Enter the system context
Commands in this context enable debugging of general system level functions and router management protocols.
16.0.R1
All
Power the output pin on the CPM alarm interface port
configure system alarm-contact-in-power boolean
false
16.0.R1
7750 SR-a
Enter the alarm-contact-input list instance
configure system alarm-contact-input number
16.0.R1
7750 SR-a
Alarm contact input pin
configure system alarm-contact-input number
1 to 4
This element is part of a list key.
16.0.R1
7750 SR-a
Administrative state of the alarm contact input
configure system alarm-contact-input number admin-state keyword
disable
enable, disable
16.0.R1
7750 SR-a
Text message sent in the log event when an alarm clears
configure system alarm-contact-input number clear-message string
1 to 80
Alarm Input Cleared
16.0.R1
7750 SR-a
Text description
configure system alarm-contact-input number description string
1 to 160
16.0.R1
7750 SR-a
Normal state associated with the alarm contact input
configure system alarm-contact-input number normal-state keyword
open
open, closed
16.0.R1
7750 SR-a
Text message sent in the log event when input changes
configure system alarm-contact-input number trigger-message string
1 to 80
Alarm Input Triggered
16.0.R1
7750 SR-a
Enter the alarms context
16.0.R4
All
Administrative state of the system alarm
configure system alarms admin-state keyword
enable
enable, disable
16.0.R4
All
Maximum number of cleared alarms
configure system alarms max-cleared number
0 to 500
500
16.0.R4
All
Allow boot license violations in boot-up configuration
true
16.0.R4
All
Enter the bluetooth context
16.0.R1
7750 SR-1, 7750 SR-s
Specifies the desired administrative state of the bluetooth module.
configure system bluetooth admin-state keyword
disable
enable, disable
20.2.R1
7750 SR-1, 7750 SR-s
Bluetooth advertising timeout
30 to 3600
seconds
16.0.R1
7750 SR-1, 7750 SR-s
Enter the device list instance
5
16.0.R1
7750 SR-1, 7750 SR-s
Bluetooth client device MAC address
This element is part of a list key.
16.0.R1
7750 SR-1, 7750 SR-s
Text description
configure system bluetooth device string description string
1 to 80
16.0.R1
7750 SR-1, 7750 SR-s
Enter the module list instance
16.0.R1
7750 SR-1, 7750 SR-s
CPM slot on which the module resides
1
This element is part of a list key.
16.0.R1
7750 SR-1, 7750 SR-s
Bluetooth module ID
configure system bluetooth module string provisioned-identifier string
1 to 32
16.0.R1
7750 SR-1, 7750 SR-s
Enable the pairing button
configure system bluetooth pairing-button boolean
false
16.0.R1
7750 SR-1, 7750 SR-s
Bluetooth passkey
6
123456
16.0.R1
7750 SR-1, 7750 SR-s
Bluetooth module(s) power mode.
configure system bluetooth power-mode keyword
automatic
manual, automatic
20.2.R1
7750 SR-1, 7750 SR-s
CLI script file to execute following a failed boot-up
configure system boot-bad-exec string
1 to 180
16.0.R1
All
CLI script file to execute following successful boot-up
configure system boot-good-exec string
1 to 180
16.0.R1
All
Enter the central-frequency-clock context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the bits context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the input context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of BITS input timing reference
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Interface type of the BITS timing reference
ds1-esf
ds1-esf, ds1-sf, e1-pcm30crc, e1-pcm31crc, g703-2048khz
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the output context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of BITS output timing reference
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Line length for the BITS output timing reference
length-not-applicable, 110, 220, 330, 440, 550, 660
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Minimum signal quality level for BITSout port
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec, eec1, eec2
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Source of the BITS output timing reference
line-ref
line-ref, internal-clock
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Squelch the signal of the BITS output timing reference
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Override for the quality level of the timing reference
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Sa bit to convey SSM information
4 to 8
8
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ptp context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the PTP timing reference
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Quality level of a timing reference that overrides any value provided by the reference's SSM process
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Minimum signal quality level for system timing module
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec, eec1, eec2
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Consider quality level in system and BITS output timing
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ref-order context
Commands in this context specify the priority order of the synchronous equipment timing subsystem.
If a reference source is disabled, this command defines the next reference source for the clock. If all reference sources are disabled, clocking is derived from a local oscillator.
