-ftp
Context 
config>system>security>management
Description 

This command allows access to the FTP server from Base and Management routers if it is operationally up.

The no form of this command disallows access to the FTP server.

Default 

allow-ftp

allow-ssh

Syntax 
[no] allow-ssh
Context 
config>system>security>management
Description 

This command allows the SSH parameters to be configured from Base and Management routers.

The no form of this command disallows SSH parameters from being configured.

Default 

allow-ssh

allow-telnet

Syntax 
[no] allow-telnet
Context 
config>system>security>management
Description 

This command allows access to the Telnet server from Base and Management routers if it is operationally up.

The no form of this command disallows access to the Telnet server.

Default 

allow-telnet

allow-telnet6

Syntax 
[no] allow-telnet
Context 
config>system>security>management
Description 

This command allows access to the Telnet IPv6 server from Base and Management routers if it is operationally up.

The no form of this command disallows access to the Telnet IPv6 server.

Default 

allow-telnet6

per-peer-queuing

Syntax 
[no] per-peer-queuing
Context 
config>system>security
Description 

This command enables CPM hardware queuing per peer. This means that when a peering session is established, the router will automatically allocate a separate CPM hardware queue for that peer.

The no form of this command disables CPM hardware queuing per peer.

Default 

per-peer-queuing

source-address

Syntax 
source-address
Context 
config>system>security
Description 

This command specifies the source address that should be used in all unsolicited packets sent by the application.

This feature only applies to inband interfaces and does not apply to the out of band management interface. Packets going out the management interface will keep using that as source IP address. In other words, when the RADIUS server is reachable through both the management interface and a network interface, the management interface is used despite whatever is configured by the source-address command.

When a source address is specified for the ptp application, the port-based 1588 hardware timestamping assist function will be applied to PTP packets matching the IPv4 address of the router interface used to ingress the SR/ESS or IP address specified in this command. If the IP address is removed, then the port-based 1588 hardware timestamping assist function will only be applied to PTP packets matching the IPv4 address of the router interface.

application

Syntax 
application app [ip-int-name | ip-address]
no application app
Context 
config>system>security>source-address
Description 

This command configures the source IP address specified by the source-address command.

The no form of this command removes the interface name or address from the command.

Parameters 
app—
Specifies the application name.
Values—
cflowd, dns, ftp, ntp, ldap, ping, ptp, radius, sflow, snmptrap, sntp, ssh, syslog, tacplus, telnet, traceroute, mcreporter, icmp-error

 

ip-int-name | ip-address —
Specifies the name of the IP interface or IP address. If the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed within double quotes.

application6

Syntax 
application6 app ipv6-address
no application6
Context 
config>system>security>source-address
Description 

This command specifies the application to use the source IPv6 address specified by the source-address command.

The no form of this command removes the application and IPv6 address from the configuration.

Parameters 
app—
Specifies the application name.
Values—
cflowd, dns, ftp, ldap, ntp, ping, radius, sflow, snmptrap, sntp, ssh, syslog, tacplus, telnet, traceroute, icmp6-error

 

ipv6-address—
Specifies the IPv6 address.

ssh

Syntax 
ssh
Context 
config>system>security
Description 

This command enables the context to configure SSH parameters.

client-cipher-list

Syntax 
client-cipher-list protocol-version version
Context 
config>system>security>ssh
Description 

This command enables the configuration of a list of allowed ciphers by the SSH client.

Parameters 
version—
Specifies the SSH version.
Values—
1 — Specifies that the SSH server will only accept connections from clients that support SSH protocol version 1 2 — Specifies that the SSH server will accept connections from clients supporting either SSH protocol version 2

 

cipher

Syntax 
cipher index name cipher-name
no cipher index
Context 
config>system>security>ssh>client-cipher-list
config>system>security>ssh>server-cipher-list
Description 

This command enables the configuration of a cipher. Client-ciphers are used when the SR OS is acting as an SSH client. Server-ciphers are used when the SR OS is acting as an SSH server.

The no form of this command removes the index and cipher name from the configuration.

Default 

no cipher index

Parameters 
index—
Specifies the index of the cipher in the list.
Values—
1 to 255

 

cipher-name—
Specifies the algorithm used when performing encryption or decryption.
Values—
For SSHv1: Client ciphers: des, 3des, blowfish Server ciphers: 3des, blowfish Table 21 lists the default ciphers used for SSHv1:

 

Table 21:  SSHv1 Default Ciphers 

Cipher index value

Cipher name

200

3des

205

blowfish

210

des

Note:

blowfish and des are not permitted in FIPS-140-2 mode.

Values—
For SSHv2: Client ciphers: 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes128-cbc, aes192-cbc, aes256-cbc, rijndael-cbc, aes128-ctr, aes192-ctr, aes256-ctr Server ciphers: 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes128-cbc, aes192-cbc, aes256-cbc, rijndael-cbc, aes128-ctr, aes192-ctr, aes256-ctr
Table 22 lists the default ciphers used for SSHv2:

 

Table 22:  SSHv2 Default Ciphers 

Cipher index value

Cipher name

190

aes256-ctr

192

aes192-ctr

194

aes128-ctr

200

aes128-cbc

205

3des-cbc

210

blowfish-cbc

215

cast128-cbc

220

arcfour

225

aes192-cbc

230

aes256-cbc

235

rijndael-cbc

Note:

blowfish-cbc, cast128-cbc, arcfour, and rijndael-cbc are not permitted in FIPS-140-2 mode.

client-kex-list

Syntax 
client-kex-list
Context 
config>system>security>ssh
Description 

This command enables the context to configure SSH KEX algorithms for SR OS as a client.

An empty list is the default list that the SSH KEX advertises. The default list contains the following:

diffie-hellman-group16-sha512

diffie-hellman-group14-sha256

diffie-hellman-group14-sha1

diffie-hellman-group14-sha1

diffie-hellman-group1-sha1

kex

Syntax 
kex index name kex-name
no kex index
Context 
config>system>security>ssh>client-kex-list
config>system>security>ssh>server-kex-list
Description 

This command allows the user to configure phase 1 SSH v2 KEX algorithms for SR OS as an SSH server or an SSH client. By default, the client and server lists are empty. If the user configures this list, SSH uses the hard-coded list with the first-listed algorithm having the highest priority and so on. An empty server or client list is the default list and contains the following algorithms:

diffie-hellman-group16-sha512

diffie-hellman-group14-sha256

diffie-hellman-group14-sha1

diffie-hellman-group14-sha1

diffie-hellman-group1-sha1

The no form of this command removes the specified KEX index. If all KEX indexes are removed, the default list is used again.

Parameters 
index—
Specifies the index of the algorithm in the list.The lowest index in the list is negotiated first on the SSH negotiation list, while the highest index is at the bottom of the SSH negotiation list.
Values—
1 to 255

 

kex-name—
Specifies the KEX algorithm for computing the shared secret key.
Values—
diffie-hellman-group16-sha512, diffie-hellman-group14-sha256, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1, diffie-hellman-group1-sha1

 

client-mac-list

Syntax 
client-mac-list
Context 
config>system>security>ssh
Description 

This command enables the context to configure SSH MAC algorithms for SR OS as a client.

mac

Syntax 
mac index name mac-name
no mac index
Context 
config>system>security>ssh>client-mac-list
config>system>security>ssh>server-mac-list
Description 

This command allows the user to configure SSH MAC algorithms for SR OS as an SSH server or an SSH client.

The no form of this command removes the specified mac index.

Default 

no mac index

Parameters 
index—
Specifies the index of the algorithm in the list.
Values—
1 to 255

 

mac-name—
Specifies the algorithm for calculating the message authentication code.
Values—
Table 23 lists the default client/server algorithms used for SSHv2.

 

Table 23:  SSHv2 Default client/server algorithms 

index

mac-name

200

hmac-sha2-512

210

hmac-sha2-256

215

hmac-sha1

220

hmac-sha1-96

225

hmac-md5

230

hmac-ripemd160

235

hmac-ripemd160-openssh-com

240

hmac-md5-96

key-re-exchange

Syntax 
key-re-exchange
Context 
config>system>security>ssh
Description 

This command enables the key re-exchange context.

client

Syntax 
client
Context 
config>system>security>ssh>key-re-exchange
Description 

This command enables the key re-exchange context for SR OS as an SSH client.

mbytes

Syntax 
mbytes {mbytes | disable}
no mbytes
Context 
config>system>security>ssh>key-re-exchange>client
config>system>security>ssh>key-re-exchange>server
Description 

This command configures the maximum bytes to be transmitted before a key re-exchange is initiated by the server.

The no form of this command reverts to the default value.

Default 

mbytes 1024

Parameters 
mbytes—
Specifies the number of megabytes, on a SSH session, after which the SSH client initiates the key-re-exchange.
Values—
1 to 64000

 

Default—
1024
disable—
Specifies that a session will never timeout. To re-enable mbytes, enter the command without the disable option.

minutes

Syntax 
minutes {minutes | disable}
no minutes
Context 
config>system>security>ssh>key-re-exchange>client
config>system>security>ssh>key-re-exchange>server
Description 

This command configures the maximum time, in minutes, before a key re-exchange is initiated by the server.

The no form of this command reverts to the default value.

Default 

minutes 60

Parameters 
minutes—
Specifies the time interval, in minutes, after which the SSH client will initiate the key-re-exchange.
Values—
1 to 1440

 

Default—
60
disable—
Specifies that a session will never timeout. To re-enable minutes, enter the command without the disable option.

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>ssh>key-re-exchange>client
config>system>security>ssh>key-re-exchange>server
Description 

This command stops the key exchange. It sets the minutes and bytes to infinity so there will not be any key exchange during the PDU transmission.

Default 

no shutdown

server

Syntax 
server
Context 
config>system>security>ssh>key-re-exchange
Description 

This command enables the key re-exchange context for the SSH server.

preserve-key

Syntax 
[no] preserve-key
Context 
config>system>security>ssh
Description 

After enabling this command, private keys, public keys, and host key file are saved by the server. It is restored following a system reboot or the ssh server restart.

The no form of this command specifies that the keys are held in memory by an SSH server and is not restored following a system reboot.

Default 

no preserve-key

server-cipher-list

Syntax 
server-cipher-list protocol-version version
Context 
config>system>security>ssh
Description 

This command enables the configuration of the list of allowed ciphers by the SSH server.

Parameters 
version—
Specifies the SSH version.
Values—
1 — Specifies that the SSH server only accepts connections from clients that support SSH protocol version 1 2 — Specifies that the SSH server accepts connections from clients supporting either SSH protocol version 2

 

server-kex-list

Syntax 
server-kex-list
Context 
config>system>security>ssh
Description 

This command allows the user to configure SSH KEX algorithms for SR OS as an SSH server.

An empty list is the default list that the SSH KEX advertises. The default list contains the following:

diffie-hellman-group16-sha512

diffie-hellman-group14-sha256

diffie-hellman-group14-sha1

diffie-hellman-group14-sha1

diffie-hellman-group1-sha1

server-mac-list

Syntax 
server-mac-list
Context 
config>system>security>ssh
Description 

This command allows the user to configure SSH MAC algorithms for SR OS as an SSH server.

server-shutdown

Syntax 
[no] server-shutdown
Context 
config>system>security>ssh
Description 

This command enables the SSH servers running on the system.

Default 

no server-shutdown

version

Syntax 
version ssh-version
no version
Context 
config>system>security>ssh
Description 

This command configures the SSH protocol version that will be supported by the SSH server.

The no form of this command removes the SSH version from the configuration.

Parameters 
ssh-version—
Specifies the SSH version.
Values—
1 — Specifies that the SSH server will only accept connections from clients that support SSH protocol version 1 2 — Specifies that the SSH server will accept connections from clients supporting either SSH protocol version 2 1-2 — Specifies that the SSH server will accept connections from clients supporting either SSH protocol version 1, or SSH protocol version 2 or both.
Note:

Values “1” and “1-2” are not permitted in FIPS-140-2 mode.

 

Default—
2

telnet-server

Syntax 
[no] telnet-server
Context 
config>system>security
Description 

This command enables Telnet servers running on the system.

Telnet servers are shut down by default. At system startup, only SSH servers are enabled.

Telnet servers in networks limit a Telnet clients to three retries to login. The Telnet server disconnects the Telnet client session after three retries.

The no form of this command disables Telnet servers running on the system.

telnet6-server

Syntax 
[no] telnet6-server
Context 
config>system>security
Description 

This command enables Telnet IPv6 servers running on the system and only applies to the 7750 SR and 7950 XRS.

Telnet servers are shut down by default. At system startup, only SSH servers are enabled.

The no form of this command disables Telnet IPv6 servers running on the system.

vprn-network-exceptions

Syntax 
vprn-network-exceptions number seconds
no vprn-network-exceptions
Context 
config>system>security
Description 

This command configures the rate to limit the processing of packets with label TTL expiry received within an LSP shortcut, or within all VPRN instances in the system, and from all network IP interfaces. This includes labeled user and control plane packets, ping and traceroute packets within GRT and VPRN, and ICMP replies. Packets over the configured rate are dropped.

This feature does not rate limit MPLS and service OAM packets (vprn-ping, vprn-trace, lsp-ping, lsp-trace, vccv-ping, and vccv-trace).

The no form of this command disables the rate limiting of the reply to these packets.

This feature only applies to the 7750 SR and 7950 XRS.

Parameters 
number—
Specifies the number limit of MPLS exception messages.
Values—
10 to 10,000

 

seconds—
Specifies the rate limit of MPLS exception messages, in seconds.
Values—
1 to 60

 

2.8.2.3. LLDP Commands

lldp

Syntax 
lldp
Context 
config>system
Description 

This command enables the context to configure system-wide Link Layer Discovery Protocol parameters.

message-fast-tx

Syntax 
message-fast-tx time
no message-fast-tx
Context 
config>system>lldp
Description 

This command configures the duration of the fast transmission period.

The no form of this command reverts to the default value.

Default 

no message-fast-tx

Parameters 
time—
Specifies the fast transmission period in seconds.
Values—
1 to 3600

 

Default—
1

message-fast-tx-init

Syntax 
message-fast-tx-init count
no message-fast-tx-init
Context 
config>system>lldp
Description 

This command configures the number of LLDPDUs to send during the fast transmission period.

The no form of this command reverts to the default value.

Default 

no message-fast-tx-init

Parameters 
count—
Specifies the number of LLDPDUs to send during the fast transmission period.
Values—
1 to 8

 

Default—
4

notification-interval

Syntax 
notification-interval time
no notification-interval
Context 
config>system>lldp
Description 

This command configures the minimum time between change notifications.

The no form of this command reverts to the default value.

Default 

no notification-interval

Parameters 
time—
Specifies the minimum time, in seconds, between change notifications.
Values—
5 to 3600

 

Default—
5

reinit-delay

Syntax 
reinit-delay time
no reinit-delay
Context 
config>system>lldp
Description 

This command configures the time before re-initializing LLDP on a port.

The no form of this command reverts to the default value.

Default 

no reinit-delay

Parameters 
time—
Specifies the time, in seconds, before re-initializing LLDP on a port.
Values—
1 to 10

 

Default—
2

tx-credit-max

Syntax 
tx-credit-max count
no tx-credit-max
Context 
config>system>lldp
Description 

This command configures the maximum consecutive LLDPDUs transmitted.

The no form of this command reverts to the default value.

Default 

no tx-credit-max

Parameters 
count—
Specifies the maximum consecutive LLDPDUs transmitted.
Values—
1 to 100

 

Default—
5

tx-hold-multiplier

Syntax 
tx-hold-multiplier multiplier
no tx-hold-multiplier
Context 
config>system>lldp
Description 

This command configures the multiplier of the tx-interval.

The no form of this command reverts to the default value.

Default 

no tx-hold-multiplier

Parameters 
multiplier—
Specifies the multiplier of the tx-interval.
Values—
2 to 10

 

Default—
4

tx-interval

Syntax 
tx-interval interval
no tx-interval
Context 
config>system>lldp
Description 

This command configures the LLDP transmit interval time.

The no form of this command reverts to the default value.

Default 

no tx-interval

Parameters 
interval—
Specifies the LLDP transmit interval time.
Values—
5 to 32768

 

Default—
30

2.8.2.4. Management Access Filter Commands

management-access-filter

Syntax 
[no] management-access-filter
Context 
config>system>security
Description 

This command creates the context to edit management access filters and to reset match criteria.

Management access filters control all traffic in and out of the CPM. They can be used to restrict management of the router by other nodes outside either specific (sub)networks or through designated ports.

Management filters, as opposed to other traffic filters, are enforced by system software.

The no form of this command removes management access filters from the configuration.

ip-filter

Syntax 
[no] ip-filter
Context 
config>system>security>mgmt-access-filter
Description 

This command enables the context to configure management access IP filter parameters.

ipv6-filter

Syntax 
[no] ipv6-filter
Context 
config>system>security>mgmt-access-filter
Description 

This command enables the context to configure management access IPv6 filter parameters. This command only applies to the 7750 SR and 7950 XRS.

mac-filter

Syntax 
[no] mac-filter
Context 
config>system>security>mgmt-access-filter
Description 

This command configures a management access MAC-filter.

default-action

Syntax 
default-action {permit | deny | deny-host-unreachable}
Context 
config>system>security>mgmt-access-filter>ip-filter
config>system>security>mgmt-access-filter>ipv6-filter
config>system>security>mgmt-access-filter>mac-filter
Description 

This command creates the default action for management access in the absence of a specific management access filter match.

The default-action is applied to a packet that does not satisfy any match criteria in any of the management access filters. Whenever management access filters are configured, the default-action must be defined.

Parameters 
permit—
Specifies that packets not matching the configured selection criteria in any of the filter entries will be permitted.
deny—
Specifies that packets not matching the selection criteria be denied and that an ICMP host unreachable message will not be issued.
deny-host-unreachable—
Specifies that packets not matching the selection criteria be denied access and that an ICMP host unreachable message will be issued.

The deny-host-unreachable only applies to ip-filter and ipv6filter.

entry

Syntax 
[no] entry entry-id
Context 
config>system>security>mgmt-access-filter>ip-filter
config>system>security>mgmt-access-filter>ipv6-filter
config>system>security>mgmt-access-filter>mac-filter
Description 

This command is used to create or edit a management access IP(v4), IPv6, or MAC filter entry. Multiple entries can be created with unique entry-id numbers. The OS exits the filter upon the first match found and executes the actions according to the respective action command. For this reason, entries must be sequenced correctly from most to least explicit.

An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action defined to be considered complete. Entries without the action keyword are considered incomplete and inactive.

The no form of this command removes the specified entry from the management access filter.

Parameters 
entry-id—
Specifies an entry ID uniquely identifies a match criteria and the corresponding action. It is recommended that entries are numbered in staggered increments. This allows users to insert a new entry in an existing policy without having to renumber the existing entries.
Values—
1 to 9999

 

action

Syntax 
action {permit | deny | deny-host-unreachable}
no action
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
config>system>security>mgmt-access-filter>mac-filter>entry
Description 

This command creates the action associated with the management access filter match criteria entry.

The action keyword is required. If no action is defined, the filter is ignored. If multiple action statements are configured, the last one overwrites previous configured actions.

If the packet does not meet any of the match criteria the configured default action is applied.

Parameters 
permit
Specifies that packets matching the configured criteria will be permitted.
deny—
Specifies that packets matching the configured selection criteria will be denied and that a ICMP host unreachable message will not be issued.
deny-host-unreachable—
Specifies that packets matching the configured selection criteria will be denied and that a host unreachable message will not be issued.

The deny-host-unreachable parameter only applies to ip-filter and ipv6-filter.

dst-port

Syntax 
dst-port value [mask]
no dst-port
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
Description 

This command configures a destination TCP or UDP port number or port range for a management access filter match criterion.

The no form of this command removes the destination port match criterion.

Parameters 
value—
Specifies the destination TCP or UDP port number as match criteria.
Values—
1 to 65535 (decimal)

 

mask—
Specifies the mask used to specify a range of destination port numbers as the match criterion.

This 16 bit mask can be configured using the formats described in Table 24:

Table 24:  Format Styles to Configure Mask 

Format Style

Format Syntax

Example

Decimal

DDDDD

63488

Hexadecimal

0xHHHH

0xF800

Binary

0bBBBBBBBBBBBBBBBB

0b1111100000000000

To select a range from 1024 up to 2047, specify 1024 0xFC00 for value and mask.

Default—
65535 (exact match)
Values—
1 to 65535 (decimal)

 

log

Syntax 
[no] log
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
config>system>security>mgmt-access-filter>mac-filter>entry
Description 

This command enables match logging. When enabled, matches on this entry will cause the Security event mafEntryMatch to be raised.

Default 

no log

protocol

Syntax 
protocol protocol-id
no protocol
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
Description 

This command configures an IP protocol type to be used as a management access filter match criterion.

The protocol type, such as TCP, UDP, and OSPF, is identified by its respective protocol number. Well-known protocol numbers include ICMP (1), TCP (6), and UDP (17).

The no form the command removes the protocol from the match criteria.

Parameters 
protocol—
Specifies the protocol number for the match criterion.
Values—
1 to 255 (decimal)

 

flow-label

Syntax 
flow-label value
no flow-label
Context 
config>system>security>mgmt-access-filter>ipv6-filter>entry
Description 

This command configures flow label match conditions. Flow labeling enables the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default quality of service or real-time service. This command only applies to the 7750 SR and 7950 XRS.

Parameters 
value—
Specifies the flow identifier in an IPv6 packet header that can be used to discriminate traffic flows (See RFC 3595, Textual Conventions for IPv6 Flow Label.)
Values—
0 to 1048575

 

next-header

Syntax 
next-header next-header
no next-header
Context 
config>system>security>mgmt-access-filter>ipv6-filter>entry
Description 

This command specifies the next header to match. The protocol type such as TCP, UDP or OSPF is identified by its respective protocol number. Well-known protocol numbers include ICMP(1), TCP(6), UDP(17). IPv6 Extension headers are identified by the next header IPv6 numbers as per RFC2460. This command only applies to the 7750 SR and 7950 XRS.

Parameters 
next-header—
Specifies for IPv4 MAF the IP protocol field, and for IPv6 the next header type to be used in the match criteria for this Management Access Filter Entry.
Values—

next-header:

0 to 255, protocol numbers accepted in DHB

keywords:

none, crtp, crudp, egp, eigrp, encap, ether-ip, gre, icmp, drp, igmp, igp, ip, ipv6, ipv6-icmp, ipv6-no-nxt, isis, iso-ip, l2tp, spf-igp, pim, pnni, ptp, rdp, rsvp, stp, tcp, udp, vrrp

 

router

Syntax 
router service-name service-name
router router-instance
no router
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
Description 

This command configures a router name or service ID to be used as a management access filter match criterion.

The no form the command removes the router name or service ID from the match criteria.

Parameters 
router-instance—
Specifies one of the following parameters for the router instance:

router-name — Specifies a router name or CPM router instance, up to 32 characters to be used in the match criteria.

Values

“Base” | “management” | “vpls-management”

Default

Base

vprn-svc-id — Specifies a CPM router instance to be used in the match criteria.

Values—
1 to 2147483647

 

service name—
Specifies an existing service name, up to 64 characters.

src-ip

Syntax 
src-ip {ip-prefix/mask | ip-prefix netmask}
no src-ip
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
Description 

This command configures a source IP address range prefix to be used as a management access filter match criterion.

The no form of this command removes the source IP address match criterion.

Default 

no src-ip

Parameters 
ip-prefix—
Specifies the IP prefix for the IP match criterion in dotted decimal notation.
mask—
Specifies the subnet mask length expressed as a decimal integer.
Values—
1 to 32 (mask length), 0.0.0.0 to 255.255.255.255 (dotted decimal)

 

netmask—
Specifies the dotted quad equivalent of the mask length.
Values—
0.0.0.0 to 255.255.255.255

 

src-ip

Syntax 
[no] src-ip {ipv6-address | prefix-length}
Context 
config>system>security>mgmt-access-filter>ipv6-filter>entry
Description 

This command configures a source IPv6 address range prefix to be used as a management access filter match criterion. This command only applies to the 7750 SR and 7950 XRS.

