Enter the system context
Commands in this context enable debugging of general system level functions and router management protocols.
16.0.R1
All
Power the output pin on the CPM alarm interface port
configure system alarm-contact-in-power boolean
false
16.0.R1
7750 SR-a
Enter the alarm-contact-input list instance
configure system alarm-contact-input number
16.0.R1
7750 SR-a
Alarm contact input pin
configure system alarm-contact-input number
1 to 4
This element is part of a list key.
16.0.R1
7750 SR-a
Administrative state of the alarm contact input
configure system alarm-contact-input number admin-state keyword
disable
enable, disable
16.0.R1
7750 SR-a
Text message sent in the log event when an alarm clears
configure system alarm-contact-input number clear-message string
1 to 80
Alarm Input Cleared
16.0.R1
7750 SR-a
Text description
configure system alarm-contact-input number description string
1 to 160
16.0.R1
7750 SR-a
Normal state associated with the alarm contact input
configure system alarm-contact-input number normal-state keyword
open
open, closed
16.0.R1
7750 SR-a
Text message sent in the log event when input changes
configure system alarm-contact-input number trigger-message string
1 to 80
Alarm Input Triggered
16.0.R1
7750 SR-a
Enter the alarms context
16.0.R4
All
Administrative state of the system alarm
configure system alarms admin-state keyword
enable
enable, disable
16.0.R4
All
Maximum number of cleared alarms
configure system alarms max-cleared number
0 to 500
500
16.0.R4
All
Allow boot license violations in boot-up configuration
true
16.0.R4
All
Enter the bluetooth context
16.0.R1
7750 SR-1, 7750 SR-s
Specifies the desired administrative state of the bluetooth module.
configure system bluetooth admin-state keyword
disable
enable, disable
20.2.R1
7750 SR-1, 7750 SR-s
Bluetooth advertising timeout
30 to 3600
seconds
16.0.R1
7750 SR-1, 7750 SR-s
Enter the device list instance
5
16.0.R1
7750 SR-1, 7750 SR-s
Bluetooth client device MAC address
This element is part of a list key.
16.0.R1
7750 SR-1, 7750 SR-s
Text description
configure system bluetooth device string description string
1 to 80
16.0.R1
7750 SR-1, 7750 SR-s
Enter the module list instance
16.0.R1
7750 SR-1, 7750 SR-s
CPM slot on which the module resides
1
This element is part of a list key.
16.0.R1
7750 SR-1, 7750 SR-s
Bluetooth module ID
configure system bluetooth module string provisioned-identifier string
1 to 32
16.0.R1
7750 SR-1, 7750 SR-s
Enable the pairing button
configure system bluetooth pairing-button boolean
false
16.0.R1
7750 SR-1, 7750 SR-s
Bluetooth passkey
6
123456
16.0.R1
7750 SR-1, 7750 SR-s
Bluetooth module(s) power mode.
configure system bluetooth power-mode keyword
automatic
manual, automatic
20.2.R1
7750 SR-1, 7750 SR-s
CLI script file to execute following a failed boot-up
configure system boot-bad-exec string
1 to 180
16.0.R1
All
CLI script file to execute following successful boot-up
configure system boot-good-exec string
1 to 180
16.0.R1
All
Enter the central-frequency-clock context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the bits context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the input context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of BITS input timing reference
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Interface type of the BITS timing reference
ds1-esf
ds1-esf, ds1-sf, e1-pcm30crc, e1-pcm31crc, g703-2048khz
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the output context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of BITS output timing reference
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Line length for the BITS output timing reference
length-not-applicable, 110, 220, 330, 440, 550, 660
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Minimum signal quality level for BITSout port
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec, eec1, eec2
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Source of the BITS output timing reference
line-ref
line-ref, internal-clock
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Squelch the signal of the BITS output timing reference
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Override for the quality level of the timing reference
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Sa bit to convey SSM information
4 to 8
8
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ptp context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS-20, 7950 XRS-20e, 7950 XRS-40
Administrative state of the PTP timing reference
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS-20, 7950 XRS-20e, 7950 XRS-40
Minimum signal quality level for system timing module
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec, eec1, eec2
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Consider quality level in system and BITS output timing
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ref-order context
Commands in this context specify the priority order of the synchronous equipment timing subsystem.
If a reference source is disabled, this command defines the next reference source for the clock. If all reference sources are disabled, clocking is derived from a local oscillator.
If a timing reference is linked to a source port that is operationally down, the port is no longer a qualified, valid reference.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
The fifth most preferred timing reference source for the synchronous equipment timing subsystem.
ref1, ref2, bits, ptp, none, synce, gnss
19.10.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-s, 7950 XRS-20, 7950 XRS-20e, 7950 XRS-40
First preferred timing reference source
ref1, ref2, bits, ptp, none, synce, gnss
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Fourth preferred timing reference source
ref1, ref2, bits, ptp, none, synce, gnss
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Second preferred timing reference source
ref1, ref2, bits, ptp, none, synce, gnss
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Third preferred timing reference source
ref1, ref2, bits, ptp, none, synce, gnss
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ref1 context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the first timing reference
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Quality level override of a timing reference
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec, eec1, eec2
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Source port for the first timing reference
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ref2 context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the second timing reference
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Quality level override of a timing reference
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec, eec1, eec2
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Source port for the second timing reference
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Revert to higher-priority reference source
configure system central-frequency-clock revert boolean
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the synce context
19.10.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-s, 7950 XRS-20, 7950 XRS-20e, 7950 XRS-40
Administrative state of the SyncE timing reference
disable
enable, disable
19.10.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-s, 7950 XRS-20, 7950 XRS-20e, 7950 XRS-40
Override the quality level of a timing reference
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec, eec1, eec2
19.10.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-s, 7950 XRS-20, 7950 XRS-20e, 7950 XRS-40
Time to re-validate a previously failed input reference
1 to 12
minutes
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
CLLI code value for the system
11
16.0.R1
All
Enable Virtual Service Router congestion management
configure system congestion-management boolean
false
16.0.R1
VSR
Contact information for the managed node
1 to 80
16.0.R1
All
GPS coordinates for the system location
configure system coordinates string
1 to 80
16.0.R1
All
Enter the cpm-http-redirect context
16.0.R4
All
Enable optimized mode for CPM HTTP redirect messages
true
16.0.R4
All
Enter the cron context
16.0.R1
All
Enter the schedule list instance
255
16.0.R1
All
Schedule name
1 to 32
This element is part of a list key.
16.0.R1
All
Schedule owner
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the cron schedule
disable
enable, disable
16.0.R1
All
Number of times to repeat a periodic schedule run
1 to 65535
16.0.R1
All
Days in a month when a schedule runs
-31 to -1 | 1 to 31
62
16.0.R1
All
Text description
1 to 80
16.0.R1
All
Enter the end-time context
16.0.R1
All
Date and time to stop triggering the schedule
The following are part of a choice: date-and-time or (day and time).
16.0.R1
All
Day to stop triggering this schedule
sunday, monday, tuesday, wednesday, thursday, friday, saturday
The following are part of a choice: date-and-time or (day and time).
16.0.R1
All
Time to stop triggering the schedule
5
The following are part of a choice: date-and-time or (day and time).
16.0.R1
All
Hours within a day when the schedule runs
0 to 23
24
16.0.R1
All
Time between each periodic schedule run
30 to 42949672
seconds
16.0.R1
All
Minutes in an hour when the schedule runs
0 to 59
60
16.0.R1
All
Months when the schedule runs
1 to 12
january, february, march, april, may, june, july, august, september, october, november, december
12
16.0.R1
All
Enter the script-policy context
16.0.R1
All
Script policy name
1 to 32
16.0.R1
All
Script policy owner
1 to 32
16.0.R1
All
Schedule type
periodic
periodic, calendar, oneshot
16.0.R1
All
Weekdays when the schedule runs
1 to 7
sunday, monday, tuesday, wednesday, thursday, friday, saturday
7
16.0.R1
All
Enter the dhcp6 context
16.0.R4
All
Applications to send NoAddrsAvail in Advertise messages
configure system dhcp6 adv-noaddrs-global keyword
esm-relay, server
2
16.0.R4
All
Enter the dns context
16.0.R1
All
Preference in DNS address resolving order
configure system dns address-pref keyword
ipv4-only, ipv6-first
16.0.R1
All
Enter the dnssec context
16.0.R1
All
Validation of AD-bit presence in DNS server responses
configure system dns dnssec ad-validation keyword
fall-through, drop
16.0.R1
All
Enter the efm-oam context
16.0.R1
All
Generate Information OAM PDU on soft reset notification
configure system efm-oam dying-gasp-tx-on-reset boolean
false
16.0.R1
All
Send Grace TLVs for soft reset graceful recovery events
false
16.0.R1
All
Enter the eth-cfm context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Allow system level capability of grace messaging
true
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the md-auto-id context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the ma-index-range context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Upper bound of the range
1 to max
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Lower bound of the range
1 to max
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the md-index-range context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Upper bound of the range
1 to max
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Lower bound of the range
1 to max
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the redundancy context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the mc-lag context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Delay timer value for the fault propagation
configure system eth-cfm redundancy mc-lag propagate-hold-time (number | keyword)
1 to 60
1
seconds
none
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Allow standby MC-LAG MEPs to act administratively down
configure system eth-cfm redundancy mc-lag standby-mep boolean
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the sender-id context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Local name used in CFM PDUs
configure system eth-cfm sender-id local-name string
1 to 45
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ETH-CFM sender ID to be used in CFM PDUs
system
system, local
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the slm context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
SLR inactivity timer to maintain the stale test data
configure system eth-cfm slm inactivity-timer number
10 to 100
100
seconds
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the grpc context
16.0.R1
All
Administrative state of gRPC server
configure system grpc admin-state keyword
disable
enable, disable
16.0.R1
All
Allow connection without secured transport protocol
When configured, this command allows an unsecured connection to remote managers; TCP connections are not encrypted, including username and password information.
The following are part of a choice: allow-unsecure-connection or tls-server-profile.
16.0.R1
All
Enter the gnmi context
16.0.R1
All
Administrative state of gNMI service
configure system grpc gnmi admin-state keyword
enable
enable, disable
16.0.R1
All
Automatically save configuration as part of operation
configure system grpc gnmi auto-config-save boolean
false
16.0.R1
All
Enter the gnoi context
19.10.R1
All
Enter the cert-mgmt context
19.10.R1
All
Administrative state of gNOI CertificateManagement service.
disable
enable, disable
19.10.R1
All
Enter the file context
21.2.R1
All
Administrative state of gNOI File service.
disable
enable, disable
21.2.R1
All
Enter the system context
20.5.R1
All
Administrative state of gNOI System service.
disable
enable, disable
20.5.R1
All
Maximum size of received message
configure system grpc max-msg-size number
1 to 1024
512
megabytes
16.0.R1
All
Enter the md-cli context
20.5.R1
All
Administrative state of the MD-CLI service
configure system grpc md-cli admin-state keyword
disable
enable, disable
20.5.R1
All
Enter the rib-api context
16.0.R4
All
Administrative state of RibAPI service
configure system grpc rib-api admin-state keyword
disable
enable, disable
16.0.R4
All
Number of seconds until stale entries are purged
configure system grpc rib-api purge-timeout number
1 to 100000
seconds
16.0.R4
All
Enter the tcp-keepalive context
16.0.R4
All
Administrative state of the TCP keepalive algorithm
configure system grpc tcp-keepalive admin-state keyword
disable
enable, disable
16.0.R4
All
Time until the first TCP keepalive probe is sent
configure system grpc tcp-keepalive idle-time number
1 to 100000
600
seconds
16.0.R4
All
Interval between TCP keep-alive probes
configure system grpc tcp-keepalive interval number
1 to 100000
15
seconds
16.0.R4
All
Missed keepalives before the TCP connection is closed
configure system grpc tcp-keepalive retries number
3 to 100
4
16.0.R4
All
Preferred TLS server profile
configure system grpc tls-server-profile reference
configure system security tls server-tls-profile string
The following are part of a choice: allow-unsecure-connection or tls-server-profile.
16.0.R1
All
Enable vendor-specific extensions to ICMP
false
16.0.R1
All
Allow QinQ encapsulation for network interfaces
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Create IP interface indexes that are globally unique
configure system ip enforce-unique-if-index boolean
false
16.0.R1
All
Allows the 6in4 forwarding of traffic sent to the system IP address.
configure system ip forward-6in4 boolean
false
19.10.R1
All
Allows the forwarding of IP traffic encapsulated in GRE transport sent to the system IP address.
configure system ip forward-ip-over-gre boolean
false
19.10.R1
All
Limit the number of IPv6 extension headers processed ingress/egress.
max
max, limited
20.5.R1
All
Enter the mpls context
19.10.R3
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Specifies the MPLS label stack statistics count.
1 to 2
1
19.10.R3
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the l2tp context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Enter the non-multi-chassis-tunnel-id-range context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the range
0 to 16383
16383
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the range
0 to 16383
1
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Enter the lacp context
16.0.R1
All
LACP system priority on aggregated Ethernet interfaces
configure system lacp system-priority number
1 to 65535
32768
16.0.R1
All
Enter the lldp context
16.0.R1
All
Administrative state of LLDP
configure system lldp admin-state keyword
enable
enable, disable
16.0.R1
All
Interval at which LLDP frames are transmitted
configure system lldp message-fast-tx number
1 to 3600
1
seconds
16.0.R1
All
PDUs to transmit during the fast transmission period
configure system lldp message-fast-tx-init number
1 to 8
4
16.0.R1
All
Minimum interval between change notifications
configure system lldp notification-interval number
5 to 3600
5
seconds
16.0.R1
All
Time required before re-initializing LLDP on a port
configure system lldp reinit-delay number
1 to 10
2
seconds
16.0.R1
All
Maximum consecutive LLDPDUs that can be transmitted
configure system lldp tx-credit-max number
1 to 100
5
16.0.R1
All
Transmit interval multiplier
configure system lldp tx-hold-multiplier number
2 to 10
4
16.0.R1
All
LLDP transmit interval
configure system lldp tx-interval number
5 to 32768
30
seconds
16.0.R1
All
Enter the load-balancing context
16.0.R1
All
Include L2TP header information for load balancing
false
16.0.R4
All
Use load balancing based on Layer 4 fields
16.0.R1
All
Hashing algorithm for system-wide LSR load balancing
lbl-only, lbl-ip, ip-only, eth-encap-ip, lbl-ip-l4-teid
16.0.R1
All
Enable enhanced egress multicast load balancing
false
16.0.R1
All
Enable enhanced VLL LAG service ID hashing
false
16.0.R1
All
Use system IP address for ECMP and LAG load balancing
16.0.R1
All
Site location of the system
1 to 80
16.0.R1
All
Enter the login-control context
16.0.R1
All
Enable exponential-backoff of the login prompt
false
16.0.R1
All
Enter the ftp context
16.0.R1
All
Maximum number of concurrent inbound FTP sessions
0 to 5
3
16.0.R1
All
Idle timeout for FTP, console, or Telnet sessions
configure system login-control idle-timeout (keyword | number)
1 to 1440
30
minutes
none
16.0.R1
All
Display login banner
configure system login-control login-banner boolean
false
16.0.R1
All
Enter the login-scripts context
16.0.R1
All
URL of the global CLI login script
1 to 180
16.0.R1
All
Enter the per-user-script context
16.0.R1
All
File name of the per-user login script
1 to 180
16.0.R1
All
Directory name of user-defined login script
1 to 180
16.0.R1
All
Enter the motd context
16.0.R1
All
Message of the day displayed after console login
configure system login-control motd text string
1 to 900
The following are part of a choice: text or url.
16.0.R1
All
URL of the location of message of the day
configure system login-control motd url string
1 to 180
The following are part of a choice: text or url.