If a timing reference is linked to a source port that is operationally down, the port is no longer a qualified, valid reference.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Fifth preferred timing reference source
ref1, ref2, bits, ptp, none, synce, gnss
19.10.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
First preferred timing reference source
ref1, ref2, bits, ptp, none, synce, gnss
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Fourth preferred timing reference source
ref1, ref2, bits, ptp, none, synce, gnss
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Second preferred timing reference source
ref1, ref2, bits, ptp, none, synce, gnss
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Third preferred timing reference source
ref1, ref2, bits, ptp, none, synce, gnss
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ref1 context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the first timing reference
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Quality level override of a timing reference
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec, eec1, eec2
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Source port for the first timing reference
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ref2 context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the second timing reference
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Quality level override of a timing reference
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec, eec1, eec2
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Source port for the second timing reference
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Revert to higher-priority reference source
configure system central-frequency-clock revert boolean
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the synce context
19.10.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the SyncE timing reference
disable
enable, disable
19.10.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Override the quality level of a timing reference
unused
unused, prs, stu, st2, tnc, st3e, st3, prc, ssua, ssub, sec, eec1, eec2
19.10.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Time to re-validate a previously failed input reference
1 to 12
minutes
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
CLLI code value for the system
11
16.0.R1
All
Enable Virtual Service Router congestion management
configure system congestion-management boolean
false
16.0.R1
VSR
Contact information for the managed node
1 to 80
16.0.R1
All
GPS coordinates for the system location
configure system coordinates string
1 to 80
16.0.R1
All
Enter the cpm-http-redirect context
16.0.R4
All
Enable optimized mode for CPM HTTP redirect messages
true
16.0.R4
All
Enter the cron context
16.0.R1
All
Enter the schedule list instance
255
16.0.R1
All
Schedule name
1 to 32
This element is part of a list key.
16.0.R1
All
Schedule owner
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the CRON schedule
disable
enable, disable
16.0.R1
All
Number of times to repeat a periodic schedule run
1 to 65535
16.0.R1
All
Days in a month when a schedule runs
-31 to -1 | 1 to 31
62
16.0.R1
All
Text description
1 to 80
16.0.R1
All
Enter the end-time context
16.0.R1
All
Date and time to stop triggering the schedule
The following elements are part of a choice: date-and-time or (day and time).
16.0.R1
All
Day to stop triggering this schedule
sunday, monday, tuesday, wednesday, thursday, friday, saturday
The following elements are part of a choice: date-and-time or (day and time).
16.0.R1
All
Time to stop triggering the schedule
5
The following elements are part of a choice: date-and-time or (day and time).
16.0.R1
All
Hours within a day when the schedule runs
0 to 23
24
16.0.R1
All
Time between each periodic schedule run
30 to 42949672
seconds
16.0.R1
All
Minutes in an hour when the schedule runs
0 to 59
60
16.0.R1
All
Months when the schedule runs
1 to 12
january, february, march, april, may, june, july, august, september, october, november, december
12
16.0.R1
All
Enter the script-policy context
16.0.R1
All
Script policy name
1 to 32
16.0.R1
All
Script policy owner
1 to 32
16.0.R1
All
Schedule type
periodic
periodic, calendar, oneshot
16.0.R1
All
Weekdays when the schedule runs
1 to 7
sunday, monday, tuesday, wednesday, thursday, friday, saturday
7
16.0.R1
All
Enter the dhcp6 context
16.0.R4
All
Applications to send NoAddrsAvail in Advertise messages
configure system dhcp6 adv-noaddrs-global keyword
esm-relay, server
2
16.0.R4
All
Enter the dns context
16.0.R1
All
Preference in DNS address resolving order
configure system dns address-pref keyword
ipv4-only, ipv6-first
16.0.R1
All
Enter the dnssec context
16.0.R1
All
Validation of AD-bit presence in DNS server responses
configure system dns dnssec ad-validation keyword
fall-through, drop
16.0.R1
All
Enter the efm-oam context
16.0.R1
All
Generate Information OAM PDU on soft reset notification
configure system efm-oam dying-gasp-tx-on-reset boolean
false
16.0.R1
All
Send Grace TLVs for soft reset graceful recovery events
When configured to true, the system sends the Nokia Vendor specific Grace TLV in the information PDU after an ISSU or a soft reset. The Grace TLV informs a remote peer to ignore the negotiated interval and multiplier and instead use the new timeout interval.
By default, the command is disabled at the system level and enabled at the port level. Both the system and port level must be enabled to support grace on a specific port. When configured to true, the EFM-OAM protocol does not enter a non-operational state when both nodes acknowledge the grace function. This feature minimizes service interruption by giving the restarting router time to become operationally and administratively up within the grace period.
The peer receiving the Grace TLV must be able to parse and process the vendor-specific messaging. Do not configure grace if the Nokia Vendor Specific Grace TLV is not supported on the remote peer.