The no form of this command removes the source IPv6 address match criterion.

Default 

no src-ip

Parameters 
ipv6-address/prefix-length—
Specifies the IPv6 address for the IPv6 match criterion in dotted decimal notation. An IPv6 IP address is written as eight 4-digit (16-bit) hexadecimal numbers separated by colons. One string of zeros per address can be left out, so that 2001:db8::0:217A is the same as 2001:db8:0:0:0:0:0:217A.
Values—

ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x: [0..FFFF]H

d: [0..255]D

prefix-length

1 to 128

 

src-port

Syntax 
src-port {port-id | cpm | lag lag-id}
no src-port
Context 
config>system>security>mgmt-access-filter>ip-filter>entry
config>system>security>mgmt-access-filter>ipv6-filter>entry
Description 

This command restricts ingress management traffic to either the CPM/CCM Ethernet port or any other logical port (for example LAG) on the device.

When the source interface is configured, only management traffic arriving on those ports satisfy the match criteria.

The no form of this command reverts to the default value.

Default 

no src-port

Parameters 
port-id—
Specifies the port ID in formats shown below.
Values—

slot/mda/port[.channel]

bundle-id

bundle-type-slot/mda.bundle-num

  bundle

keyword

  type

ima, fr, or ppp

  bundle-num

1 to 336

bpgrp-id

bpgrp-type-bpgrp-num

bpgrp

keyword

  type

ima or ppp

  bpgrp-num

1 to 2000

aps-id

aps-group-id[.channel]

  aps

keyword

  group-id

1 to 128

ccag-id

ccag-id. path-id[cc-type]

  ccag

keyword

  id

1 to 8

  path-id

a, b

  cc-type

.sap-net, .net-sap

 

cpm—
Matches any traffic received on any Ethernet port.
lag-id—
Specifies the LAG identifier.
Values—
1 to 800

 

renum

Syntax 
renum old-entry-number new-entry-number
Context 
config>system>security>mgmt-access-filter>ip-filter
config>system>security>mgmt-access-filter>ipv6-filter
config>system>security>mgmt-access-filter>mac-filter
Description 

This command renumbers existing management access filter entries for an IP(v4), IPv6, or MAC filter to re-sequence filter entries.

The exits on the first match found and executes the actions in accordance with the accompanying action command. This may require some entries to be re-numbered differently from most to least explicit.

Parameters 
old-entry-number—
Specifies the entry number of the existing entry.
Values—
1 to 9999

 

new-entry-number—
Specifies the new entry number that will replace the old entry number.
Values—
1 to 9999

 

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>mgmt-access-filter>ip-filter
config>system>security>mgmt-access-filter>ipv6-filter
config>system>security>mgmt-access-filter>mac-filter
Description 

This command disables the management-access-filter.

match

Syntax 
match [frame-type frame-type]
no match
Context 
config>system>security>mgmt-access-filter>mac-filter>entry
Description 

This command configures math criteria for this MAC filter entry.

Parameters 
frame-type
Specifies the type of MAC frame to use as match criteria.
Values—
802dot3 | 802dot2-llc | 802dot2-snap | 802dot1ag | ethernet_II

 

Default—
802dot3

cfm-opcode

Syntax 
cfm-opcode {lt | gt | eq} opcode
cfm-opcode range start end
no cfm-opcode
Context 
config>system>security>mgmt-access-filter>mac-filter>entry>match
Description 

This command specifies the type of opcode checking to be performed.

If the cfm-opcode match condition is configured then a check must be made to see if the Ethertype is either IEEE802.1ag or Y1731. If the Ethertype does not match then the packet is not CFM and no match to the cfm-opcode is attempted.

The CFM (ieee802.1ag or Y1731) opcode can be assigned as a range with a start and an end number or with a (less than lt, greater than gt, or equal to eq) operator.

If no range with a start and an end or operator (lt, gt, eq) followed by an opcode with the value between 0 and 255 is defined then the command is invalid.

Table 25 lists the opcode values.

Table 25:  Opcode Values  

CFM PDU or Organization

Acronym

Configurable Numeric Value (Range)

Reserved for IEEE 802.1 0

0

Continuity Check Message

CCM

1

Loopback Reply

LBR

2

Loopback Message

LBM

3

Linktrace Reply

LTR

4

Linktrace Message

LTM

5

Reserved for IEEE 802.1

6 – 31

Reserved for ITU

32

AIS

33

Reserved for ITU

34

LCK

35

Reserved for ITU

36

TST

37

Reserved for ITU

38

APS

39

Reserved for ITU

40

MCC

41

LMR

42

LMM

43

Reserved for ITU

44

1DM

45

DMR

46

DMM

47

Reserved for ITU

48 – 63

Reserved for IEEE 802.1 0

64 - 255

Defined by ITU-T Y.1731 32 - 63

Defined by IEEE 802.1. 64 - 255

Default 

no cfm-opcode

Parameters 
opcode—
Specifies the opcode checking to be performed.
start—
specifies the start number.
Values—
0 to 255

 

end—
Specifies the end number.
Values—
0 to 255

 

lt | gt | eq—
Specifies comparison operators.

dot1p

Syntax 
dot1p dot1p-value [dot1p-mask]
Context 
config>system>security>mgmt-access-filter>mac-filter>entry>match
Description 

This command configures Dot1p match conditions.

Table 26:  Management Access Filter dot1p Mask Format 

Format Style

Format Syntax

Example

Decimal

D

4

Hexadecimal

0xH

0x4

Binary

0bBBB

0b100

Parameters 
dot1p-value—
Specifies the IEEE 802.1p value in decimal.
Values—
0 to 7

 

mask—
Specifies the 3-bit mask can be configured using the following formats.

dsap

Syntax 
dsap dsap-value [dsap-mask]
Context 
config>system>security>mgmt-access-filter>mac-filter>entry>match
Description 

This command configures DSAP match conditions.

Parameters 
dsap-value—
Specifies the 8-bit DSAP match criteria value in hexadecimal.
Values—
0x00 to 0xFF (hex)

 

mask—
Specifies a range of DSAP values to use as the match criteria.

This 8 bit mask can be configured using the formats described in Table 27:

Table 27:  Format Styles 

Format Style

Format Syntax

Example

Decimal

DDD

240

Hexadecimal

0xHH

0xF0

Binary

0bBBBBBBBB

0b11110000

Default—
FF (hex) (exact match)
Values—
0x00 to 0xFF

 

dst-mac

Syntax 
dst-mac ieee-address [ieee-address-mask]
no dst-mac
Context 
config>system>security>mgmt-access-filter>mac-filter>entry>match
Description 

This command configures the destination MAC match condition.

Parameters 
ieee-address—
Specifies the MAC address to be used as a match criterion.
Values—
HH:HH:HH:HH:HH:HH or HH-HH-HH-HH-HH-HH where H is a hexadecimal digit

 

mask—
Specifies a 48-bit mask to match a range of MAC address values.

etype

Syntax 
etype 0x0600xx0xffff
no etype
Context 
config>system>security>mgmt-access-filter>mac-filter>entry>match
Description 

Configures an Ethernet type II Ethertype value to be used as a MAC filter match criterion.

The Ethernet type field is a two-byte field used to identify the protocol carried by the Ethernet frame. For example, 0800 is used to identify the IPv4 packets.

The Ethernet type field is used by the Ethernet version-II frames. IEEE 802.3 Ethernet frames do not use the type field. For IEEE 802.3 frames, use the dsap, ssap or snap-pid fields as match criteria.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria. Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Router Configuration Guide for information about MAC Match Criteria Exclusivity Rules fields that are exclusive based on the frame format.

The no form of this command removes the previously entered etype field as the match criteria.

Default 

no etype

Parameters 
ethernet-type—
Specifies the Ethernet type II frame Ethertype value to be used as a match criterion expressed in hexadecimal.
Values—
0x0600 to 0xFFFF

 

snap-oui

Syntax 
snap-oui {zero | non-zero}
no snap-oui
Context 
config>system>security>mgmt-access-filter>mac-filter>entry>match
Description 

This command configures an IEEE 802.3 LLC SNAP Ethernet Frame OUI zero or non-zero value to be used as a MAC filter match criterion.

The no form of this command removes the criterion from the match criteria.

Default 

no snap-oui

Parameters 
zero—
Specifies to match packets with the three-byte OUI field in the SNAP-ID set to zero.
non-zero—
Specifies to match packets with the three-byte OUI field in the SNAP-ID not set to zero.

snap-pid

Syntax 
snap-pid snap-pid
no snap-pid
Context 
config>system>security>mgmt-access-filter>mac-filter>entry>match
Description 

This command configures an IEEE 802.3 LLC SNAP Ethernet Frame PID value to be used as a MAC filter match criterion.

This is a two-byte protocol id that is part of the IEEE 802.3 LLC SNAP Ethernet Frame that follows the three-byte OUI field.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria. Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Router Configuration Guide for information about MAC Match Criteria Exclusivity Rules fields that are exclusive based on the frame format.

Note:

The snap-pid match criterion is independent of the OUI field within the SNAP header. Two packets with different three-byte OUI fields but the same PID field will both match the same filter entry based on a snap-pid match criteria.

The no form of this command removes the snap-pid value as the match criteria.

Default 

no snap-pid

Parameters 
pid-value—
Specifies the two-byte snap-pid value to be used as a match criterion in hexadecimal.
Values—
0x0000 to 0xFFFF

 

src-mac

Syntax 
src-mac ieee-address [ieee-address-mask]
no src-mac
Context 
config>system>security>mgmt-access-filter>mac-filter>entry>match
Description 

This command configures a source MAC address or range to be used as a MAC filter match criterion.

The no form of this command removes the source mac as the match criteria.

Default 

no src-mac

Parameters 
ieee-address—
Specifies the 48-bit IEEE mac address to be used as a match criterion.
Values—
HH:HH:HH:HH:HH:HH or HH-HH-HH-HH-HH-HH where H is a hexadecimal digit

 

ieee-address-mask—
Specifies a 48-bit mask that can be configured using the formats listed in Table 28:
Table 28:  ieee-address-mask Formats 

Format Style

Format Syntax

Example

Decimal

DDDDDDDDDDDDDD

281474959933440

Hexadecimal

0xHHHHHHHHHHHH

0x0FFFFF000000

Binary

0bBBBBBBB...B

0b11110000...B

To configure so that all packets with a source MAC OUI value of 00-03-FA are subject to a match condition then the entry should be specified as: 003FA000000 0xFFFFFF000000

Default—
0xFFFFFFFFFFFF (exact match)
Values—
0x00000000000000 to 0xFFFFFFFFFFFF

 

ssap

Syntax 
ssap ssap-value [ssap-mask]
no ssap
Context 
config>system>security>mgmt-access-filter>mac-filter>entry>match
Description 

This command configures an Ethernet 802.2 LLC SSAP value or range for a MAC filter match criterion.

This is a one-byte field that is part of the 802.2 LLC header of the IEEE 802.3 Ethernet Frame.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria. Refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Router Configuration Guide for information about MAC Match Criteria Exclusivity Rules fields that are exclusive based on the frame format.

The no form of this command removes the SSAP match criterion.

Default 

no ssap

Parameters 
ssap-value—
Specifies the 8-bit SSAP match criteria value in hex.
Values—
0x00 to 0xFF

 

ssap-mask—
Specifies a range of SSAP values to use as the match criteria.

svc-id

Syntax 
svc-id service-id
no svc-id
Context 
config>system>security>mgmt-access-filter>mac-filter>entry>match
Description 

This command specifies an existing svc-id to use as a match condition.

Parameters 
service-id—
Specifies a service-id to match.
Values—
service-id: 1 to 2147483647 svc-name: 64 characters maximum

 

2.8.2.5. CLI Script Authorization Commands

cli-script

Syntax 
cli-script
Context 
config>system>security
Description 

This command enables the context to configure CLI scripts.

authorization

Syntax 
authorization
Context 
config>system>security>cli-script
Description 

This command enables the context to authorize CLI script execution.

cron

Syntax 
cron
Context 
config>system>security>cli-script>authorization
Description 

This command enables the context to configure authorization for the Cron job-scheduler.

cli-user

Syntax 
cli-user user-name
no cli-user
Context 
config>system>security>cli-script>authorization>cron
config>system>security>cli-script>authorization>event-handler
config>system>security>cli-script>authorization>vsd
Description 

This command configures The user context under which various types of CLI scripts should execute in order to authorize the script commands. TACACS+ and RADIUS users and authorization are not permitted for cli-script authorization.

The no form of this command configures scripts to execute with no restrictions and without performing authorization.

Default 

no cli-user

Parameters 
user-name—
The name of a user in the local node database. TACACS+ or RADIUS users can not be used. The user configuration should reference a valid local profile for authorization.

event-handler

Syntax 
event-handler
Context 
config>system>security>cli-script>authorization
Description 

This command enables the context to configure authorization for the Event Handling System (EHS). EHS allows user-controlled programmatic exception handling by allowing a CLI script to be executed upon the detection of a log event.

vsd

Syntax 
[no] vsd
Context 
config>system>security>cli-script>authorization
Description 

This command enables the context to configure authorization for the VSD server.

The no form of this command removes all authorizations for the VSD server.

2.8.2.6. CPM Filter Commands

cpm-filter

Syntax 
cpm-filter
Context 
config>system>security
Description 

This command enables the context to configure a CPM filter. A CPM filter is a hardware filter done by the P chip on the CPM and CFM that applies to all the traffic going to the CPM CPU. It can be used to drop, accept packets, as well as allocate dedicated hardware queues for the traffic.

The no form of this command disables the CPM filter.

default-action

Syntax 
default-action {accept | drop}
Context 
config>system>security>cpm-filter
Description 

This command specifies the action to take on the traffic when the filter entry matches. If there are no filter entry defined, the packets received will either be dropped or forwarded based on that default action.

Default 

default-action accept

Parameters 
accept—
Specifies that packets matching the filter entry are forwarded.
drop—
Specifies that packets matching the filter entry are dropped.

ip-filter

Syntax 
[no] ip-filter
Context 
config>system>security>cpm-filter
Description 

This command enables the context to configure CPM IP filter parameters.

ipv6-filter

Syntax 
[no] ipv6-filter
Context 
config>system>security>cpm-filter
Description 

This command enables the context to configure CPM IPv6 filter parameters. This command applies only to the 7750 SR and 7950 XRS.

mac-filter

Syntax 
[no] mac-filter
Context 
config>system>security>cpm-filter
Description 

This command enables the context to configure CPM MAC-filter parameters.

entry

Syntax 
entry entry-id
Context 
config>sys>sec>cpm>ip-filter
config>sys>sec>cpm>ipv6-filter
config>sys>sec>cpm>mac-filter
Description 

This command specifies a particular CPM filter match entry. Every CPM filter must have at least one filter match entry. Entries are created and deleted by user.

The default match criteria is match none.

Parameters 
entry-id—
Identifies a CPM filter entry as configured on this system.
Values—
1 to 131072

 

action

Syntax 
action [accept | drop | queue queue-id]
no action
Context 
config>sys>sec>cpm>ip-filter>entry
config>sys>sec>cpm>ipv6-filter>entry
config>sys>sec>cpm>mac-filter>entry
Description 

This command specifies the action to take for packets that match this filter entry.

Default 

action drop

Parameters 
accept—
Specifies packets matching the entry criteria will be forwarded.
drop—
Specifies packets matching the entry criteria will be dropped.
queue queue-id
Specifies packets matching the entry criteria will be forward to the specified CPM hardware queue.

log

Syntax 
log log-id
Context 
config>sys>sec>cpm>ip-filter>entry
config>sys>sec>cpm>ipv6-filter>entry
config>sys>sec>cpm>mac-filter>entry
Description 

This command specifies the log in which packets matching this entry should be entered. The value zero indicates that logging is disabled.

The no form of this command deletes the log ID.

Parameters 
log-id—
Specifies the log ID where packets matching this entry should be entered.

match

Syntax 
match [protocol protocol-id]
no match
Context 
config>sys>sec>cpm>ip-filter>entry
Description 

This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied the action associated with the match criteria is executed. If more than one match criteria (within one match statement) are configured then all criteria must be satisfied (AND function) before the action associated with the match is executed.

A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.

The no form of this command removes the match criteria for the entry-id.

Parameters 
protocol—
Configures an IP protocol to be used as an IP filter match criterion. The protocol type such as TCP or UDP is identified by its respective protocol number.
protocol-id—
Configures the decimal value representing the IP protocol to be used as an IP filter match criterion. Well known protocol numbers include ICMP(1), TCP(6), UDP(17). The no form the command removes the protocol from the match criteria.
Values—
1 to 255 (values can be expressed in decimal, hexadecimal, or binary) keywords - none, crtp, crudp, egp, eigrp, encap, ether-ip, gre, icmp, idrp, igmp, igp, ip, ipv6, ipv6-frag, ipv6-icmp, ipv6-no-nxt, ipv6-opts, ipv6-route, isis, iso-ip, l2tp, ospf-igp, pnni, ptp, rdp, rsvp, stp, tcp, udp, vrrp, * — udp/tcp wildcard

 

Table 29:  IP Protocol Names  

Protocol

Protocol ID

Description

icmp

1

Internet Control Message

igmp

2

Internet Group Management

ip

4

IP in IP (encapsulation)

tcp

6

Transmission Control

egp

8

Exterior Gateway Protocol

igp

9

any private interior gateway (used by Cisco for their IGRP)

udp

17

User Datagram

rdp

27

Reliable Data Protocol

ipv6

41

IPv6

ipv6-route

43

Routing Header for IPv6

ipv6-frag

44

Fragment Header for IPv6

idrp

45

Inter-Domain Routing Protocol

rsvp

46

Reservation Protocol

gre

47

General Routing Encapsulation

ipv6-icmp

58

ICMP for IPv6

ipv6-no-nxt

59

No Next Header for IPv6

ipv6-opts

60

Destination Options for IPv6

iso-ip

80

ISO Internet Protocol

eigrp

88

EIGRP

ospf-igp

89

OSPFIGP

ether-ip

97

Ethernet-within-IP Encapsulation

encap

98

Encapsulation Header

pnni

102

PNNI over IP

pim

103

Protocol Independent Multicast

vrrp

112

Virtual Router Redundancy Protocol

l2tp

115

Layer Two Tunneling Protocol

stp

118

Spanning Tree Protocol

ptp

123

Performance Transparency Protocol

isis

124

ISIS over IPv4

crtp

126

Combat Radio Transport Protocol

crudp

127

Combat Radio User Datagram

match

Syntax 
match [next-header next-header]
no match
Context 
config>sys>sec>cpm>ipv6-filter>entry
Description 

This command specifies match criteria for the IP filter entry. This command applies only the 775 SR and 7950 XRS.

The no form of this command removes the match criteria for the entry-id.

Parameters 
next-header—
Specifies the next header to match.

The protocol type such as TCP / UDP / OSPF is identified by its respective protocol number. Well-known protocol numbers include ICMP(1), TCP(6), UDP(17).

Values—

next-header:

1 to 42, 45 to 49, 52 to 59, 61 to 255 protocol numbers accepted in DHB

keywords:

none, crtp, crudp, egp, eigrp, encap, ether-ip, gre, icmp, drp, igmp, igp, ip, ipv6, ipv6-icmp, ipv6-no-nxt, isis, iso-ip, l2tp, spf-igp, pim, pnni, ptp, rdp, rsvp, stp, tcp, udp, vrrp

* — udp/tcp wildcard

 

dscp

Syntax 
dscp dscp-name
no dscp
Context 
config>sys>sec>cpm>ip-filter>entry>match
config>sys>sec>cpm>ipv6-filter>entry>match
config>sys>sec>cpm>mac-filter>entry>match
Description 

This command configures a DiffServ Code Point (DSCP) name to be used as an IP filter match criterion.

The no form of this command removes the DSCP match criterion.

Default 

no dscp

Parameters 
dscp-name—
Configures a dscp name that has been previously mapped to a value using the dscp-name command. The DiffServ code point may only be specified by its name.

dst-ip

Syntax 
dst-ip ip-address/mask
dst-ip ip-address netmask
dst-ip ip-prefix-list ip-prefix-list-name
no dst-ip
Context 
config>sys>sec>cpm>ip-filter>entry>match
Description 

This command configures a destination IP address range to be used as an IP filter match criterion.

To match on the destination IP address, specify the address and its associated mask, for example, 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.

The no form of this command removes the destination IP address match criterion.

Default 

no dst-ip

Parameters 
ip-address—
Specifies the IP address for the IP match criterion in dotted decimal notation.
Values—
0.0.0.0 to 255.255.255.255

 

ip-prefix-list —
Creates a list of IPv4 prefixes for match criteria in IPv4 ACL and CPM filter policies.
ip-prefix-list-name—
A string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
mask—
Specifies the subnet mask length expressed as a decimal integer.
Values—
1 to 32

 

netmask—
Specifies the dotted quad equivalent of the mask length.
Values—
0.0.0.0 to 255.255.255.255

 

dst-ip

Syntax 
dst-ip [ipv6-address /prefix-length] [ipv6-prefix-list ipv6-prefix-list-name]
no dst-ip
Context 
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command configures a destination IPv6 address range to be used as an IPv6 filter match criterion.

To match on the destination IPv6 address, specify the address.

The no form of this command removes the destination IP address match criterion.

This command only applies to the 7750 SR and 7950 XRS.

Default 

no dst-ip

Parameters 
ipv6-address/prefix-length—
Specifies the IPv6 address for the IPv6 match criterion in dotted decimal notation. An IPv6 IP address is written as eight 4-digit (16-bit) hexadecimal numbers separated by colons. One string of zeros per address can be left out, so that 2001:db8::0:217A is the same as 2001:db8:0:0:0:0:0:217A.
Values—

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x:

[0 to .FFFF]H

d:

[0 to 255]D

prefix-length:

1 to 128

 

ipv6-prefix-list —
Creates a list of IPv4 prefixes for match criteria in IPv4 ACL and CPM filter policies.
ipv6-prefix-list-name—
Specifies a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.

dst-port

Syntax 
dst-port [tcp/udp port-number] [mask]
dst-port port-list port-list-name
dst-port range tcp/udp port-number tcp/udp port-number
no dst-port
Context 
config>sys>sec>cpm>ip-filter>entry>match
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command specifies the TCP/UDP port or port name to match the destination-port of the packet.

Note:

An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.

The no form of this command removes the destination port match criterion.

Default 

no dst-port

Parameters 
tcp/udp port-number—
Specifies the destination port number to be used as a match criteria expressed as a decimal integer.
Values—
0 to 65535 (accepted in decimal hex or binary)

 

port-list-name—
Specifies the port list name to be used as a match criteria for the destination port.
mask
Specifies the 16 bit mask to be applied when matching the destination port.
Values—
[0x0000 to 0xFFFF] | [0 to 65535] | [0b0000000000000000 to 0b1111111111111111]

 

flow-label

Syntax 
flow-label value
no flow-label
Context 
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command configures flow label match conditions. Flow labeling enables the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default quality of service or real-time service.

Parameters 
value—
Specifies the flow identifier in an IPv6 packet header that can be used to discriminate traffic flows (See RFC 3595, Textual Conventions for IPv6 Flow Label.)
Values—
0 to 1048575

 

fragment

Syntax 
fragment {true | false}
no fragment
Context 
config>sys>sec>cpm>ip-filter>entry>match
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command specifies fragmented or non-fragmented IP packets as an IP filter match criterion.

Note:

An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.

This command enables match on existence of IPv6 Fragmentation Extension Header in the IPv6 filter policy. To match first fragment of an IP fragmented packet, specify additional Layer 4 matching criteria in a filter policy entry. The no version of this command ignores IPv6 Fragmentation Extension Header presence/absence in a packet when evaluating match criteria of a given filter policy entry.