16.0.R1
All
Enter the pre-login-message context
16.0.R1
All
Message displayed prior to the login prompt
1 to 900
16.0.R1
All
Display the system name before the pre-login message
false
16.0.R1
All
Enter the ssh context
16.0.R1
All
Allow graceful shutdown of SSH sessions
configure system login-control ssh graceful-shutdown boolean
true
16.0.R1
All
Maximum number of concurrent inbound sessions
0 to 50
5
16.0.R1
All
Maximum number of concurrent outbound sessions
0 to 15
5
16.0.R1
All
Minimum TTL value for incoming BGP packets
configure system login-control ssh ttl-security number
1 to 255
16.0.R1
All
Enter the telnet context
16.0.R1
All
Allow graceful shutdown of Telnet sessions
false
16.0.R1
All
Maximum number of concurrent inbound sessions
0 to 50
5
16.0.R1
All
Maximum number of concurrent outbound sessions
0 to 15
5
16.0.R1
All
Minimum TTL value for incoming BGP packets
1 to 255
16.0.R1
All
Enter the management-interface context
16.0.R1
All
Enter the cli context
16.0.R1
All
Enter the classic-cli context
16.0.R1
All
Allow writable access in classic CLI configure branch
true
16.0.R1
All
Enter the rollback context
16.0.R1
All
Maximum number of rollback files on compact flash
1 to 50
10
16.0.R1
All
Location and filename of the rollback checkpoint files
1 to 180
16.0.R1
All
Maximum rollback files saved at a remote location
1 to 200
10
16.0.R1
All
Enter the rescue context
16.0.R1
All
Location of the rollback rescue file
1 to 180
16.0.R1
All
System-wide CLI engine access configuration
configure system management-interface cli cli-engine keyword
md-cli
classic-cli, md-cli
2
This element is ordered by the user.
16.0.R1
All
Enter the md-cli context
16.0.R1
All
Automatically save configuration as part of operation
false
16.0.R1
All
Enter the environment context
16.0.R1
All
Enter the command-completion context
16.0.R1
All
Complete the command when the enter key is pressed
true
16.0.R1
All
Complete the command when the space key is pressed
true
16.0.R1
All
Complete the command when the tab key is pressed
true
16.0.R1
All
Enter the console context
16.0.R1
All
Number of lines displayed on the screen
24 to 512
24
16.0.R1
All
Number of columns displayed on the screen
80 to 512
80
16.0.R1
All
Enter the message-severity-level context
16.0.R1
All
Message severity threshold for CLI messages
info
warning, info
16.0.R1
All
Prompt to continue or stop when output text fills page
true
16.0.R1
All
Enter the progress-indicator context
16.0.R1
All
Administrative state of the progress indicator
enable
enable, disable
16.0.R1
All
Delay before progress indicator is displayed
0 to 10000
1000
milliseconds
16.0.R1
All
Progress indicator output style
dots
dots
16.0.R1
All
Enter the prompt context
16.0.R1
All
Show the current command context in the prompt
true
16.0.R1
All
Add a new line before every prompt line
true
16.0.R1
All
Show the timestamp before the first prompt line
false
16.0.R1
All
Show an asterisk (*) when uncommitted changes exist
true
16.0.R1
All
Time zone displayed before the prompt
local
local, utc
16.0.R1
All
Time format to display date and time
rfc-3339
iso-8601, rfc-1123, rfc-3339
20.5.R1
All
Configuration mode for the system
classic
classic, model-driven, mixed
16.0.R1
All
Enter the configuration-save context
16.0.R1
All
Maximum number of backup versions maintained
1 to 200
5
16.0.R1
All
Enter the netconf context
16.0.R1
All
Administrative state of NETCONF
disable
enable, disable
16.0.R1
All
Automatically save configuration as part of operation
false
16.0.R1
All
Enter the capabilities context
16.0.R1
All
Allow the NETCONF server to access the candidate datastore
true
16.0.R1
All
Allow NETCONF server to access the running datastore
false
16.0.R1
All
Choose port on which the NETCONF server will listen for new connections.
22 | 830
830
19.10.R1
All
Enter the operations context
Commands in this context configure parameters associated with operational commands in model-driven interfaces.
21.5.R1
All
Enter the global-timeouts context
Commands in this context configure system timeout parameters for operational commands.
Timeout parameters provide default system-level control for various types of operational commands in model-driven interfaces. The timeout values are used when specific execution and retention timeouts are not requested for a specific operation.
21.5.R1
All
Timeout for asynchronous operation execution
configure system management-interface operations global-timeouts asynchronous-execution (number | keyword)
This command configures the period of time that operations launched as “asynchronous” are allowed to execute before being automatically stopped by the SR OS.
An asynchronous operation is not deleted from the system when it is stopped. See the asynchronous-retention command.
If a specific execution timeout is not included in the request for a particular asynchronous operation, this system-level timeout applies.
Note: This execution timeout is part of the general global operations infrastructure and is separate and independent from any operation-specific timeouts (for example, the ping operation also has its own timeout parameter).
1 to 604800
3600
never
21.5.R1
All
Timeout for asynchronous operation data retention
configure system management-interface operations global-timeouts asynchronous-retention (number | keyword)
This command configures the period of time that data related to operations launched as “asynchronous” is retained in the system. After the retention timeout expires, all information related to the operation is deleted, including any status information and result data.
If a specific retention timeout is not included in the request for a particular asynchronous operation, this system-level timeout applies.
1 to 604800
86400
never
21.5.R1
All
Timeout for synchronous operation execution
configure system management-interface operations global-timeouts synchronous-execution (number | keyword)
This command configures the period of time that operations launched as “'synchronous” (the default method for all operations) are allowed to execute before they are automatically stopped, and their associated data is deleted.
If a specific execution timeout is not included in the request for a particular synchronous operation, this system-level timeout applies.
Note: This execution timeout is part of the general global operations infrastructure and is separate and independent from any operation-specific timeouts (for example, the ping operation also has its own timeout parameter).
Caution: If this command is set with a specific time value, MD-CLI operations are subject to the timeout and are interrupted if they execute longer than the time value. This situation can arise because the timeout also applies to operations requested in the MD-CLI interface (for example, ping, file dir, and so on).
1 to 604800
never
never
21.5.R1
All
Enter the remote-management context
Commands in this context configure remote management to manage multiple SR OS nodes running different SR OS versions from the same MD-CLI shell.
20.5.R1
All
Administrative state of remote management registration
disable
enable, disable
20.5.R1
All
Allow connection without secured transport protocol
When configured, this command allows an unsecured connection to remote managers; TCP connections are not encrypted, including username and password information.
The following are part of a choice: allow-unsecure-connection or client-tls-profile.
20.5.R1
All
TLS client profile name
This command specifies the client TLS profile to all remote managers.
configure system security tls client-tls-profile string
The following are part of a choice: allow-unsecure-connection or client-tls-profile.
20.5.R1
All
Time without a response before manager declared down
1 to 3600
60
seconds
20.5.R1
All
Device label supplied to the remote manager
This command specifies a metadata label that is supplied to the manager. This label is used to group devices or network nodes with a common purpose or goal.
1 to 64
20.5.R1
All
Device name supplied to the remote manager
This command specifies a device name that is supplied to the manager. The name identifies a specific SR OS node in the network.
When unconfigured, the default system name is used.
1 to 64
20.5.R1
All
Time between hello messages from SR OS node to manager
10 to 3600
10
minutes
20.5.R1
All
Enter the manager list instance
Commands in this context configure specific manager-related commands. Commands configured in this context take precedence over command values specified directly in the configure management-interface remote-management context.
If a command is not configured in this context, the command setting is inherited from the higher level context.
2
20.5.R1
All
Remote management manager name
1 to 64
This element is part of a list key.
20.5.R1
All
Administrative state of remote management registration
configure system management-interface remote-management manager string admin-state keyword
disable
enable, disable
20.5.R1
All
Allow connection without secured transport protocol
When configured, this command allows an unsecured connection to remote managers; TCP connections are not encrypted, including username and password information.
The following are part of a choice: allow-unsecure-connection or client-tls-profile.
20.5.R1
All
TLS client profile name
configure system management-interface remote-management manager string client-tls-profile reference
This command assigns a profile name to a remote manager.
configure system security tls client-tls-profile string
The following are part of a choice: allow-unsecure-connection or client-tls-profile.
20.5.R1
All
Max time without response before manager declared down
1 to 3600
seconds
20.5.R1
All
Text description
configure system management-interface remote-management manager string description string
1 to 80
20.5.R1
All
Device label supplied to the remote manager
configure system management-interface remote-management manager string device-label string
This command specifies a metadata label that is supplied to the manager. This label is used to group devices or network nodes with a common purpose or goal.
1 to 64
20.5.R1
All
Device name supplied to the remote manager
configure system management-interface remote-management manager string device-name string
This command specifies a device name that is supplied to the manager. The name identifies a specific SR OS node in the network.
When unconfigured, the default system name is used.
1 to 64
20.5.R1
All
Destination IP address of the manager
configure system management-interface remote-management manager string manager-address (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name)
1 to 255
20.5.R1
All
Destination TCP port for gRPC connections to manager
configure system management-interface remote-management manager string manager-port number
1 to 65535
57400
20.5.R1
All
Reference to a router or VPRN service name
configure system management-interface remote-management manager string router-instance string
20.5.R1
All
Source IP address for connection to the manager
configure system management-interface remote-management manager string source-address (ipv4-address-no-zone | ipv6-address-no-zone)
20.5.R1
All
Source TCP destination port number
configure system management-interface remote-management manager string source-port (number | keyword)
1 to 65535
grpc-default
20.5.R1
All
Router name or VPRN service name
management
20.5.R1
All
Source IP address for connection to the manager
configure system management-interface remote-management source-address (ipv4-address-no-zone | ipv6-address-no-zone)
20.5.R1
All
Source TCP port number to connection to the manager
configure system management-interface remote-management source-port (number | keyword)
1 to 65535
grpc-default
grpc-default
20.5.R1
All
Schema path URL
This command specifies the schema path where the SR OS YANG modules can be manually copied by the user prior to using a <get-schema> request. It is recommended that the URL string not exceed 135 characters for the <get-schema> request to work properly with all schema files.
When unconfigured, the software upgrade process manages the YANG schema files to ensure the schema files are synchronized with the software image on both the primary and standby CPM.
1 to 180
16.0.R4
All
Enter the snmp context
16.0.R1
All
Administrative state of the SNMP daemon
enable
enable, disable
16.0.R1
All
SNMP engine ID that identifies the SNMPv3 node
10 to 64
16.0.R1
All
Port number to be used to send general SNMP messages.
0 | 1 to 65535
161
16.0.R1
All
Maximum SNMP packet size generated by the node
484 to 9216
1500
16.0.R1
All
Enter the streaming context
16.0.R1
All
Administrative state of the streaming daemon
disable
enable, disable
16.0.R1
All
Enter the yang-modules context
Commands in this context determine the system support of the Nokia YANG models.
The settings affect the data sent in a NETCONF <hello>, data populated in the RFC 6022 /netconf-state/schemas list, data returned in a <get-schema> request, and data populated in the RFC 8525 /yang-library.
16.0.R1
All
Support base release 13 YANG models
false
16.0.R1
All
Support access to combined Nokia YANG models
When configured to true, the system supports the combined Nokia YANG files for both configuration and state data in the NETCONF server.
When the system is operating in classic configuration mode, attempts to access (read or write) the configuration using the Nokia configuration modules or namespace via NETCONF result in errors, even if this command is set to true.
When configured to false, access to the combined Nokia YANG files is not supported.
This command and the nokia-submodules command cannot both be set to true at the same time.
16.0.R4
All
Support submodule-based packaging of Nokia YANG models
When configured to true, the system supports the alternative submodule-based packaging of the Nokia YANG files for both configuration and state data in the NETCONF server.
When the system is operating in classic configuration mode, attempts to access (read or write) the configuration using the Nokia configuration modules or namespace via NETCONF result in errors, even if this command is set to true.
When configured to false, access to the submodule-based packaging of the Nokia YANG files is not supported.
This command and the nokia-combined-modules command cannot both be set to true at the same time.
21.2.R1
All
Support OpenConfig YANG models
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative name assigned to the system
1 to 64
16.0.R1
All
Enter the network-element-discovery context
19.5.R1
All
Generate NE discovery traps
false
19.5.R1
All
Enter the profile list instance
1
19.5.R1
All
Profile name
1 to 32
This element is part of a list key.
19.5.R1
All
Network element ID of the advertised node
configure system network-element-discovery profile string neid string
7 to 8
19.5.R1
All
Enter the neip context
19.5.R1
All
Enter the auto-generate context
21.2.R1
All
Enable the ipv4 context
21.2.R1
All
Most significant byte if the NE IPv4 address
configure system network-element-discovery profile string neip auto-generate ipv4 vendor-id-value number
1 to 255
140
21.2.R1
All
Enable the ipv6 context
21.2.R1
All
Most significant byte of the NE IPv6 address
configure system network-element-discovery profile string neip auto-generate ipv6 vendor-id-value number
1 to 255
140
21.2.R1
All
NEIP IPv4 address
19.5.R1
All
NEIP IPv6 address
19.5.R1
All
Platform name and chassis type to be advertised
configure system network-element-discovery profile string platform-type string
1 to 255
19.5.R1
All
MAC address of the advertised node
configure system network-element-discovery profile string system-mac string
19.5.R1
All
Vendor ID to be advertised
configure system network-element-discovery profile string vendor-id string
1 to 255
Nokia
19.5.R1
All
Process received OSPF dynamic hostname information
configure system ospf-dynamic-hostnames boolean
When configured to true, OSPF dynamic hostnames are enabled. The router receiving the new dynamic hostname within the OSPF Router Information (RI) LSA is instructed to process the received dynamic hostname information.
When configured to false, dynamic hostname information is not processed.
false
20.2.R1
All
Enter the persistence context
16.0.R1
All
Enter the ancp context
16.0.R1
All
Text description
configure system persistence ancp description string
1 to 80
16.0.R1
All
CPM flash card where the information is stored
configure system persistence ancp location keyword
cf1, cf2, cf3
16.0.R1
All
Enter the application-assurance context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Text description
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
CPM flash card where the information is stored
cf1, cf2, cf3
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the dhcp-server context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Text description
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
CPM flash card where the information is stored
configure system persistence dhcp-server location keyword
cf1, cf2, cf3
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Enter the nat-port-forwarding context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Text description
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
CPM flash card where the information is stored
cf1, cf2, cf3
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the options context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
DHCP lease time limit to be eligible for persistence
1 to 631152000
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Enter the python-policy-cache context
16.0.R1
All
Text description
1 to 80
16.0.R1
All
CPM flash card where the information is stored
cf1, cf2, cf3
16.0.R1
All
Enter the subscriber-mgmt context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Text description
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
CPM flash card where the information is stored
cf1, cf2, cf3
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Enter the power-management list instance
16.0.R1
7750 SR-s, 7950 XRS
Power zone
1 to 2
This element is part of a list key.
16.0.R1
7750 SR-s, 7950 XRS
Power capacity mode algorithm
configure system power-management power-zone number mode keyword
basic
none, basic, advanced
16.0.R1
7750 SR-s, 7950 XRS
Power capacity to trigger a safety alert event
configure system power-management power-zone number power-safety-alert number
0 to 120000
0
watts
16.0.R1
7750 SR-s, 7950 XRS
Minimum threshold to power off devices
configure system power-management power-zone number power-safety-level number
0 to 100
100
percent
16.0.R1
7750 SR-s, 7950 XRS
Enter the script-control context
16.0.R1
All
Enter the script list instance
configure system script-control script string owner string
1500
16.0.R1
All
Script name
configure system script-control script string owner string
1 to 32
This element is part of a list key.
16.0.R1
All
Script owner
configure system script-control script string owner string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the policy
configure system script-control script string owner string admin-state keyword
disable
enable, disable
16.0.R1
All
Text description
configure system script-control script string owner string description string
1 to 80
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Script location
1 to 255
16.0.R1
All
Enter the script-policy list instance
configure system script-control script-policy string owner string
1500
16.0.R1
All
Script policy name
configure system script-control script-policy string owner string
1 to 32
This element is part of a list key.