When configured to false, the Nokia Vendor Specific Grace TLV is not sent.
false
16.0.R1
All
Enter the eth-cfm context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Allow system level capability of grace messaging
true
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the md-auto-id context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the ma-index-range context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Upper bound of the range
1 to 4294967295
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Lower bound of the range
1 to 4294967295
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the md-index-range context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Upper bound of the range
1 to 4294967295
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Lower bound of the range
1 to 4294967295
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the redundancy context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the mc-lag context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Delay timer value for the fault propagation
configure system eth-cfm redundancy mc-lag propagate-hold-time (number | keyword)
1 to 60
1
seconds
none
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Allow standby MC-LAG MEPs to act administratively down
configure system eth-cfm redundancy mc-lag standby-mep boolean
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the sender-id context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Local name used in CFM PDUs
configure system eth-cfm sender-id local-name string
1 to 45
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ETH-CFM sender ID to be used in CFM PDUs
system
system, local
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the slm context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
SLR inactivity timer to maintain the stale test data
configure system eth-cfm slm inactivity-timer number
10 to 100
100
seconds
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the grpc context
16.0.R1
All
Administrative state of gRPC server
configure system grpc admin-state keyword
disable
enable, disable
16.0.R1
All
Allow connection without secured transport protocol
When configured, this command allows an unsecured connection to remote managers; TCP connections are not encrypted, including username and password information.
The following elements are part of a choice: allow-unsecure-connection or tls-server-profile.
16.0.R1
All
Enter the gnmi context
16.0.R1
All
Administrative state of gNMI service
configure system grpc gnmi admin-state keyword
enable
enable, disable
16.0.R1
All
Automatically save configuration as part of operation
configure system grpc gnmi auto-config-save boolean
false
16.0.R1
All
Enter the gnoi context
19.10.R1
All
Enter the cert-mgmt context
19.10.R1
All
Administrative state of gNOI CertificateManagement
disable
enable, disable
19.10.R1
All
Enter the file context
21.2.R1
All
Administrative state of the gNOI File service
disable
enable, disable
21.2.R1
All
Enter the system context
20.5.R1
All
Administrative state of the gNOI System service
disable
enable, disable
20.5.R1
All
Maximum size of received message
configure system grpc max-msg-size number
1 to 1024
512
megabytes
16.0.R1
All
Enter the md-cli context
20.5.R1
All
Administrative state of the MD-CLI service
configure system grpc md-cli admin-state keyword
disable
enable, disable
20.5.R1
All
Enter the rib-api context
16.0.R4
All
Administrative state of RibAPI service
configure system grpc rib-api admin-state keyword
disable
enable, disable
16.0.R4
All
Number of seconds until stale entries are purged
configure system grpc rib-api purge-timeout number
1 to 100000
seconds
16.0.R4
All
Enter the tcp-keepalive context
16.0.R4
All
Administrative state of the TCP keepalive algorithm
configure system grpc tcp-keepalive admin-state keyword
disable
enable, disable
16.0.R4
All
Time until the first TCP keepalive probe is sent
configure system grpc tcp-keepalive idle-time number
This command configures the amount of time the connection must be idle before TCP keepalives are sent.
1 to 100000
600
seconds
16.0.R4
All
Time between TCP keep-alive probes
configure system grpc tcp-keepalive interval number
1 to 100000
15
seconds
16.0.R4
All
Number of probe retries before closing the connection
configure system grpc tcp-keepalive retries number
This command configures the number of missed TCP keepalive probes before closing the TCP connection and attempting to reach the other destinations within the same destination group.
3 to 100
4
16.0.R4
All
Preferred TLS server profile
configure system grpc tls-server-profile reference
configure system security tls server-tls-profile string
The following elements are part of a choice: allow-unsecure-connection or tls-server-profile.
16.0.R1
All
Enter the grpc-tunnel context
22.2.R1
All
Enter the destination-group list instance
Commands in this context configure parameters for destination groups.
4
22.2.R1
All
Destination group name
1 to 32
This element is part of a list key.
22.2.R1
All
Allow unsecured operation of gRPC connections
This command allows a gRPC tunnel to run without a secured transport protocol. Data is transferred in unencrypted form.
The following elements are part of a choice: allow-unsecure-connection or tls-client-profile.
22.2.R1
All
Text description
configure system grpc-tunnel destination-group string description string
1 to 80
22.2.R1
All
Enter the destination list instance
configure system grpc-tunnel destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number
4
This element is ordered by the user.
22.2.R1
All
Address of the destination within the destination group
configure system grpc-tunnel destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number
1 to 255
This element is part of a list key.
22.2.R1
All
TCP port number for the destination
configure system grpc-tunnel destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number
1 to 65535
This element is part of a list key.
22.2.R1
All
Local IP address of packets sent from the source
configure system grpc-tunnel destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number local-source-address (ipv4-address-no-zone | ipv6-address-no-zone)
22.2.R1
All
QoS marking used for gRPC tunnel packets
configure system grpc-tunnel destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number originated-qos-marking keyword
be, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cs1, cp9, af11, cp11, af12, cp13, af13, cp15, cs2, cp17, af21, cp19, af22, cp21, af23, cp23, cs3, cp25, af31, cp27, af32, cp29, af33, cp31, cs4, cp33, af41, cp35, af42, cp37, af43, cp39, cs5, cp41, cp42, cp43, cp44, cp45, ef, cp47, nc1, cp49, cp50, cp51, cp52, cp53, cp54, cp55, nc2, cp57, cp58, cp59, cp60, cp61, cp62, cp63
22.2.R1
All
Router instance for the destination group
configure system grpc-tunnel destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number router-instance string
22.2.R1
All
Enter the tcp-keepalive context
22.2.R1
All
Administrative state of the TCP keepalive algorithm
configure system grpc-tunnel destination-group string tcp-keepalive admin-state keyword
disable
enable, disable
22.2.R1
All
Time until the first TCP keepalive probe is sent
configure system grpc-tunnel destination-group string tcp-keepalive idle-time number
This command configures the amount of time the connection must be idle before TCP keepalives are sent.