The no form of this command removes the match criterion.

This command enables match on existence of IPv6 Fragmentation Extension Header in the IPv6 filter policy. To match first fragment of an IP fragmented packet, specify additional Layer 4 matching criteria in a filter policy entry. The no version of this command ignores IPv6 Fragmentation Extension Header presence/absence in a packet when evaluating match criteria of a given filter policy entry.

Default 

no fragment

Parameters 
true—
Specifies to match on all fragmented IP packets. A match will occur for all packets that have either the MF (more fragment) bit set or have the Fragment Offset field of the IP header set to a non-zero value. For IPv6, packet matches if it contains IPv6 Fragmentation Extension Header.
false—
Specifies to match on all non-fragmented IP packets. Non-fragmented IP packets are packets that have the MF bit set to zero and have the Fragment Offset field also set to zero. For IPv6, packet matches if it does not contain IPv6 Fragmentation Extension Header.

hop-by-hop-opt

Syntax 
hop-by-hop-opt {true | false}
no hop-by-hop-opt
Context 
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command enables match on existence of Hop-by-Hop Options Extension Header in the IPv6 filter policy. This command applies to the 7750 SR and 7950 XRS.

The no form of this command ignores Hop-by-Hop Options Extension Header presence/absence in a packet when evaluating match criteria of a given filter policy entry.

Default 

no hop-by-hop-opt

Parameters 
true—
Match if a packet contains Hop-by-Hop Options Extension Header.
false—
Match if a packet does not contain Hop-by-Hop Options Extension Header.

icmp-code

Syntax 
icmp-code icmp-code
no icmp-code
Context 
config>sys>sec>cpm>ip-filter>entry>match
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command configures matching on ICMP code field in the ICMP header of an IP packet as an IP filter match criterion.

Note:

An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.

The behavior of the icmp-code value is dependent on the configured icmp-type value, thus a configuration with only an icmp-code value specified will have no effect. To match on the icmp-code, an associated icmp-type must also be specified.

The no form of this command removes the criterion from the match entry.

Default 

no icmp-code

Parameters 
icmp-code—
Specifies the ICMP code values that must be present to match.
Values—
0 to 255

 

icmp-type

Syntax 
icmp-type icmp-type
no icmp-type
Context 
config>sys>sec>cpm>ip-filter>entry>match
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command configures matching on ICMP type field in the ICMP header of an IP packet as an IP filter match criterion.

Note:

An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.

The no form of this command removes the criterion from the match entry.

Default 

no icmp-type

Parameters 
icmp-type—
Specifies the ICMP type values that must be present to match.
Values—
0 to 255

 

ip-option

Syntax 
ip-option ip-option-value ip-option-mask
no ip-option
Context 
config>sys>sec>cpm>ip-filter>entry>match
Description 

This command configures matching packets with a specific IP option or a range of IP options in the IP header as an IP filter match criterion.

The option-type octet contains 3 fields:

  1. 1 bit copied flag (copy options in all fragments)
  2. 2 bits option class
  3. 5 bits option number

The no form of this command removes the match criterion.

Default 

no ip-option

Parameters 
ip-option-value—
Enter the 8 bit option-type as a decimal integer. The mask is applied as an AND to the option byte, the result is compared with the option-value.

The decimal value entered for the match should be a combined value of the eight bit option type field and not just the option number. Thus to match on IP packets that contain the Router Alert option (option number =20), enter the option type of 148 (10010100).

Values—
0 to 255

 

ip-option-mask—
Specifies a range of option numbers to use as the match criteria.

This 8 bit mask can be configured using the formats described in Table 30:

Table 30:  ip-option-mask Formats 

Format Style

Format Syntax

Example

Decimal

DDD

20

Hexadecimal

0xHH

0x14

Binary

0bBBBBBBBB

0b0010100

Default—
255 (decimal) (exact match)
Values—
1 to 255 (decimal)

 

multiple-option

Syntax 
multiple-option {true | false}
no multiple-option
Context 
config>sys>sec>cpm>ip-filter>entry>match
Description 

This command configures matching packets that contain more than one option fields in the IP header as an IP filter match criterion.

The no form of this command removes the checking of the number of option fields in the IP header as a match criterion.

Default 

no multiple-option

Parameters 
­true—
Specifies matching on IP packets that contain more than one option field in the header.
false—
Specifies matching on IP packets that do not contain multiple option fields present in the header.

option-present

Syntax 
option-present {true | false}
no option-present
Context 
config>sys>sec>cpm>ip-filter>entry>match
Description 

This command configures matching packets that contain the option field or have an option field of zero in the IP header as an IP filter match criterion.

The no form of this command removes the checking of the option field in the IP header as a match criterion.

Default 

no option-present

Parameters 
true—
Specifies matching on all IP packets that contain the option field in the header. A match will occur for all packets that have the option field present. An option field of zero is considered as no option present.
false—
Specifies matching on IP packets that do not have any option field present in the IP header (an option field of zero). An option field of zero is considered as no option present.

port

Syntax 
port tcp/udp port-number [mask]
port port-list port-list-name
port range tcp/udp port-number tcp/udp port-number
no port
Context 
config>system>security>cpm-filter>ip-filter>entry>match
config>system>security>cpm-filter>ipv6-filter>entry>match
Description 

This command configures a TCP/UDP source or destination port match criterion in IPv4 and IPv6 CPM filter policies. A packet matches this criterion if packet’s TCP/UDP (as configured by protocol/next-header match) source OR destination port matches either the specified port value or a port in the specified port range or port list.

This command is mutually exclusive with src-port and dst-port commands.

The no form of this command deletes the specified port match criterion.

Default 

no port

Parameters 
tcp/udp port-number—
Specifies the source or destination port to be used as a match criterion specified as a decimal integer.
Values—
0 to 65535

 

mask
Specifies the 16 bit mask to be applied when matching the port.
Values—
[0x0000 to 0xFFFF] | [0 to 65535] | [0b0000000000000000. to 0b1111111111111111]

 

range tcp/udp port-number—
Specifies an inclusive range of source or destination port values to be used as match criteria. start of the range and end of the range are expressed as decimal integers.
Values—
start, end, port-number: 1 to 65535

 

port-list port-list-name—
Specifies a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.

router

Syntax 
router service-name service-name
router router-instance
no router
Context 
config>sys>sec>cpm>ip-filter>entry>match
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command specifies a router name or a service-id to be used in the match criteria.

Default 

no router

Parameters 
router-instance—
Specifies one of the following parameters for the router instance:

router-name — Specifies a router name up to 32 characters to be used in the match criteria.

service-id — Specifies an existing service ID to be used in the match criteria.

Values—
1 to 2147483647

 

service-name service-name—
Specifies an existing service name up to 64 characters.

src-ip

Syntax 
src-ip [ipv6-address/prefix-length| ip-prefix-list prefix-list-name]
no src-ip
Context 
config>sys>sec>cpm>ip-filter>entry>match
Description 

This command specifies the IP address to match the source IP address of the packet.

To match on the source IP address, specify the address and its associated mask, such as 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.

The no form of this command removes the source IP address match criterion.

Default 

no src-ip

Parameters 
ipv6-address/prefix-length—
Specifies the IP address for the match criterion in dotted decimal notation. An IP address is written as eight 4-digit (16-bit) hexadecimal numbers separated by colons. One string of zeros per address can be left out, so that 2001:db8::0:217A is the same as 2001:db8:0:0:0:0:0:217A.
Values—

ipv4-address

a.b.c.d (host bits must be 0)

x:x:x:x:x:x:d.d.d.d[-interface]

x: [0..FFFF]H

d: [0..255]D

interface: 32 characters maximum, mandatory for link local addresses

prefix-length

1 to 128

 

ip-prefix-list —
Creates a list of IPv4 prefixes for match criteria in IPv4 ACL and CPM filter policies.
ip-prefix-list-name—
Specifies a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.

src-ip

Syntax 
src-ip [ip-address/mask | ipv6-prefix-list ipv6-prefix-list-name]
no src-ip
Context 
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command specifies the IPv6 address to match the source IPv6 address of the packet.

To match on the source IP address, specify the address and its associated mask, such as 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.

The no form of this command removes the source IP address match criterion.

This command only applies to the 7750 SR and 7950 XRS.

Default 

no src-ip

Parameters 
ip-address/mask—
Specifies the IP address for the match criterion in dotted decimal notation. An IP address is written as eight 4-digit (16-bit) hexadecimal numbers separated by colons. One string of zeros per address can be left out, so that 2001:db8::0:217A is the same as 2001:db8:0:0:0:0:0:217A.
Values—

ipv6-address

x:x:x:x:x:x:x:x[-interface]

x:x:x:x:x:x:d.d.d.d[-interface]

x: [0..FFFF]H

d: [0..255]D

interface: 32 characters maximum, mandatory for link local addresses

mask:

Specifies eight 16-bit hexadecimal pieces representing bit match criteria.

Values

x:x:x:x:x:x:x (eight 16-bit pieces)

 

ipv6-prefix-list —
Creates a list of IPv6 prefixes for match criteria in IPv6 ACL and CPM filter policies.
ipv6-prefix-list-name—
Specifies a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.

src-port

Syntax 
src-port tcp/udp port-number [mask]
scr-port port-list port-list-name
scr-port range tcp/udp port-number tcp/udp port-number
no scr-port
Context 
config>sys>sec>cpm>ip-filter>entry>match
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command specifies the TCP/UDP port to match the source port of the packet.

Note:

An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.

Default 

no src-port

Parameters 
tcp/udp port-number—
Specifies the source port number to be used as a match criteria expressed as a decimal integer.
Values—
0 to 65535

 

port-list-name—
Specifies the port list name to be used as a match criteria for thedestination port.
mask
Specifies the 16 bit mask to be applied when matching the destination port.
Values—
[0x0000..0xFFFF] | [0..65535] | [0b0000000000000000..0b1111111111111111]

 

tcp-ack

Syntax 
tcp-ack {true | false}
no tcp-ack
Context 
config>sys>sec>cpm>ip-filter>entry>match
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command configures matching on the ACK bit being set or reset in the control bits of the TCP header of an IP or IPv6 packet as an IP filter match criterion.

Note:

An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.

The no form of this command removes the criterion from the match entry.

Default 

no tcp-ack

Parameters 
true—
Specifies matching on IP or IPv6 packets that have the ACK bit set in the control bits of the TCP header of an IP or IPv6 packet.
false—
Specifies matching on IP or IPv6 packets that do not have the ACK bit set in the control bits of the TCP header of the IP or IPv6 packet.

tcp-syn

Syntax 
tcp-syn {true | false}
no tcp-syn
Context 
config>sys>sec>cpm>ip-filter>entry>match
config>sys>sec>cpm>ipv6-filter>entry>match
Description 

This command configures matching on the SYN bit being set or reset in the control bits of the TCP header of an IP or IPv6 packet as an IP filter match criterion.

Note:

An entry containing Layer 4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information.

The SYN bit is normally set when the source of the packet wants to initiate a TCP session with the specified destination IP or IPv6 address.

The no form of this command removes the criterion from the match entry.

Default 

no tcp-syn

Parameters 
true—
Specifies matching on IP or IPv6 packets that have the SYN bit set in the control bits of the TCP header.
false—
Specifies matching on IP or IPv6 packets that do not have the SYN bit set in the control bits of the TCP header.

renum

Syntax 
renum old-entry-id new-entry-id
Context 
config>sys>sec>cpm>ip-filter
config>sys>sec>cpm>ipv6-filter
config>sys>sec>cpm>mac-filter
Description 

This command renumbers existing IP(IPv4), IPv6, or MAC filter entries to re-sequence filter entries.

This may be required in some cases since the OS exits when the first match is found and execute the actions according to the accompanying action command. This requires that entries be sequenced correctly from most to least explicit.

Parameters 
old-entry-id—
Specifies the entry number of an existing entry.
Values—
1 to 6144 for ip-filter and ipv6-filter
1 to 2048 for mac-filter

 

new-entry-id—
Specifies the new entry number to be assigned to the old entry.
Values—
1 to 6144 for ip-filter and ipv6-filter
1 to 2048 for mac-filter

 

shutdown

Syntax 
[no] shutdown
Context 
config>sys>sec>cpm>ip-filter
config>sys>sec>cpm>ipv6-filter
config>sys>sec>cpm>mac-filter
Description 

This command enables IPv4, IPv6 or MAC CPM filter.

The no form of this command disable the filter.

Default 

shutdown

2.8.2.7. CPM Queue Commands

cpm-queue

Syntax 
cpm-queue
Context 
config>system>security
Description 

This command enables the context to configure a CPM queue.

queue

Syntax 
queue queue-id [create]
Context 
config>system>security>cpm-queue
Description 

This command allows users to allocate dedicated CPM. The first available queue is 33.

Parameters 
queue-id—
33 to 2000

cbs

Syntax 
cbs cbs
no cbs
Context 
config>system>cpm-queue>queue
Description 

This command specifies the amount of buffer that can be drawn from the reserved buffer portion of the queue’s buffer pool.

Parameters 
cbs—
Specifies the committed burst size in kbytes.

mbs

Syntax 
mbs mbs
no mbs
Context 
config>system>security>cpm-queue>queue
Description 

This command specifies the maximum queue depth to which a queue can grow.

Parameters 
mbs—
Specifies the maximum burst size in kbytes.

rate

Syntax 
rate rate [cir cir]
no rate
Context 
config>system>security>cpm-queue>queue
Description 

This command specifies the maximum bandwidth that will be made available to the queue in kilobits per second (kb/s).

Parameters 
rate—
Specifies the administrative Peak Information Rate (PIR) for the queue.
cir
Specifies the amount of bandwidth committed to the queue.

2.8.2.8. CPU Protection Commands

cpu-protection

Syntax 
cpu-protection
Context 
config>sys>security
Description 

This command enters the context to configure CPU protection parameters.

included-protocols

Syntax 
included-protocols
Context 
config>sys>security>cpu-protection>ip>included-protocols
Description 

This context allows configuration of which protocols are included for ip-src-monitoring. This is system-wide configuration that applies to cpu protection globally.

dhcp

Syntax 
[no] dhcp
Context 
config>sys>security>cpu-protection>ip>included-protocols
Description 

This command includes the extracted IPv4 DHCP packets for ip-src-monitoring. IPv4 DHCP packets will be subject to the per-source-rate of CPU protection policies.

Default 

dhcp (Note this is different from the other protocols)

gtp

Syntax 
[no] gtp
Context 
config>sys>security>cpu-protection>ip>included-protocols
Description 

This command includes the extracted IPV4 GTP packets for ip-src-monitoring. IPv4 GTP packets will be subject to the per-source-rate of CPU protection policies.

Default 

no gtp

icmp

Syntax 
[no] icmp
Context 
config>sys>security>cpu-protection>ip>included-protocols
Description 

This command includes the extracted IPv4 ICMP packets for ip-src-monitoring. IPv4 ICMP packets will be subject to the per-source-rate of CPU protection policies.

Default 

no icmp

igmp

Syntax 
[no] igmp
Context 
config>sys>security>cpu-protection>ip>included-protocols
Description 

This command includes the extracted IPv4 IGMP packets for ip-src-monitoring. IPv4 IGMP packets will be subject to the per-source-rate of CPU protection policies.

Default 

no igmp

link-specific-rate

Syntax 
link-specific-rate packet-rate-limit
no link-specific-rate
Context 
config>sys>security>cpu-protection
Description 

This command configures a link-specific rate for CPU protection. This limit is applied to all ports within the system. The CPU will receive no more than the configured packet rate for all link level protocols such as LACP from any one port. The measurement is cleared each second and is based on the ingress port.

Default 

link-specific-rate 15000

Parameters 
packet-rate-limit—
Specifies a packet arrival rate limit, in packets per second, for link level protocols.
Values—
1 to 65535, max (no limit)

 

policy

Syntax 
policy cpu-protection-policy-id [create]
no policy cpu-protection-policy-id
Context 
config>sys>security>cpu-protection
Description 

This command configures CPU protection policies.

The no form of this command deletes the specified policy from the configuration.

Policies 254 and 255 are reserved as the default access and network interface policies, and cannot de deleted. The parameters within these policies can be modified. An event will be logged (warning) when the default policies are modified.

Default 

Policy 254 (default access interface policy):

  1. per-source-rate: max (no limit)
  2. overall-rate: 6000
  3. out-profile–rate: 6000
  4. alarm

Policy 255 (default network interface policy):

  1. per-source-rate: max (no limit)
  2. overall-rate: max (no limit)
  3. out-profile-rate: 3000
  4. alarm
Parameters 
cpu-protection-policy-id—
Assigns a policy ID to the specific CPU protection policy.
Values—
1 to 255

 

create—
Keyword used to create CPU protection policy. The create keyword requirement can be enabled/disabled in the environment>create context.

alarm

Syntax 
[no] alarm
Context 
config>sys>security>cpu-protection>policy
Description 

This command enables the generation of an event when a rate is exceed. The event includes information about the offending source. Only one event is generated per monitor period.

The no form of this command disables the notifications.

Default 

no alarm

eth-cfm

Syntax 
[no] eth-cfm
Context 
config>sys>security>cpu-protection>policy
Description 

Provides the construct under which the different entries within CPU policy can define the match criteria and overall arrival rate of the Ethernet Configuration and Fault Management (ETH-CFM) packets at the CPU.

entry

Syntax 
entry entry levels levels opcodes opcodes rate packet-rate-limit
no entry
Context 
config>sys>security>cpu-protection>eth-cfm
Description 

Builds the specific match and rate criteria. Up to ten entries may exist in up to four CPU protection policies.

The no form of this command reverses the match and rate criteria configured.

Default 

no entry

Parameters 
rate—
Specifies a packet rate limit in frames per second, where a “0” means drop all.
Values—
1 to 100

 

level—
Specifies a domain level.
Values—
all: Wildcard entry level
range: 0 to 7: within specified range, multiple ranges allowed
number: 0 to 7: specific level number, may be combined with range

 

opcode—
Specifies an operational code that identifies the application.
Values—
range: 0 to 255: within specified range, multiple ranges allowed
number: 0 to 255: specific level number, may be combined with range
 

 

out-profile-rate

Syntax 
out-profile-rate packet-rate-limit [log-event]
no out-profile-rate
Context 
config>sys>security>cpu-protection>policy
Description 

This command applies a packet arrival rate limit for the entire SAP/interface, above which packets will be market as discard eligible, in other words, out-profile/low-priority/yellow. The rate defined is a global rate limit for the interface regardless of the number of traffic flows. It is a per-SAP/interface rate.

The no form of this command sets out-profile-rate parameter back to the default value.

Default 

out-profile-rate 3000 for cpu-protection-policy-id 1-253

out-profile-rate 6000 for cpu-protection-policy-id 254 (default access interface policy)

out-profile-rate 3000 for cpu-protection-policy-id 255 (default network interface policy)

Parameters 
packet-rate-limit—
Specifies a packet arrival rate limit in packets per second.
Values—
1 to 65535, max (max indicates no limit)

 

log-events—
Issues a tmnxCpmProtViolSapOutProf, tmnxCpmProtViolIfOutProf, or tmnxCpmProtViolSdpBindOutProf log event and tracks violating interfaces when the out-profile-rate is exceeded. Supported on CPM3 and above only.

overall-rate

Syntax 
overall-rate packet-rate-limit
no overall-rate
Context 
config>sys>security>cpu-protection>policy
Description 

This command applies a maximum packet arrival rate limit (applied per SAP/interface) for the entire SAP/interface, above which packets will be discarded immediately. The rate defined is a global rate limit for the interface regardless of how many traffic flows are present on the SAP/interface. It is a per-SAP/interface rate.

The no form of this command sets overall-rate parameter back to the default value.

Default 

overall max for cpu-protection-policy-id 1 to 253

overall 6000 for cpu-protection-policy-id 254 (default access interface policy)

overall max for cpu-protection-policy-id 255 (default network interface policy)

Parameters 
packet-rate-limit—
Specifies a packet arrival rate limit in packets per second.
Values—
1 to 65535, max (the max indicates no limit)

 

per-source-rate

Syntax 
per-source-rate packet-rate-limit
no per-source-rate
Context 
config>sys>security>cpu-protection>policy
Description 

This command configures a per-source packet arrival rate limit. Use this command to apply a packet arrival rate limit on a per source basis. A source is defined as a unique combination of SAP and MAC source address (mac-monitoring) or SAP and source IP address (ip-src-monitoring). The CPU will receive no more than the configured packet rate from each source (only certain protocols are rate limited for ip-src-monitoring as configured under include-protocols in the cpu-protection policy). The measurement is cleared each second.

This parameter is only applicable if the policy is assigned to an interface (some examples include saps, subscriber-interfaces, and spoke-sdps), and the mac-monitor or ip-src-monitor keyword is specified in the cpu-protection configuration of that interface.

The ip-src-monitoring is useful in subscriber management architectures that have routers between the subscriber and the BNG (router). In layer-3 aggregation scenarios, all packets from all subscribers behind the same aggregation router will arrive with the same source MAC address and as such the mac-monitoring functionality can not differentiate traffic from different subscribers.

Default 

per-source-rate max

Parameters 
packet-rate-limit—
Specifies a per-source packet (per SAP/MAC source address or per SAP/IP source address) arrival rate limit in packets per second.
Values—
1 to 65535, max (max indicates no limit)

 

port-overall-rate

Syntax 
port-overall-rate packet-rate-limit [low-action-priority]
no port-overall-rate
Context 
config>sys>security>cpu-protection
Description 

This command configures a per-port overall rate limit for CPU protection.

Default 

port-overall-rate max

Parameters 
packet-rate-limit—
Specifies an overall per-port packet arrival rate limit in packets per second.
Values—
1 to 65535, max (indicates no limit)

 

action-low-priority—
Marks packets that exceed the rate as low-priority (for preferential discard later if there is congestion in the control plane) instead of discarding them immediately.

protocol-protection

Syntax 
protocol-protection [allow-sham-links] [block-pim-tunneled]
no protocol-protection
Context 
config>sys>security>cpu-protection
Description 

This command causes the network processor on the CPM to discard all packets received for protocols that are not configured on the particular interface. This helps mitigate DoS attacks by filtering invalid control traffic before it hits the CPU. For example, if an interface does not have IS-IS configured, then protocol protection will discard any IS-IS packets received on that interface.

Default 

no protocol-protection

Parameters 
allow-sham-links—
Allows sham links. As OSPF sham links form an adjacency over the MPLS-VPRN backbone network, when protocol-protection is enabled, the tunneled OSPF packets to be received over the backbone network must be explicitly allowed.
block-pim-tunneled—
- Blocks extraction and processing of PIM packets arriving at the SR OS node inside a tunnel (for example, MPLS or GRE) on a network interface. With protocol-protection enabled and tunneled pim blocked, PIM in an mVPN on the egress DR will not switch traffic from the (*,G) to the (S,G) tree.

cpu-protection

Syntax 
cpu-protection policy-id
no cpu-protection
Context 
config>router>interface
config>service>ies>interface
config>service>ies>video-interface
config>service>vpls>video-interface
config>service>vprn>interface
config>service>vprn>network-interface
config>service>vprn>video-interface
Description 

Use this command to apply a specific CPU protection policy to the associated interface. For these interface types, the per-source rate limit is not applicable.

If no CPU-protection policy is assigned to an interface, then the default policy is used to limit the overall-rate. The default policy is policy number 254 for access interfaces, 255 for network interfaces and no policy for video interfaces.

The no form of this command reverts to the default values.

Default 

cpu-protection 254 (for access interfaces)

cpu-protection 255 (for network interfaces)

no cpu-protection (for video interfaces)

cpu-protection

Syntax 
cpu-protection policy-id [mac-monitoring] [ip-src-monitoring]
no cpu-protection
Context 
config>subscr-mgmt>msap-policy
Description 

Use this command to apply a specific CPU protection policy to the associated msap-policy. The specified cpu-protection policy will automatically be applied to any MSAPs that are create using the msap-policy.