16.0.R1
All
Script policy owner
configure system script-control script-policy string owner string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the script policy
configure system script-control script-policy string owner string admin-state keyword
disable
enable, disable
16.0.R1
All
Maximum amount of time to keep a run history status
configure system script-control script-policy string owner string expire-time (number | keyword)
0 to 21474836
3600
seconds
forever
16.0.R1
All
Maximum amount of time the script may run
configure system script-control script-policy string owner string lifetime (number | keyword)
0 to 21474836
3600
seconds
forever
16.0.R1
All
Allow EHS/CRON script to break database explicit lock
configure system script-control script-policy string owner string lock-override boolean
false
19.10.R1
All
Maximum number of script history status entries kept
configure system script-control script-policy string owner string max-completed number
1 to 1500
1
16.0.R1
All
Location to receive CLI output of a script run
configure system script-control script-policy string owner string results string
1 to 255
16.0.R1
All
Enter the script context
configure system script-control script-policy string owner string script
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Script name
configure system script-control script-policy string owner string script name string
1 to 32
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Script owner
configure system script-control script-policy string owner string script owner string
1 to 32
16.0.R1
All
Enter the security context
Commands in this context configure central security settings such as DDoS protection, users, authorization profiles, and certificates.
Access to these commands should be restricted to highly trusted users and device administrators.
16.0.R1
All
Enter the aaa context
16.0.R1
All
Enter the cli-session-group list instance
configure system security aaa cli-session-group string
16
16.0.R1
All
CLI session group name
configure system security aaa cli-session-group string
1 to 32
This element is part of a list key.
16.0.R2
All
Maximum number of concurrent SSH and Telnet sessions
configure system security aaa cli-session-group string combined-max-sessions number
0 to 50
16.0.R1
All
Text description
configure system security aaa cli-session-group string description string
1 to 80
16.0.R1
All
Maximum number of concurrent SSH sessions
configure system security aaa cli-session-group string ssh-max-sessions number
0 to 50
16.0.R1
All
Maximum number of concurrent Telnet sessions
configure system security aaa cli-session-group string telnet-max-sessions number
0 to 50
16.0.R1
All
Polling interval of RADIUS, TACACS+, and LDAP servers
configure system security aaa health-check (number | keyword)
6 to 1500
30
seconds
none
16.0.R1
All
Enter the local-profiles context
16.0.R1
All
Enter the profile list instance
128
16.0.R1
All
User profile name
1 to 32
This element is part of a list key.
16.0.R1
All
CLI session group to which the profile belongs
configure system security aaa local-profiles profile string cli-session-group reference
configure system security aaa cli-session-group string
16.0.R1
All
Maximum number of concurrent SSH and Telnet sessions
configure system security aaa local-profiles profile string combined-max-sessions number
0 to 50
16.0.R1
All
Action for non-matching entry
configure system security aaa local-profiles profile string default-action keyword
none
deny-all, permit-all, none, read-only-all
16.0.R1
All
User profile entry ID
1 to 9999
This element is part of a list key.
16.0.R1
All
Action when a user command matches the entry
none
deny, permit, none, read-only
16.0.R1
All
Text description
configure system security aaa local-profiles profile string entry number description string
1 to 80
16.0.R1
All
Command to match the entry
1 to 255
16.0.R1
All
Enter the grpc context
16.0.R1
All
Enter the rpc-authorization context
Commands in this context control the authorization of each RPC in gRPC interfaces.
16.0.R1
All
gNMI Capabilities RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnmi-capabilities keyword
permit
permit, deny
16.0.R1
All
gNMI Get RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnmi-get keyword
permit
permit, deny
16.0.R1
All
gNMI Set RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnmi-set keyword
permit
permit, deny
16.0.R1
All
gNMI Subscribe RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnmi-subscribe keyword
permit
permit, deny
16.0.R1
All
CanGenerateCSR RPC usage
deny
permit, deny
19.10.R1
All
GetCertificates RPC usage
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-cert-mgmt-getcert keyword
deny
permit, deny
19.10.R1
All
Install RPC usage
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-cert-mgmt-install keyword
deny
permit, deny
19.10.R1
All
RevokeCertificates RPC usage
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-cert-mgmt-revoke keyword
deny
permit, deny
20.2.R1
All
Rotate RPC usage
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-cert-mgmt-rotate keyword
deny
permit, deny
19.10.R1
All
gNOI File Get RPC usage
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-file-get keyword
permit
permit, deny
21.2.R1
All
gNOI File Put RPC usage
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-file-put keyword
permit
permit, deny
21.2.R1
All
gNOI File Remove RPC usage
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-file-remove keyword
permit
permit, deny
21.2.R1
All
gNOI File Stat RPC usage
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-file-stat keyword
permit
permit, deny
21.2.R1
All
gNOI System CancelReboot RPC usage
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-cancelreboot keyword
deny
permit, deny
20.5.R1
All
gNOI System Reboot RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-reboot keyword
deny
permit, deny
20.5.R1
All
gNOI System RebootStatus RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-rebootstatus keyword
deny
permit, deny
20.5.R1
All
gNOI System SetPackage RPC usage
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-setpackage keyword
deny
permit, deny
20.5.R1
All
gNOI System SwitchControlProcessor RPC usage
deny
permit, deny
20.5.R1
All
gNOI MdCli Session RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization md-cli-session keyword
permit
permit, deny
20.5.R1
All
RibApi GetVersion RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization rib-api-getversion keyword
permit
permit, deny
16.0.R4
All
RibApi Modify RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization rib-api-modify keyword
permit
permit, deny
16.0.R4
All
Allow lawful intercept profile ID
false
19.10.R1
All
Enter the netconf context
16.0.R1
All
Enter the base-op-authorization context
16.0.R1
All
Allow NETCONF kill-session operation
configure system security aaa local-profiles profile string netconf base-op-authorization kill-session boolean
false
16.0.R1
All
Allow NETCONF lock and unlock operations
configure system security aaa local-profiles profile string netconf base-op-authorization lock boolean
false
16.0.R1
All
Maximum number of concurrent SSH sessions
configure system security aaa local-profiles profile string ssh-max-sessions number
0 to 50
16.0.R1
All
Maximum number of concurrent Telnet sessions
configure system security aaa local-profiles profile string telnet-max-sessions number
0 to 50
16.0.R1
All
Enter the management-interface context
20.10.R1
All
Enter the md-cli context
20.10.R1
All
Perform remote command accounting during a load or rollback operation
true
20.10.R1
All
Enter the output-authorization context
20.10.R1
All
Perform output authorization
true
20.10.R1
All
Perform telemetry data notification authorization
false
20.10.R1
All
Enter the remote-servers context
16.0.R1
All
Enter the ldap context
16.0.R1
All
Administrative state of the LDAP protocol
configure system security aaa remote-servers ldap admin-state keyword
enable
enable, disable
16.0.R1
All
Allow SSH public key authentication from LDAP server
false
16.0.R1
All
Route preference to reach the AAA server
This command specifies the routing preference to reach the AAA server. If the configured option is to use both in-band and out-of-band routes, the out-of-band routes in the Base routing instance are used to reach the server before the in-band routes in the management routing instance.
both
both, inband, outband
21.5.R1
All
Enter the server list instance
5
16.0.R1
All
LDAP server ID
1 to 5
This element is part of a list key.
16.0.R1
All
Enter the address list instance
1
16.0.R1
All
LDAP server address
This element is part of a list key.
16.0.R1
All
Port number on which to contact the LDAP server
1 to 65535
389
16.0.R1
All
Administrative state of the LDAP server
configure system security aaa remote-servers ldap server number admin-state keyword
disable
enable, disable
16.0.R1
All
Enter the bind-authentication context
16.0.R1
All
Password used for authentication with the LDAP server
configure system security aaa remote-servers ldap server number bind-authentication password string
1 to 199
16.0.R1
All
Root domain used for authentication with LDAP server
configure system security aaa remote-servers ldap server number bind-authentication root-dn string
1 to 512
16.0.R1
All
Enter the search context
16.0.R1
All
LDAP server search base domain name
1 to 512
16.0.R1
All
LDAP server name
configure system security aaa remote-servers ldap server number server-name string
1 to 32
16.0.R1
All
TLS client profile used to encrypt the LDAP connection
configure system security aaa remote-servers ldap server number tls-profile reference
configure system security tls client-tls-profile string
16.0.R1
All
Number of attempts to retry contacting the LDAP server
1 to 10
3
16.0.R1
All
Timeout for a response from the LDAP server
1 to 90
3
seconds
16.0.R1
All
Apply the default template to LDAP
true
16.0.R1
All
Enter the radius context
16.0.R1
All
Algorithm used to access the set of RADIUS servers
direct
direct, round-robin
16.0.R1
All
Enable RADIUS command accounting
configure system security aaa remote-servers radius accounting boolean
false
16.0.R1
All
Port number on RADIUS server for accounting requests
1 to 65535
1813
16.0.R1
All
Administrative state of RADIUS authentication
enable
enable, disable
16.0.R1
All
Enable RADIUS authorization
false
16.0.R1
All
Enable RADIUS interactive authentication
false
16.0.R1
All
TCP port number on which to contact RADIUS server
1 to 65535
1812
16.0.R1
All
Route preference to reach the AAA server
This command specifies the routing preference to reach the AAA server. If the configured option is to use both in-band and out-of-band routes, the out-of-band routes in the Base routing instance are used to reach the server before the in-band routes in the management routing instance.
both
both, inband, outband
21.5.R1
All
Enter the server list instance
5
16.0.R1
All
RADIUS server ID
1 to 5
This element is part of a list key.
16.0.R1
All
IP address of the RADIUS server
This element is mandatory.
16.0.R1
All
Secret key to access the RADIUS server
1 to 115
This element is mandatory.
16.0.R1
All
Number of attempts to retry contacting RADIUS server
1 to 10
3
16.0.R1
All
Time to wait for a response from the RADIUS server
1 to 90
3
seconds
16.0.R1
All
Apply the RADIUS default user template to RADIUS user
false
16.0.R1
All
Enter the tacplus context
16.0.R1
All
Enable the accounting context
16.0.R1
All
Type of accounting record packet sent to TACACS+ server
stop-only
start-stop, stop-only
16.0.R1
All
Enter the admin-control context
16.0.R1
All
Interactive authentication from node to TACACS+ server
0 to 15
16.0.R1
All
Administrative state of the TACACS+ protocol operation
enable
enable, disable
16.0.R1
All
Enable the authorization context
16.0.R1
All
Allow privilege level mapping
false
16.0.R1
All
Allows TACACS+ interactive authentication
false
16.0.R1
All
Enter the priv-lvl-map context
16.0.R1
All
Enter the priv-lvl list instance
16.0.R1
All
Privilege level for the mapping
0 to 15
This element is part of a list key.
16.0.R1
All
User profile for the mapping
configure system security aaa remote-servers tacplus priv-lvl-map priv-lvl number user-profile-name reference
This element is mandatory.
16.0.R1
All
Route preference to reach the AAA server
This command specifies the routing preference to reach the AAA server. If the configured option is to use both in-band and out-of-band routes, the out-of-band routes in the Base routing instance are used to reach the server before the in-band routes in the management routing instance.
both
both, inband, outband
21.5.R1
All
Enter the server list instance
5
16.0.R1
All
TACACS+ server ID
1 to 5
This element is part of a list key.
16.0.R1
All
IP address of TACACS+ server.
This element is mandatory.
16.0.R1
All
TCP port ID on which to contact TACACS+ server
0 | 1 to 65535
49
16.0.R1
All
Secret key to access the TACACS+ server
1 to 199
This element is mandatory.
16.0.R1
All
Time to wait for a response from the TACACS+ server
1 to 90
3
seconds
16.0.R1
All
Apply TACACS+ default user-template to TACACS+ user
true
16.0.R1
All
Enter the user-template list instance
configure system security aaa user-template keyword
16.0.R1
All
Default user template applied to the system user
configure system security aaa user-template keyword
ldap-default, radius-default, tacplus-default
This element is part of a list key.
16.0.R1
All
Enter the access context
16.0.R1
All
Allow console access (serial port or Telnet)
true
16.0.R1
All
Allow FTP access
false
16.0.R1
All
Allow gRPC access
false
16.0.R1
All
Allow access to lawful intercept
false
19.10.R1
All
Allow NETCONF session access
false
16.0.R1
All
Enter the console context
16.0.R1
All
File to execute for a successful user login via console
configure system security aaa user-template keyword console login-exec string
1 to 200
16.0.R1
All
User local home directory based on the template
configure system security aaa user-template keyword home-directory (sat-url | cflash-without-slot-url)
1 to 200
16.0.R1
All
User profile based on the template
1 to 32
16.0.R1
All
Prevent user navigation above the home directory
configure system security aaa user-template keyword restricted-to-home boolean
false
16.0.R1
All
Enter the cli-script context
16.0.R1
All
Enter the authorization context
16.0.R1
All
Enter the cron context
16.0.R1
All
User profile name for CLI command script authorization
configure system security cli-script authorization cron cli-user reference
configure system security user-params local-user user string
16.0.R1
All
Enter the event-handler context
16.0.R1
All
User profile name for CLI command script authorization
configure system security user-params local-user user string
16.0.R1
All
Enter the vsd context
16.0.R1
All
User profile name for CLI command script authorization
configure system security cli-script authorization vsd cli-user reference
configure system security user-params local-user user string
16.0.R1
All
Enter the cpm-filter context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Action for packets that do not match any filter entries
configure system security cpm-filter default-action keyword
accept
drop, accept
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ip-filter context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the CPM filter
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the entry list instance
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Filter entry ID
1 to 131072
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the action context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Use default action for matching packets
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Drop matching packets
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets to the CPM hardware queue
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Text description
configure system security cpm-filter ip-filter entry number description string
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Log ID where matching packets are entered
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the match context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
DSCP used as the match criterion on the packet
be, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cs1, cp9, af11, cp11, af12, cp13, af13, cp15, cs2, cp17, af21, cp19, af22, cp21, af23, cp23, cs3, cp25, af31, cp27, af32, cp29, af33, cp31, cs4, cp33, af41, cp35, af42, cp37, af43, cp39, cs5, cp41, cp42, cp43, cp44, cp45, ef, cp47, nc1, cp49, cp50, cp51, cp52, cp53, cp54, cp55, nc2, cp57, cp58, cp59, cp60, cp61, cp62, cp63
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the dst-ip context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP address used as the match criterion
The following are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP prefix list used as match criterion
configure system security cpm-filter ip-filter entry number match dst-ip ip-prefix-list reference
configure filter match-list ip-prefix-list string
The following are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Address mask as the match criterion
The following are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the dst-port context
The following are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
0 to 65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
1 to 65535
65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure filter match-list port-list string
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Match criterion based on presence of fragmented packets
false, true
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the icmp context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ICMP code to match
0 to 255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ICMP type to match
0 to 255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the ip-option context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Mask that is ANDed with ip-option value in the packet header
1 to 255
255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Specific IP option to match
0 to 255
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Specifies whether multiple options are to be matched.
configure system security cpm-filter ip-filter entry number match multiple-option boolean
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Specifies whether IP options matching is enabled.