1 to 100000
600
seconds
22.2.R1
All
Time between TCP keep-alive probes
configure system grpc-tunnel destination-group string tcp-keepalive interval number
1 to 100000
15
seconds
22.2.R1
All
Number of probe retries before closing the connection
configure system grpc-tunnel destination-group string tcp-keepalive retries number
This command configures the number of missed TCP keepalive probes before closing the TCP connection and attempting to reach the other destinations within the same destination group.
3 to 100
4
22.2.R1
All
TLS client profile assigned to the destination group
configure system grpc-tunnel destination-group string tls-client-profile reference
configure system security tls client-tls-profile string
The following elements are part of a choice: allow-unsecure-connection or tls-client-profile.
22.2.R1
All
Enter the tunnel list instance
configure system grpc-tunnel tunnel string
Commands in this context configure gRPC-tunnel-related parameters.
4
22.2.R1
All
Tunnel name
configure system grpc-tunnel tunnel string
1 to 32
This element is part of a list key.
22.2.R1
All
Administrative state of the tunnel
configure system grpc-tunnel tunnel string admin-state keyword
disable
enable, disable
22.2.R1
All
Text description
configure system grpc-tunnel tunnel string description string
1 to 80
22.2.R1
All
Destination group used in the tunnel
configure system grpc-tunnel tunnel string destination-group reference
22.2.R1
All
Enter the handler list instance
configure system grpc-tunnel tunnel string handler string
Commands in this context configure handler parameters for this instance. Multiple handlers can be created for any tunnel.
8
22.2.R1
All
Handler name
configure system grpc-tunnel tunnel string handler string
1 to 32
This element is part of a list key.
22.2.R1
All
Administrative state of the handler
configure system grpc-tunnel tunnel string handler string admin-state keyword
disable
enable, disable
22.2.R1
All
TCP port number the handler listens to internally
1 to 65535
22.2.R1
All
Enter the target-type context
configure system grpc-tunnel tunnel string handler string target-type
22.2.R1
All
Custom string for target type
configure system grpc-tunnel tunnel string handler string target-type custom-type string
This command configures a custom string for the target type. This string can correspond to specific values used by the gRPC tunnel protocol, such as GNMI_GNOI or SSH. If a custom string is defined, the gRPC tunnel client must specify the string to request a session for that handler. The string must be unique within a tunnel.
1 to 64
The following elements are part of a choice: custom-type, grpc-server, or ssh-server.
22.2.R1
All
Target type set to GNMI_GNOI
configure system grpc-tunnel tunnel string handler string target-type grpc-server
When configured, this command assigns the gRPC server as a handler for all tunnels sessions. At the gRPC tunnel protocol level, this corresponds to a value of GNMI_GNOI.
The following elements are part of a choice: custom-type, grpc-server, or ssh-server.
22.2.R1
All
Target type is SSH
configure system grpc-tunnel tunnel string handler string target-type ssh-server
When configured, this command assigns the SSH server as a handler for all tunnels sessions. At the gRPC tunnel protocol level, this corresponds to a value of SSH.
The following elements are part of a choice: custom-type, grpc-server, or ssh-server.
22.2.R1
All
Enter the target-name context
configure system grpc-tunnel tunnel string target-name
22.2.R1
All
Custom target name
configure system grpc-tunnel tunnel string target-name custom-string string
1 to 64
The following elements are part of a choice: custom-string, node-name, or user-agent.
22.2.R1
All
Set the node name as target name
When configured, this command uses the node name as the target name. The node name is configured by the configure system name command.
The following elements are part of a choice: custom-string, node-name, or user-agent.
22.2.R1
All
Set the user agent as the target name
When configured, this command uses the user agent as the target name. The agent is a string consisting of node-name:vendor:model:software-version.
The following elements are part of a choice: custom-string, node-name, or user-agent.