If no CPU-protection policy is assigned to a SAP, then a default policy is used to limit the overall-rate according to the default policy. The default policy is policy number 254 for access interfaces, 255 for network interfaces and no policy for video interfaces.

The no form of this command reverts to the default values.

Default 

cpu-protection 254 (for access interfaces)

cpu-protection 255 (for network interfaces)

The configuration of no cpu-protection returns the msap-policy to the default policies as shown above.

Parameters 
mac-monitoring —
Enables per SAP + source MAC address rate limiting using the per-source-rate from the associated cpu-protection policy.
ip-src-monitoring —
Enables per SAP + IP source address rate limiting for certain protocol packets using the per-source-rate and included-protocols from the associated cpu-protection policy. The ip-src-monitoring is useful in subscriber management architectures that have routers between the subscriber and the BNG (router). In layer-3 aggregation scenarios all packets from all subscribers behind the same aggregation router will arrive with the same source MAC address and as such the mac-monitoring functionality can not differentiate traffic from different subscribers.

cpu-protection

Syntax 
cpu-protection policy-id [mac-monitoring] | [eth-cfm-monitoring [aggregate][car]] | [ip-src-monitoring]
no cpu-protection
Context 
config>service>ies>if>sap
config>service>ies>if>spoke-sdp
config>service>ies>sub-if>grp-if>sap
config>service>vprn>if>sap
config>service>vprn>if>spoke-sdp
config>service>vprn>sub-if>grp-if>sap
Description 

Use this command to apply a specific CPU protection policy to the associated msap-policy. The specified cpu-protection policy will automatically be applied to any MSAPs that are create using the msap-policy.

If no CPU-protection policy is assigned to a SAP, then a default policy is used to limit the overall-rate according to the default policy. The default policy is policy number 254 for access interfaces, 255 for network interfaces and no policy for video interfaces.

The no form of this command reverts to the default values.

Default 

cpu-protection 254 (for access interfaces)

cpu-protection 255 (for network interfaces)

The configuration of no cpu-protection returns the msap-policy to the default policies as shown above.

Parameters 
mac-monitoring —
Enables per SAP + source MAC address rate limiting using the per-source-rate from the associated cpu-protection policy.
ip-src-monitoring—
Enables per SAP + IP source address rate limiting for certain protocol packets using the per-source-rate and include-protocols from the associated cpu-protection policy. The ip-src-monitoring is useful in subscriber management architectures that have routers between the subscriber and the BNG (router). In layer-3 aggregation scenarios all packets from all subscribers behind the same aggregation router will arrive with the same source MAC address and as such the mac-monitoring functionality can not differentiate traffic from different subscribers.
eth-cfm-monitoring—
Enables the Ethernet Connectivity Fault Management cpu-protection extensions on the associated SAP/SDP/template.
aggregate —
applies the rate limit to the sum of the per-peer packet rates.
car—
(Committed Access Rate) Ignores Eth-CFM packets when enforcing overall-rate.

cpu-protection

Syntax 
cpu-protection policy-id [mac-monitoring] | [eth-cfm-monitoring [aggregate][car]]
no cpu-protection
Context 
config>service>epipe>sap
config>service>epipe>spoke-sdp
config>service>ipipe>sap
config>service>template>vpls-sap-template
config>service>vpls>mesh-sdp
config>service>vpls>sap
config>service>vpls>spoke-sdp
Description 

Use this command to apply a specific CPU protection policy to the associated SAP, SDP or template. If the mac-monitoring keyword is given then per MAC rate limiting should be performed, using the per-source-rate from the associated cpu-protection policy.

If no CPU-protection policy is assigned to a SAP, then a default policy is used to limit the overall-rate according to the default policy. The default policy is policy number 254 for access interfaces, 255 for network interfaces and no policy for video interfaces.

The no form of this command reverts to the default values.

Default 

cpu-protection 254 (for access interfaces)

cpu-protection 255 (for network interfaces)

The configuration of no cpu-protection returns the SAP/SDP/template to the default policies as shown above.

Parameters 
mac-monitoring—
Enables per SAP + source MAC address rate limiting using the per-source-rate from the associated cpu-protection policy.
eth-cfm-monitoring—
Enables the Ethernet Connectivity Fault Management cpu-protection extensions on the associated SAP/SDP/template.
aggregate—
applies the rate limit to the sum of the per-peer packet rates.
car—
(Committed Access Rate) Ignores Eth-CFM packets when enforcing overall-rate.

2.8.2.9. Distributed CPU Protection Commands

dist-cpu-protection

Syntax 
dist-cpu-protection
Context 
config>system>security
Description 

This command enters the CLI context for configuration of the Distributed CPU Protection (DCP) feature.

policy

Syntax 
[no] policy policy-name
Context 
config>sys>security>dist-cpu-protection
Description 

This command configures one of the maximum 16 Distributed CPU Protection policies. These policies can be applied to objects such as SAPs and network interfaces.

Parameters 
policy-name—
Specifies name of the policy, up to 32 characters.

local-monitoring-policer

Syntax 
[no] local-monitoring-policer policer-name [create]
Context 
config>sys>security>dist-cpu-protection>policy>
Description 

This command configures a monitoring policer that is used to monitor the aggregate rate of several protocols arriving on an object (for example, SAP). When the local-monitoring-policer is determined to be in a nonconforming state (at the end of a minimum monitoring time of 60 seconds) then the system will attempt to allocate dynamic policers for the particular object for any protocols associated with the local monitor (for example, using the protocol name enforcement dynamic policer-name CLI command).

If the system cannot allocate all the dynamic policers within 150 seconds, it will stop attempting to allocate dynamic policers, raise a LocMonExcdAllDynAlloc log event, and go back to using the local monitor. The local monitor may then detect exceeded packets again and make another attempt at allocating dynamic policers.

Once this policer-name is referenced by a protocol then this policer will be instantiated for each “object” that is created and references this DDoS policy. If there is no policer free then the object will be blocked from being created.

Parameters 
policy-name—
Specifies name of the policy, up to 32 characters.

exceed-action

Syntax 
exceed-action {discard | low-priority | none}
Context 
config>sys>security>dist-cpu-protection>policy>local-monitoring-policer
Description 

This command controls the action performed upon the extracted control packets when the configured policer rates are exceeded.

Default 

exceed-action none

Parameters 
discard—
Discards packets that are nonconforming.
low-priority—
Marks packets that are nonconforming as low-priority (discard eligible or out-profile). If there is congestion in the control plane of the SR OS then unmarked (green, hi-prio or in-profile) control packets are given preferential treatment.
none—
no hold-down

log-events

Syntax 
log-events [verbose]
no log-events
Context 
config>sys>security>dist-cpu-protection>policy>local-monitoring-policer
Description 

This command controls the creation of log events related to local-monitoring-policer status and activity.

Default 

log-events

Parameters 
verbose—
Sends the same events as just “log-events” plus DcpLocMonExcd, DcpLocMonExcdAllDynAlloc, and DcpLocMonExcdAllDynFreed. The optional “verbose” includes some events that are more likely used during debug/tuning/investigations

rate

Syntax 
rate kbps kilobits-per-second | max [mbs size] [bytes | kilobytes]
rate packets {ppi | max} within seconds [initial-delay packets]
no rate
Context 
config>sys>security>dist-cpu-protection>policy>static-policer
config>sys>security>dist-cpu-protection>policy>local-monitoring-policer
config>sys>security>dist-cpu-protection>policy>protocol>dynamic-parameters
Description 

This command configures the rate and burst tolerance for the policer in either a packet rate or a bit rate.

The actual hardware may not be able to perfectly rate limit to the exact configured parameters. In this case, the configured parameters will be adapted to the closest supported rate. The actual (operational) parameters can be seen in CLI, for example, show service id 33 sap 1/1/3:33 dist-cpu-protection detail.

Default 

rate packets max within 1 initial-delay 0

Parameters 
packets | kbps—
specifies that the rate is either in units of packets per interval or in units of kilobits per second. The packets option would typically be used for lower rates (for example, for per subscriber DHCP rate limiting) while the kbps option would typically be used for higher rates (for example, per interface BGP rate limiting).
ppi—
Specifies packets per interval. 0..255 or max (0 = all packets are nonconforming)
  1. rate of max = effectively disable the policer (always conforming)
  2. rate of packets 0 = all packets considered nonconforming.
seconds
Specifies the length of the ppi rate measurement interval.
Values—
1 to 32767

 

packets
The number of packets allowed (even at line rate) in an initial burst (or a burst after the policer bucket has drained to zero) in addition to the normal “ppi”. This would typically be set to a value that is equal to the number of received packets in several full handshakes/negotiations of the particular protocol.
Values—
0 to 255

 

kilobits-per-second
Specifies the kilobits per second.
Values—
1 to 20000000 | max   max = This effectively disables the policer (always conforming).

 

mbs—
The tolerance for the kbps rate
Values—
0 to 4194304. A configured mbs of 0 will cause all packets to be considered nonconforming.

 

Default—
The default mbs sets the mbs to 10 ms of the kbps.
bytes | kilobytes—
Specifies that the units of the mbs size parameter are either in bytes or kilobytes.

protocol

Syntax 
[no] protocol name [create]
Context 
config>sys>security>dist-cpu-protection>policy
Description 

This command creates the protocol for control in the policy.

Control packets that are both forwarded (which means they could be subject to normal QoS policy policing) and also copied for extraction are not subject to distributed cpu protection (including in the all-unspecified bucket). This includes traffic snooping (for example, PIM in VPLS) as well as control traffic that is flooded in an R-VPLS instance and also extracted to the CPM (ARP, ISIS and VRRP). Centralized per SAP/interface, cpu-protection can be employed to rate limit or mark this traffic if desired.

Explanatory notes for some of the protocols:

  1. bfd-cpm: includes all bfd handled on the CPM including cpm-np type, single hop and multi-hop, and MPLS-TP CC and CV bfd
  2. dhcp: includes dhcp for IPv4 and IPv6
  3. eth-cfm: 802.1ag and includes Y.1731. Eth-cfm packets on port and LAG based facility MEPs are not included (but packets on Tunnel MEPs are).
  4. icmp: includes IPv4 and IPv6 ICMP (including RS/RA/Redirect) except NS/NA Neighbor Discovery packets which are classified as a separate protocol “ndis”
  5. isis: includes isis used for SPBM
  6. ldp: includes ldp and t-ldp
  7. mpls-ttl: MPLS packets that are extracted due to an expired mpls ttl field
  8. ndis: IPv6 NS/NA Neighbor Discovery (not including RS/RA/Redirect which are classified as part of the protocol “icmp”)
  9. ospf: includes all OSPFv2 and OSPFv3 packets.
  10. pppoe-pppoa: includes PADx, LCP, PAP/CHAP and NCPs
  11. all-unspecified: a special “protocol”. When configured, this treats all extracted control packets that are not explicitly created in the dist-cpu-protection policy as a single aggregate flow (or “virtual protocol”). It lumps together “all the rest of the control traffic” to allow it to be rate limited as one flow. It includes all control traffic of all protocols that are extracted and sent to the CPM (even protocols that cannot be explicitly configured with the distributed cpu protection feature). Control packets that are both forwarded and copied for extraction are not included. If an operator later explicitly configures a protocol, then that protocol is suddenly no longer part of the “all-unspecified” flow. The “all-unspecified” protocol must be explicitly configured in order to operate.

“no protocol x” means packets of protocol x are not monitored and not enforced (although they do count in the fp protocol queue) on the objects to which this dist-cpu-protection policy is assigned, although the packets will be treated as part of the all-unspecified protocol if the all-unspecified protocol is created in the policy.

Parameters 
names—
Signifies the protocol name.
Values—
arp, dhcp, http-redirect, icmp, igmp, mld, ndis, pppoe-pppoa, all-unspecified, mpls-ttl, bfd-cpm, bgp, eth-cfm, isis, ldp, ospf, pim, rsvp.

 

dynamic-parameters

Syntax 
dynamic-parameters
Context 
config>sys>security>dist-cpu-protection>policy>protocol
Description 

The dynamic-parameters are used to instantiate a dynamic enforcement policer for the protocol when the associated local-monitoring-policer is considered as exceeding its rate parameters (at the end of a minimum monitoring time of 60 seconds).

detection-time

Syntax 
detection-time seconds
no detection-time
Context 
config>sys>security>dist-cpu-protection>policy>protocol>dynamic-parameters
Description 

When a dynamic enforcing policer is instantiated, it will remain allocated until at least a contiguous conforming period of detection-time passes.

Default 

detection-time 30

Parameters 
seconds—
Specifies the detection time.
Values—
1 to 128000

 

dynamic-enforcement-policer-pool

Syntax 
[no] dynamic-enforcement-policer-pool number-of-policers
Context 
config>card>fp>dist-cpu-protection
Description 

This command reserves a set of policers for use as dynamic enforcement policers for the Distributed CPU Protection (DCP) feature. Policers are allocated from this pool and instantiated as per-object-per-protocol dynamic enforcement policers after a local monitor is triggered for an object (such as a SAP or Network Interface). Any change to this configured value automatically clears the high water mark, timestamp, and failed allocation counts as seen under “show card x fp y dist-cpu-protection” and in the tmnxFpDcpDynEnfrcPlcrStatTable in the TIMETRA-CHASSIS-MIB. Decreasing this value to below the currently used/allocated number causes all dynamic policers to be returned to the free pool (and traffic returns to the local monitors).

Default 

no dynamic-enforcement-policer-pool

Parameters 
number-of-policers—
specifies the number of policers to be reserved.
Values—
1000 to 32000

 

exceed-action

Syntax 
exceed-action {discard [hold-down seconds] | low-priority [hold-down seconds] | none}
Context 
config>sys>security>dist-cpu-protection>policy>protocol>dynamic-parameters
config>sys>security>dist-cpu-protection>policy>static-policer
Description 

This command controls the action performed upon the extracted control packets when the configured policer rates are exceeded.

Default 

exceed-action none

Parameters 
discard—
Discards packets that are nonconforming.
low-priority—
Marks packets that are nonconforming as low-priority (for example, discard eligible or out-profile). If there is congestion in the control plane of the SR OS then unmarked (for example, green, hi-prio or in-profile) control packets are given preferential treatment.
hold-down seconds
When this optional parameter is specified, it causes the following “hold-down” behavior.

When the SR OS software detects that an enforcement policer has marked or discarded one or more packets (software may detect this some time after the packets are actually discarded), and an optional hold-down seconds value has been specified for the exceed-action, then the policer will be set into a “mark-all” or “drop-all” mode that cause the following:

  1. the policer state to be updated as normal
  2. all packets to be marked (if the action is “low-priority”) or dropped (action = discard) regardless of the results of the policing decisions/actions/state.

The hold-down is cleared after approximately the configured time in seconds after it was set. The hold-down seconds option should be selected for protocols that receive more than one packet in a complete handshake/negotiation (for example, DHCP, PPP). hold-down is not applicable to a local monitoring policer. The “detection-time” will only start after any hold-down is complete. During the hold-down (and the detection-time), the policer is considered as in an “exceed” state. The policer may re-enter the hold-down state if an exceed packet is detected during the detection-time countdown.

Configuring the indefinite parameter value will cause hold down to remain in place until the operator clears it manually using a tools command (tools perform security dist-cpu-protection release-hold-down) or removes the dist-cpu-protection policy from the object.

Configuring the none parameter value will disable hold down.

Values—
1 to 10080, indefinite, none

 

log-events

Syntax 
[no] log-events [verbose]
no log-events
Context 
config>sys>security>dist-cpu-protection>policy>protocols>dynamic-parameters
Description 

This command controls the creation of log events related to dynamic enforcement policer status and activity.

Default 

log-events

Parameters 
verbose—
This parameter sends the same events as just “log-events” plus Hold Down Start, Hold Down End, DcpDynamicEnforceAlloc and DcpDynamicEnforceFreed events. This includes the allocation/de-allocation events (typically used for debug/tuning only – could be very noisy even when there is nothing much of concern).

enforcement

Syntax 
enforcement {static policer-name | dynamic {mon-policer-name | local-mon-bypass}}
Context 
config>sys>security>dist-cpu-protection>policy>protocol
Description 

This command configures the enforcement method for the protocol.

Default 

enforcement dynamic local-mon-bypass

Parameters 
static—
Specifies that the protocol is always enforced using a static-policer. Multiple protocols can reference the same static-policer. Packets of protocols that are statically enforced bypass any local monitors.
policer name—
Specifies which static-policer to use.
dynamic—
Specifies that a specific enforcement policer for this protocol for this SAP/object is instantiated when the associated local-monitoring-policer is determined to be in a nonconforming state (at the end of a minimum monitoring time of 60 seconds to reduce thrashing).
mon-policer-name—
Specifies which local-monitoring-policer to use.
local-mon-bypass—
This parameter is used to not include packets from this protocol in the local monitoring function, and when the local-monitor “trips”, do not instantiate a dynamic enforcement policer for this protocol.

static-policer

Syntax 
[no] static-policer policer-name [create]
Context 
config>sys>security>dist-cpu-protection>policy
Description 

Configures a static enforcement policer that can be referenced by one or more protocols in the policy. Once this policer-name is referenced by a protocol, then this policer will be instantiated for each object (for example, a SAP or network interface) that is created and references this policy. If there is no policer resource available on the associated card or fp then the object is be blocked from being created. Multiple protocols can use the same static-policer.

Parameters 
policy-name—
Specifies the name of the policy, up to 32 characters.

detection-time

Syntax 
detection-time seconds
Context 
config>sys>security>dist-cpu-protection>policy>static-policer
Description 

When a policer is declared as in an “exceed” state, it will remain as exceeding until a contiguous conforming period of detection-time passes. The detection-time only starts after the exceed-action hold-down is complete. If the policer detects another exceed during the detection count down then a hold-down is once again triggered before the policer re-enters the detection time (that is, the countdown timer starts again at the configured value). During the hold-down (and the detection-time), the policer is considered as in an “exceed” state.

Default 

detection-time 30

Parameters 
seconds—
Specifies the detection time.
Values—
1 to 128000

 

log-events

Syntax 
log-events [verbose]
no log-events
Context 
config>sys>security>dist-cpu-protection>policy>static-policer
Description 

This command controls the creation of log events related to static-policer status and activity.

Default 

log-events

Parameters 
verbose—
Sends the same events as just “log-events” plus Hold Down Start and Down End events. The optional “verbose” includes some events that are more likely used during debug/tuning/investigations.

2.8.2.10. Extracted Protocol Traffic Priority Commands

init-extract-prio-mode

Syntax 
init-extract-prio-mode {uniform | l3-classify}
Context 
config>card>fp
Description 

This command determines the scheme used to select the initial drop priority of extracted control plane traffic. The initial drop priority of extracted packets can be either low or high priority. The drop priority of the extracted packets can be subsequently altered by mechanisms such as CPU protection. High-priority traffic receives preferential treatment in control plane congestion situations over low-priority traffic.

Default 

init-extract-prio-mode uniform

Parameters 
uniform—
Initializes the drop priority of all extracted control traffic as high priority. Drop priority can then be altered (marked low priority) by distributed CPU protection (DCP) or centralized CPU protection rate-limiting functions in order to achieve protocol and interface isolation.
l3-classify—
Initializes the drop priority of Layer 3 extracted control traffic (BGP and OSPF) based on the QoS classification of the packets. This is useful in networks where the DSCP and EXP markings can be trusted as the primary method to distinguish, protect, and isolate good terminating protocol traffic from unknown or potentially harmful protocol traffic instead of using the rate-based DCP and centralized CPU protection traffic marking/coloring mechanisms (for example, out-profile-rate and exceed-action low-priority).

For network interfaces, the QoS classification profile result selects the drop priority (in = high priority, out = low priority) for extracted control traffic, and the default QoS classification maps different DSCP and EXP values to different in/out profile states.

For access interfaces, the QoS classification priority result typically selects the drop priority for extracted control traffic. The default access QoS classification (default-priority) maps all traffic to low. If the queues in the access QoS policy are configured as profile-mode queues (rather than the default priority-mode) extracted traffic will use the QoS classification profile value configured against the associated FC (rather than the priority result) to select the drop priority.

Layer 2 extracted control traffic (ARP or ETH-CFM) and protocols that cannot always be QoS-classified, such as IS-IS, are initialized as low drop priority in order to protect Layer 2 protocol traffic on uniform interfaces (which would typically be subject to centralized CPU protection). Alternately, DCP can be used (by configuring a non-zero rate with exceed-action of low-priority for the all-unspecified protocol) to mark some of this traffic as high priority.

2.8.2.11. Security Password Commands

password

Syntax 
password
Context 
config>system>security
Description 

This command creates the context to configure password management parameters.

admin-password

Syntax 
admin-password password [hash | hash2]
no admin-password
Context 
config>system>security>password
Description 

This command allows a user (with admin permissions) to configure a password which enables a user to become an administrator.

This password is valid only for one session. When enabled, no authorization to TACACS+ or RADIUS is performed and the user is locally regarded as an admin user.

This functionality can be enabled in two contexts:

config>system>security>password>admin-password

<global> enable-admin

If the admin-password is configured in the config>system>security>password context, then any user can enter the special mode by entering the enable-admin command.

enable-admin is in the default profile. By default, all users are given access to this command.

Once the enable-admin command is entered, the user is prompted for a password. If the password matches, user is given unrestricted access to all the commands.

The minimum length of the password is determined by the minimum-length command. The complexity requirements for the password is determined by the complexity command.

Note:

The password argument of this command is not sent to the servers. This is consistent with other commands that configure secrets.

The usernames and passwords in the FTP and TFTP URLs will not be sent to the authorization or accounting servers when the file>copy source-url dest-url command is executed.

For example:

file copy ftp://test:secret@10.20.31.79/test/srcfile cf1:\destfile

In this example, the username 'test' and password 'secret' will not be sent to the AAA servers (or to any logs). They will be replaced with '****'.

The no form of this command removes the admin password from the configuration.

Default 

no admin-password

Parameters 
password —
Configures the password which enables a user to become a system administrator. The maximum length can be up to 20 characters if unhashed, 32 characters if hashed, 54 characters if the hash2 keyword is specified.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
Note:

This command applies to a local user, in addition to users on RADIUS, TACACS, and LDAP.

aging

Syntax 
aging days
no aging
Context 
config>system>security>password
Description 

This command configures the number of days a user password is valid before the user must change their password. This parameter can be used to force the user to change the password at the configured interval. Note the aging starts after the last password configuration or update. This timer is persistence (per user) over a node reboot or activity switch between CPMs. When the user changes the password, the timer is reset to the maximum age. When the password for a user ages out, the user is prompted at login to change the password. Console/SSH/Telnet supports password change prompt.

The no form of this command reverts to the default value.

Parameters 
days—
Specifies the maximum number of days the password is valid.
Values—
1 to 500
Note:

This command applies to local users.

 

attempts

Syntax 
attempts count [time minutes1 [lockout minutes2]
no attempts
Context 
config>system>security>password
Description 

This command configures a threshold value of unsuccessful login attempts allowed in a specified time frame.

If the threshold is exceeded, the user is locked out for a specified time period.

If multiple attempts commands are entered, each command overwrites the previously entered command.

The no attempts command resets all values to default.

Default 

attempts 3 time 5 lockout 10

Parameters 
count—
Specifies the number of unsuccessful login attempts allowed for the specified time. This is a mandatory value that must be explicitly entered.
Values—
1 to 64

 

minutes
Specifies the period of time, in minutes, that a specified number of unsuccessful attempts can be made before the user is locked out.
Values—
0 to 60

 

minutes
Specifies the lockout period, in minutes, during which the user is not allowed to login.
Values—
0 to 1440, or infinite

 

If the user exceeds the attempted count times in the specified time, then that user is locked out from any further login attempts for the configured lockout time period.
Values—
0 to 1440

 

Values—
infinite; user is locked out and must wait until manually unlocked before any further attempts.
Note:

This command applies to a local user, in addition to users on RADIUS, TACACS, and LDAP.