configure system security cpm-filter ip-filter entry number match option-present boolean
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the port context
The following are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
0 to 65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
1 to 65535
65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure filter match-list port-list string
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP protocol as the match criterion
0 to 255
tcp-udp, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Router instance as the match criteria
configure system security cpm-filter ip-filter entry number match router-instance string
1 to 64
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the src-ip context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP address used as the match criterion
The following are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP prefix list used as match criterion
configure system security cpm-filter ip-filter entry number match src-ip ip-prefix-list reference
configure filter match-list ip-prefix-list string
The following are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Address mask as the match criterion
The following are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the src-port context
The following are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
0 to 65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
1 to 65535
65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure filter match-list port-list string
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the tcp-flags context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ACK bit in TCP header control bits as match criterion
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
SYN bit in TCP header control bits as match criterion
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ipv6-filter context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the CPM filter
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the entry list instance
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Filter entry ID
1 to 131072
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the action context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Use default action for matching packets
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Drop matching packets
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets to the CPM hardware queue
configure system security cpm-filter ipv6-filter entry number action queue reference
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Text description
configure system security cpm-filter ipv6-filter entry number description string
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Log ID where matching packets are entered
configure system security cpm-filter ipv6-filter entry number log reference
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the match context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
DSCP used as the match criterion on the packet
configure system security cpm-filter ipv6-filter entry number match dscp keyword
be, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cs1, cp9, af11, cp11, af12, cp13, af13, cp15, cs2, cp17, af21, cp19, af22, cp21, af23, cp23, cs3, cp25, af31, cp27, af32, cp29, af33, cp31, cs4, cp33, af41, cp35, af42, cp37, af43, cp39, cs5, cp41, cp42, cp43, cp44, cp45, ef, cp47, nc1, cp49, cp50, cp51, cp52, cp53, cp54, cp55, nc2, cp57, cp58, cp59, cp60, cp61, cp62, cp63
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the dst-ip context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP address as the match criterion
configure system security cpm-filter ipv6-filter entry number match dst-ip address (ipv6-address | ipv6-prefix-with-host-bits)
The following are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv6 prefix list as match criterion for IP address
configure system security cpm-filter ipv6-filter entry number match dst-ip ipv6-prefix-list reference
The following are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv6 address mask as the match criterion
configure system security cpm-filter ipv6-filter entry number match dst-ip mask string
The following are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the dst-port context
The following are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
configure system security cpm-filter ipv6-filter entry number match dst-port eq number
0 to 65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
configure system security cpm-filter ipv6-filter entry number match dst-port mask number
1 to 65535
65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure system security cpm-filter ipv6-filter entry number match dst-port port-list reference
configure filter match-list port-list string
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match dst-port range end number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match dst-port range start number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the extension-header context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Match on existence of Hop-By-Hop Options Header
configure system security cpm-filter ipv6-filter entry number match extension-header hop-by-hop boolean
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Flow label in the IPv6 header as the match criterion
configure system security cpm-filter ipv6-filter entry number match flow-label number
0 to 1048575
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Match criterion based on presence of fragmented packets
configure system security cpm-filter ipv6-filter entry number match fragment keyword
false, true
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the icmp context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ICMP code as the match criterion
configure system security cpm-filter ipv6-filter entry number match icmp code number
0 to 255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ICMP type as the match criterion
configure system security cpm-filter ipv6-filter entry number match icmp type number
0 to 255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP protocol to match
configure system security cpm-filter ipv6-filter entry number match next-header (number | keyword)
0 to 255
tcp-udp, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the port context
The following are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
configure system security cpm-filter ipv6-filter entry number match port eq number
0 to 65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
configure system security cpm-filter ipv6-filter entry number match port mask number
1 to 65535
65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure system security cpm-filter ipv6-filter entry number match port port-list reference
configure filter match-list port-list string
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match port range end number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match port range start number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Router instance as the match criteria
configure system security cpm-filter ipv6-filter entry number match router-instance string
1 to 64
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the src-ip context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP address as the match criterion
configure system security cpm-filter ipv6-filter entry number match src-ip address (ipv6-address | ipv6-prefix-with-host-bits)
The following are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv6 prefix list as match criterion for IP address
configure system security cpm-filter ipv6-filter entry number match src-ip ipv6-prefix-list reference
The following are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv6 address mask as the match criterion
configure system security cpm-filter ipv6-filter entry number match src-ip mask string
The following are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the src-port context
The following are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
configure system security cpm-filter ipv6-filter entry number match src-port eq number
0 to 65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
configure system security cpm-filter ipv6-filter entry number match src-port mask number
1 to 65535
65535
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure system security cpm-filter ipv6-filter entry number match src-port port-list reference
configure filter match-list port-list string
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match src-port range end number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match src-port range start number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the tcp-flags context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ACK bit in TCP header control bits as match criterion
configure system security cpm-filter ipv6-filter entry number match tcp-flags ack boolean
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
SYN bit in TCP header control bits as match criterion
configure system security cpm-filter ipv6-filter entry number match tcp-flags syn boolean
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the mac-filter context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the CPM filter
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the entry list instance
configure system security cpm-filter mac-filter entry number
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Filter entry ID
configure system security cpm-filter mac-filter entry number
1 to 131072
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the action context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Use default action for matching packets
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Drop matching packets
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets to the CPM hardware queue
configure system security cpm-filter mac-filter entry number action queue reference
The following are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Text description
configure system security cpm-filter mac-filter entry number description string
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Log ID where matching packets are entered
configure system security cpm-filter mac-filter entry number log reference
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the match context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the cfm-opcode context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Equal to comparison operator for the CFM opcode
configure system security cpm-filter mac-filter entry number match cfm-opcode eq number
0 to 255
The following are part of a choice: eq, gt, lt, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Greater than comparison operator for the CFM opcode
configure system security cpm-filter mac-filter entry number match cfm-opcode gt number
0 to 254
The following are part of a choice: eq, gt, lt, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Less than comparison operator for the CFM opcode
configure system security cpm-filter mac-filter entry number match cfm-opcode lt number
1 to 255
The following are part of a choice: eq, gt, lt, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following are part of a choice: eq, gt, lt, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the Opcode range to match
configure system security cpm-filter mac-filter entry number match cfm-opcode range end number
1 to 255
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the OpCode range to match
configure system security cpm-filter mac-filter entry number match cfm-opcode range start number
0 to 254
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the dst-mac context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
MAC address used as the match criterion
configure system security cpm-filter mac-filter entry number match dst-mac address string
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
MAC address mask as the match criterion
configure system security cpm-filter mac-filter entry number match dst-mac mask string
ff:ff:ff:ff:ff:ff
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Ethernet type as the match criterion
configure system security cpm-filter mac-filter entry number match etype string
This command specifies an Ethernet type II Ethertype value to be used as a MAC filter match criterion.
The Ethernet type field is used by the Ethernet version-II frames and does not apply to IEEE 802.3 Ethernet frames.
5 to 6
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
MAC frame type as the match criterion
configure system security cpm-filter mac-filter entry number match frame-type keyword
802dot2-llc, ethernet-ii
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the llc-dsap context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
8-bit DSAP as the match criterion
configure system security cpm-filter mac-filter entry number match llc-dsap dsap number
0 to 255
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Mask for DSAP value as the match criterion
configure system security cpm-filter mac-filter entry number match llc-dsap mask number
1 to 255
255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the llc-ssap context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Mask for SSAP value as the match criterion
configure system security cpm-filter mac-filter entry number match llc-ssap mask number
1 to 255
255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
8-bit SSAP as the match criterion
configure system security cpm-filter mac-filter entry number match llc-ssap ssap number
0 to 255
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Service ID used as the match condition
configure system security cpm-filter mac-filter entry number match service reference
16.0.R4
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the src-mac context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
MAC address used as the match criterion
configure system security cpm-filter mac-filter entry number match src-mac address string
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
MAC address mask as the match criterion
configure system security cpm-filter mac-filter entry number match src-mac mask string
ff:ff:ff:ff:ff:ff
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the cpm-queue context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the queue list instance
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
CPM queue ID
33 to 2000
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Buffer size that can be drawn from queue buffer pool
0 to 131072
kilobps
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Maximum queue depth to which the queue can grow
0 to 131072
kilobps
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the rate context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Amount of bandwidth committed to the queue
0 to 100000000
max
kilobps
max
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Peak information Rate for the queue
1 to 100000000
max
kilobps
max
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the cpu-protection context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the ip-src-monitoring context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the included-protocols context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Include extracted DHCP packets for IP source monitoring
true
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Include extracted GTP packets for IP source monitoring
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Include extracted ICMP packets for IP source monitoring
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Include extracted IGMP packets for IP source monitoring
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Packet arrival rate limit for link level protocols
configure system security cpu-protection link-specific-rate (number | keyword)
1 to 65535
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the policy list instance
configure system security cpu-protection policy number
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Policy ID
configure system security cpu-protection policy number
1 to 255
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Generate an event when the rate is exceeded
true
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Text description
configure system security cpu-protection policy number description string
1 to 80
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the eth-cfm context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the entry list instance
10
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Entry ID
1 to 100
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Add a list entry for level
1
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Lower bound of the level range
0 to 7
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Upper bound of the level range
0 to 7
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Add a list entry for opcode
1
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Lower bound of the OpCode range
0 to 255
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Upper bound of the OpCode range
0 to 255
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Packet arrival rate limit
0 to 65534
max
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the out-profile-rate context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Generate a log event when the packet rate is exceeded
configure system security cpu-protection policy number out-profile-rate log-events boolean
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Packet arrival rate limit
configure system security cpu-protection policy number out-profile-rate pir (number | keyword)
1 to 65534
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Overall packet arrival rate limit to apply for all sources of packets
configure system security cpu-protection policy number overall-rate (number | keyword)
1 to 65534
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the per-source-parameters context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the ip-src-monitoring context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Apply per-source rate limiting to DHCP packets containing Client IP address zero
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Per-source packet arrival rate limit
configure system security cpu-protection policy number per-source-rate (number | keyword)
1 to 65534
max
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the port-overall-rate context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Mark packets that exceed the rate as low-priority
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Per-port packet arrival rate limit
configure system security cpu-protection port-overall-rate pir (number | keyword)
1 to 65535
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enable the protocol-protection context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Allow OSPF sham-link traffic over VPRN transport tunnels
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Block extraction and processing of PIM packets that arrive inside a tunnel
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the dist-cpu-protection context
16.0.R1
All
Enter the policy list instance
Commands in this context configure the attributes of DCP policies. These policies can be applied to objects such as SAPs, network interfaces or ports
18
16.0.R1
All
Policy name
1 to 32
This element is part of a list key.
16.0.R1
All
Text description
configure system security dist-cpu-protection policy string description string
1 to 80
16.0.R1
All
Enter the local-monitoring-policer list instance
configure system security dist-cpu-protection policy string local-monitoring-policer string
1
16.0.R1
All
Local monitoring policer name
configure system security dist-cpu-protection policy string local-monitoring-policer string
1 to 32
This element is part of a list key.
16.0.R1
All
Text description
configure system security dist-cpu-protection policy string local-monitoring-policer string description string
1 to 80
16.0.R1
All
Action taken when policer rates are exceeded
configure system security dist-cpu-protection policy string local-monitoring-policer string exceed-action keyword
none
discard, low-priority, none
16.0.R1
All
Control of log events creation for status and activity
configure system security dist-cpu-protection policy string local-monitoring-policer string log-events keyword
true
false, true, verbose
16.0.R1
All
Enter the rate context
configure system security dist-cpu-protection policy string local-monitoring-policer string rate
16.0.R1
All
Enter the kbps context
configure system security dist-cpu-protection policy string local-monitoring-policer string rate kbps
The following are part of a choice: kbps or packets.
16.0.R1
All
Rate limit
configure system security dist-cpu-protection policy string local-monitoring-policer string rate kbps limit (keyword | number)
1 to 20000000
max
kilobps
max
16.0.R1
All
Tolerance for the rate
configure system security dist-cpu-protection policy string local-monitoring-policer string rate kbps mbs number
0 to 4194304
bytes
16.0.R1
All
Enter the packets context
configure system security dist-cpu-protection policy string local-monitoring-policer string rate packets
This element is the default part of a choice.
The following are part of a choice: kbps or packets.
16.0.R1
All
Additional packets allowed in an initial burst
configure system security dist-cpu-protection policy string local-monitoring-policer string rate packets initial-delay number
0 to 255
0
packets
16.0.R1
All
Packets per interval limit
configure system security dist-cpu-protection policy string local-monitoring-policer string rate packets limit (keyword | number)
0 to 8000
max
packets per interval
max
16.0.R1
All
Measurement interval for packets rate
configure system security dist-cpu-protection policy string local-monitoring-policer string rate packets within number
1 to 32767
1
seconds
16.0.R1
All
Enter the protocol list instance
16.0.R1
All
Protocol name
arp, dhcp, http-redirect, icmp, igmp, mld, ndis, pppoe-pppoa, all-unspecified, mpls-ttl, bfd-cpm, bgp, eth-cfm, isis, ldp, ospf, pim, rsvp, icmp-ping-check, lacp
This element is part of a list key.
16.0.R1
All
Enter the dynamic-parameters context
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters
16.0.R1
All
Minimum time the dynamic policer remains allocated
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters detection-time number
1 to 128000
30
seconds
16.0.R1
All
Enter the exceed-action context
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters exceed-action
16.0.R1
All
Action taken on control packets when rates are exceeded
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters exceed-action action keyword
none
discard, low-priority, none
16.0.R1
All
Hold down behavior
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters exceed-action hold-down (keyword | number)
1 to 10080
none
seconds
indefinite, none
16.0.R1
All
Control of log events creation for status and activity
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters log-events keyword
true
false, true, verbose
16.0.R1
All
Enter the rate context
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate
16.0.R1
All
Enter the kbps context
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate kbps
The following are part of a choice: kbps or packets.
16.0.R1
All
Rate limit
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate kbps limit (keyword | number)
1 to 20000000
max
kilobps
max
16.0.R1
All
Tolerance for the rate
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate kbps mbs number
0 to 4194304
bytes
16.0.R1
All
Enter the packets context
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate packets
This element is the default part of a choice.
The following are part of a choice: kbps or packets.
16.0.R1
All
Additional packets allowed in an initial burst
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate packets initial-delay number
0 to 255
0
packets
16.0.R1
All
Packets per interval limit
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate packets limit (keyword | number)
0 to 8000
max
packets per interval
max
16.0.R1
All
Measurement interval for packets rate
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate packets within number
1 to 32767
1
seconds
16.0.R1
All
Enter the enforcement context
configure system security dist-cpu-protection policy string protocol keyword enforcement
16.0.R1
All
Enter the dynamic context
configure system security dist-cpu-protection policy string protocol keyword enforcement dynamic
The following are part of a choice: dynamic, dynamic-local-mon-bypass, or static.
16.0.R1
All
Dynamic enforcement policer for the protocol
configure system security dist-cpu-protection policy string protocol keyword enforcement dynamic mon-policer-name reference
configure system security dist-cpu-protection policy string local-monitoring-policer string
16.0.R1
All
Do not include packets in the local monitoring function
This element is the default part of a choice.
The following are part of a choice: dynamic, dynamic-local-mon-bypass, or static.
16.0.R1
All
Enter the static context
configure system security dist-cpu-protection policy string protocol keyword enforcement static
The following are part of a choice: dynamic, dynamic-local-mon-bypass, or static.
16.0.R1
All
Static policer enforced by the protocol
configure system security dist-cpu-protection policy string protocol keyword enforcement static policer-name reference
configure system security dist-cpu-protection policy string static-policer string
16.0.R1
All
Enter the static-policer list instance
configure system security dist-cpu-protection policy string static-policer string
18
16.0.R1
All
Static policer name
configure system security dist-cpu-protection policy string static-policer string
1 to 32
This element is part of a list key.
16.0.R1
All
Text description
configure system security dist-cpu-protection policy string static-policer string description string
1 to 80
16.0.R1
All
Minimum time the dynamic policer remains allocated
configure system security dist-cpu-protection policy string static-policer string detection-time number
1 to 128000
30
seconds
16.0.R1
All
Enter the exceed-action context
configure system security dist-cpu-protection policy string static-policer string exceed-action
16.0.R1
All
Action taken on control packets when rates are exceeded
configure system security dist-cpu-protection policy string static-policer string exceed-action action keyword
none
discard, low-priority, none
16.0.R1
All
Hold down behavior
configure system security dist-cpu-protection policy string static-policer string exceed-action hold-down (keyword | number)
1 to 10080
none
seconds
indefinite, none
16.0.R1
All
Control of log events creation for status and activity
configure system security dist-cpu-protection policy string static-policer string log-events keyword
true
false, true, verbose
16.0.R1
All
Enter the rate context
configure system security dist-cpu-protection policy string static-policer string rate
16.0.R1
All
Enter the kbps context
configure system security dist-cpu-protection policy string static-policer string rate kbps
The following are part of a choice: kbps or packets.