22.2.R1
All
Enable vendor-specific extensions to ICMP
false
16.0.R1
All
Allow QinQ encapsulation for network interfaces
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Create IP interface indexes that are globally unique
configure system ip enforce-unique-if-index boolean
false
16.0.R1
All
Allow forwarding of IPv6 over IPv4 sent to the system IP address
configure system ip forward-6in4 boolean
false
19.10.R1
All
Allow forwarding of IP over GRE sent to the system IP address
configure system ip forward-ip-over-gre boolean
false
19.10.R1
All
Limit the number of IPv6 extension headers processed ingress/egress.
max
max, limited
20.5.R1
All
Enter the mpls context
19.10.R3
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Collect traffic statistics on labels of the MPLS stack
1 to 2
1
19.10.R3
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the l2tp context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Enter the non-multi-chassis-tunnel-id-range context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the range
0 to 16383
16383
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the range
0 to 16383
1
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Enter the lacp context
16.0.R1
All
LACP system priority on aggregated Ethernet interfaces
configure system lacp system-priority number
1 to 65535
32768
16.0.R1
All
Enter the lldp context
16.0.R1
All
Administrative state of LLDP
configure system lldp admin-state keyword
enable
enable, disable
16.0.R1
All
Interval at which LLDP frames are transmitted
configure system lldp message-fast-tx number
This command configures the interval at which LLDP frames are transmitted on behalf of the LLDP during a fast transmission period.
1 to 3600
1
seconds
16.0.R1
All
PDUs to transmit during the fast transmission period
configure system lldp message-fast-tx-init number
1 to 8
4
16.0.R1
All
Minimum interval between change notifications
configure system lldp notification-interval number
5 to 3600
5
seconds
16.0.R1
All
Time required before re-initializing LLDP on a port
configure system lldp reinit-delay number
1 to 10
2
seconds
16.0.R1
All
Maximum consecutive LLDPDUs that can be transmitted
configure system lldp tx-credit-max number
1 to 100
5
16.0.R1
All
Transmit interval multiplier
configure system lldp tx-hold-multiplier number
2 to 10
4
16.0.R1
All
LLDP transmit interval
configure system lldp tx-interval number
5 to 32768
30
seconds
16.0.R1
All
Enter the load-balancing context
16.0.R1
All
Include L2TP header information for load balancing
false
16.0.R4
All
Use load balancing based on Layer 4 fields
16.0.R1
All
Hashing algorithm for system-wide LSR load balancing
lbl-only, lbl-ip, ip-only, eth-encap-ip, lbl-ip-l4-teid, lbl-ip-or-teid
16.0.R1
All
Enable enhanced egress multicast load balancing
false
16.0.R1
All
Enable enhanced VLL LAG service ID hashing
false
16.0.R1
All
Use system IP address for ECMP and LAG load balancing
16.0.R1
All
Site location of the system
1 to 80
16.0.R1
All
Enter the login-control context
16.0.R1
All
Enable exponential-backoff of the login prompt
false
16.0.R1
All
Enter the ftp context
16.0.R1
All
Maximum number of concurrent inbound FTP sessions
0 to 5
3
16.0.R1
All
Idle timeout for FTP, console, or Telnet sessions
configure system login-control idle-timeout (keyword | number)
1 to 1440
30
minutes
none
16.0.R1
All
Display login banner
configure system login-control login-banner boolean
false
16.0.R1
All
Enter the login-scripts context
16.0.R1
All
URL of the global CLI login script
1 to 180
16.0.R1
All
Enter the per-user-script context
16.0.R1
All
File name of the per-user login script
1 to 180
16.0.R1
All
Directory name of user-defined login script
1 to 180
16.0.R1
All
Enter the motd context
16.0.R1
All
Message of the day displayed after console login
configure system login-control motd text string
1 to 900
The following elements are part of a choice: text or url.
16.0.R1
All
URL of the location of message of the day
configure system login-control motd url string
1 to 180
The following elements are part of a choice: text or url.
16.0.R1
All
Enter the pre-login-message context
16.0.R1
All
Message displayed prior to the login prompt
1 to 900
16.0.R1
All
Display the system name before the pre-login message
false
16.0.R1
All
Enter the ssh context
16.0.R1
All
Allow graceful shutdown of SSH sessions
configure system login-control ssh graceful-shutdown boolean
true
16.0.R1
All
Maximum number of concurrent inbound sessions
0 to 50
5
16.0.R1
All
Maximum number of concurrent outbound sessions
0 to 15
5
16.0.R1
All
Minimum TTL value for incoming packets
configure system login-control ssh ttl-security number
1 to 255
16.0.R1
All
Enter the telnet context
16.0.R1
All
Allow graceful shutdown of Telnet sessions
false
16.0.R1
All
Maximum number of concurrent inbound sessions
0 to 50
5
16.0.R1
All
Maximum number of concurrent outbound sessions
0 to 15
5
16.0.R1
All
Minimum TTL value for incoming packets
1 to 255
16.0.R1
All
Enter the management-interface context
16.0.R1
All
Enter the cli context
16.0.R1
All
Enter the classic-cli context
16.0.R1
All
Allow writable access in classic CLI configure branch
true
16.0.R1
All
Enter the rollback context
16.0.R1
All
Maximum number of rollback files on compact flash
1 to 50
10
16.0.R1
All
Location and filename of the rollback checkpoint files
1 to 180
16.0.R1
All
Maximum rollback files saved at a remote location
1 to 200
10
16.0.R1
All
Enter the rescue context
16.0.R1
All
Location of the rollback rescue file
1 to 180
16.0.R1
All
System-wide CLI engine access configuration
configure system management-interface cli cli-engine keyword
md-cli
classic-cli, md-cli
2
This element is ordered by the user.