 

enable-admin

Syntax 
enable-admin
Context 
<global>
Description 

Refer to the description for the admin-password command. If the admin-password is configured in the config>system>security>password context, then any user can enter the special administrative mode by entering the command.

The enable-admin command is in the default profile. By default, all users are given access to this command.

Once the enable-admin command is entered, the user is prompted for a password. If the password matches, the user is given unrestricted access to all of the commands.

The minimum length of the password is determined by the minimum-length command. The complexity requirements for the password is determined by the complexity command.

To verify that a user is in the enable-admin mode, perform one of the following steps:

  1. Enter the show users command to show which users are in this mode
  2. Enter the enable-admin command again at the root prompt and an error message will be returned.
*A:node-1# show users
===============================================================================
User                             Type      Login time           Idle time
  Session ID   From
===============================================================================
                                 Console         --             3d 10:16:12 --
  6            --
admin                            SSHv2     12OCT2018 20:44:15   0d 00:00:00 A-
 #83           192.168.255.255
admin                            SSHv2     12OCT2018 21:09:25   0d 00:05:10 --
  84           192.168.255.255
-------------------------------------------------------------------------------
Number of users: 2
'#' indicates the current active session
'A' indicates user is in admin mode
===============================================================================
*A:node-1# enable-admin
MINOR: CLI Already in admin mode.
*A:node-1#

authentication-order

Syntax 
authentication-order [method-1] [method-2] [method-3] [method-4] [exit-on-reject]
no authentication-order
Context 
config>system>security>password
Description 

This command configures the sequence in which password authentication, authorization, and accounting is attempted among local passwords, RADIUS, TACACS+, and LDAP.

The authentication order should be from the most preferred authentication method to the least preferred. The presence of all methods in the command line does not guarantee that they are all operational. Specifying options that are not available delays user authentication.

If all (operational) methods are attempted and no authentication for a particular login has been granted, then an entry in the security log documents the failed attempt. Both the attempted login identification and originating IP address are logged with the a timestamp.

The no form of this command reverts to the default authentication sequence.

Default 

authentication-order radius tacplus ldap local - The preferred order for password authentication is 1. local passwords, 2. RADIUS, 3. TACACS+, and 4. LDAP.

Parameters 
method-1—
Specifies the first password authentication method to attempt.
Values—
local, radius, tacplus, ldap

 

method-2—
Specifies the second password authentication method to attempt.
Values—
local, radius, tacplus, ldap

 

method-3—
Specifies the third password authentication method to attempt.
Values—
local, radius, tacplus, ldap

 

method-4—
Specifies the fourth password authentication method to attempt.
Values—
local, radius, tacplus, ldap

 

local—
Specifies the password authentication based on the local password database.
radius—
Specifies RADIUS authentication.
tacplus—
Specifies TACACS+ authentication.
ldap—
Specifies LDAP authentication.
exit-on-reject—
When enabled and if one of the AAA methods configured in the authentication order sends a reject, then the next method in the order will not be tried. If the exit-on-reject keyword is not specified and if one AAA method sends a reject, the next AAA method will be attempted. If in this process, all the AAA methods are exhausted, it will be considered as a reject.

A rejection is distinct from an unreachable authentication server. When the exit-on-reject keyword is specified, authorization and accounting will only use the method that provided an affirmation authentication; only if that method is no longer readable or is removed from the configuration will other configured methods be attempted. If the local keyword is the first authentication and:

  1. exit-on-reject is configured and the user does not exist, the user will not be authenticated
  2. the user is authenticated locally, then other methods, if configured, will be used for authorization and accounting
  3. the user is configured locally but without console access, login will be denied
    Note:

    This command applies to a local user, in addition to users on RADIUS, TACACS, and LDAP.

complexity-rules

Syntax 
complexity-rules
Context 
config>system>security>password
Description 

This command defines a list of rules for configurable password options.

Note:

This command applies to local users.

allow-user-name

Syntax 
[no] allow-user-name
Context 
config>system>security>password>complexity-rules
Description 

The user name is allowed to be used as part of the password.

The no form of this command does not allow user name to be used as password.

Default 

no allow-user-name

credits

Syntax 
credits [lowercase credits] [uppercase credits] [numeric credits] [special-character credits]
no credits
Context 
config>system>security>password>complexity-rules
Description 

The maximum credits given for usage of the different character classes in the local passwords.

The no form of this command resets to default.

Default 

no credits

Parameters 
credits—
Specifies the number of credits that can be used for each characters class.
Values—
0 to 10

 

minimum-classes

Syntax 
minimum-classes minimum
no minimum-classes
Context 
config>system>security>password>complexity-rules
Description 

Force the use of at least this many different character classes

The no form of this command resets to default.

Default 

no minimum-classes

Parameters 
minimum —
Specifies the minimum number of classes to be configured.
Values—
2 to 4

 

minimum-length

Syntax 
minimum-length length
no minimum-length
Context 
config>system>security>password>complexity-rules
Description 

This command configures the minimum number of characters required for locally administered passwords, HMAC-MD5-96, HMAC-SHA-96, and des-keys configured in the system security section.

If multiple minimum-length commands are entered each command overwrites the previous entered command.

The no form of this command reverts to default value.

Default 

minimum-length 6

Parameters 
value—
Specifies the minimum number of characters required for a password.
Values—
1 to 8

 

repeated-characters

Syntax 
repeated-characters count
no repeated-characters
Context 
config>system>security>password>complexity-rules
Description 

The number of times a characters can be repeated consecutively.

The no form of this command resets to default.

Default 

no repeated-characters

Parameters 
count —
Specifies the minimum count of consecutively repeated characters.
Values—
2 to 8

 

required

Syntax 
required [lowercase count] [uppercase count] [numeric count] [special-character count]
no required
Context 
config>system>security>password>complexity-rules
Description 

Force the minimum number of different character classes required.

The no form of this command resets to default.

Default 

required lowercase 0 uppercase 0 numeric 0 special-character 0

Parameters 
count —
Specifies the minimum count of characters classes.
Values—
0 to 10

 

dynsvc-password

Syntax 
dynsvc-password password [hash | hash2]
no dynsvc-password
Context 
config>system>security>password
Description 

This command configures the password which enables the user to configure dynamic services.

Default 

no dynsvc-password

Parameters 
password —
Configures the password which enables a user to become a system administrator. The maximum length can be up to 20 characters if unhashed, 32 characters if hashed, 54 characters if the hash2 keyword is specified.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
Note:

This command applies to a local user, in addition to users on RADIUS, TACACS, and LDAP.

enable-admin-control

Syntax 
enable-admin-control
Context 
config>system>security>password
Description 

Enable the user to become a system administrator.

Note:

This command applies to users on RADIUS, TACACS, and LDAP.

tacplus-map-to-priv-lvl

Syntax 
tacplus-map-to-priv-lvl [admin-priv-lvl]
no tacplus-map-to-priv-lvl
Context 
config>system>security>password>enable-admin-control
Description 

When tacplus-map-to-priv-lvl is enabled, and tacplus authorization is enabled with the use-priv-lvl option, typing enable-admin starts an interactive authentication exchange from the node to the TACACS+ server. The start message (service=enable) contains the user-id and the requested admin-priv-lvl. Successful authentication results in the use of a new profile (as configured under config>system>security>tacplus>priv-lvl-map).

health-check

Syntax 
[no] health-check [interval interval]
Context 
config>system>security>password
Description 

This command specifies that RADIUS, TACACS+, and LDAP servers are monitored for 3 seconds each at 30 second intervals. Servers that are not configured will have 3 seconds of idle time. If in this process a server is found to be unreachable, or a previously unreachable server starts responding, a trap will be sent based on the type of the server.

The no form of this command disables the periodic monitoring of the RADIUS, TACACS+, and LDAP servers. In this case, the operational status for the active server will be up if the last access was successful.

Default 

health-check interval 30

Parameters 
interval
Specifies the polling interval for RADIUS, TACACS+, and LDAP servers.
Values—
6 to 1500

 

Default—
30

history-size

Syntax 
history-size size
no history-size
Context 
config>system>security>password
Description 

Configure how many previous passwords a new password is matched against.

Default 

history-size 0

Parameters 
size—
Specifies how many previous passwords a new password is matched against.
Values—
0 to 20

 

minimum-age

Syntax 
minimum-age [days days] [hrs hours] [min minutes] [sec seconds]
no minimum-age
Context 
config>system>security>password
Description 

Configure the minimum required age of a password before it can be changed again.

Default 

minimum-age min 10

Parameters 
days—
Specifies the minimum required days of a password before it can be changed again.
Values—
0 to 1

 

hours—
Specifies the minimum required hours of a password before it can be changed again.
Values—
0 to 23

 

minutes—
Specifies the minimum required minutes of a password before it can be changed again.
Values—
0 to 59

 

seconds—
Specifies the minimum required seconds of a password before it can be changed again.
Values—
0 to 59
Note:

This command applies to local users.

 

minimum-change

Syntax 
minimum-change distance
no minimum-change
Context 
config>system>security>password
Description 

This command configures the minimum number of characters required to be different in the new password from a previous password.

The no form of this command reverts to default value.

Default 

minimum-change 5

Parameters 
distance—
Specifies how many characters must be different in the new password from the old password.
Values—
1 to 20
Note:

This command applies to local users.

 

2.8.2.12. Public Key Infrastructure (PKI) Commands

The commands described in the following section apply to the 7450 ESS and 7750 SR.

pki

Syntax 
pki
Context 
config>system>security
Description 

This command enables the context to configure certificate parameters.

ca-profile

Syntax 
ca-profile name [create]
no ca-profile name
Context 
config>system>security>pki
Description 

This command creates a new ca-profile or enter the configuration context of an existing ca-profile. Up to 128 ca-profiles could be created in the system. A shutdown the ca-profile will not affect the current up and running ipsec-tunnel or ipsec-gw that associated with the ca-profile. But authentication afterwards will fail with a shutdown ca-profile.

Executing a no shutdown command in this context will cause system to reload the configured cert-file and crl-file.

A ca-profile can be applied under the ipsec-tunnel or ipsec-gw configuration.

The no form of this command removes the name parameter from the configuration. A ca-profile cannot be removed until all the associations (ipsec-tunnel/gw) have been removed.

Parameters 
name—
Specifies the name of the ca-profile, a string up to 32 characters.
create—
This keyword creates a new ca-profile. The create keyword requirement can be enabled/disabled in the environment>create context.

cert-file

Syntax 
cert-file filename
no cert-file
Context 
config>system>security>pki>ca-profile
Description 

This command specifies the filename of a file in cf3:\system-pki\cert as the CA’s certificate of the ca-profile.

Notes:

  1. The system will perform following checks against configured cert-file when a no shutdown command is issued:
    1. Configured cert-file must be a DER formatted X.509v3 certificate file.
    2. All non-optional fields defined in section 4.1 of RFC5280 must exist and conform to the RFC 5280 defined format.
    3. Check the version field to see if its value is 0x2.
    4. Check The Validity field to see that if the certificate is still in validity period.
    5. X509 basic constraints extension must exists, and CA Boolean must be True.
    6. If Key Usage extension exists, then at least keyCertSign and cRLSign should be asserted.
    7. If the certificate is not a self-signing certificate, then system will try to look for issuer’s CA’s certificate to verify if this certificate is signed by issuer’s CA; but if there is no such CA-profile configured, then system will just proceed with a warning message.
    8. If the certificate is not a self-signing certificate, then system will try to look for issuer’s CA’s CRL to verify that it has not been revoked; but if there is no such CA-profile configured or there is no such CRL, then system will just proceed with a warning message.
    If any of above checks fails, then the no shutdown command will fail.
  2. Changing or removing of cert-file is only allowed when the ca-profile is in a shutdown state.

The no form of this command removes the filename from the configuration.

Parameters 
filename—
Specifies a local CF card file URL.

cmpv2

Syntax 
cmpv2
Context 
config>system>security>pki>ca-profile
Description 

This command enables the context to configure Certificate Management Protocol Version 2 (CMPv2) parameters.

accept-unprotected-errormsg

Syntax 
[no] accept-unprotected-errormsg
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command enables the system to accept both protected and unprotected CMPv2 error message. Without this command, system will only accept protected error messages.

The no form of this command causes the system to only accept protected PKI confirmation message.

Default 

no accept-unprotected-errormsg

accept-unprotected-pkiconf

Syntax 
[no] accept-unprotected-pkiconf
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command enables the system to accept both protected and unprotected CMPv2 PKI confirmation messages. Without this command, the system will only accept protected PKI confirmation message.

The no form of this command causes the system to only accept protected PKI confirmation message.

Default 

no accept-unprotected-pkiconf

http-response-timeout

Syntax 
http-response-timeout timeout
no http-response-timeout
Context 
config>system>security>pki>ca-profile>cmp2
Description 

This command specifies the timeout value for HTTP response that is used by CMPv2.

The no form of this command reverts to the default.

Default 

http-response-timeout 30

Parameters 
timeout—
Specifies the HTTP response timeout in seconds.
Values—
1 to 3600

 

key-list

Syntax 
key-list
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command enables the context to configure pre-shared key list parameters.

key

Syntax 
key password [hash | hash2 | custom] reference reference-number
no key reference reference-number
Context 
config>system>security>pki>ca-profile>cmpv2>key-list
Description 

This command specifies a pre-shared key used for CMPv2 initial registration. Multiples of key commands are allowed to be configured under this context.

The password and reference-number is distributed by the CA via out-of-band means.

The configured password is stored in configuration file in an encrypted form by using the SR OS hash2 algorithm.

The no form of this command removes the parameters from the configuration.

Parameters 
password—
Specifies a printable ASCII string, up to 64 characters.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
custom—
Specifies the custom encryption to management interface.
reference-number—
Specifies a printable ASCII string, up to 64 characters.

response-signing-cert

Syntax 
response-signing-cert filename
no response-signing-cert
Context 
config>system>security>pki>ca-profile>cmp2
Description 

This command specifies a imported certificate that is used to verify the CMP response message if they are protected by signature. If this command is not configured, then CA’s certificate will be used.

Default 

no response-signing-cert

Parameters 
filename—
Specifies the filename of the imported certificate.

same-recipnonce-for-pollreq

Syntax 
[no] same-recipnonce-for-pollreq
Context 
config>system>security>pki>ca-profile>cmp2
Description 

This command enables the system to use same recipNonce as the last CMPv2 response for poll request.

The no form of this command disables system to use same recipNonce as the last CMPv2 response for poll request.

Default 

no same-recipnonce-for-pollreq

url

Syntax 
url url-string [service-id service-id]
url url-string [service-name service-name]
no url
Context 
config>system>security>pki>ca-profile>cmp2
Description 

This command specifies HTTP URL of the CMPv2 server. The URL must be unique across all configured ca-profiles.

The URL will be resolved by the DNS server configured (if configured) in the corresponding router context.

If the service-id is 0 or omitted, then system will try to resolve the FQDN via DNS server configured in bof.cfg. After resolution, the system will connect to the address in management routing instance first, then base routing instance.

Note:

If the service is VPRN, then the system only allows HTTP ports 80 and 8080.

Parameters 
url-string—
Specifies the HTTP URL of the CMPv2 server, up to 180 characters.
service-id service-id
Specifies the service instance that used to reach CMPv2 server.

This variant of this command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic). The url url-string service-name service-name variant can be used in all configuration modes.

Values—
service-id: 1 to 2147483647 base-router: 0

 

service-name service-name—
Identifies the service, up to 64 characters.

crl-file

Syntax 
crl-file filename
no crl-file
Context 
config>system>security>pki>ca-profile
Description 

This command specifies the name of a file in cf3:\system-pki\crl as the Certification Revoke List file of the ca-profile.

Notes:

  1. The system will perform following checks against configured crl-file when a no shutdown command is issued:
    1. A valid cert-file of the ca-profile must be already configured.
    2. Configured crl-file must be a DER formatted CRLv2 file.
    3. All non-optional fields defined in section 5.1 of RFC5280 must exist and conform to the RFC5280 defined format.
    4. Check the version field to see if its value is 0x1.
    5. Delta CRL Indicator must not exists (delta CRL is not supported).
    6. CRL’s signature must be verified by using the cert-file of ca-profile.
    If any of above checks fail, the no shutdown command will fail.
  2. Changing or removing the crl-file is only allowed when the ca-profile is in a shutdown state.

The no form of this command removes the filename from the configuration.

Parameters 
filename—
Specifies the name of CRL file stored in cf3:\system-pki\crl.

ocsp

Syntax 
ocsp
Context 
config>system>security>pki>ca-profile
Description 

This command enables the context to configure OCSP parameters.

responder-url

Syntax 
responder-url url-string
no responder-url
Context 
config>system>security>pki>ca-profile>ocsp
Description 

This command specifies HTTP URL of the OCSP responder for the CA, this URL will only be used if there is no OCSP responder defined in the AIA extension of the certificate to be verified.

Default 

no responder-url

Parameters 
url-string—
Specifies the HTTP URL of the OCSP responder

service

Syntax 
service service-id
service name service-name
no service
Context 
config>system>security>pki>ca-profile>ocsp
Description 

This command specifies the service or routing instance that used to contact OCSP responder. This applies to OCSP responders that either configured in CLI or defined in AIA extension of the certificate to be verified.

The responder-url will also be resolved by using the DNS server configured in the configured routing instance.

With VPRN services, the system checks whether the specified service ID or service name is an existing VPRN service at the time of CLI configuration. Otherwise the configuration fails.

Parameters 
service-id —
Specifies an existing service ID to be used in the match criteria.

This variant of this command is only supported in 'classic' configuration-mode (configure system management-interface configuration-mode classic). The service name service-name variant can be used in all configuration modes.

Values—
service-id: 1 to 2147483647 base-router: 0

 

name service-name—
Identifies the service, up to 64 characters.

transmission-profile

Syntax 
transmission-profile name
no transmission-profile
Context 
config>system>security>pki>ca-profile>ocsp
Description 

This command specifies the transmission-profile for OCSP. When specified, this configuration overrides the service service-id or service service-name configured in the config>system>security>pki>ca-profile>ocsp context.

The no form of the command removes the profile name from the configuration.

Default 

no transmission-probile

Parameters 
name—
Specifies the file transmission profile name, up to 32 characters.

certificate-display-format

Syntax 
certificate-display-format {ascii | utf8}
Context 
config>system>security>pki
Description 

This command specifies the display format used for the Certificates and Certificate Revocation Lists.

Default 

certificate-display-format ascii

Parameters 
ascii—
Specifies the ASCII format to use for the Certificates and Certificate Revocation Lists.
utf8—
Specifies the UTF8 format to use for the Certificates and Certificate Revocation Lists.

certificate-expiration-warning

Syntax 
certificate-expiration-warning hours [repeat repeat-hours]
no certificate-expiration-warning
Context 
config>system>security>pki
Description 

With this command configured, the system will issues two types of warnings related to certificate expiration:

  1. BeforeExp — A warning message issued before certificate expire
  2. AfterExp — A warning message issued when certificate expire

This command specifies when system will issue BeforeExp message before a certificate expires. For example, with certificate-expiration-warning 5, the system will issue a BeforeExp message 5 hours before a certificate expires. An optional repeat <repeat-hour> parameter will enable the system to repeat the BeforeExp message every hour until the certificate expires.

If the user only wants AfterExp, then certificate-expiration-warning 0 can be used to achieve this.

BeforeExp and AfterExp warnings can be cleared in following cases:

  1. The certificate is reloaded by the admin certificate reload command. In this case, if the reloaded file is not expired, then AfterExp is cleared. And, if the reloaded file is outside of configured warning window, then the BeforeExp is also cleared.
  2. When the ca-profile/ipsec-gw/ipsec-tunnel/cert-profile is shutdown, then BeforeExp and AfterExp of corresponding certificates are cleared.
  3. When no certificate-expiration-warning command is configured, then all existing BeforeExp and AfterExp are cleared.
  4. Users may change the configuration of the certificate-expiration-warning so that certain certificates are no longer in the warning window. BeforeExp of corresponding certificates are cleared.
  5. If the system time changes so that the new time causes the certificates to no longer be in the warning window, then BeforeExp is cleared. If the new time causes an expired certificate to come non-expired, then AfterExp is cleared.
Default 

no certificate-expiration-warning

Parameters 
hours—
Specifies the amount of time before a certificate expires when system issues BeforeExp.
Values—
0 to 8760

 

repeat-hours
Specifies the time the system will repeat BeforeExp every repeat-hour.
Values—
0 to 8760

 

common-name-list

Syntax 
common-name-list name [create]
Context 
config>system>security>pki
Description 

This command configures a list of common names (CNs) that will be used to authenticate X.509.3 certificates. If the CN field of the X.509.3 certificate matches any of the CNs in the list, then the certificate can be used.

Parameters 
name—
Specifies the name of the CN list, up to 32 characters maximum.

cn

Syntax 
[no] cn index type type value common-name-value
Context 
config>system>security>pki>common-name-list
Description 

This command creates a CN list entry in text or regexp format.

The no form of this command removes the specified entry.

Parameters 
index—
Specifies the index number of the entry.
type—
Specifies the type of the entry.
Values—
ip-address, domain-name

 

common-name-value—
Specifies the IP address or domain name value, up to 255 characters maximum.

crl-expiration-warning

Syntax 
crl-expiration-warning hours [repeat repeat-hours]
no crl-expiration-warning
Context 
config>system>security>pki
Description 

This command specifies when system will issue BeforeExp message before a CRL expires. For example, with certificate-expiration-warning 5, the system will issue a BeforeExp message 5 hours before a CRL expires. An optional repeat repeat-hour parameter enables the system to repeat the BeforeExp message every hour until the CRL expires.

If the user only wants AfterExp, then certificate-expiration-warning 0 can be used to achieve this.

BeforeExp and AfterExp warnings can be cleared in following cases:

  1. The CRL is reloaded by the admin certificate reload command. In this case, if the reloaded file is not expired, then AfterExp is cleared. And, if the reloaded file is outside of configured warning window, then the BeforeExp is also cleared.
  2. When the ca-profile is shutdown, then BeforeExp and AfterExp of corresponding certificates are cleared.
  3. When no crl-expiration-warning command is configured, then all existing BeforeExp and AfterExp are cleared.
  4. Users may change the configuration of the crl-expiration-warning so that certain CRL are no longer in the warning window. BeforeExp of corresponding CRL are cleared.
  5. If the system time changes so that the new time causes the CRL to no longer be in the warning window, then BeforeExp is cleared. If the new time causes an expired CRL to come non-expired, then AfterExp is cleared.
Default 

no crl-expiration-warning

Parameters 
hours—
Specifies the amount of time before a CRL expires when system issues BeforeExp
Values—
0 to 8760

 

repeat-hour—
Specifies that the system repeats BeforeExp every repeat-hour
Values—
0 to 8760

 

imported-format

Syntax 
imported-format {any | secure}
Context 
config>system>security>pki
Description 

This command specifies the allowed format of imported certificates or keys in the cf3:/system-pki directory.

Default 

imported-format any

Parameters 
any—
Allows any imported format.
secure—
Only allows enhanced secure imported formats.

maximum-cert-chain-depth

Syntax 
maximum-cert-chain-depth level
no maximum-cert-chain-depth
Context 
config>system>security>pki
Description 

This command defines the maximum depth of certificate chain verification. This number is applied system wide.

The no form of this command reverts to the default.

Default 

maximum-cert-chain-depth 7

Parameters 
level—
Specifies the maximum depth level of certificate chain verification, range from 1 to 7. the certificate under verification is not counted in. for example, if this parameter is set to 1, then the certificate under verification must be directly signed by trust anchor CA.
Values—
1 to 7

 

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>pki>ca-profile>
Description 

Use this command to enable or disable the ca-profile. The system verifies the configured cert-file and crl-file. If the verification fails, then the no shutdown command fails.