16.0.R1
All
Rate limit
configure system security dist-cpu-protection policy string static-policer string rate kbps limit (keyword | number)
1 to 20000000
max
kilobps
max
16.0.R1
All
Tolerance for the rate
configure system security dist-cpu-protection policy string static-policer string rate kbps mbs number
0 to 4194304
bytes
16.0.R1
All
Enter the packets context
configure system security dist-cpu-protection policy string static-policer string rate packets
This element is the default part of a choice.
The following are part of a choice: kbps or packets.
16.0.R1
All
Additional packets allowed in an initial burst
configure system security dist-cpu-protection policy string static-policer string rate packets initial-delay number
0 to 255
0
packets
16.0.R1
All
Packets per interval limit
configure system security dist-cpu-protection policy string static-policer string rate packets limit (keyword | number)
0 to 8000
max
packets per interval
max
16.0.R1
All
Measurement interval for packets rate
configure system security dist-cpu-protection policy string static-policer string rate packets within number
1 to 32767
1
seconds
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Policy type
access-network, port
21.5.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the dot1x context
16.0.R1
All
Administrative state of port access control in a system
configure system security dot1x admin-state keyword
disable
enable, disable
16.0.R1
All
Enter the radius-policy list instance
configure system security dot1x radius-policy string
16.0.R1
All
RADIUS server policy to use for 802.1X authentication
configure system security dot1x radius-policy string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of this RADIUS server policy
configure system security dot1x radius-policy string admin-state keyword
disable
enable, disable
16.0.R1
All
Number of RADIUS requests toward the same RADIUS server
1 to 10
3
16.0.R1
All
Enter the server list instance
5
16.0.R1
All
RADIUS server index
1 to 5
This element is part of a list key.
16.0.R1
All
UDP port number on which to contact the RADIUS server for accounting requests
configure system security dot1x radius-policy string server number accounting-port number
1 to 65535
1813
16.0.R1
All
IP address of the RADIUS server
This element is mandatory.
16.0.R1
All
UDP port number on which to contact the RADIUS server for authentication
configure system security dot1x radius-policy string server number authentication-port number
1 to 65535
1812
16.0.R1
All
Secret key associated with the RADIUS server
1 to 54
This element is mandatory.
16.0.R1
All
RADIUS server type
authorization
authorization, accounting, combined
16.0.R1
All
Source address of the RADIUS packet
configure system security dot1x radius-policy string source-address string
16.0.R1
All
Time assigned between the request retries toward the same RADIUS server
1 to 90
5
seconds
16.0.R1
All
Enable FTP servers running on the system
configure system security ftp-server boolean
false
16.0.R1
All
Enter the hash-control context
16.0.R4
All
Enter the management-interface context
Commands in this context configure encryption parameters for different management interfaces.
16.0.R4
All
Enter the classic-cli context
16.0.R4
All
Global read algorithm for the system
This command specifies how encrypted configuration secrets are interpreted and which encryption types are accepted when secrets are input into the system or read from a configuration file (for example, at system bootup time).
all-hash
all-hash, hash, hash2, custom
16.0.R4
All
Global write algorithm for the system
This command specifies the format of the output for encrypted configuration secrets (for example, in the saved configuration file, or in the output of the info or show commands).
hash2
cleartext, hash, hash2, custom
16.0.R4
All
Enter the grpc context
16.0.R4
All
Encryption format for configuration secrets
This command specifies the format of the input and output for encrypted configuration secrets.
hash2
cleartext, hash, hash2, custom
16.0.R4
All
Enter the md-cli context
16.0.R4
All
Encryption format for configuration secrets
This command specifies the format of the input and output for encrypted configuration secrets.
hash2
cleartext, hash, hash2, custom
16.0.R4
All
Enter the netconf context
16.0.R4
All
Encryption format for configuration secrets
This command specifies the format of the input and output for encrypted configuration secrets.
hash2
cleartext, hash, hash2, custom
16.0.R4
All
Enter the keychains context
16.0.R1
All
Enter the keychain list instance
256
16.0.R1
All
Keychain name
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the keychain
enable
enable, disable
16.0.R1
All
Enter the bidirectional context
16.0.R1
All
Enter the entry list instance
16.0.R1
All
Keychain identifier
0 to 63 | 255
This element is part of a list key.
16.0.R1
All
Administrative state of the keychain entry
configure system security keychains keychain string bidirectional entry number admin-state keyword
enable
enable, disable
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Encryption algorithm used by the keychain key
aes-128-cmac-96, hmac-sha-1-96, password, message-digest, hmac-md5, hmac-sha-1, hmac-sha-256
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
The key used by the encryption algorithm to sign and authenticate protocol packets.
configure system security keychains keychain string bidirectional entry number authentication-key string
1 to 54
16.0.R1
All
Calendar date and time when the system starts using the key
configure system security keychains keychain string bidirectional entry number begin-time string
16.0.R1
All
Keychain key option
none
none, basic, isis-enhanced
16.0.R1
All
Time within which an eligible receive key should overlap with the active send key
0 to 4294967294
300
infinite
16.0.R1
All
Text description
1 to 80
16.0.R1
All
Enter the receive context
16.0.R1
All
Enter the entry list instance
16.0.R1
All
Keychain identifier
0 to 63 | 255
This element is part of a list key.
16.0.R1
All
Administrative state of the keychain entry
enable
enable, disable
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Encryption algorithm used by the keychain key
aes-128-cmac-96, hmac-sha-1-96, password, message-digest, hmac-md5, hmac-sha-1, hmac-sha-256
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
The key used by the encryption algorithm to sign and authenticate protocol packets.
1 to 54
16.0.R1
All
Calendar date and time when the system starts using the key
16.0.R1
All
Calendar date and time when the system should stop using the key
16.0.R1
All
Time within which an eligible receive key should overlap with the active send key
0 to 4294967294
300
infinite
16.0.R1
All
Enter the send context
16.0.R1
All
Enter the entry list instance
16.0.R1
All
Keychain identifier
0 to 63 | 255
This element is part of a list key.
16.0.R1
All
Administrative state of the keychain entry
enable
enable, disable
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Encryption algorithm used by the keychain key
aes-128-cmac-96, hmac-sha-1-96, password, message-digest, hmac-md5, hmac-sha-1, hmac-sha-256
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
The key used by the encryption algorithm to sign and authenticate protocol packets.
1 to 54
16.0.R1
All
Calendar date and time when the system starts using the key
16.0.R1
All
Enter the tcp-option-number context
16.0.R1
All
TCP option value expected in the TCP header of received packets
option-254
option-253, option-254, both, tcp-ao
16.0.R1
All
TCP option value assigned in the TCP header of transmitted packets
option-254
option-253, option-254, tcp-ao
16.0.R1
All
Enter the management context
Commands in this context control which management protocols can be used to access the SR OS router via the 'Base' and 'management' router instances.
16.0.R5
All
Allow access to the FTP server
configure system security management allow-ftp boolean
When configured to true, this command allows FTP access to the SR OS router via the 'Base' and 'management' router instances.
When configured to false, this command disallows access to the SR OS FTP server.
true
16.0.R6
All
Allow access to the gRPC server
configure system security management allow-grpc boolean
When configured to true, this command allows access to the gRPC server via the 'Base' and 'management' router instances.
When configured to false, this command disallows gRPC server access.
true
19.5.R1
All
Allow access to the NETCONF server
configure system security management allow-netconf boolean
When configured to true, this command allows NETCONF server access to the SR OS router via the 'Base' and 'management' router instances.
When configured to false, this command disallows access to the NETCONF server.
true
19.5.R1
All
Allow access to the SSH server
configure system security management allow-ssh boolean
When configured to true, this command allows SSH server access to the SR OS router via the 'Base' and 'management' router instances.
When configured to false, this command disallows SSH server access.
true
16.0.R5
All
Allow access to the IPv4 Telnet server
configure system security management allow-telnet boolean
When configured to true, this command allows IPv4 Telnet server access to the SR OS router via the 'Base' and 'management' router instances.
When configured to false, this command disallows access to the IPv4 Telnet server.
true
16.0.R5
All
Allow access to the Telnet IPv6 server
configure system security management allow-telnet6 boolean
When configured to true, this command allows IPv6 Telnet server access to the SR OS router via the 'Base' and 'management' router instances.
When configured to false, this command disallows access to the IPv6 Telnet server.
true
16.0.R5
All
Enter the management-access-filter context
16.0.R4
All
Enter the ip-filter context
16.0.R4
All
Administrative state of management-access filters
enable
enable, disable
16.0.R4
All
Default action for the management access filter
ignore-match
ignore-match, accept, drop, reject
16.0.R4
All
The id used to uniquely identify this filter entry.
1 to 9999
This element is part of a list key.
16.0.R4
All
Specifies the default action for management access in the absence of a specific management access filter entry match.
ignore-match
ignore-match, accept, drop, reject
16.0.R4
All
Text description
configure system security management-access-filter ip-filter entry number description string
1 to 80
16.0.R4
All
Enable match logging
configure system security management-access-filter ip-filter entry number log-events boolean
false
16.0.R4
All
Enter the match context
16.0.R4
All
Enable the dst-port context
16.0.R4
All
IP address mask as the match criterion
1 to 65535
65535
16.0.R4
All
TCP or UDP port number as the match criterion
1 to 65535
This element is mandatory.
16.0.R4
All
Enter the mgmt-port context
16.0.R4
All
Specifies source cpm.
The following are part of a choice: cpm, (lag and lag-id), or port-id.
16.0.R4
All
LAG ID as the match criterion
1 to 27
The following are part of a choice: cpm, (lag and lag-id), or port-id.
21.2.R1
All
Port ID as the match criterion
The following are part of a choice: cpm, (lag and lag-id), or port-id.
16.0.R4
All
IP protocol as the match criterion
0 to 255
tcp-udp, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
16.0.R4
All
Router instance as the match criterion
configure system security management-access-filter ip-filter entry number match router-instance string
16.0.R4
All
Enter the src-ip context
16.0.R4
All
IP address or IP prefix as the match criterion
The following are part of a choice: (address and mask) or ip-prefix-list.
16.0.R4
All
IP prefix list as the match criterion
configure system security management-access-filter ip-filter entry number match src-ip ip-prefix-list reference
configure filter match-list ip-prefix-list string
The following are part of a choice: (address and mask) or ip-prefix-list.
20.7.R1
All
IP address mask as the match criterion
The following are part of a choice: (address and mask) or ip-prefix-list.
16.0.R4
All
Enter the ipv6-filter context
16.0.R4
All
Administrative state of management-access filters
enable
enable, disable
16.0.R4
All
Default action for the management access filter
ignore-match
ignore-match, accept, drop, reject
16.0.R4
All
Enter the entry list instance
16.0.R4
All
The id used to uniquely identify this filter entry.
1 to 9999
This element is part of a list key.
16.0.R4
All
Specifies the default action for management access in the absence of a specific management access filter entry match.
configure system security management-access-filter ipv6-filter entry number action keyword
ignore-match
ignore-match, accept, drop, reject
16.0.R4
All
Text description
configure system security management-access-filter ipv6-filter entry number description string
1 to 80
16.0.R4
All
Enable match logging
configure system security management-access-filter ipv6-filter entry number log-events boolean
false
16.0.R4
All
Enter the match context
16.0.R4
All
Enable the dst-port context
16.0.R4
All
IP address mask as the match criterion
configure system security management-access-filter ipv6-filter entry number match dst-port mask number
1 to 65535
65535
16.0.R4
All
TCP or UDP port number as the match criterion
configure system security management-access-filter ipv6-filter entry number match dst-port port number
1 to 65535
This element is mandatory.
16.0.R4
All
Specifies the flow label to be matched.
configure system security management-access-filter ipv6-filter entry number match flow-label number
0 to 1048575
16.0.R4
All
Enter the mgmt-port context
16.0.R4
All
Specifies source cpm.
The following are part of a choice: cpm, (lag and lag-id), or port-id.
16.0.R4
All
LAG ID as the match criterion
configure system security management-access-filter ipv6-filter entry number match mgmt-port lag string
1 to 27
The following are part of a choice: cpm, (lag and lag-id), or port-id.
21.2.R1
All
Port ID as the match criterion
configure system security management-access-filter ipv6-filter entry number match mgmt-port port-id string
The following are part of a choice: cpm, (lag and lag-id), or port-id.
16.0.R4
All
IP protocol to match
configure system security management-access-filter ipv6-filter entry number match next-header (number | keyword)
0 to 255
tcp-udp, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
16.0.R4
All
Router instance as the match criterion
configure system security management-access-filter ipv6-filter entry number match router-instance string
16.0.R4
All
Enter the src-ip context
16.0.R4
All
IPv6 address or IPv6 prefix to match
configure system security management-access-filter ipv6-filter entry number match src-ip address (ipv6-prefix | ipv6-address)
The following are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R4
All
IPv6 prefix list as the match criterion
configure system security management-access-filter ipv6-filter entry number match src-ip ipv6-prefix-list reference
The following are part of a choice: (address and mask) or ipv6-prefix-list.
20.7.R1
All
IPv6 address mask as the match criterion
configure system security management-access-filter ipv6-filter entry number match src-ip mask string
The following are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R4
All
Enter the mac-filter context
16.0.R4
All
Administrative state of management access MAC filter
enable
enable, disable
16.0.R4
All
Default action for the management access filter
ignore-match
ignore-match, accept, drop
16.0.R4
All
Enter the entry list instance
16.0.R4
All
The id used to uniquely identify this filter entry.
1 to 9999
This element is part of a list key.
16.0.R4
All
Action associated with the management access filter
configure system security management-access-filter mac-filter entry number action keyword
ignore-match
ignore-match, accept, drop
16.0.R4
All
Text description
configure system security management-access-filter mac-filter entry number description string
1 to 80
16.0.R4
All
If is 'true', entry match logging is enabled.
configure system security management-access-filter mac-filter entry number log-events boolean
false
16.0.R4
All
Enter the match context
16.0.R4
All
Enter the cfm-opcode context
16.0.R4
All
Equal to comparison operator for the CFM opcode
configure system security management-access-filter mac-filter entry number match cfm-opcode eq number
0 to 255
The following are part of a choice: eq, gt, lt, or range.
16.0.R4
All
Greater than comparison operator for the CFM opcode
configure system security management-access-filter mac-filter entry number match cfm-opcode gt number
0 to 254
The following are part of a choice: eq, gt, lt, or range.
16.0.R4
All
Less than comparison operator for the CFM opcode
configure system security management-access-filter mac-filter entry number match cfm-opcode lt number
1 to 255
The following are part of a choice: eq, gt, lt, or range.
16.0.R4
All
Enable the range context
The following are part of a choice: eq, gt, lt, or range.
16.0.R4
All
Upper bound of the range for the OpCode to match
configure system security management-access-filter mac-filter entry number match cfm-opcode range end number
1 to 255
This element is mandatory.
16.0.R4
All
Lower bound of the range for the OpCode to match
configure system security management-access-filter mac-filter entry number match cfm-opcode range start number
0 to 254
This element is mandatory.
16.0.R4
All
Enable the dot1p context
16.0.R4
All
3-bit mask as the match criterion
configure system security management-access-filter mac-filter entry number match dot1p mask number
1 to 7
7
16.0.R4
All
IEEE 802.1p value as the match criterion
configure system security management-access-filter mac-filter entry number match dot1p priority number
0 to 7
This element is mandatory.
16.0.R4
All
Enable the dst-mac context
16.0.R4
All
MAC address used as the match criterion
configure system security management-access-filter mac-filter entry number match dst-mac address string
This element is mandatory.