16.0.R1
All
Enter the md-cli context
16.0.R1
All
Automatically save configuration as part of operation
false
16.0.R1
All
Enter the environment context
16.0.R1
All
Enter the command-alias context
21.7.R1
All
Enter the alias list instance
Commands in this context create aliases to existing MD-CLI commands or to Python applications.
Aliases may be mounted for use globally or for selected context paths. Arguments and output modifiers may be provided to aliases at configuration or run time.
21.7.R1
All
Alias name
1 to 64
This element is part of a list key.
21.7.R1
All
Administrative state of the alias
configure system management-interface cli md-cli environment command-alias alias string admin-state keyword
This command controls the administrative state of the MD-CLI alias.
MD-CLI aliases that are administratively disabled cannot be executed, do not autocomplete in operational mode, and do not appear in ? help.
disable
enable, disable
21.10.R1
All
CLI command to run when executing the alias
configure system management-interface cli md-cli environment command-alias alias string cli-command string
1 to 255
The following elements are part of a mandatory choice: cli-command or python-script.
21.7.R1
All
Text description
configure system management-interface cli md-cli environment command-alias alias string description string
1 to 110
21.7.R1
All
Add a list entry for mount-point
configure system management-interface cli md-cli environment command-alias alias string mount-point (keyword | string)
1
21.7.R1
All
Mount point where alias is available
configure system management-interface cli md-cli environment command-alias alias string mount-point (keyword | string)
1 to 255
global
This element is part of a list key.
21.7.R1
All
Python script to run when executing the alias
configure system management-interface cli md-cli environment command-alias alias string python-script reference
configure python python-script string
The following elements are part of a mandatory choice: cli-command or python-script.
21.7.R1
All
Enter the command-completion context
16.0.R1
All
Complete the command when the Enter key is pressed
true
16.0.R1
All
Complete the command when the Space key is pressed
true
16.0.R1
All
Complete the command when the Tab key is pressed
true
16.0.R1
All
Enter the console context
16.0.R1
All
Number of lines displayed on the screen
24 to 512
24
16.0.R1
All
Number of columns displayed on the screen
80 to 512
80
16.0.R1
All
Enter the info-output context
22.2.R1
All
Enter the always-display context
Commands in this context specify elements that are always displayed in the info output, regardless of whether the detail option is used.
22.2.R1
All
Display admin-state elements
When configured to true, the values of the admin-state elements in info output (without the detail option) are always displayed, even if they are the default values.
false
22.2.R1
All
Enter the message-severity-level context
16.0.R1
All
Message severity threshold for CLI messages
info
warning, info
16.0.R1
All
Prompt to continue or stop when output text fills page
true
16.0.R1
All
Enter the progress-indicator context
16.0.R1
All
Administrative state of the progress indicator
enable
enable, disable
16.0.R1
All
Delay before progress indicator is displayed
0 to 10000
1000
milliseconds
16.0.R1
All
Progress indicator output style
dots
dots
16.0.R1
All
Enter the prompt context
16.0.R1
All
Show the current command context in the prompt
true
16.0.R1
All
Add a new line before every prompt line
true
16.0.R1
All
Show the timestamp before the first prompt line
false
16.0.R1
All
Show an asterisk (*) when uncommitted changes exist
true
16.0.R1
All
Enter the python context
21.10.R1
All
Memory reserved per interpreter
1 to 500
megabytes
21.10.R1
All
Minimum memory requirement to spawn Python interpreter
5 to 50
percent
21.10.R1
All
Maximum run time before a Python application is stopped
30 to 86400
3600
seconds
21.10.R1
All
Time zone to display time
This command configures the time zone for a timestamp displayed in outputs, such as event logs and traps for the current CLI session.
Log files on compact flash are maintained and displayed in UTC format.
local
local, utc
16.0.R1
All
Time format to display date and time
This command specifies the format of the time display in configuration, state, and certain show command output in the current CLI session.
rfc-3339
iso-8601, rfc-1123, rfc-3339
20.5.R1
All
Number of commit history IDs to store
This command sets the number of IDs to store in the commit history.
Setting the value to 0 disables the commit history.