The ca-profile in a shutdown state cannot be used in certificate authentication.

Default 

shutdown

certificate

Syntax 
certificate
Context 
admin
Description 

This command enables the context to configure X.509 certificate related operational parameters. For information about CMPv6 admin certificate commands, see the 7450 ESS, 7750 SR, and VSR Multiservice Integrated Service Adapter and Extended Services Appliance Guide.

clear-ocsp-cache

Syntax 
clear-ocsp-cache [entry-id]
Context 
admin>certificate
Description 

This command clears the current OCSP response cache. If optional issuer and serial-number are not specified, then all current cached results are cleared.

Parameters 
entry-id—
Specifies the local cache entry identifier of the certificate to clear.
Values—
1 to 2000

 

crl-update

Syntax 
crl-update ca ca-profile-name
Context 
admin>certificate
Description 

This command manually triggers the Certificate Revocation List file (CRL) update for the specified ca-profile.

Using this command requires shutting down the auto-crl-update.

Parameters 
ca-profile-name —
Specifies the name of the Certificate Authority profile.

display

Syntax 
display type {type} url-string format {format} [password [32 chars max]]
Context 
admin>certificate
Description 

This command displays the content of an input file in plain text.

Note:

When displaying the key file content, only the key size and type are displayed.

The following list summarizes the formats supported by this command:

  1. System
    1. system format
    2. PKCS #12
    3. PKCS #7 PEM encoded
    4. PKCS #7 DER encoded
    5. RFC4945
  2. Certificate Request
    1. PKCS #10
  3. Key
    1. system format
    2. PKCS #12
  4. CRL
    1. system format
    2. PKCS #7 PEM encoded
    3. PKCS #7 DER encoded
    4. RFC4945
Parameters 
url-string—
Specifies the local CF card url of the input file.
Values—

url-string

<local-url> [up to 99 characters]

local-url

<cflash-id>/<file-path>

cflash-id

cf1: | cf2: | cf3:

 

type—
Specifies the type of input file.
Values—
cert, key, crl, cert-request

 

format—
Specifies the format of input file.
Values—
pkcs10, pkcs12, pkcs7-der, pkcs7-pem, pem, der

 

password—
Specifies the password to decrypt the input file in case that it is an encrypted PKCS#12 file, up to 99 characters.

export

Syntax 
export type {type} input filename output url-string format output-format [password [32 chars max]] [pkey filename]
Context 
admin>certificate
Description 

This command performs certificate operations.

Parameters 
url-string—
Specifies the local CF card url of the file.
Values—

url-string

<local-url> [up to 99 characters]

local-url

<cflash-id>/<file-path>

cflash-id

cf1: | cf2: | cf3:

 

type—
Specifies the type of input file.
Values—
cert, key, crl

 

format—
Specifies the format of output file.
Values—
pkcs10, pkcs12, pkcs7-der, pkcs7-pem, pem, der

 

gen-keypair

Syntax 
gen-keypair url-string curve {secp256r1 | secp384r1 | secp521r1}
gen-keypair url-string [size key-size] [type {rsa | dsa}]
Context 
admin>certificate
Description 

This command generates RSA, DSA, or ECDSA private key or public key pairs at the specified location.

Parameters 
url-string—
Specifies the path of the key file.
Values—

url-string

<local-url> [up to 99 characters]

local-url

<cflash-id>/<file-path>

cflash-id

cf1: | cf2: | cf3:

 

curve—
Generates an ECDSA key with a specified curve.
Values—
secp256r1, secp384r1, secp521r1

 

key-size
Specifies the key size in bits.

The minimum key-size is 1024 when running in FIPS-140-2 mode.

Values—
512 to 8192

 

Default—
2048
type—
Specifies the type of key.
Values—
rsa, dsa

 

Default—
rsa

gen-local-cert-req

Syntax 
gen-local-cert-req keypair url-string subject-dn subject-dn [domain-name name] [ip-addr ip-address] file cert-req-file-url [hash-alg hash-algorithm]
Context 
admin>certificate
Description 

This command generates a PKCS#10 formatted certificate request by using a local existing key pair file.

Parameters 
url-string—
Specifies the name of the keyfile in cf3:\system-pki\key that is used to generate a certificate request.
Values—

url-string

<local-url> [up to 99 characters]

local-url

<cflash-id>/<file-path>

cflash-id

cf1: | cf2: | cf3:

 

subject-dn—
Specifies the distinguish name that is used as the subject in a certificate request, including:
  1. C-Country
  2. ST-State
  3. O-Organization name
  4. OU-Organization Unit name
  5. CN-common name

This parameter is formatted as a text string including any of the above attributes. The attribute and its value is linked by using “=”, and “,” is used to separate different attributes.

For example: C=US,ST=CA,O=ALU,CN=SR12

Values—
attr1=val1,attr2=val2... where: attrN={C|ST|O|OU|CN}, 256 chars max

 

domain-name—
Specifies a domain name string can be specified and included as the dNSName in the Subject Alternative Name extension of the certificate request.
ip-address—
Specifies an IPv4 address string can be specified and included as the ipAddress in the Subject Alternative Name extension of the certificate request.
cert-req-file-url—
Specifies the certificate URL. This URL could be either a local CF card path and filename to save the certificate request; or an FTP URL to upload the certificate request.
hash-algorithm
Specifies the hash algorithm to be used in a certificate request.
Values—
sha1, sha224, sha256, sha384, sha512

 

import

Syntax 
import type {cert | key | crl} input url-string output filename format input-format [password [32 chars max]]
Context 
admin>certificate#
Description 

This command converts an input file (key/certificate/CRL) to a system format file. The following list summarizes the formats supported by this command:

  1. Certificate
    1. PKCS #12
    2. PKCS #7 PEM encoded
    3. PKCS #7 DER encoded
    4. PEM
    5. DER
  2. Key
    1. PKCS #12
    2. PEM
    3. DER
  3. CRL
    1. PKCS #7 PEM encoded
    2. PKCS #7 DER encoded
    3. PEM
    4. DER
Note:

If there are multiple objects with the same type in the input file, only the first object is extracted and converted.

Parameters 
input url-string
Specifies the URL for the input file. This URL could be either a local CF card URL file or a FP URL to download the input file.
Values—

url-string

<local-url> up to 99 characters

local-url

<cflash-id>/<file-path>

cflash-id

cf1:|cf2:|cf3:

 

output filename
Specifies the name of output file up to 95 characters. The output directory depends on the file type like following:
  1. Key: cf3:\system-pki\key
  2. Cert: cf3:\system-pki\cert
  3. CRL: cf3:\system-pki\CRL
type—
The type of input file.
Values—
cert, key, crl

 

format—
Specifies the format of input file.
Values—
pkcs12, pkcs7-der, pkcs7-pem, pem, der

 

password —
Specifies the password to decrypt the input file in case that it is an encrypted PKCS#12 file.

reload

Syntax 
reload type {cert | key | cert-key-pair} filename [key-file key-filename]
Context 
admin>certificate
Description 

This command reloads imported certificate or key file or both at the same time. This command is typically used to update certificate or key file without shutting down ipsec-tunnel/ipsec-gw/cert-profile/ca-profile. Note that type cert and type key is deprecated in a future release. Use type cert-key-pair instead. Instead of type cert use type key instead.

  1. If the new file exists and valid, then for each tunnel using it:
    1. If the key matches the certificate, then the new file is downloaded to the MS-ISA to be used the next time. Tunnels currently up are not affected.
    2. If the key does not match the certificate:
      1. If cert and key configuration is used instead of cert-profile then the tunnel is brought down.
      2. If cert-profile is used, then cert-profile is brought down. The next authentication fails while the established tunnels are not affected.

If the new file does not exists or somehow invalid (bad format, does not contain right extension, and so on), then this command will abort.

In the case of type cert-key-pair, if the new file does not exist or is invalid or cert and key do not match, then this command aborts with an error message.

Parameters 
cert—
Specifies to reload a certificate file.
key—
Specifies to reload a key file.
cert-key-pair—
Specifies to reload a certificate file and its key file at the same time.
filename —
Specifies the file name of imported certificate or key.
key-filename—
Specifies the key filename. IF the cert-key-pair is enabled, the filename is the imported filename of certificate, key-filename is the imported key file.

secure-nd-export

Syntax 
secure-nd-export
Context 
admin>certificate
Description 

This command exports IPv6 Secure Neighbor Discovery (SeND) certificates to the file cf[1..3]:\system-pki\secureNdKey in PKCS #7 DER format.

secure-nd-import

Syntax 
secure-nd-import input url-string format input-format [password password] [key-rollover]
Context 
admin>certificate
Description 

This command imports IPv6 Secure Neighbor Discovery (SeND) certificates from a file, and saves them to cf[1..3]:\system-pki\secureNdKey in PKCS #7 DER format.

Parameters 
url-string
Specifies the name of an input file up to 99 characters.
Values—

local-url

<cflash-id>\<file-path>

cflash-id

cf1:|cf2:|cf3:

 

input-format —
Specifies the input file format.
Values—
pkcs12, pem, or der

 

password —
Specifies the password to decrypt the input file if it is an encrypted PKCS#12 file.
Values—
32 characters maximum

 

2.8.2.13. Profile Commands

profile

Syntax 
[no] profile user-profile-name
Context 
config>system>security
Description 

This command creates a context to create user profiles for CLI command tree permissions.

Profiles are used to either deny or permit user console access to a hierarchical branch or to specific commands.

Once the profiles are created, the user command assigns users to one or more profiles. You can define up to 16 user profiles but a maximum of 8 profiles can be assigned to a user. The user-profile-name can consist of up to 32 alphanumeric characters.

The no form of this command deletes a user profile.

Default 

profile default

Parameters 
user-profile-name—
Specifies the user profile name entered as a character string. The string is case sensitive and limited to 32 ASCII 7-bit printable characters with no spaces.

default-action

Syntax 
default-action {deny-all | permit-all | none | read-only-all}
Context 
config>system>security>profile
Description 

This command specifies the default action to be applied when no match conditions are met.

Parameters 
deny-all—
Sets the default of the profile to deny access to all commands.
permit-all—
Sets the default of the profile to permit access to all commands.
Note:

The permit-all parameter does not change access to security commands. Security commands are only and always available to members of the super-user profile.

none—
Sets the default of the profile to no-action. This option is useful to assign multiple profiles to a user.

For example, if a user is a member of two profiles and the default action of the first profile is permit-all, then the second profile is never evaluated because the permit-all is executed first. Set the first profile default action to none and if no match conditions are met in the first profile, then the second profile is evaluated. If the default action of the last profile is none and no explicit match is found, then the default deny-all takes effect.

entry

Syntax 
[no] entry entry-id
Context 
config>system>security>profile
Description 

This command is used to create a user profile entry.

More than one entry can be created with unique entry-id numbers. Exits when the first match is found and executes the actions according to the accompanying action command. Entries should be sequenced from most explicit to least explicit.

An entry may not have any match criteria defined (in which case, everything matches) but must have at least the keyword action for it to be considered complete.

The no form of this command removes the specified entry from the user profile.

Parameters 
entry-id—
Specifies an entry-id that uniquely identifies a user profile command match criteria and a corresponding action. If more than one entry is configured, the entry-ids should be numbered in staggered increments to allow users to insert a new entry without requiring renumbering of the existing entries.
Values—
1 to 9999

 

action

Syntax 
action {deny | permit | read-only}
Context 
config>system>security>profile>entry
Description 

This command configures the action associated with the profile entry.

Parameters 
deny—
Specifies that commands matching the entry command match criteria are to be denied.
permit—
Specifies that commands matching the entry command match criteria is permitted.

match

Syntax 
match command-string
no match
Context 
config>system>security>profile>entry
Description 

This command configures a command or subtree commands in subordinate command levels are specified.

Because the OS exits when the first match is found, subordinate levels cannot be modified with subsequent action commands. More specific action commands should be entered with a lower entry number or in a profile that is evaluated prior to this profile.

All commands below the hierarchy level of the matched command are denied.

The no form of this command removes a match condition.

Parameters 
command-string—
Specifies the CLI command or CLI tree level that is the scope of the profile entry.

grpc

Syntax 
grpc
Context 
config>system>security>profile
Description 

This command enables the context to configure a specific gRPC security profile.

rpc-authorization

Syntax 
rpc-authorization
Context 
config>system>security>profile>grpc
Description 

This command opens a configuration context for configuring user privileges related to RPCs.

gnmi-capabilities

Syntax 
gnmi-capabilities {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies use of Capability RPC for a user associated with the given format.

Default 

gnmi-capabilities permit

Parameters 
deny—
Specifies that the use of the Capability RPC is denied.
permit—
Specifies that the use of the Capability RPC is permitted.

gnmi-get

Syntax 
gnmi-get {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies the Get RPC.

Default 

gnmi-get permit

Parameters 
deny—
Specifies that the use of the Get RPC is denied.
permit—
Specifies that the use of the Get RPC is permitted.

gnmi-set

Syntax 
gnmi-set {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies the Set RPC.

Default 

gnmi-set permit

Parameters 
deny—
Specifies that the use of the Set RPC is denied.
permit—
Specifies that the use of the Set RPC is permitted.

gnmi-subscribe

Syntax 
gnmi-subscribe {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies the Subscribe RPC.

Default 

gnmi-subscribe permit

Parameters 
deny—
Specifies that the use of the Subscribe RPC is denied.
permit—
Specifies that the use of the Subscribe RPC is permitted.

gnoi-cert-mgmt-cangenerate

Syntax 
gnoi-cert-mgmt-cangenerate {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies the use of the gNOI CanGenerateCSR RPCs for the user profile.

Default 

gnoi-cert-mgmt-cangenerate deny

Parameters 
deny—
Specifies that the use of the gNOI CanGenerateCSR RPCs for the user profile is denied.
permit—
Specifies that the use of the gNOI CanGenerateCSR RPCs for the user profile is permitted.

gnoi-cert-mgmt-getcert

Syntax 
gnoi-cert-mgmt-getcert {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies the use of the gNOI GetCertificate RPCs for the user profile.

Default 

gnoi-cert-mgmt-getcert deny

Parameters 
deny—
Specifies that the use of the gNOI GetCertificate RPCs for the user profile is denied.
permit—
Specifies that the use of the gNOI GetCertificate RPCs for the user profile is permitted.

gnoi-cert-mgmt-install

Syntax 
gnoi-cert-mgmt-install {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies the use of the gNOI Install RPCs for the user profile.

Default 

gnoi-cert-mgmt-install deny

Parameters 
deny—
Specifies that the use of the gNOI Install RPCs for the user profile is denied.
permit—
Specifies that the use of the gNOI Install RPCs for the user profile is permitted.

gnoi-cert-mgmt-revoke

Syntax 
gnoi-cert-mgmt-revoke {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies the use of gNOI RevokeCertificates RPCs for the user profile.

Default 

gnoi-cert-mgmt-revoke deny

Parameters 
deny—
Specifies that the use of gNOI RevokeCertificates RPCs for the user profile is denied.
permit—
Specifies that the use of gNOI RevokeCertificates RPCs for the user profile is permitted.

gnoi-cert-mgmt-rotate

Syntax 
gnoi-cert-mgmt-rotate {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies the use of the gNOI Rotate RPCs for the user profile.

Default 

gnoi-cert-mgmt-rotate deny

Parameters 
deny—
Specifies that the use of the gNOI Rotate RPCs for the user profile is denied.
permit—
Specifies that the use of the gNOI Rotate RPCs for the user profile is permitted.

rib-api-getversion

Syntax 
rib-api-getversion {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies the use of the GetVersion RPC provided by the RibApi service.

Default 

rib-api-getversion permit

Parameters 
deny—
Specifies that the use of the GetVersion RPC is denied.
permit—
Specifies that the use of the GetVersion RPC is permitted.

rib-api-modify

Syntax 
rib-api-modify {deny | permit}
Context 
config>system>security>profile>grpc>rpc-authorization
Description 

This command permits or denies the use of the Modify RPC provided by the RibApi service.

Default 

rib-api-modify permit

Parameters 
deny—
Specifies that the use of the Modify RPC is denied.
permit—
Specifies that the use of the Modify RPC is permitted.

li

Syntax 
[no] li
Context 
config>system>security>profile
Description 

This command enables the Lawful Intercept (LI) profile identifier.

The no form of this command disables the LI profile identifier.

renum

Syntax 
renum old-entry-number new-entry-number
Context 
config>system>security>profile
Description 

This command renumbers profile entries to re-sequence the entries.

Since the OS exits when the first match is found and executes the actions according to accompanying action command, re-numbering is useful to rearrange the entries from most explicit to least explicit.

Parameters 
old-entry-number—
Enter the entry number of an existing entry.
Values—
1 to 9999

 

new-entry-number—
Enter the new entry number.
Values—
1 to 9999

 

2.8.2.14. CLI Session Commands

cli-session-group

Syntax 
cli-session-group session-group-name [create]
no cli-session-group session-group-name
Context 
config>system>security
Description 

This command is used to configure a session group that can be used to limit the number of CLI sessions available to members of the group.

Parameters 
session-group-name
Specifies a particular session group.

combined-max-sessions

Syntax 
combined-max-sessions number-of-sessions
no combined-max-sessions
Context 
config>system>security>cli-session-group
config>system>security>profile
Description 

This command is used to limit the number of combined SSH/TELNET based CLI sessions available to all users that are part of a particular profile, or to all users of all profiles that are part of the same cli-session-group.

The no form of this command disables the command and the profile/group limit is not applied to the number of combined sessions.

Default 

no combined-max-sessions

Parameters 
number-of-sessions
Specifies the maximum number of allowed combined SSH/TELNET based CLI sessions.
Values—
0 to 50

 

ssh-max-sessions

Syntax 
ssh-max-sessions number-of-sessions
no ssh-max-sessions
Context 
config>system>security>cli-session-group
config>system>security>profile
Description 

This command is used to limit the number of SSH-based CLI sessions available to all users that are part of a particular profile, or to all users of all profiles that are part of the same cli-session-group.

The no form of this command disables the command and the profile/group limit is not applied on the number of sessions.

Default 

no ssh-max-sessions

Parameters 
number-of-sessions
Specifies the maximum number of allowed SSH-based CLI sessions.
Values—
0 to 50

 

telnet-max-sessions

Syntax 
telnet-max-sessions number-of-sessions
no telnet-max-sessions
Context 
config>system>security>cli-session-group
config>system>security>profile
Description 

This command is used to limit the number of Telnet-based CLI sessions available to all users that are part of a particular profile, or to all users of all profiles that are part of the same cli-session-group.

The no form of this command disables the command and the profile/group limit is not applied on the number of sessions.

Default 

no telnet-max-sessions

Parameters 
number-of-sessions
Specifies the maximum number of allowed Telnet-based CLI sessions.
Values—
0 to 50

 

2.8.2.15. RADIUS Commands

radius

Syntax 
[no] radius
Context 
config>system>security
Description 

This command creates the context to configure RADIUS authentication on the router.

Implement redundancy by configuring multiple server addresses for each router.

The no form of this command removes the RADIUS configuration.

access-algorithm

Syntax 
access-algorithm {direct | round-robin}
no access-algorithm
Context 
config>system>security>radius
Description 

This command indicates the algorithm used to access the set of RADIUS servers.

Default 

access-algorithm direct

Parameters 
direct—
Specifies that the first server is used as primary server for all requests, the second as secondary and so on.
round-robin—
Specifies that the first server is used as primary server for the first request, the second server as primary for the second request, and so on. If the router gets to the end of the list, it starts again with the first server.

accounting

Syntax 
[no] accounting
Context 
config>system>security>radius
Description 

This command enables RADIUS accounting.

The no form of this command disables RADIUS accounting.

Default 

no accounting

accounting-port

Syntax 
accounting-port port
no accounting-port
Context 
config>system>security>radius
Description 

This command specifies a UDP port number on which to contact the RADIUS server for accounting requests.

Default 

accounting-port 1813

Parameters 
port—
Specifies the UDP port number.
Values—
1 to 65535

 

Default—
1813

authorization

Syntax 
[no] authorization
Context 
config>system>security>radius
Description 

This command configures RADIUS authorization parameters for the system.

Default 

no authorization

interactive-authentication

Syntax 
[no] interactive-authentication
Context 
config>system>security>radius
Description 

This command enables RADIUS interactive authentication for the system. Enabling interactive-authentication forces RADIUS to fall into challenge/response mode.

Default 

no interactive-authentication

port

Syntax 
port port
no port
Context 
config>system>security>radius
Description 

This command configures the TCP port number to contact the RADIUS server.

The no form of this command reverts to the default value.

Default 

port 1812 (as specified in RFC 2865, Remote Authentication Dial In User Service (RADIUS))

Parameters 
port—
Specifies the TCP port number to contact the RADIUS server.
Values—
1 to 65535

 

retry

Syntax 
retry count
no retry
Context 
config>system>security>radius
config>system>security>dot1x>radius-plcy
Description 

This command configures the number of times the router attempts to contact the RADIUS server for authentication if there are problems communicating with the server.

The no form of this command reverts to the default value.

Default 

retry 3

Parameters 
count—
Specifies the retry count.
Values—
1 to 10

 

server

Syntax 
server index address ip-address secret key [hash | hash2 | custom]
no server index
Context 
config>system>security>radius
Description 

This command adds a RADIUS server and configures the RADIUS server IP address, index, and key values.

Up to five RADIUS servers can be configured at any one time. RADIUS servers are accessed in order from lowest to highest index for authentication requests until a response from a server is received. A higher indexed server is only queried if no response is received from a lower indexed server (which implies that the server is not available). If a response from a server is received, no other RADIUS servers are queried. It is assumed that there are multiple identical servers configured as backups and that the servers do not have redundant data.

The no form of this command removes the server from the configuration.

Default 

no server

Parameters 
index—
Specifies the index for the RADIUS server. The index determines the sequence in which the servers are queried for authentication requests. Servers are queried in order from lowest to highest index.
Values—
1 to 5

 

ip-address
Specifies the IP address of the RADIUS server. Two RADIUS servers cannot have the same IP address. An error message is generated if the server address is a duplicate.
Values—

ipv4-address

a.b.c.d (host bits must be 0)

ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x: [0..FFFF]H

d: [0..255]D

 

key
Specifies the secret key to access the RADIUS server, up to 64 characters. This secret key must match the password on the RADIUS server.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
custom—
Specifies the custom encryption to management interface.

timeout

Syntax 
timeout seconds
no timeout
Context 
config>system>security>radius
Description 

This command configures the number of seconds the router waits for a response from a RADIUS server.

The no form of this command reverts to the default value.

Default 

timeout 3

Parameters 
seconds—
Specifies the number of seconds the router waits for a response from a RADIUS server, expressed as a decimal integer.
Values—
1 to 90

 

use-default-template

Syntax 
[no] use-default-template
Context 
config>system>security>radius
Description 

This command specifies whether the RADIUS default user template is actively applied to the RADIUS user if no VSAs are returned with the auth-accept from the RADIUS server. When enabled, the radius_default user-template is actively applied if no VSAs are returned with the auth-accept from the RADIUS server and radius authorization is enabled.

The no form of this command disables the use of the RADIUS default template.

Default 

no use-default-template

2.8.2.16. TACACS+ Client Commands

tacplus

Syntax 
[no] tacplus
Context 
config>system>security
Description 

This command creates the context to configure TACACS+ authentication on the router.

Configure multiple server addresses for each router for redundancy.

The no form of this command removes the TACACS+ configuration.

accounting

Syntax 
accounting [record-type {start-stop | stop-only}]
no accounting
Context 
config>system>security>tacplus
Description 

This command configures the type of accounting record packet that is to be sent to the TACACS+ server. The record-type parameter indicates whether TACACS+ accounting start and stop packets be sent or just stop packets be sent.