16.0.R4
All
MAC address mask as the match criterion
configure system security management-access-filter mac-filter entry number match dst-mac mask string
ff:ff:ff:ff:ff:ff
16.0.R4
All
Ethernet type II Ethertype value as the match criterion
configure system security management-access-filter mac-filter entry number match etype string
5 to 6
16.0.R4
All
MAC frame type as the match criterion
configure system security management-access-filter mac-filter entry number match frame-type keyword
802dot3
802dot3, 802dot2-llc, 802dot2-snap, ethernet-ii, 802dot1-ag
16.0.R4
All
Enable the llc-dsap context
16.0.R4
All
8-bit DSAP as the match criterion
configure system security management-access-filter mac-filter entry number match llc-dsap dsap number
0 to 255
This element is mandatory.
16.0.R4
All
Mask for DSAP value as the match criterion
configure system security management-access-filter mac-filter entry number match llc-dsap mask number
1 to 255
255
16.0.R4
All
Enable the llc-ssap context
16.0.R4
All
Mask for SSAP value as the match criterion
configure system security management-access-filter mac-filter entry number match llc-ssap mask number
1 to 255
255
16.0.R4
All
8-bit SSAP as the match criterion
configure system security management-access-filter mac-filter entry number match llc-ssap ssap number
0 to 255
This element is mandatory.
16.0.R4
All
Service ID used as the match condition
configure system security management-access-filter mac-filter entry number match service string
1 to 64
16.0.R4
All
IEEE 802.3 LLC SNAP Ethernet Frame OUI value for match
configure system security management-access-filter mac-filter entry number match snap-oui keyword
zero, non-zero
16.0.R4
All
IEEE 802.3 LLC SNAP Ethernet Frame PID as the match
configure system security management-access-filter mac-filter entry number match snap-pid number
0 to 65535
16.0.R4
All
Enable the src-mac context
16.0.R4
All
MAC address used as the match criterion
configure system security management-access-filter mac-filter entry number match src-mac address string
This element is mandatory.
16.0.R4
All
MAC address mask as the match criterion
configure system security management-access-filter mac-filter entry number match src-mac mask string
ff:ff:ff:ff:ff:ff
16.0.R4
All
Allow a separate control plane queue for each LDP and BGP peering session to improve DoS protection
configure system security per-peer-queuing boolean
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the pki context
16.0.R1
All
Enter the ca-profile list instance
configure system security pki ca-profile string
128
16.0.R1
All
Certificate Authority (CA) profile name
configure system security pki ca-profile string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the CA profile
configure system security pki ca-profile string admin-state keyword
disable
enable, disable
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enable the auto-crl-update context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Administrative state of the automatic CRL update
configure system security pki ca-profile string auto-crl-update admin-state keyword
disable
enable, disable
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the crl-urls context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the url-entry list instance
configure system security pki ca-profile string auto-crl-update crl-urls url-entry number
16.0.R1
All
URL on this system
configure system security pki ca-profile string auto-crl-update crl-urls url-entry number
1 to 8
This element is part of a list key.
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
File transmission profile to update CRL
configure system security pki ca-profile string auto-crl-update crl-urls url-entry number transmission-profile reference
configure system transmission-profile string
16.0.R4
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Location of updated CRL
configure system security pki ca-profile string auto-crl-update crl-urls url-entry number url http-url-path-loose
1 to 180
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Interval between two consecutive CRL updates
configure system security pki ca-profile string auto-crl-update periodic-update-interval number
3600 to 31622400
86400
seconds
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Time prior to the next update time of the current CRL
configure system security pki ca-profile string auto-crl-update pre-update-time number
0 to 31622400
3600
seconds
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Interval before retrying to update CRL
configure system security pki ca-profile string auto-crl-update retry-interval number
0 to 31622400
3600
seconds
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Time scheduler type for an automated CRL update
configure system security pki ca-profile string auto-crl-update schedule-type keyword
next-update-based
next-update-based, periodic
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Certificate file name
1 to 95
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the cmpv2 context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the accept-unprotected-message context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept unprotected error messages
configure system security pki ca-profile string cmpv2 accept-unprotected-message error-message boolean
false
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept unprotected PKI confirmation messages
configure system security pki ca-profile string cmpv2 accept-unprotected-message pkiconf-message boolean
false
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Subject name in CMPv2 header for all Initial Registration (IR) messages
configure system security pki ca-profile string cmpv2 always-set-sender-for-ir boolean
false
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the http context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
HTTP response timeout
configure system security pki ca-profile string cmpv2 http response-timeout number
1 to 3600
30
seconds
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
HTTP version for CMPv2 messages
1.1
1.0, 1.1
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the key-list context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the key list instance
128
16.0.R1
All
Unique identifier for the CA initial authentication key
1 to 64
This element is part of a list key.
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Shared secret for this CA initial authentication key
1 to 115
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
File name of the certificate to verify the signature of received CMPv2 responses
configure system security pki ca-profile string cmpv2 response-signing-cert string
1 to 95
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Same recipNonce as the last CMPv2 response for a poll request
configure system security pki ca-profile string cmpv2 same-recipient-nonce-for-poll-request boolean
false
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the url context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Administrative service name
configure system security pki ca-profile string cmpv2 url service-name string
1 to 64
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
URL for CMPv2
configure system security pki ca-profile string cmpv2 url url-string http-optional-url-loose
1 to 180
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Certificate Revocation List (CRL) file name
1 to 95
16.0.R1
All
Text description
configure system security pki ca-profile string description string
1 to 80
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the ocsp context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
HTTP URL of the OCSP responder for the CA
configure system security pki ca-profile string ocsp responder-url http-optional-url-loose
1 to 180
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Administrative service name
configure system security pki ca-profile string ocsp service-name string
1 to 64
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
The transmission profile for OCSP.
configure system security pki ca-profile string ocsp transmission-profile reference
configure system transmission-profile string
16.0.R6
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Method to verify the revocation status of certificates issued by the CA
configure system security pki ca-profile string revocation-check keyword
crl
crl, crl-optional
16.0.R1
All
Display format for certificates and Certificate Revocation Lists (CRLs)
ascii
ascii, utf8
16.0.R1
All
Enter the certificate-expiration-warning context
16.0.R1
All
Time at which the system generates the certificate expiration warning trap for in-use certificates
0 to 8760
hours
16.0.R1
All
Time period when the system repeatedly generates the certificate expiration warning trap
0 to 8760
0
hours
16.0.R1
All
Enter the common-name-list list instance
configure system security pki common-name-list string
64
16.0.R1
All
Name for the common name list
configure system security pki common-name-list string
1 to 32
This element is part of a list key.
16.0.R1
All
Enter the common-name list instance
configure system security pki common-name-list string common-name number
16.0.R1
All
Common name index
configure system security pki common-name-list string common-name number
1 to 128
This element is part of a list key.
16.0.R1
All
Common name type
configure system security pki common-name-list string common-name number cn-type keyword
ip-address, domain-name
This element is mandatory.
16.0.R1
All
Common name value
configure system security pki common-name-list string common-name number cn-value string
1 to 255
This element is mandatory.
16.0.R1
All
Enter the crl-expiration-warning context
16.0.R1
All
Time when the system generates the Certificate Revocation List (CRL) expiration warning trap
0 to 8760
hours
16.0.R1
All
Time when the system repeatedly generates the Certificate Revocation List (CRL) expiration warning trap
0 to 8760
0
hours
16.0.R1
All
The supported encrypted file formats
configure system security pki imported-format keyword
any
any, secure
16.0.R6
All
Maximum depth of certificate chain verification
1 to 7
7
16.0.R1
All
Enter the snmp context
16.0.R1
All
Enter the access list instance
configure system security snmp access string context string security-model keyword security-level keyword
16.0.R1
All
Group name
configure system security snmp access string context string security-model keyword security-level keyword
1 to 32
This element is part of a list key.
16.0.R1
All
String against which the context name should match to gain access rights
configure system security snmp access string context string security-model keyword security-level keyword
1 to 32
_sros_none
This element is part of a list key.
16.0.R1
All
Security model
configure system security snmp access string context string security-model keyword security-level keyword
snmpv1, snmpv2c, usm
This element is part of a list key.
16.0.R1
All
Minimum level of security required to gain the access rights allowed by this entry
configure system security snmp access string context string security-model keyword security-level keyword
no-auth-no-privacy, auth-no-privacy, privacy
This element is part of a list key.
16.0.R1
All
SNMP view for notification access
configure system security snmp access string context string security-model keyword security-level keyword notify string
This command specifies the SNMP view used to control which MIB objects can be accessed for notifications.
1 to 32
16.0.R1
All
Match type for the context
configure system security snmp access string context string security-model keyword security-level keyword prefix-match keyword
exact, prefix
16.0.R1
All
SNMP view for read access
configure system security snmp access string context string security-model keyword security-level keyword read string
This command specifies the SNMP view used to control which MIB objects can be accessed using a read (get) operation.
1 to 32
16.0.R1
All
SNMP view for write access
configure system security snmp access string context string security-model keyword security-level keyword write string
This command specifies the SNMP view used to control which MIB objects can be accessed using a write (set) operation.
1 to 32
16.0.R1
All
Enter the attempts context
16.0.R1
All
Maximum unsuccessful SNMP attempts that are allowed for the specified time
1 to 64
20
16.0.R1
All
Lockout period during which the host is not allowed to log in
0 to 1440
10
minutes
16.0.R1
All
Time when a number of unsuccessful attempts are made before the host is locked out
0 to 60
5
minutes
16.0.R1
All
Enter the community list instance
16.0.R1
All
Management information that is accessed when using the community string
1 to 114
This element is part of a list key.
16.0.R1
All
SNMP community name(s) to be used with the associated VPRN instance
r, rw, rwa, mgmt, vpls-mgmt
This element is mandatory.
16.0.R1
All
Management information to be accessed when using the community string
16.0.R1
All
SNMP version
both
v1, v2c, both
16.0.R1
All
Enter the source-access-list list instance
16
16.0.R1
All
Value for the name given to source access list
1 to 32
This element is part of a list key.
16.0.R1
All
Enter the source-host list instance
configure system security snmp source-access-list string source-host string
16
16.0.R1
All
Source host entry name
configure system security snmp source-access-list string source-host string
1 to 32
This element is part of a list key.
16.0.R1
All
Address of the source host entry
configure system security snmp source-access-list string source-host string address (ipv4-address-no-zone | ipv6-address-no-zone)
This element is mandatory.
16.0.R1
All
Enter the usm-community list instance
configure system security snmp usm-community string
16.0.R1
All
SNMPv1/SNMPv2 community string to determine the SNMPv3 access permission
configure system security snmp usm-community string
1 to 114
This element is part of a list key.
16.0.R1
All
Group to manage the access rights of the community string
1 to 32
16.0.R1
All
Management information to be accessed when using the community string
configure system security snmp usm-community string source-access-list reference
16.0.R1
All
Enter the view list instance
16.0.R1
All
Name of the view to display output
1 to 32
This element is part of a list key.
16.0.R1
All
Object Identifier (OID) value
1 to 256
This element is part of a list key.
16.0.R1
All
Mask value as binary value, or hex value
1 to 16
16.0.R1
All
Type of SNMP security view mask
included, excluded
16.0.R1
All
Enter the source-address context
16.0.R1
All
Enter the ipv4 list instance
configure system security source-address ipv4 keyword
16.0.R1
All
Application that uses the source IP address
configure system security source-address ipv4 keyword
telnet, ftp, ssh, radius, tacplus, snmptrap, syslog, ping, traceroute, dns, sntp, ntp, cflowd, ptp, mcreporter, sflow, icmp-error, ldap
This element is part of a list key.
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Source IPv4 address
The following are part of a mandatory choice: address or interface-name.
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Interface name whose IP address to be used in all packets sent by the application
configure system security source-address ipv4 keyword interface-name string
1 to 32
The following are part of a mandatory choice: address or interface-name.
16.0.R1
All
Enter the ipv6 list instance
configure system security source-address ipv6 keyword
16.0.R1
All
Application which uses the source IPv6 address
configure system security source-address ipv6 keyword
telnet, ftp, radius, tacplus, snmptrap, syslog, ping, traceroute, dns, cflowd, ntp, sflow, icmp6-error, ldap
This element is part of a list key.
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Source IPv6 address
This element is mandatory.
16.0.R1
All
Enter the ssh context
16.0.R1
All
Enter the client-cipher-list-v1 context
16.0.R1
All
Cipher index in the list
1 to 255
This element is part of a list key.
16.0.R1
All
Cipher name value
des, 3des, blowfish
This element is mandatory.
16.0.R1
All
Enter the client-cipher-list-v2 context
16.0.R1
All
Cipher index in the list
1 to 255
This element is part of a list key.
16.0.R1
All
Cipher name value
3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes128-cbc, aes192-cbc, aes256-cbc, rijndael-cbc, aes128-ctr, aes192-ctr, aes256-ctr
This element is mandatory.
16.0.R1
All
Enter the client-kex-list-v2 context
19.10.R3
All
SSHv2 KEX algorithm index
1 to 255
This element is part of a list key.
19.10.R3
All
KEX algorithm for computing a shared secret key
diffie-hellman-group1-sha1, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha256, diffie-hellman-group16-sha512
This element is mandatory.
19.10.R3
All
Enter the client-mac-list-v2 context
16.0.R1
All
MAC algorithm index
1 to 255
This element is part of a list key.
16.0.R1
All
MAC algorithm that performs encryption or decryption
hmac-sha2-512, hmac-sha2-256, hmac-sha1, hmac-sha1-96, hmac-md5, hmac-ripemd160, hmac-ripemd160-openssh-com, hmac-md5-96
This element is mandatory.
16.0.R1
All
Enter the key-re-exchange context
16.0.R1
All
Enter the client context
16.0.R1
All
Administrative state of the key re-exchange
enable
enable, disable
16.0.R1
All
Maximum bytes transmitted before key re-exchange begins
1 to 64000
1024
megabytes
infinite
16.0.R1
All
Maximum time before key re-exchange is initiated
1 to 1440
60
minutes
infinite
16.0.R1
All
Enter the server context
16.0.R1
All
Administrative state of the key re-exchange
enable
enable, disable
16.0.R1
All
Maximum bytes transmitted before key re-exchange begins
1 to 64000
1024
megabytes
infinite
16.0.R1
All
Maximum time before key re-exchange is initiated
1 to 1440
60
minutes
infinite
16.0.R1
All
Preserve keys and restore on system or server restart
configure system security ssh preserve-key boolean
false
16.0.R1
All
Administrative state of the SSH server
configure system security ssh server-admin-state keyword
enable
enable, disable
16.0.R1
All
Enter the server-cipher-list-v1 context
16.0.R1
All
Cipher index in the list
1 to 255
This element is part of a list key.
16.0.R1
All
Cipher name value
des, 3des, blowfish
This element is mandatory.
16.0.R1
All
Enter the server-cipher-list-v2 context
16.0.R1
All
Cipher index in the list
1 to 255
This element is part of a list key.
16.0.R1
All
Cipher name value
3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes128-cbc, aes192-cbc, aes256-cbc, rijndael-cbc, aes128-ctr, aes192-ctr, aes256-ctr
This element is mandatory.
16.0.R1
All
Enter the server-kex-list-v2 context
19.10.R3
All
SSHv2 KEX algorithm index
1 to 255
This element is part of a list key.
19.10.R3
All
KEX algorithm for computing a shared secret key
diffie-hellman-group1-sha1, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha256, diffie-hellman-group16-sha512
This element is mandatory.
19.10.R3
All
Enter the server-mac-list-v2 context
16.0.R1
All
MAC algorithm index
1 to 255
This element is part of a list key.
16.0.R1
All
MAC algorithm that performs encryption or decryption
hmac-sha2-512, hmac-sha2-256, hmac-sha1, hmac-sha1-96, hmac-md5, hmac-ripemd160, hmac-ripemd160-openssh-com, hmac-md5-96
This element is mandatory.