0 to 200
50
21.10.R1
All
Configuration mode for the system
classic
classic, model-driven, mixed
16.0.R1
All
Enter the configuration-save context
16.0.R1
All
Maximum number of backup versions maintained
1 to 200
5
16.0.R1
All
Enter the netconf context
16.0.R1
All
Administrative state of NETCONF
disable
enable, disable
16.0.R1
All
Automatically save configuration as part of operation
false
16.0.R1
All
Enter the capabilities context
16.0.R1
All
Allow the NETCONF server to access the candidate datastore
true
16.0.R1
All
Allow NETCONF server to access the running datastore
false
16.0.R1
All
Choose port on which the NETCONF server will listen for new connections.
22 | 830
830
19.10.R1
All
Enter the operations context
Commands in this context configure parameters associated with operational commands in model-driven interfaces.
21.5.R1
All
Enter the global-timeouts context
Commands in this context configure system timeout parameters for operational commands.
Timeout parameters provide default system-level control for various types of operational commands in model-driven interfaces. The timeout values are used when specific execution and retention timeouts are not requested for a specific operation.
21.5.R1
All
Timeout for asynchronous operation execution
configure system management-interface operations global-timeouts asynchronous-execution (number | keyword)
This command configures the period of time that operations launched as “asynchronous” are allowed to execute before being automatically stopped by the SR OS.
An asynchronous operation is not deleted from the system when it is stopped. See the asynchronous-retention command.
If a specific execution timeout is not included in the request for a particular asynchronous operation, this system-level timeout applies.
Note: This execution timeout is part of the general global operations infrastructure and is separate and independent from any operation-specific timeouts (for example, the ping operation also has its own timeout parameter).
1 to 604800
3600
seconds
never
21.5.R1
All
Timeout for asynchronous operation data retention
configure system management-interface operations global-timeouts asynchronous-retention (number | keyword)
This command configures the period of time that data related to operations launched as “asynchronous” is retained in the system. After the retention timeout expires, all information related to the operation is deleted, including any status information and result data.
If a specific retention timeout is not included in the request for a particular asynchronous operation, this system-level timeout applies.
1 to 604800
86400
seconds
never
21.5.R1
All
Timeout for synchronous operation execution
configure system management-interface operations global-timeouts synchronous-execution (number | keyword)
This command configures the period of time that operations launched as “'synchronous” (the default method for all operations) are allowed to execute before they are automatically stopped, and their associated data is deleted.
If a specific execution timeout is not included in the request for a particular synchronous operation, this system-level timeout applies.
Note: This execution timeout is part of the general global operations infrastructure and is separate and independent from any operation-specific timeouts (for example, the ping operation also has its own timeout parameter).
Caution: If this command is set with a specific time value, MD-CLI operations are subject to the timeout and are interrupted if they execute longer than the time value. This situation can arise because the timeout also applies to operations requested in the MD-CLI interface (for example, ping, file dir, and so on).
1 to 604800
never
seconds
never
21.5.R1
All
Enter the remote-management context
Commands in this context configure remote management to manage multiple SR OS nodes running different SR OS versions from the same MD-CLI shell.
20.5.R1
All
Administrative state of remote management registration
disable
enable, disable
20.5.R1
All
Allow connection without secured transport protocol
When configured, this command allows an unsecured connection to remote managers; TCP connections are not encrypted, including username and password information.
The following elements are part of a choice: allow-unsecure-connection or client-tls-profile.
20.5.R1
All
TLS client profile name
This command specifies the client TLS profile to all remote managers.
configure system security tls client-tls-profile string
The following elements are part of a choice: allow-unsecure-connection or client-tls-profile.
20.5.R1
All
Time without a response before manager declared down
1 to 3600
60
seconds
20.5.R1
All
Device label supplied to the remote manager
This command specifies a metadata label that is supplied to the manager. This label is used to group devices or network nodes with a common purpose or goal.
1 to 64
20.5.R1
All
Device name supplied to the remote manager
This command specifies a device name that is supplied to the manager. The name identifies a specific SR OS node in the network.
When unconfigured, the default system name is used.
1 to 64
20.5.R1
All
Time between hello messages from SR OS node to manager
10 to 216000
600
seconds
20.5.R1
All
Enter the manager list instance
Commands in this context configure specific manager-related commands. Commands configured in this context take precedence over command values specified directly in the configure management-interface remote-management context.
If a command is not configured in this context, the command setting is inherited from the higher level context.
2
20.5.R1
All
Remote management manager name
1 to 64
This element is part of a list key.
20.5.R1
All
Administrative state of remote management registration
configure system management-interface remote-management manager string admin-state keyword
disable
enable, disable
20.5.R1
All
Allow connection without secured transport protocol
When configured, this command allows an unsecured connection to remote managers; TCP connections are not encrypted, including username and password information.
The following elements are part of a choice: allow-unsecure-connection or client-tls-profile.
20.5.R1
All
TLS client profile name
configure system management-interface remote-management manager string client-tls-profile reference
This command assigns a profile name to a remote manager.
configure system security tls client-tls-profile string
The following elements are part of a choice: allow-unsecure-connection or client-tls-profile.