Default 

no accounting

Parameters 
record-type start-stop—
Specifies that a TACACS+ start packet is sent whenever the user executes a command and a TACACS+ stop packet when command execution is complete.
record-type stop-only—
Specifies that only a TACACS+ stop packet is sent whenever the command execution is complete.

authorization

Syntax 
[no] authorization [use-priv-lvl]
Context 
config>system>security>tacplus
Description 

This command configures TACACS+ authorization parameters for the system.

Default 

no authorization

Parameters 
use-priv-lvl—
Automatically performs a single authorization request to the TACACS+ server for cmd* (all commands) immediately after login, and then use the local profile associated (via the priv-lvl-map) with the priv-lvl returned by the TACACS+ server for all subsequent authorization (except enable-admin). After the initial authorization for cmd*, no further authorization requests are sent to the TACACS+ server (except enable-admin).

interactive-authentication

Syntax 
[no] interactive-authentication
Context 
config>system>security>tacplus
Description 

This configuration instructs the SR OS to send no username nor password in the TACACS+ start message, and to display the server_msg in the GETUSER and GETPASS response from the TACACS+ server. Interactive authentication can be used to support a One Time Password scheme (e.g. S/Key). An example flow (e.g. with a telnet connection) is as follows:

  1. The SR OS sends an authentication start request to the TACACS+ server with no username nor password.
  2. TACACS+ server replies with TAC_PLUS_AUTHEN_STATUS_GETUSER and a server_msg.
  3. The SR OS displays the server_msg, and collects the user name.
  4. The SR OS sends a continue message with the user name.
  5. TACACS+ server replies with TAC_PLUS_AUTHEN_STATUS_GETPASS and a server_msg.
  6. The SR OS displays the server_msg (which may contain, for example, an S/Key for One Time Password operation), and collects the password.
  7. The SR OS sends a continue message with the password.
  8. TACACS+ server replies with PASS or FAIL.

When interactive-authentication is disabled the SR OS sends the username and password in the tacplus start message. An example flow (e.g. with a telnet connection) is as follows:

  1. TAC_PLUS_AUTHEN_TYPE_ASCII.
    1. the login username in the “user” field.
    2. the password in the user_msg field (while this is non-standard, it does not cause interoperability problems).
  2. TACACS+ server ignores the password and replies with TAC_PLUS_AUTHEN_STATUS_GETPASS.
  3. The SR OS sends a continue packet with the password in the user_msg field.
  4. TACACS+ server replies with PASS or FAIL.

When interactive-authentication is enabled, tacplus must be the first method specified in the authentication-order configuration.

Default 

no interactive-authentication

priv-lvl-map

Syntax 
[no] priv-lvl-map
Context 
config>system>security>tacplus
Description 

This command enables the context to specify a series of mappings between TACACS+ priv-lvl and locally configured profiles for authorization. These mappings are used when the use-priv-lvl option is specified for tacplus authorization.

The no form of this command reverts to the default.

Default 

priv-lvl-map

priv-lvl

Syntax 
priv-lvl priv-lvl user-profile-name
no priv-lvl priv-lvl
Context 
config>system>security>tacplus>priv-lvl-map
Description 

This command maps a specific TACACS+ priv-lvl to a locally configured profile for authorization. This mapping is used when the use-priv-lvl option is specified for TACPLUS authorization.

Parameters 
priv-lvl—
Specifies the privilege level used when sending a TACACS+ ENABLE request.
Values—
0 to 15

 

user-profile-name—
Specifies the user profile for this mapping.

server

Syntax 
server index address ip-address secret key [hash | hash2 | custom] [port port]
no server index
Context 
config>system>security>tacplus
Description 

This command adds a TACACS+ server and configures the TACACS+ server IP address, index, and key values.

Up to five TACACS+ servers can be configured at any one time. TACACS+ servers are accessed in order from lowest index to the highest index for authentication requests.

The no form of this command removes the server from the configuration.

Parameters 
index—
Specifies the index for the TACACS+ server. The index determines the sequence in which the servers are queried for authentication requests. Servers are queried in order from the lowest index to the highest index.
Values—
1 to 5

 

ip-address
Specifies the IP address of the TACACS+ server. Two TACACS+ servers cannot have the same IP address. An error message is generated if the server address is a duplicate.
Values—

ipv4-address

a.b.c.d (host bits must be 0)

ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x: [0..FFFF]H

d: [0..255]D

 

secret key
Specifies the secret key, up to 128 characters to access the RADIUS server. This secret key must match the password on the RADIUS server.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
custom—
Specifies the custom encryption to management interface.
port
Specifies the port ID.
Values—
0 to 65535

 

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>tacplus
Description 

This command administratively disables the TACACS+ protocol operation. Shutting down the protocol does not remove or change the configuration other than the administrative state.

The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.

The no form of this command administratively enables the protocol which is the default state.

Default 

no shutdown

timeout

Syntax 
timeout seconds
no timeout
Context 
config>system>security>tacplus
Description 

This command configures the number of seconds the router waits for a response from a TACACS+ server.

The no form of this command reverts to the default value.

Default 

timeout 3

Parameters 
seconds—
The number of seconds the router waits for a response from a TACACS+ server, expressed as a decimal integer.
Values—
1 to 90

 

use-default-template

Syntax 
[no] use-default-template
Context 
config>system>security>tacplus
Description 

This command specifies whether the tacplus_default user-template is actively applied to the TACACS+ user. When enabled, the tacplus_default user-template is actively applied if tacplus authorization is enabled (without the use-priv-lvl option).

Default 

use-default-template

2.8.2.17. LDAP Client Commands

ldap

Syntax 
[no] ldap
Context 
config>system>security
Description 

This command configures LDAP authentication parameters for the system.

The no form of this command de-configures the LDAP client from the SR OS.

public-key-authentication

Syntax 
[no] public-key-authentication
Context 
config>system>security>ldap
Description 

This command enables public key retrieval from the LDAP server. If disabled (no public-key-authentication), password authentication is attempted via LDAP.

Default 

no public-key-authentication

retry

Syntax 
retry count
no retry
Context 
config>system>security>ldap
Description 

This command configures the number of retries for the SR OS in its attempt to reach the current LDAP server before attempting the next server.

The no form of this command reverts to the default value.

Default 

retry 3

Parameters 
count—
Specifies the number of retransmissions.
Values—
1 to 10

 

Default—
3

server

Syntax 
server server-index [create]
no server server-index
Context 
config>system>security>ldap
Description 

This command configures an LDAP server. Up to five servers can be configured, which can then work in a redundant manner.

The no version of this command removes the server connection.

Parameters 
server-index—
Specifies a unique LDAP server connection.
Values—
1 to 5

 

address

Syntax 
address ip-address [port port]
no address
Context 
config>system>security>ldap>server
Description 

This command configures the IPv4 or IPv6 address for the LDAP server.

The no version of this command removes the server address.

Parameters 
ip-address—
The IP address of the LDAP server.
Values—

ipv4-address

a.b.c.d (host bits must be 0)

ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x: [0..FFFF]H

d: [0..255]D

 

port
Specifies the port ID. The port is the LDAP server listening port; by default it is 389 but if the listening port on LDAP server is changed, this command needs to be configured accordingly.
Values—
1 to 65535

 

Default—
389

bind-authentication

Syntax 
bind-authentication root-dn [password password] [hash | hash2 | custom]
no bind-authentication
Context 
config>system>security>ldap>server
Description 

This command configures the LDAP binding used to log into LDAP server. A string of domain components (DC) and common names (CN) can be programmed to identify the user in addition to the password field. The password is hashed. For example, “cn=admin,dc=nokia,dc=com” indicates the user admin in domain nokia.com. Table 31 lists the LDAP attributes.

The no version of this command removes the bind-authentication.

Table 31:  LDAP Attributes  

Object Class

Naming Attribute Display Name

Naming Attribute LDAP Name

user

Common-Name

cn

organizationalUnit

Organizational-Unit-Name

ou

domain

Domain-Component

dc

Parameters 
root-dn—
Up to 512 characters.
password
Configures the password which enables a user to bind to the LDAP server. The maximum length is 128 characters.
hash—
Specifies that the password is entered in an encrypted form. If the hash or hash2 parameter is not used, the password is assumed to be in an unencrypted, clear text form. For security, all passwords are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the password is entered in a more complex encrypted form that involves more variables than the password value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the password is assumed to be in an unencrypted, clear text form. For security, all passwords are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
custom—
Specifies the custom encryption to management interface.

ldap-server

Syntax 
ldap-server server-name
no ldap-server
Context 
config>system>security>ldap>server
Description 

This command configures the LDAP server name or description.

The no version of this command removes the LDAP server name.

Parameters 
server-name—
Specifies the name of the server, up to 32 characters.

search

Syntax 
search base-dn
no search
Context 
config>system>security>ldap>server
Description 

This command configures the LDAP search command. The search base-dn tells the server which part of the external directory tree to search. The search DN uses the same LDAP attribute as root-dn. For example, to search a public-key for an SSH generated for a Nokia vendor, one might use “dc=public-key,dc=nokia,dc=com”.

The no version of this command remove the search DN; as such, no search is possible on the LDAP server.

Parameters 
base-dn—
Specifies the base domain name used in the search, up to 512 characters.

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>ldap
config>system>security>ldap>server
Description 

In the ldap context, this command enables or disabled LDAP protocol operations.

In the server context, this command enables or disables the LDAP server. To perform no shutdown, an LDAP server address is required. To change the address, the user first needs to shut down the server.

tls-profile

Syntax 
tls-profile tls-profile-name
no tls-profile
Context 
config>system>security>ldap>server
Description 

This command attaches a TLS client profile to the LDAP client. The parameter in the TLS profile is used to encrypt the LDAP connection to the server. Each LDAP server can use its own TLS profile.

The no form of this command removes the TLS profile from LDAP and disables the TLS encryption from LDAP.

Parameters 
tls-profile-name—
Specifies the TLD profile for encryption.

timeout

Syntax 
timeout seconds
no timeout
Context 
config>system>security>ldap
Description 

The timeout value is the number of seconds that the SR OS will wait for a response from the current server that it is trying to establish a connection with. If the server does not reply within the configured timeout value, the SR OS will increment the retry counter by 1. The SR OS attempts to establish the connection to the current server up to the configured retry value before it moves to the next configured server.

The no form of this command reverts to the default value.

Default 

timeout 3

Parameters 
seconds—
The length of time that the SR OS waits for a response from the server.
Values—
1 to 90

 

Default—
3

use-default-template

Syntax 
[no] use-default-template
Context 
config>system>security>ldap
Description 

This command specifies whether or not the default template is to be actively applied to LDAP.

Default 

use-default-template

2.8.2.18. User Management Commands

user

Syntax 
[no] user user-name
Context 
config>system>security
Description 

This command creates a local user and a context to edit the user configuration.

If a new user-name is entered, the user is created. When an existing user-name is specified, the user parameters can be edited.

When creating a new user and then entering the info command, the system displays a password in the output. This is expected behavior in the hash2 scenario. However, when using that user name, there will be no password required. The user can login to the system and then <ENTER> at the password prompt, the user will be logged in.

Unless an administrator explicitly changes the password, it will be null. The hashed value displayed uses the username and null password field, so when the username is changed, the displayed hashed value will change.

The no form of this command deletes the user and all configuration data. Users cannot delete themselves.

Parameters 
user-name—
Specifies the name of the user up to 32 characters.

access

Syntax 
[no] access [ftp] [snmp] [console] [li] [netconf] [grpc]
Context 
config>system>security>user
config>system>security>user-template
Description 

This command grants a user permission for FTP, SNMP, console, lawful intercept (LI), NETCONF, or gRPC access.

If a user requires access to more than one application, then multiple applications can be specified in a single command. Multiple commands are treated additively.

The no form of this command removes access for a specific application, and denies permission for all management access methods. To deny a single access method, enter the no form of this command followed by the method to be denied, for example, no access FTP denies FTP access.

Default 

no access

Parameters 
ftp—
Specifies FTP permission.
snmp—
Specifies SNMP permission. This keyword is only configurable in the config>system>security>user context.
console—
Specifies console access (serial port or Telnet) permission.
li—
Specifies CLI command access in the lawful intercept (LI) context (applies to the 7450 ESS and 7750 SR).
netconf—
Specifies NETCONF session access for the user defined in the specified user context. When using the Base-R13 SR OS YANG data model, console access is also necessary (not required for the Nokia SR OS YANG data model).
grpc—
Specifies gRPC access.

console

Syntax 
console
Context 
config>system>security>user
config>system>security>user-template
Description 

This command creates the context to configure user profile membership for the console (either Telnet or CPM serial port user).

cannot-change-password

Syntax 
[no] cannot-change-password
Context 
config>system>security>user>console
Description 

This command allows a user the privilege to change their password for both FTP and console login.

To disable a user’s privilege to change their password, use the cannot-change-password form of this command.

Note:

The cannot-change-password flag is not replicated when a user copy is performed. A new-password-at-login flag is created instead.

Default 

no cannot-change-password

login-exec

Syntax 
login-exec url-prefix: source-url
no login-exec
Context 
config>system>security>user>console
config>system>security>user-template>console
Description 

This command configures a user’s login exec file which executes whenever the user successfully logs in to a console session.

Only one exec file can be configured. If multiple login-exec commands are entered for the same user, each subsequent entry overwrites the previous entry.

The no form of this command disables the login exec file for the user.

Default 

no login-exec

Parameters 
url-prefix: source-url—
Specifies either a local or remote URL, up to 200 characters, that identifies the exec file that is executed after the user successfully logs in.

member

Syntax 
member user-profile-name [user-profile-name]
no member user-profile-name
Context 
config>system>security>user>console
Description 

This command is used to allow the user access to a profile.

A user can participate in up to eight profiles.

The no form of this command deletes access user access to a profile.

Default 

member default

Parameters 
user-profile-name—
Specifies up to eight user profile names, up to 32 characters.

new-password-at-login

Syntax 
[no] new-password-at-login
Context 
config>system>security>user>console
Description 

This command forces the user to change a password at the next console login. The new password applies to FTP but the change can be enforced only by the console, SSH, or Telnet login.

The no form of this command does not force the user to change passwords.

Default 

no new-password-at-login

home-directory

Syntax 
home-directory url-prefix [directory] [directory/directory]
no home-directory
Context 
config>system>security>user
config>system>security>user-template
Description 

This command configures the local home directory for the user for both console (file commands and '>' redirection) and FTP access.

If the URL or the specified URL/directory structure is not present, then a warning message is issued and the default is assumed.

The no form of this command removes the configured home directory.

Default 

no home-directory

Note:

If restrict-to-home has been configured no file access is granted and no home-directory is created. If restrict-to-home is not applied then root becomes the user’s home-directory.

Parameters 
local-url-prefix [directory] [directory/directory]
Specifies the user’s local home directory URL prefix and directory structure, up to 190 characters.

password

Syntax 
password [password]
Context 
config>system>security>user
Description 

This command configures the user password for console and FTP access.

The password is stored in an encrypted format in the configuration file when specified. Passwords should be encased in double quotes (“ “) at the time of the password creation. The double quote character (“) is not accepted inside a password. It is interpreted as the start or stop delimiter of a string.

The password can be entered as plain text or a hashed value. SR OS can distinguish between hashed passwords and plain text passwords and take the appropriate action to store the password correctly.

config>system>security>user# password testuser1

The password is hashed by default.

For example:

config>system>security# user testuser1
config>system>security>user$ password xyzabcd1
config>system>security>user# exit
config>system>security# info
-------------------------------------
...
            user "testuser1"
                password "$2y$10$pFoehOg/tCbBMPDJ/
kqpu.8af0AoVGY2xsR7WFqyn5fVTnwRzGmOK"
            exit
...
-------------------------------------
config>system>security# 
 

The password command allows you also to enter the password as a hashed value.

For example:

config>system>security# user testuser1
config>system>security>user$ password "$2y$10$pFoehOg/tCbBMPDJ/
kqpu.8af0AoVGY2xsR7WFqyn5fVTnwRzGmOK"
config>system>security>user# exit
config>system>security# info
-------------------------------------
...
user "testuser1"
password "$2y$10$pFoehOg/tCbBMPDJ/kqpu.8af0AoVGY2xsR7WFqyn5fVTnwRzGmOK"
exit
...
-------------------------------------
config>system>security#
Parameters 
password—
This is the password for the user that must be entered by this user during the login procedure. The minimum length of the password is determined by the minimum-length command. The maximum length can be up to 20 chars if unhashed, 32 characters if hashed. The complexity requirements for the password is determined by the complexity-rules command and must be followed; otherwise, the password will not be accepted.

All password special characters (#, $, spaces, and so on) must be enclosed within double quotes.

For example: config>system>security>user# password “south#bay?”

The question mark character (?) cannot be directly inserted as input during a telnet connection because the character is bound to the help command during a normal Telnet/console connection.

To insert a # or ? characters, they must be entered inside a notepad or clipboard program and then cut and pasted into the Telnet session in the password field that is encased in the double quotes as delimiters for the password.

If a password is entered without any parameters, a password length of zero is implied: (carriage return).

public-keys

Syntax 
public-keys
Context 
config>system>security>user
Description 

This command allows the user to enter the context to configure public keys for SSH.

ecdsa

Syntax 
ecdsa
Context 
config>system>security>user>public-keys
Description 

This command allows the user to enter the context to configure ECDSA public keys.

ecdsa-key

Syntax 
ecdsa-key key-id [create]
no ecdsa-key key-id
Context 
config>system>security>user>public-keys>ecdsa
Description 

This command creates an ECDSA public key and associates it with the username. Multiple public keys can be associated with the user. The key ID is used to identify these keys for the user.

Parameters 
create—
Keyword used to create an ECDSA key. The create keyword requirement can be enabled/disabled in the environment>create context.
key-id
Specifies the key identifier.
Values—
1 to 32

 

key-value

Syntax 
key-value public-key-value
no key-value
Context 
config>system>security>user>public-keys>ecdsa>ecdsa-key
config>system>security>user>public-keys>rsa>rsa-key
Description 

This command configures a value for the RSA or ECDSA public key. The public key must be enclosed in quotation marks. For RSA, the key is between 768 and 4096 bits. For ECDSA, the key is between 1 and 1024 bits.

Default 

no key-value

Parameters 
public-key-value
Specifies the public key value, up to 800 characters for RSA and up to 255 characters for ECDSA.

rsa

Syntax 
rsa
Context 
config>system>security>user>public-keys
Description 

This command allows the user to enter the context to configure RSA public keys.

rsa-key

Syntax 
rsa-key key-id [create]
no rsa-key key-id
Context 
config>system>security>user>public-keys>rsa
Description 

This command creates an RSA public key and associates it with the username. Multiple public keys can be associated with the user. The key ID is used to identify these keys for the user.

Parameters 
create—
Keyword used to create the RSA key. The create keyword requirement can be enabled/disabled in the environment>create context.
key-id
Specifies the key identifier.
Values—
1 to 32

 

restricted-to-home

Syntax 
[no] restricted-to-home
Context 
config>system>security>user
config>system>security>user-template
Description 

This command prevents users from navigating above their home directories for file access (either by means of CLI sessions with the file command, '>' redirection, or by means of FTP). A user is not allowed to navigate to a directory higher in the directory tree on the home directory device. The user is allowed to create and access subdirectories below their home directory.

If a home-directory is not configured or the home directory is not available, then the user has no file access.

The no form of this command allows the user access to navigate to directories above their home directory.

Default 

no restricted-to-home

snmp

Syntax 
snmp
Context 
config>system>security>user
Description 

This command creates the context to configure SNMP group membership for a specific user and defines encryption and authentication parameters.

All SNMPv3 users must be configured with the commands available in this CLI node.

The OS always uses the configured SNMPv3 user name as the security user name.

authentication

Syntax 
authentication {[none] | [[hash] {md5 key-1 | sha key-1} privacy {none | des-key key-2| aes-128-cfb-key key-2}]
no authentication
Context 
config>system>security>user>snmp
Description 

This command configures the authentication and encryption method the user must use in order to be validated by the router. SNMP authentication allows the device to validate the managing node that issued the SNMP message and determine if the message has been tampered.

The keys configured in this command must be localized keys (MD5 or DES hash of the configured SNMP engine-ID and a password). The password is not directly entered in this command (only the localized key).

Default 

no authentication

Parameters 
none—
Do not use authentication. If none is specified, then privacy cannot be configured.
hash—
When hash is not specified, then non-encrypted characters can be entered. When hash is configured, then all specified keys are stored in an encrypted format in the configuration file. The key must be entered in encrypted form when the hash parameter is used.
md5 key-1
Use an HMAC-MD5-96 authentication key.

The MD5 authentication key is stored in an encrypted format. The key must be entered as a full 32 hex character string.

sha key-1
Use an HMAC-SHA-96 authentication key.

The sha authentication key is stored in an encrypted format. The key must be entered as a full 40 hex character string.

privacy none—
Do not perform SNMP packet encryption.
Default—
privacy none
privacy des-key key-2
Use DES for SNMP payload encryption and configure the key. The key must be a 32 hex-character string and is stored in an encrypted format.

The des-key parameter is not available in FIPS-140-2 mode.

privacy aes-128-cfb-key key-2
Use 128 bit CFB mode AES for SNMP payload encryption and configure the key. The key must be a 32 hex-character string and is stored in an encrypted format.
Default—
privacy none

group

Syntax 
group group-name
no group
Context 
config>system>security>user>snmp
Description 

This command associates (or links) a user to a group name. The group name must be configured with the config>system>security>user >snmp>group command. The access command links the group with one or more views, security model (s), security level (s), and read, write, and notify permissions.

Parameters 
group-name—
Enter the group name (between 1 and 32 alphanumeric characters) that is associated with this user. A user can be associated with one group-name per security model.

user-template

Syntax 
user-template {tacplus_default | radius_default | ldap-default}
Context 
config>system>security
Description 

This command configures default security user template parameters.

Parameters 
tacplus_default—
Specifies the default TACACS+ user template. All parameters of the tacplus_default template except the “profile” are actively applied to all TACACS+ users if tacplus use-default-template is enabled. The “profile” parameters are applied to all TACACS+ users if tacplus authorization is enabled (without the use-priv-lvl option) and tacplus use-default-template is enabled.
radius_default—
Specifies the default RADIUS user template. The radius_default template is actively applied to a RADIUS user if radius authorization is enabled, radius use-default-template is enabled, and no VSAs are returned with the auth-accept from the RADIUS server.
ldap_default—
Specifies the default LDAP user template.

profile

Syntax 
profile user-profile-name
no profile
Context 
config>system>security>user-template
Description 

This command configures the profile for the user based on this template.

Parameters 
user-profile-name—
The user profile name entered as a character string. The string is case sensitive and limited to 32 ASCII 7-bit printable characters with no spaces.

2.8.2.19. Dot1x Commands

dot1x

Syntax 
[no] dot1x
Context 
config>system>security
Description 

This command creates the context to configure 802.1x network access control on the router.

The no form of this command removes the 802.1x configuration.

radius-plcy

Syntax 
radius-plcy name [create]
Context 
config>system>security> dot1x
Description 

This command creates the context to configure RADIUS server parameters for 802.1x network access control on the router.

Note:

The RADIUS server configured under the config>system>security>dot1x>radius-plcy context authenticates clients who get access to the data plane of the router as opposed to the RADIUS server configured under the config>system>radius context which authenticates CLI login users who get access to the management plane of the router.

The no form of this command removes the RADIUS server configuration for 802.1x.

retry

Syntax 
retry count
no retry
Context 
config>system>security> dot1x>radius-plcy
Description 

This command configures the number of times the router attempts to contact the RADIUS server for authentication if there are problems communicating with the server.

The no form of this command reverts to the default value.

Default 

retry 3

Parameters 
count—
Specifies the retry count.
Values—
1 to 10

 

server

Syntax 
server server-index address ip-address secret key [hash | hash2 | custom] [auth-port auth-port] [acct-port acct-port] [type server-type]
Context 
config>system>security> dot1x>radius-plcy
Description 

This command adds a Dot1x server and configures the Dot1x server IP address, index, and key values.