16.0.R1
All
SSH protocol version supported by the SSH server
2
1, 2, 1-2
16.0.R1
All
Enter the system-passwords context
16.0.R1
All
Password that assigns the user as administrator
3 to 136
16.0.R1
All
Password that allows the user to assign VSD services
3 to 136
16.0.R1
All
Enter the tech-support context
16.0.R1
All
Default file path for generated tech-support files
configure system security tech-support ts-location (ts-sat-url | cflash-url | string)
1 to 180
16.0.R1
All
Enable Telnet servers running on the system
configure system security telnet-server boolean
false
16.0.R1
All
Enable Telnet IPv6 servers running on the system
configure system security telnet6-server boolean
false
16.0.R1
All
Enter the tls context
16.0.R1
All
Enter the cert-profile list instance
configure system security tls cert-profile string
16
16.0.R1
All
TLS certificate profile name
configure system security tls cert-profile string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the certificate profile
configure system security tls cert-profile string admin-state keyword
disable
enable, disable
16.0.R1
All
Enter the entry list instance
8
16.0.R1
All
Certificate profile ID
1 to 8
This element is part of a list key.
16.0.R1
All
Certificate file name
configure system security tls cert-profile string entry number certificate-file string
1 to 95
16.0.R1
All
Key file name
1 to 95
16.0.R1
All
Enter the send-chain context
configure system security tls cert-profile string entry number send-chain
16.0.R1
All
Add a list entry for ca-profile
configure system security tls cert-profile string entry number send-chain ca-profile reference
7
16.0.R1
All
Certificate Authority (CA) profile name
configure system security tls cert-profile string entry number send-chain ca-profile reference
configure system security pki ca-profile string
This element is part of a list key.
16.0.R1
All
Enter the client-cipher-list list instance
configure system security tls client-cipher-list string
16
16.0.R1
All
TLS client cipher list
configure system security tls client-cipher-list string
1 to 32
This element is part of a list key.
16.0.R1
All
Index of the cipher
1 to 255
This element is part of a list key.
16.0.R1
All
Value for the cipher suite code
tls-rsa-with3des-ede-cbc-sha, tls-rsa-with-aes128-cbc-sha, tls-rsa-with-aes256-cbc-sha, tls-rsa-with-aes128-cbc-sha256, tls-rsa-with-aes256-cbc-sha256
This element is mandatory.
16.0.R1
All
Enter the client-tls-profile list instance
configure system security tls client-tls-profile string
16
16.0.R1
All
Name of TLS client profile.
configure system security tls client-tls-profile string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the client TLS profile
configure system security tls client-tls-profile string admin-state keyword
disable
enable, disable
16.0.R1
All
Certificate profile ID
configure system security tls client-tls-profile string cert-profile reference
configure system security tls cert-profile string
16.0.R1
All
Specifies the ordered list of supported cipher suite codes associated with this TLS client profile.
configure system security tls client-tls-profile string cipher-list reference
configure system security tls client-cipher-list string
16.0.R1
All
Trust anchor profile
configure system security tls client-tls-profile string trust-anchor-profile reference
16.0.R1
All
Enter the server-cipher-list list instance
configure system security tls server-cipher-list string
16
16.0.R1
All
Name of TLS server cipher list.
configure system security tls server-cipher-list string
1 to 32
This element is part of a list key.
16.0.R1
All
Index of the cipher
1 to 255
This element is part of a list key.
16.0.R1
All
Value for the cipher suite code
tls-rsa-with3des-ede-cbc-sha, tls-rsa-with-aes128-cbc-sha, tls-rsa-with-aes256-cbc-sha, tls-rsa-with-aes128-cbc-sha256, tls-rsa-with-aes256-cbc-sha256
This element is mandatory.
16.0.R1
All
Enter the server-tls-profile list instance
configure system security tls server-tls-profile string
16
16.0.R1
All
Name of TLS server profile.
configure system security tls server-tls-profile string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the server TLS profile
configure system security tls server-tls-profile string admin-state keyword
disable
enable, disable
16.0.R1
All
Enter the authenticate-client context
16.0.R1
All
Common name list for TLS client certificate authentication
configure system security tls server-tls-profile string authenticate-client common-name-list reference
configure system security pki common-name-list string
16.0.R1
All
Trust anchor profile for TLS client certificate authentication
configure system security tls server-tls-profile string authenticate-client trust-anchor-profile reference
16.0.R1
All
Certificate profile ID
configure system security tls server-tls-profile string cert-profile reference
configure system security tls cert-profile string
16.0.R1
All
Specifies the ordered list of supported cipher suite codes associated with this TLS client profile.
configure system security tls server-tls-profile string cipher-list reference
configure system security tls server-cipher-list string
16.0.R1
All
TLS HELLO request timer
configure system security tls server-tls-profile string tls-re-negotiate-timer number
0 to 65000
0
minutes
16.0.R1
All
Enter the trust-anchor-profile list instance
16
16.0.R1
All
Name of TLS trust anchor profile
1 to 32
This element is part of a list key.
16.0.R1
All
Add a list entry for trust-anchor
configure system security tls trust-anchor-profile string trust-anchor reference
8
16.0.R1
All
Trusted CA profile
configure system security tls trust-anchor-profile string trust-anchor reference
configure system security pki ca-profile string
This element is part of a list key.
16.0.R1
All
Enter the user-params context
16.0.R1
All
Enter the attempts context
16.0.R1
All
Number of unsuccessful login attempts
1 to 64
3
16.0.R1
All
Lockout period after unsuccessful login attempts
0 to 1440
10
minutes
16.0.R1
All
Time frame of unsuccessful login attempts
0 to 60
5
minutes
16.0.R1
All
Enter the authentication-order context
16.0.R1
All
Ignore subsequent AAA methods in authentication order when a reject is received
false
16.0.R1
All
Sequence of password authentication, authorization, and accounting
local, radius, tacplus, ldap
4
This element is ordered by the user.
16.0.R1
All
Enter the local-user context
16.0.R1
All
Enter the password context
16.0.R1
All
Maximum time during which a user password is valid
1 to 500
days
16.0.R1
All
Enter the complexity-rules context
16.0.R1
All
User name as part of the password
false
16.0.R1
All
Enter the credits context
The following are part of a choice: credits or required.
16.0.R1
All
Maximum credits given for the usage of lowercase letters
1 to 10
16.0.R1
All
Maximum credits given for the usage of numeric characters
1 to 10
16.0.R1
All
Maximum credits given for the usage of special characters
1 to 10
16.0.R1
All
Maximum credits given for the usage of uppercase letters
1 to 10
16.0.R1
All
Force the use of different character classes for a minimum number
2 to 4
16.0.R1
All
Minimum length required for local passwords
6 to 50
6
16.0.R1
All
Number of times the same character appears consecutively
2 to 8
16.0.R1
All
Enter the required context
The following are part of a choice: credits or required.
16.0.R1
All
Number required for lowercase letters
1 to 10
16.0.R1
All
Number required for numeric characters
1 to 10
16.0.R1
All
Number required for special characters
1 to 10
16.0.R1
All
Number required for uppercase letters
1 to 10
16.0.R1
All
Password hashing algorithm
bcrypt
bcrypt, sha2-pbkdf2, sha3-pbkdf2
20.7.R1
All
New password to match against previous ones
0 to 20
16.0.R1
All
Minimum age required for a password before changing it
0 to 86400
600
seconds
16.0.R1
All
Minimum distance required between the old and the new password
1 to 20
5
16.0.R1
All
Enter the user list instance
configure system security user-params local-user user string
16.0.R1
All
Local user name
configure system security user-params local-user user string
1 to 32
This element is part of a list key.
16.0.R1
All
Enter the access context
16.0.R1
All
Allow console access (serial port or Telnet)
configure system security user-params local-user user string access console boolean
false
16.0.R1
All
Allow FTP access
configure system security user-params local-user user string access ftp boolean
false
16.0.R1
All
Allow gRPC access
configure system security user-params local-user user string access grpc boolean
false
16.0.R1
All
Enable/disable access to LI.
configure system security user-params local-user user string access li boolean
false
19.10.R1
All
Allow NETCONF session access
configure system security user-params local-user user string access netconf boolean
false
16.0.R1
All
Allow SNMP access
configure system security user-params local-user user string access snmp boolean
false
16.0.R1
All
User level override for CLI engine access
configure system security user-params local-user user string cli-engine keyword
md-cli
classic-cli, md-cli
2
This element is ordered by the user.
16.0.R1
All
Enter the console context
16.0.R1
All
Change password privileges
configure system security user-params local-user user string console cannot-change-password boolean
false
16.0.R1
All
File to execute when a user successfully logs in
configure system security user-params local-user user string console login-exec (sat-url | cflash-url | ftp-tftp-url | filename)
1 to 200
16.0.R1
All
User profiles for this user
configure system security user-params local-user user string console member reference
8
This element is ordered by the user.
16.0.R1
All
Prompt a user to change password at next console login
configure system security user-params local-user user string console new-password-at-login boolean
false
16.0.R1
All
Home directory for the user
configure system security user-params local-user user string home-directory (sat-url | cflash-without-slot-url)
1 to 200
16.0.R1
All
Password to authenticate the user for console and FTP access
configure system security user-params local-user user string password string
3 to 136
This element is mandatory.
16.0.R1
All
Enter the public-keys context
16.0.R1
All
Enter the ecdsa context
16.0.R1
All
Enter the ecdsa-key list instance
configure system security user-params local-user user string public-keys ecdsa ecdsa-key number
16.0.R1
All
Number of the Secure Shell version 2 (SSHv2) ECDSA public key that is associated with system user
configure system security user-params local-user user string public-keys ecdsa ecdsa-key number
1 to 32
This element is part of a list key.
16.0.R1
All
Text description
configure system security user-params local-user user string public-keys ecdsa ecdsa-key number description string
1 to 80
16.0.R1
All
Number of the Secure Shell version 2 (SSHv2) ECDSA public key that is associated with system user
configure system security user-params local-user user string public-keys ecdsa ecdsa-key number key-value string
1 to 255
16.0.R1
All
Enter the rsa context
16.0.R1
All
Enter the rsa-key list instance
configure system security user-params local-user user string public-keys rsa rsa-key number
16.0.R1
All
Number of the Secure Shell version 2 (SSHv2) RSA public key that is associated with system user
configure system security user-params local-user user string public-keys rsa rsa-key number
1 to 32
This element is part of a list key.
16.0.R1
All
Text description
configure system security user-params local-user user string public-keys rsa rsa-key number description string
1 to 80
16.0.R1
All
Number of the Secure Shell version 2 (SSHv2) RSA public key that is associated with system user
configure system security user-params local-user user string public-keys rsa rsa-key number key-value string
1 to 800
16.0.R1
All
Users prevented from navigating above their home directories to access file
configure system security user-params local-user user string restricted-to-home boolean
false
16.0.R1
All
Enter the snmp context
configure system security user-params local-user user string snmp
16.0.R1
All
Enable the authentication context
16.0.R1
All
Authentication key for authentication protocol
configure system security user-params local-user user string snmp authentication authentication-key string
1 to 54
16.0.R1
All
Authentication protocol
configure system security user-params local-user user string snmp authentication authentication-protocol keyword
md5, sha
16.0.R1
All
Enable the privacy context
16.0.R1
All
Localized privacy key for authentication
configure system security user-params local-user user string snmp authentication privacy privacy-key string
1 to 51
This element is mandatory.
16.0.R1
All
Encryption protocol for authentication
configure system security user-params local-user user string snmp authentication privacy privacy-protocol keyword
des, aes-128-cfb
This element is mandatory.
16.0.R1
All
User to associate with a group name
configure system security user-params local-user user string snmp group string
1 to 32
16.0.R1
All
Enable the vprn-network-exceptions context
16.0.R1
All
Limit of exception messages received
10 to 1000
100
16.0.R1
All
Time interval to measure exception messages
1 to 60
10
seconds
16.0.R1
All
FIB assigned to the system
configure system selective-fib boolean
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the software-repository list instance
configure system software-repository string
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Unique name for the system software repository
configure system software-repository string
1 to 32
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Text description
configure system software-repository string description string
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Primary location for the files in the software repository
configure system software-repository string primary-location string
1 to 180
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Secondary location for the files in the software repository
configure system software-repository string secondary-location string
1 to 180
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Tertiary location for the files in the software repository
configure system software-repository string tertiary-location string
1 to 180
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the switch-fabric context
Commands in this context configure system level attributes related to the switch fabric.
20.5.R1
7450 ESS, 7750 SR-7, 7750 SR-7s, 7750 SR-14s, 7950 XRS-20, 7950 XRS-20e, 7950 XRS-40
Enter the failure-recovery context
Commands in this context configure the attributes related to the automatic switch fabric recovery process. This process is triggered when there are two resets of an IOM/XCM due to ICC failures within a small time frame. The recovery process involves the sequential resetting of SFM in case the issues are due to one of the SFM in the ICC communication path. As the final step in the recovery process, a CPM switchover is triggered to reset the active CPM.
21.2.R1
7450 ESS, 7750 SR-7, 7950 XRS-20, 7950 XRS-20e, 7950 XRS-40
Administrative state of the failure recovery process
disable
enable, disable
21.2.R1
7450 ESS, 7750 SR-7, 7950 XRS-20, 7950 XRS-20e, 7950 XRS-40
Number of SFMs that can fail before SFM overload state
This command specifies the number of SFMs that are permitted to fail before the system goes into SFM overload state.
The default value for the 7750 SR-7s is 1 and the default value for the 7750 SR-14s is 2. Users can select the SFM limit based on the number possible for the system minus one. For the 7750 SR-7s, the limit is 3 and the limit for the 7750 SR-14s is 7.
1 to 7
20.5.R1
7750 SR-7s, 7750 SR-14s
Enter the telemetry context
Commands in this context configure the parameters for the dial-out telemetry functionality.
20.2.R1
All
Enter the destination-group list instance
Commands in this context configure parameters for destination groups.
225
20.5.R1
All
Destination group name
1 to 32
This element is part of a list key.
20.5.R1
All
Allow unsecured operation of gRPC connections
The following are part of a choice: allow-unsecure-connection or tls-client-profile.
20.5.R1
All
Text description
configure system telemetry destination-group string description string
1 to 80
20.5.R1
All
Enter the destination list instance
configure system telemetry destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number
4
This element is ordered by the user.
20.5.R1
All
Address of the destination within the destination group
configure system telemetry destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number
1 to 255
This element is part of a list key.
20.5.R1
All
TCP port number for the destination
configure system telemetry destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number
0 | 1 to 65535
This element is part of a list key.
20.5.R1
All
Router instance for the destination group
configure system telemetry destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number router-instance string
20.5.R1
All
Enter the tcp-keepalive context
20.5.R1
All
Administrative state of the TCP keep-alive algorithm
configure system telemetry destination-group string tcp-keepalive admin-state keyword
disable
enable, disable
20.5.R1
All
Time until the first TCP keepalive probe is sent
configure system telemetry destination-group string tcp-keepalive idle-time number
1 to 100000
600
seconds
20.5.R1
All
Time between TCP keepalive probes
configure system telemetry destination-group string tcp-keepalive interval number
1 to 100000
15
seconds
20.5.R1
All
Number of probe retries before closing the connection
configure system telemetry destination-group string tcp-keepalive retries number
This command configures the number of missed TCP keepalive probes before closing the TCP connection and attempting to reach the other destinations within the same destination group.
3 to 100
4
20.5.R1
All
TLS client profile assigned to the destination group
configure system telemetry destination-group string tls-client-profile reference
configure system security tls client-tls-profile string
The following are part of a choice: allow-unsecure-connection or tls-client-profile.
20.5.R1
All
Enter the persistent-subscriptions context
20.5.R1
All
Enter the subscription list instance
225
20.5.R1
All
Persistent subscription name
1 to 32
This element is part of a list key.