Up to five Dot1x servers can be configured at any one time. Dot1x servers are accessed in order from lowest to highest index for authentication requests until a response from a server is received. A higher indexed server is only queried if no response is received from a lower indexed server (which implies that the server is not available). If a response from a server is received, no other Dot1x servers are queried. It is assumed that there are multiple identical servers configured as backups and that the servers do not have redundant data.

The no form of this command removes the server from the configuration.

Default 

no server

Parameters 
server-index—
Specifies the index for the Dot1x server. The index determines the sequence in which the servers are queried for authentication requests. Servers are queried in order from lowest to highest index.
Values—
1 to 5

 

ip-address
Specifies the IP address of the Dot1x server. Two Dot1x servers cannot have the same IP address. An error message is generated if the server address is a duplicate.
key
Specifies the secret key, up to 128 characters, to access the Dot1x server. This secret key must match the password on the Dot1x server.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
custom—
Specifies the custom encryption to management interface.
acct-port
Specifies the UDP port number on which to contact the RADIUS server for accounting requests.
auth-port
Specifies a UDP port number to be used as a match criteria.
Values—
1 to 65535

 

server-type
Specifies the server type.
Values—
authorization, accounting, combined

 

source-address

Syntax 
source-address ip-address
Context 
config>system>security>dot1x>radius-plcy
Description 

This command configures the NAS IP address to be sent in the RADIUS packet.

The no form of this command reverts to the default value.

Parameters 
ip-address —
Specifies the IP prefix for the IP match criterion in dotted decimal notation.
Values—
0.0.0.0 to 255.255.255.255

 

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>dot1x
config>system>security>dot1x>radius-plcy
Description 

This command administratively disables the 802.1x protocol operation. Shutting down the protocol does not remove or change the configuration other than the administrative state.

The operational state of the entity is disabled as well as the operational state of any entities contained within.

The no form of this command administratively enables the protocol which is the default state.

Default 

shutdown

timeout

Syntax 
timeout seconds
no timeout
Context 
config>system>security> dot1x>radius-plcy
Description 

This command configures the number of seconds the router waits for a response from a RADIUS server.

The no form of this command reverts to the default value.

Default 

timeout 3

Parameters 
seconds—
Specifies the number of seconds the router waits for a response from a RADIUS server, expressed as a decimal integer.
Values—
1 to 90

 

2.8.2.20. Keychain Authentication

keychain

Syntax 
[no] keychain keychain-name
Context 
config>system>security
Description 

This command enables the context to configure keychain parameters. A keychain must be configured on the system before it can be applied to a session.

The no form of this command removes the keychain nodal context and everything under it from the configuration. If the keychain to be removed is in use when the no keychain command is entered, the command will not be accepted and an error indicating that the keychain is in use will be printed.

Parameters 
keychain-name—
Specifies a keychain name which identifies this particular keychain entry.
Values—
An ASCII string up to 32 characters.

 

direction

Syntax 
direction
Context 
config>system>security>keychain
Description 

This command specifies the data type that indicates the TCP stream direction to apply the keychain.

bi

Syntax 
bi
Context 
config>system>security>keychain>direction
Description 

This command configures keys for both send and receive stream directions.

uni

Syntax 
uni
Context 
config>system>security>keychain>direction
Description 

This command configures keys for send or receive stream directions.

entry

Syntax 
entry entry-id [key authentication-key | hash-key | hash2-key | custom-key] [hash | hash2 | custom] algorithm algorithm]
no entry entry-id
Context 
config>system>security>keychain>direction>bi
config>system>security>keychain>direction>uni>receive
config>system>security>keychain>direction>uni>send
Description 

This command defines a particular key in the keychain. Entries are defined by an entry-id. A keychain must have valid entries for the TCP Enhanced Authentication mechanism to work.

If the entry is the active entry for sending, then this causes a new active key to be selected (if one is available using the youngest key rule). If it is the only possible key to send, then the system rejects the command with an error indicating the configured key is the only available send key.

If the key is one of the eligible keys for receiving, it will be removed. If the key is the only possible eligible key, then the command is accepted, and an error indicating that this is the only eligible key will be generated.

The no form of this command removes the entry from the keychain.

Parameters 
entry-id—
Specifies an entry that represents a key configuration to be applied to a keychain.
Values—
0 to 63, null-key

 

key—
Specifies a key ID which is used along with keychain-name and direction to uniquely identify this particular key entry.
authentication-key—
Specifies the authentication-key that is used by the encryption algorithm. The key is used to sign and authenticate a protocol packet.

The authentication-key can be any combination of letters or numbers.

Values—
A key must be 160 bits for algorithm hmac-sha-1-96 and must be 128 bits for algorithm aes-128-cmac-96. If the key given with the entry command amounts to less than this number of bits, then it is padded internally with zero bits up to the correct length.

 

algorithm—
Specifies an enumerated integer that indicates the encryption algorithm to be used by the key defined in the keychain.
Values—
aes-128-cmac-96 — Specifies an algorithm based on the AES standard for TCP authentication.
aes-128-gcm-16 — Specifies an algorithm used for MCS.
hmac-sha-1-96 — Specifies an algorithm based on SHA-1 for RSVP-TE and TCP authentication.
message-digest — MD5 hash used for TCP authentication.
hmac-md5 — MD5 hash used for IS-IS and RSVP-TE.
password – Specifies a simple password authentication for OSPF, IS-IS, and RSVP-TE.
hmac-sha-1 — Specifies the sha-1 algorithm for OSPF, IS-IS, and RSVP-TE.
hmac-sha-256 — Specifies the sha-256 algorithm for OSPF and IS-IS.

 

hash-key | hash2-key | custom-key—
Specifies the hash key. The key can be any combination of ASCII characters up to 33 for the hash-key and 96 characters for the hash2-key (encrypted). If spaces are used in the string, enclose the entire string in quotation marks (“ ”).

This is useful when a user must configure the parameter, but, for security purposes, the actual unencrypted key value is not provided.

hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
custom—
Specifies a custom hash version is used while saving the configuration files.

begin-time

Syntax 
begin-time date hours-minutes [UTC]
begin-time {now | forever}
no begin-time
Context 
config>system>security>keychain>direction>bi>entry
config>system>security>keychain>direction>uni>receive>entry
config>system>security>keychain>direction>uni>send>entry
Description 

This command specifies the calendar date and time after which the key specified by the keychain authentication key is used to sign and/or authenticate the protocol stream.

If no date and time is set, the begin-time is represented by a date and time string with all NULLs and the key is not valid by default.

Default 

begin-time forever

Parameters 
date hours-minutes—
Specifies the date and time for the key to become active.
Values—
date: YYYY/MM/DD hours-minutes: hh:mm[:ss]

 

now—
Specifies the key should become active immediately.
forever—
Specifies that the key is always inactive.
UTC—
Indicates that time is given with reference to Coordinated Universal Time in theinput.

option

Syntax 
option {basic | isis-enhanced}
no option
Context 
config>system>security>keychain>direction>bi>entry
Description 

This command configures allows options to be associated with the authentication key.

Parameters 
basic—
Specifies that IS-IS should use RFC 5304 encoding of the authentication information. It is only applicable if used with the IS-IS protocol. All other protocols should ignore this configuration command.
isis-enhanced—
Specifies that IS-IS should use RFC 5310 encoding of the authentication information. It is only applicable if used with the IS-IS protocol. All other protocols should ignore this configuration command.

tolerance

Syntax 
tolerance [seconds | forever]
no tolerance
Context 
config>system>security>keychain>direction>bi>entry
config>system>security>keychain>direction>uni>receive>entry
Description 

This command configures the amount of time that an eligible receive key should overlap with the active send key or to never expire.

Parameters 
seconds—
Specifies the duration that an eligible receive key overlaps with the active send key.
Values—
0 to 4294967294 seconds

 

forever—
Specifies that an eligible receive key overlap with the active send key forever.

receive

Syntax 
receive
Context 
config>system>security>keychain>direction>uni
Description 

This command enables the receive nodal context. Entries defined under this context are used to authenticate TCP segments that are being received by the router.

send

Syntax 
send
Context 
config>system>security>keychain>direction>uni
Description 

This command specifies the send nodal context to sign TCP segments that are being sent by the router to another device.

end-time

Syntax 
end-time date hours-minutes [UTC]
end-time {now | forever}
no end-time
Context 
config>system>security>keychain>direction>uni>receive>entry
Description 

This command specifies the calendar date and time after which the key specified by the authentication key is no longer eligible to sign and/or authenticate the protocol stream.

Default 

end-time forever

Parameters 
date—
Specifies the calendar date after which the key specified by the authentication key is no longer eligible to sign and/or authenticate the protocol stream in the YYYY/MM/DD format. When no year is specified the system assumes the current year.
hours-minutes—
Specifies the time after which the key specified by the authentication key is no longer eligible to sign and/or authenticate the protocol stream in the hh:mm[:ss] format. Seconds are optional, and if not included, assumed to be 0.
UTC—
Indicates that time is given with reference to Coordinated Universal Time in the input.
now—
Specifies a time equal to the current system time.
forever—
Specifies that the key is always active.

tcp-option-number

Syntax 
tcp-option-number
Context 
config>system>security>keychain
Description 

This command enables the context to configure the TCP option number to be placed in the TCP packet header.

receive

Syntax 
receive option-number
no receive
Context 
config>system>security>keychain>tcp-option-number
Description 

This command configures the TCP option number accepted in TCP packets received.

The no form of this command reverts to the default value.

Default 

receive 254

Parameters 
option-number—
Specifies an enumerated integer that indicates the TCP option number to be used in the TCP header.
Values—
253, 254, 253&254, tcp-ao

 

send

Syntax 
send option-number
no send
Context 
config>system>security>keychain>tcp-option-number
Description 

This command configures the TCP option number accepted in TCP packets sent.

Default 

send 254

Parameters 
option-number—
Specifies an enumerated integer that indicates the TCP option number to be used in the TCP header.
Values—
253, 254, tcp-ao

 

2.8.2.21. TTL Security Commands

ttl-security

Syntax 
ttl-security min-ttl-value
no ttl-security
Context 
config>router>bgp>group
config>router>bgp>group>neighbor
config>router>ldp>tcp-session-params>peer-transport
config>system>login-control>ssh
config>system>login-control>telnet
Description 

This command configures TTL security parameters for incoming packets. When the feature is enabled, LDP will accept incoming IP packets from a peer only if the TTL value in the packet is greater than or equal to the minimum TTL value configured for that peer. Per-peer-queueing must be enabled in order for TTL protection to operate.

The no form of this command disables TTL security.

Parameters 
min-ttl-value—
Specifies the minimum TTL value for an incoming BGP packet.
Values—
1 to 255

 

2.8.2.22. gRPC Commands

grpc

Syntax 
grpc
Context 
config>system
Description 

This command enters the context to configure gRPC parameters.

allow-unsecure-connection

Syntax 
[no] allow-unsecure-connection
Context 
config>system>grpc
Description 

This command enables unsecure operation of gRPC connections. This means that TCP connections are not encrypted, including username and password information.

This command can be enabled only if there is no TLS profile assigned to the gRPC server.

The no form of this command enables TLS encryption on gRPC connections.

Default 

no allow-unsecure-connection

gnmi

Syntax 
gnmi
Context 
config>system>grpc
Description 

This command enables the context for configuring a gNMI service on gRPC.

auto-config-save

Syntax 
[no] auto-config-save
Context 
config>system>grpc>gnmi
Description 

This command enables automatic saving of the configuration as part of the commit operation.

The no form of this command disables automatic saving.

shutdown

Syntax 
[no] shutdown
Context 
config>system>grpc>gnmi
Description 

This command stops the gNMI service.

The no form of this command starts the gNMI service.

max-msg-size

Syntax 
max-msg-size number
no max-msg-size
Context 
config>system>grpc
Description 

This command configures the maximum rx message size that can be received.

The no form of this command reverts to the default.

Default 

max-msg-size 512

Parameters 
number—
Specifies the message size, in MB.
Values—
1 to 1024

 

Default—
512

rib-api

Syntax 
rib-api
Context 
config>system>grpc
Description 

This command enables the context to control the RibAPI gRPC service.

purge-timeout

Syntax 
purge-timeout seconds
no purge-timeout
Context 
config>system>grpc>rib-api
Description 

This command configures the purge timeout associated with the RibApi gRPC service.

If a gRPC client used the RibApi gRPC service to program RIB entries into the router, and then the TCP connection drops for any reason, the associated RIB entries are immediately marked as stale and a timer with the purge-timeout value is started. Upon timer expiration, all of the stale entries are removed. While the timer is running, the stale entries remain valid and usable for forwarding but are less preferred than any non-stale entry. The purge-timeout gives an opportunity for the disconnected client, or some other client, to re-program the necessary RIB entries so that forwarding can continue uninterrupted.

The no form of this command resets to the default value of 0. Entries are immediately deleted when the TCP connection drops.

Default 

no purge-timeout

Parameters 
seconds—
Specifies the number of seconds until the stale entries are purged.
Values—
1 to 100 000

 

Default—
0

shutdown

Syntax 
[no] shutdown
Context 
config>system>grpc>rib-api
Description 

This command stops the RibApi gRPC service, deletes all programmed RIB entries (stale and non-stale), but does not close the TCP connections.

The no form of this command restarts the RibApi gRPC service.

shutdown

Syntax 
[no] shutdown
Context 
config>system>grpc
Description 

This command stops the gRPC server. This closes all of the associated TCP connections and immediately purges all RIB entries that were programmed using the RibApi Service.

The no form of this command starts the gRPC server.

tcp-keepalive

Syntax 
tcp-keepalive
Context 
config>system>grpc
Description 

This command enables the context to configure the sending of TCP keepalives by the router towards all gRPC clients.

Enabling TCP keepalive speeds up the detection of certain failures. The TCP keepalives sent by the router are controlled by three commands: idle-time, interval, and retries. The router starts sending TCP keepalives when the connection has been idle (no TCP segments sent or received) for more than idle-time seconds. At that point, the router sends a probe (TCP ACK with a sequence number = current sequence number - 1) and expects a TCP ACK. It repeats this probe every interval seconds for the configured number of retries. If no response is received to any of the probes, the connection is immediately closed, which starts the purge timer if the TCP connection is currently supporting the RibApi service.

idle-time

Syntax 
idle-time idle
no idle-time
Context 
config>system>grpc>tcp-keepalive
Description 

This command configures the amount of time in seconds that the connection must be idle before TCP keepalives are sent.

The no form of this command resets to the default value.

Default 

idle-time 600

Parameters 
idle—
Specifies the number of seconds until the first TCP keep-alive probe is sent.
Values—
1 to 100 000

 

Default—
600

interval

Syntax 
interval interval
no interval
Context 
config>system>grpc>tcp-keepalive
Description 

This command configures the amount of time in seconds between successive TCP keepalive probes sent by the router.

The no form of this command resets to the default value.

Default 

interval 15

Parameters 
interval—
Specifies the number of seconds between TCP keepalive probes.
Values—
1 to 100 000

 

Default—
15

retries

Syntax 
retries count
no retries
Context 
config>system>grpc>tcp-keepalive
Description 

This command configures the number of TCP keepalive probes sent by the router that must be unacknowledged before the connection is closed.

The no form of this command resets to the default value.

Default 

retries 4

Parameters 
count—
Specifies the number of missed keep-alives before the TCP connection is declared down.
Values—
3 to 100

 

Default—
4

shutdown

Syntax 
[no] shutdown
Context 
config>system>grpc>tcp-keepalive
Description 

This command stops the TCP keepalives from being sent to all gRPC clients.

The no form of this command restarts the sending of TCP keepalives to all gRPC clients.

tls-server-profile

Syntax 
tls-server-profile name
no tls-server-profile
Context 
config>system>grpc
Description 

This command adds a configured TLS server profile to the gRPC session. The TLS server is used for encryption of the gRPC session. gRPC will not transmit any PDUs if there is a TLS server profile assigned to it and the TLS connection is down.

The no form of this command removes the specified TLS server profile from the gRPC session.

Parameters 
name—
Specifies the name of the TLS server profile configured under the config>system>security>tls context.

2.8.2.23. Login Control Commands

login-control

Syntax 
login-control
Context 
config>system
Description 

This command creates the context to configure the session control for console, Telnet, SSH, and FTP sessions.

exponential-backoff

Syntax 
[no] exponential-backoff
Context 
config>system>login-control
Description 

This command enables the exponential-backoff of the login prompt. The exponential-backoff command is used to deter dictionary attacks, when a malicious user can gain access to the CLI by using a script to try admin with any conceivable password.

The no form of this command disables exponential-backoff.

Default 

no exponential-backoff

ftp

Syntax 
ftp
Context 
config>system>login-control
Description 

This command creates the context to configure FTP login control parameters.

inbound-max-sessions

Syntax 
inbound-max-sessions number-of-sessions
no inbound-max-sessions
Context 
config>system>login-control>ftp
Description 

This command configures the maximum number of concurrent inbound FTP sessions.

This value is the combined total of inbound and outbound sessions.

The no form of this command reverts to the default value.

Default 

inbound-max-sessions 3

Parameters 
value—
Specifies the maximum number of concurrent FTP sessions on the node.
Values—
0 to 5

 

idle-timeout

Syntax 
idle-timeout {minutes | disable}
no idle-timeout
Context 
config>system>login-control
Description 

This command configures the idle timeout for console, Telnet, SSH, and FTP sessions before the session is terminated by the system.

By default, each idle console, Telnet, SSH, or FTP session times out after 30 minutes of inactivity.

The no form of this command reverts to the default value.

Default 

idle-timeout 30

Parameters 
minutes—
Specifies the idle timeout in minutes. Allowed values are 1 to 1440.
Values—
1 to 1440

 

disable—
When the disable option is specified, a session will never timeout. To re-enable idle timeout, enter the command without the disable option.

login-banner

Syntax 
[no] login-banner
Context 
config>system>login-control
Description 

This command enables or disables the display of a login banner. The login banner contains the SR OS copyright and build date information for a console login attempt.

The no form of this command causes only the configured pre-login-message and a generic login prompt to display.

login-scripts

Syntax 
login-scripts
Context 
config>system>login-control
Description 

This command enables the context to configure CLI scripts that execute when a user (authenticated via any method including local user database, TACACS+, or RADIUS) first logs into a CLI session.

global

Syntax 
global file-url
no global
Context 
config>system>login-control>login-scripts
Description 

This command enables an operator to define a common CLI script that executes when any user logs into a CLI session. This login exec script is executed when any user (authenticated by any means including local user database, TACACS+, or RADIUS) opens a CLI session. This allows a user, for example, to define a common set of CLI aliases that are made available on the router for all users. This global login exec script is executed before any user-specific login exec files that may be configured.

This CLI script executes in the context of the user who opens the CLI session. Any commands in the script that the user is not authorized to execute will fail.

The no form of this command disables the execution of a global login-script.

Default 

no global

Parameters 
file-url—
The path or directory name.

per-user

Syntax 
per-user user-directory dir-url file-name file-name
no per-user
Context 
config>system>login-control>login-scripts
Description 

This command allows users to define their own login scripts that can be executed each time they first login to a CLI session. The command executes the script “file-url / username / file-name" when the user username logs into a CLI session (authenticated by any means including local user database, TACACS+, or RADIUS).

For example:

per-user user-directory "cf1:/local/users" file-name "login-script.txt"

would search for the following script when user “admin” logs in and authenticates via RADIUS:

     cf1:/local/users/admin/login-script.txt

The per user login script is executed after any global script executes and before any login-exec script configured against a local user is executed. This allows users, for example, who are authenticated via TACACS+ or RADIUS to define their own login scripts.

This CLI script executes in the context of the user who opens the CLI session. Any commands in the script that the user is not authorized to execute will fail.

The no form of this command disables the execution of any per user login-scripts.

Default 

no per-user

Parameters 
dir-url—
Specifies the path or directory name.
file-name—
Specifies the name of the file (located in the dir-url directory) including the extension.

motd

Syntax 
motd {url url-prefix: source-url | text motd-text-string}
no motd
Context 
config>system>login-control
Description 

This command creates the message of the day displayed after a successful console login. Only one message can be configured.

The no form of this command removes the message.

Default 

no motd

Parameters 
url url-prefix: source-url
When the message of the day is present as a text file, provide both url-prefix and the source-url of the file containing the message of the day. The URL prefix can be local or remote.
text motd-text-string
Specifies the text of the message of the day. The motd-text-string must be enclosed in double quotes. Multiple text strings are not appended to one another.

Some special characters can be used to format the message text. The \n character can be used to create multi-line messages. A \n in the message moves to the beginning of the next line by sending ASCII/UTF-8 chars 0xA (LF) and 0xD (CR) to the client terminal. An \r in the message sends the ASCII/UTF-8 char 0xD (CR) to the client terminal.

pre-login-message

Syntax 
pre-login-message login-text-string [name]
no pre-login-message
Context 
config>system>login-control
Description 

This command creates a message displayed prior to console login attempts on the console via Telnet.

Only one message can be configured. If multiple pre-login-messages are configured, the last message entered overwrites the previous entry.

It is possible to add the name parameter to an existing message without affecting the current pre-login-message.

The no form of this command removes the message.

Default 

no pre-login-message

Parameters 
login-text-string—
Specifies the login text string up to 900 characters. Any printable, 7-bit ASCII characters can be used. If the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed within double quotes. Some special characters can be used to format the message text. The \n character can be used to create multi-line messages. A \n in the message moves to the beginning of the next line by sending ASCII/UTF-8 chars 0xA (LF) and 0xD (CR) to the client terminal. A \r in the message sends the ASCII/UTF-8 char 0xD (CR) to the client terminal.
name—
When this keyword is specifies, the configured system name is always displayed first in the login message. To remove the name from the login message, the message must be cleared and a new message entered without the name.

ssh

Syntax 
ssh
Context 
config>system>login-control
config>system>security
Description 

This command enables the context to configure the SSH parameters.

telnet

Syntax 
telnet
Context 
config>system>login-control
Description 

This command creates the context to configure the Telnet login control parameters.

disable-graceful-shutdown

Syntax 
[no] disable-graceful-shutdown
Context 
config>system>login-control>ssh
Description 

This command enables graceful shutdown of SSH sessions.

The no form of this command disables graceful shutdown of SSH sessions.

inbound-max-sessions

Syntax 
inbound-max-sessions number-of-sessions
no inbound-max-sessions
Context 
config>system>login-control>telnet
config>system>login-control>ssh
Description 

This parameter limits the number of inbound Telnet and SSH sessions. A maximum of 30 telnet and ssh connections can be established to the router. The local serial port cannot be disabled.

Telnet and SSH maximum sessions can also use the combined total of both inbound sessions (SSH+Telnet). While it is acceptable to continue to internally limit the combined total of SSH and Telnet sessions to N, either SSH or Telnet sessions can use the inbound maximum sessions, if so required by the Operator.

The no form of this command reverts to the default value.

Default 

inbound-max-sessions 5

Parameters 
number-of-sessions—
The maximum number of concurrent inbound Telnet sessions, expressed as an integer.
Values—
0 to 50 (default = 5) or 0 to N where N is the new total number of SSH+Telnet sessions if they are scaled

 

outbound-max-sessions

Syntax 
outbound-max-sessions number-of-sessions
no outbound-max-sessions
Context 
config>system>login-control>telnet
config>system>login-control>ssh
Description 

This parameter limits the number of outbound Telnet and SSH sessions. A maximum of 15 telnet and ssh connections can be established from the router. The local serial port cannot be disabled.

The no form of this command reverts to the default value.

Default 

outbound-max-sessions 5

Parameters 
value—
Specifies the maximum number of concurrent outbound Telnet sessions, expressed as an integer.
Values—
0 to 15

 

enable-graceful-shutdown

Syntax 
[no] enable-graceful-shutdown
Context 
config>system>login-control>telnet
Description 

This command enables graceful shutdown of telnet sessions.

The no form of this command disables graceful shutdown of telnet sessions.