20.5.R1
All
Administrative state of the persistent subscription
configure system telemetry persistent-subscriptions subscription string admin-state keyword
disable
enable, disable
20.5.R1
All
Text description
configure system telemetry persistent-subscriptions subscription string description string
1 to 80
20.5.R1
All
Name of the destination group used in the subscription
configure system telemetry persistent-subscriptions subscription string destination-group reference
20.5.R1
All
Encoding used for telemetry notifications
configure system telemetry persistent-subscriptions subscription string encoding keyword
This command specifies the encoding used for telemetry notifications as defined by the gNMI OpenConfig standard.
json
json, bytes, proto, json-ietf
20.5.R1
All
Local IP address of packets sent from the source
configure system telemetry persistent-subscriptions subscription string local-source-address (ipv4-address-no-zone | ipv6-address-no-zone)
20.5.R1
All
Mode for telemetry notifications
configure system telemetry persistent-subscriptions subscription string mode keyword
This command specifies the subscription path mode for telemetry notifications sent out for the persistent subscription.
target-defined, on-change, sample
20.5.R1
All
QoS marking used for telemetry notification packets
be, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cs1, cp9, af11, cp11, af12, cp13, af13, cp15, cs2, cp17, af21, cp19, af22, cp21, af23, cp23, cs3, cp25, af31, cp27, af32, cp29, af33, cp31, cs4, cp33, af41, cp35, af42, cp37, af43, cp39, cs5, cp41, cp42, cp43, cp44, cp45, ef, cp47, nc1, cp49, cp50, cp51, cp52, cp53, cp54, cp55, nc2, cp57, cp58, cp59, cp60, cp61, cp62, cp63
20.5.R1
All
Sampling interval for the persistent subscription
configure system telemetry persistent-subscriptions subscription string sample-interval number
This command configures the sampling interval for the persistent subscription. The interval applies only in sampling or target-defined modes.
1000 to max
10000
milliseconds
20.5.R1
All
Sensor group used in the persistent subscription
configure system telemetry persistent-subscriptions subscription string sensor-group reference
This command specifies the sensor group to be used in the persistent subscription. If no valid paths exist in the sensor group, the configuration is accepted, however, no gRPC connection is established when persistent subscription is activated.
20.5.R1
All
Enter the sensor-groups context
20.5.R1
All
Enter the sensor-group list instance
225
20.5.R1
All
Sensor group name
1 to 32
This element is part of a list key.
20.5.R1
All
Text description
configure system telemetry sensor-groups sensor-group string description string
1 to 80
20.5.R1
All
Add a list entry for path
configure system telemetry sensor-groups sensor-group string path string
4500
20.5.R1
All
YANG model path indicating the data to be streamed
configure system telemetry sensor-groups sensor-group string path string
The command specifies the path from which data is streamed to the collector. Streamed data includes all descendants of the tree indicated by the path.
1 to 512
This element is part of a list key.
20.5.R1
All
Enter the thresholds context
16.0.R1
All
Enter the cflash-cap-alarm-percent list instance
16.0.R1
All
Capacity that monitors the cflash (compact flash) assigned in this command
1 to 200
This element is part of a list key.
16.0.R1
All
Specifies the falling threshold percentage value for sampled statistics of cflash capacity alarm entry.
configure system thresholds cflash-cap-alarm-percent string falling-threshold number
0 to 100
percent
16.0.R4
All
Polling period over which data is sampled and compared
configure system thresholds cflash-cap-alarm-percent string interval number
1 to 2147483647
This element is mandatory.
16.0.R1
All
Specifies the rising threshold percentage value for sampled statistics of cflash capacity alarm entry.
configure system thresholds cflash-cap-alarm-percent string rising-threshold number
0 to 100
percent
This element is mandatory.
16.0.R4
All
Notification type specifying action when event occurs
configure system thresholds cflash-cap-alarm-percent string rmon-event-type keyword
both
none, log, trap, both
16.0.R1
All
Alarm type when the alarm is first created
configure system thresholds cflash-cap-alarm-percent string startup-alarm keyword
either
rising, falling, either
16.0.R1
All
Enter the cflash-cap-warn-percent list instance
16.0.R1
All
Capacity that monitors the cflash (compact flash) assigned in this command
1 to 200
This element is part of a list key.
16.0.R1
All
Specifies the falling threshold percentage value for sampled statistics of cflash capacity alarm entry.
configure system thresholds cflash-cap-warn-percent string falling-threshold number
0 to 100
percent
16.0.R4
All
Polling period over which data is sampled and compared
configure system thresholds cflash-cap-warn-percent string interval number
1 to 2147483647
This element is mandatory.
16.0.R1
All
Specifies the rising threshold percentage value for sampled statistics of cflash capacity alarm entry.
configure system thresholds cflash-cap-warn-percent string rising-threshold number
0 to 100
percent
This element is mandatory.
16.0.R4
All
Notification type specifying action when event occurs
configure system thresholds cflash-cap-warn-percent string rmon-event-type keyword
both
none, log, trap, both
16.0.R1
All
Alarm type when the alarm is first created
configure system thresholds cflash-cap-warn-percent string startup-alarm keyword
either
rising, falling, either
16.0.R1
All
Enable the kb-memory-use-alarm context
16.0.R4
All
Specifies the threshold for the sampled statistic for the falling threshold event.
-2147483648 to 2147483647
16.0.R4
All
Polling period over which data is sampled and compared
1 to 2147483647
This element is mandatory.
16.0.R4
All
Specifies the threshold for the sampled statistic for the rising threshold event.
-2147483648 to 2147483647
This element is mandatory.
16.0.R4
All
Notification type specifying action when event occurs
both
none, log, trap, both
16.0.R4
All
Alarm type when the alarm is first created
either
rising, falling, either
16.0.R4
All
Enable the kb-memory-use-warn context
16.0.R4
All
Specifies the threshold for the sampled statistic for the falling threshold event.
-2147483648 to 2147483647
16.0.R4
All
Polling period over which data is sampled and compared
1 to 2147483647
This element is mandatory.
16.0.R4
All
Specifies the threshold for the sampled statistic for the rising threshold event.
-2147483648 to 2147483647
This element is mandatory.
16.0.R4
All
Notification type specifying action when event occurs
both
none, log, trap, both
16.0.R4
All
Alarm type when the alarm is first created
either
rising, falling, either
16.0.R4
All
Enter the rmon context
16.0.R1
All
Enter the alarm list instance
configure system thresholds rmon alarm number
1200
16.0.R1
All
Index ID for an entry in the alarm table
configure system thresholds rmon alarm number
0 to 65400
This element is part of a list key.
16.0.R1
All
RMON event ID used when a falling threshold crossing event occurs
configure system thresholds rmon alarm number falling-event number
0 to 65400
16.0.R1
All
Falling threshold for the sampled statistic
configure system thresholds rmon alarm number falling-threshold number
This command specifies a falling threshold for the sampled statistic. When the current sampled value is less than or equal to this threshold and the value at the last sampling interval was greater than this threshold, a single threshold crossing event is generated. A single threshold crossing event is also generated if the first sample taken is less than or equal to this threshold and the associated startup-alarm command is set to falling or either.
After a falling threshold crossing event is generated, another such event is not generated until the sampled value exceeds this threshold and reaches or exceeds the rising-threshold command setting.
-2147483648 to 2147483647
16.0.R1
All
Polling period over which data is sampled and compared
This command specifies the polling interval over which the data is sampled and compared with the rising and falling thresholds
1 to 2147483647
This element is mandatory.
16.0.R1
All
Owner that created this entry and uses the resources
1 to 80
TiMOS CLI
16.0.R1
All
RMON event ID used when a rising event threshold event occurs
configure system thresholds rmon alarm number rising-event number
0 to 65400
16.0.R1
All
Rising threshold for the sampled statistic
configure system thresholds rmon alarm number rising-threshold number
This command specifies the rising threshold for the sampled statistic. When the current sampled value is greater than or equal to this threshold and the value at the last sampling interval was below this threshold, a single threshold crossing event is generated. A single threshold crossing event is also generated if the first sample taken is greater than or equal to this threshold and the associated startup-alarm command is set to rising or either.
After a rising threshold crossing event is generated, another such event is not generated until the sampled value falls below this threshold and reaches or falls below the falling-threshold command setting.
-2147483648 to 2147483647
16.0.R1
All
Method to sample the selected variable and calculate the value comparing against the thresholds
configure system thresholds rmon alarm number sample-type keyword
absolute
absolute, delta
16.0.R1
All
Alarm to send when this entry is first set to valid
configure system thresholds rmon alarm number startup-alarm keyword
either
rising, falling, either
16.0.R1
All
Object identifier to sample the specific variable
configure system thresholds rmon alarm number variable-oid string
1 to 255
This element is mandatory.
16.0.R1
All
Enter the event list instance
configure system thresholds rmon event number
1200
16.0.R1
All
Index ID for an entry in the event table
configure system thresholds rmon event number
1 to 65400
This element is part of a list key.
16.0.R1
All
Text description
configure system thresholds rmon event number description string
1 to 80
16.0.R1
All
Type of notification action to be taken when this event occurs
configure system thresholds rmon event number event-type keyword
both
none, log, trap, both
16.0.R1
All
Owner that created this entry and uses the resources
1 to 80
TiMOS CLI
16.0.R1
All
Enter the time context
16.0.R1
All
Enter the dst-zone list instance
1
16.0.R1
All
Name of a summer time zone
1 to 5
This element is part of a list key.
16.0.R1
All
Enter the end context
16.0.R1
All
Day of the week when the daylight savings time setting ends
sunday
sunday, monday, tuesday, wednesday, thursday, friday, saturday
16.0.R1
All
Hour and number of minutes after which the daylight savings time ends
5
00:00
16.0.R1
All
Month of the week when the daylight savings time setting ends
january
january, february, march, april, may, june, july, august, september, october, november, december
16.0.R1
All
Week of the month when the daylight savings time setting ends
first
first, second, third, fourth, last
16.0.R1
All
Offset for summer time setting
0 to 60
60
minutes
16.0.R1
All
Enter the start context
16.0.R1
All
Day of the week when the daylight savings time setting starts
sunday
sunday, monday, tuesday, wednesday, thursday, friday, saturday
16.0.R1
All
Hour and number of minutes after which the daylight savings time starts
5
00:00
16.0.R1
All
Month of the week when the daylight savings time setting starts
january
january, february, march, april, may, june, july, august, september, october, november, december
16.0.R1
All
Week of the month when the daylight savings time setting starts
first
first, second, third, fourth, last
16.0.R1
All
Enable the ntp context
16.0.R1
All
Administrative state of NTP execution
configure system time ntp admin-state keyword
disable
enable, disable
16.0.R1
All
Reject NTP PDUs that do not match the authentication key-id, type, or key requirements
configure system time ntp authentication-check boolean
true
16.0.R1
All
Enter the authentication-key list instance
configure system time ntp authentication-key number
16.0.R1
All
Index of the NTP authentication key table that uniquely identifies an authentication key and type
configure system time ntp authentication-key number
1 to 255
This element is part of a list key.
16.0.R1
All
Key to authenticate NTP packets
1 to 71
This element is mandatory.
16.0.R1
All
Type of authentication method to authenticate NTP packet
des, message-digest
This element is mandatory.
16.0.R1
All
Enter the broadcast list instance
16.0.R1
All
Router name
This element is part of a list key.
16.0.R1
All
Router interface name
1 to 32
This element is part of a list key.
16.0.R1
All
Specifies the key-id of the authentication key and its authentication type used by this node to receive and transmit NTP packets to and from an NTP node.
configure system time ntp authentication-key number
16.0.R1
All
TTL value of messages transmitted by this broadcast address
1 to 255
127
16.0.R1
All
NTP version number generated or accepted by this node in NTP packets
2 to 4
4
16.0.R1
All
Enter the broadcast-client list instance
configure system time ntp broadcast-client string interface-name string
16.0.R1
All
Router name or VPRN service name
configure system time ntp broadcast-client string interface-name string
This element is part of a list key.
16.0.R1
All
Router interface name
configure system time ntp broadcast-client string interface-name string
1 to 32
This element is part of a list key.
16.0.R1
All
NTP PDUs authentication required when acting as a broadcast client
configure system time ntp broadcast-client string interface-name string authenticate boolean
false
16.0.R1
All
Enable the multicast context
16.0.R1
All
Specifies the key-id of the authentication key and its authentication type used by this node to receive and transmit NTP packets to and from an NTP node.
configure system time ntp authentication-key number
16.0.R1
All
NTP version number generated by the node
This command specifies the NTP version number that is generated by the node. This command does not need to be configured when in client mode, in which case all three versions are accepted.
2 to 4
4
16.0.R1
All
Enable the multicast-client context
16.0.R1
All
Authentication of NTP PDUs required when acting as a client
configure system time ntp multicast-client authenticate boolean
false
16.0.R1
All
Enable the ntp-server context
16.0.R1
All
Authentication of NTP PDUs when acting as a server
configure system time ntp ntp-server authenticate boolean
false
16.0.R1
All
Enter the peer list instance
16.0.R1
All
Identifies a node that will provide time to the NTP client of this system.
This element is part of a list key.
16.0.R1
All
Router name or VPRN service name
This element is part of a list key.
16.0.R1
All
Specifies the key-id of the authentication key and its authentication type used by this node to receive and transmit NTP packets to and from an NTP node.
configure system time ntp authentication-key number
16.0.R1
All
NTP server from which is preferred to receive time
false
16.0.R1
All
NTP version number generated by the node
This command specifies the NTP version number that is generated by the node. This command does not need to be configured when in client mode, in which case all three versions are accepted.
2 to 4
4
16.0.R1
All
Enter the server list instance
16.0.R1
All
IP address of an external NTP server
ptp
This element is part of a list key.
16.0.R1
All
Router name or VPRN service name
This element is part of a list key.
16.0.R1
All
Specifies the key-id of the authentication key and its authentication type used by this node to receive and transmit NTP packets to and from an NTP node.
configure system time ntp authentication-key number
16.0.R1
All
NTP server from which is preferred to receive time
false
16.0.R1
All
NTP version number generated by the node
This command specifies the NTP version number that is generated by the node. This command does not need to be configured when in client mode, in which case all three versions are accepted.
2 to 4
4
16.0.R1
All
Use local time over UTC time in the system
configure system time prefer-local-time boolean
false
16.0.R1
All
Enter the sntp context
16.0.R1
All
Administrative state of the SNTP protocol execution
configure system time sntp admin-state keyword
disable
enable, disable
16.0.R1
All
Enter the server list instance
16.0.R1
All
IP address of the SNTP server
This element is part of a list key.
16.0.R1
All
Frequency of querying the server
64 to 1024
64
seconds
16.0.R1
All
Preference value for this SNTP server
false
16.0.R1
All
SNTP version supported by this server
1 to 3
3
16.0.R1
All
Mode for Simple Network Time Protocol (SNTP)
configure system time sntp sntp-state keyword
unicast
unicast, broadcast
16.0.R1
All
Enter the zone context
16.0.R1
All
Enter the non-standard context
The following are part of a choice: non-standard or standard.
16.0.R1
All
Active non-standard time zone in this managed system
1 to 5
16.0.R1
All
Number of hours and minutes by which the time zone offsets from UTC
5 to 6
16.0.R1
All
Enter the standard context
The following are part of a choice: non-standard or standard.
16.0.R1
All
Active standard time zone in this managed system
utc
hst, akst, pst, mst, cst, est, ast, nst, utc, gmt, wet, cet, eet, msk, msd, awst, acst, aest, nzst
16.0.R1
All
Enter the transmission-profile list instance
configure system transmission-profile string
16.0.R4
All
Name of file transmission profile
configure system transmission-profile string
1 to 32
This element is part of a list key.
16.0.R4
All
IPv4 source address of the file transmission connections
configure system transmission-profile string ipv4-source-address string
16.0.R4
All
IPv6 source address of the file transmission connections
configure system transmission-profile string ipv6-source-address string
16.0.R4
All
Maximum level of redirection
configure system transmission-profile string redirection number
1 to 8
16.0.R4
All
Number of attempts to reconnecting to the server
configure system transmission-profile string retry number
1 to 256
16.0.R4
All
Router instance that hosts the file transmission connection
configure system transmission-profile string router-instance string
1 to 64
Base
16.0.R4
All
Timeout for a response from the server
configure system transmission-profile string timeout number
1 to 3600
60
seconds
16.0.R4
All