20.5.R1
All
Max time without response before manager declared down
1 to 3600
seconds
20.5.R1
All
Text description
configure system management-interface remote-management manager string description string
1 to 80
20.5.R1
All
Device label supplied to the remote manager
configure system management-interface remote-management manager string device-label string
This command specifies a metadata label that is supplied to the manager. This label is used to group devices or network nodes with a common purpose or goal.
1 to 64
20.5.R1
All
Device name supplied to the remote manager
configure system management-interface remote-management manager string device-name string
This command specifies a device name that is supplied to the manager. The name identifies a specific SR OS node in the network.
When unconfigured, the default system name is used.
1 to 64
20.5.R1
All
Destination IP address of the manager
configure system management-interface remote-management manager string manager-address (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name)
1 to 255
20.5.R1
All
Destination TCP port for gRPC connections to manager
configure system management-interface remote-management manager string manager-port number
1 to 65535
57400
20.5.R1
All
Reference to a router or VPRN service name
configure system management-interface remote-management manager string router-instance string
20.5.R1
All
Source IP address for connection to the manager
configure system management-interface remote-management manager string source-address (ipv4-address-no-zone | ipv6-address-no-zone)
20.5.R1
All
Source TCP destination port number
configure system management-interface remote-management manager string source-port (number | keyword)
1 to 65535
grpc-default
20.5.R1
All
Router name or VPRN service name
management
20.5.R1
All
Source IP address for connection to the manager
configure system management-interface remote-management source-address (ipv4-address-no-zone | ipv6-address-no-zone)
20.5.R1
All
Source TCP port number to connection to the manager
configure system management-interface remote-management source-port (number | keyword)
1 to 65535
grpc-default
grpc-default
20.5.R1
All
Schema path URL
This command specifies the schema path where the SR OS YANG modules can be manually copied by the user prior to using a <get-schema> request. It is recommended that the URL string not exceed 135 characters for the <get-schema> request to work properly with all schema files.
When unconfigured, the software upgrade process manages the YANG schema files to ensure the schema files are synchronized with the software image on both the primary and standby CPM.
1 to 180
16.0.R4
All
Enter the snmp context
16.0.R1
All
Administrative state of the SNMP daemon
enable
enable, disable
16.0.R1
All
SNMP engine ID that identifies the SNMPv3 node
10 to 64
16.0.R1
All
Port number to be used to send general SNMP messages.
0 | 1 to 65535
161
16.0.R1
All
Maximum SNMP packet size generated by the node
484 to 9216
1500
16.0.R1
All
Enter the streaming context
16.0.R1
All
Administrative state of the streaming daemon
disable
enable, disable
16.0.R1
All
Enter the yang-modules context
Commands in this context determine the system support of the Nokia YANG models.
The settings affect the data sent in a NETCONF <hello>, data populated in the RFC 6022 /netconf-state/schemas list, data returned in a <get-schema> request, and data populated in the RFC 8525 /yang-library.
16.0.R1
All
Support base release 13 YANG models
false
16.0.R1
All
Enter the nmda context
Commands in this context configure the attributes for the Network Management Datastores Architecture (NMDA).
21.7.R1
All
Advertise NMDA support over NETCONF
When configured to true, this command enables the advertisement of NMDA support over NETCONF through the use of YANG library 1.1.
When configured to false, this command disables NMDA advertisement over NETCONF and YANG library 1.0 is used.
false
21.7.R1
All
Support access to combined Nokia YANG models
When configured to true, the system supports the combined Nokia YANG files for both configuration and state data in the NETCONF server.
When the system is operating in classic configuration mode, attempts to access (read or write) the configuration using the Nokia configuration modules or namespace via NETCONF result in errors, even if this command is set to true.
When configured to false, access to the combined Nokia YANG files is not supported.
This command and the nokia-submodules command cannot both be set to true at the same time.
16.0.R4
All
Support submodule-based packaging of Nokia YANG models
When configured to true, the system supports the alternative submodule-based packaging of the Nokia YANG files for both configuration and state data in the NETCONF server.
When the system is operating in classic configuration mode, attempts to access (read or write) the configuration using the Nokia configuration modules or namespace via NETCONF result in errors, even if this command is set to true.
When configured to false, access to the submodule-based packaging of the Nokia YANG files is not supported.
This command and the nokia-combined-modules command cannot both be set to true at the same time.
21.2.R1
All
Support OpenConfig YANG models
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative name assigned to the system
1 to 64
16.0.R1
All
Enter the network-element-discovery context
19.5.R1
All
Generate NE discovery traps
false
19.5.R1
All
Enter the profile list instance
1
19.5.R1
All
Profile name
1 to 32
This element is part of a list key.
19.5.R1
All
Network element ID of the advertised node
configure system network-element-discovery profile string neid string
7 to 8
19.5.R1
All
Enter the neip context
19.5.R1
All
Enter the auto-generate context
21.2.R1
All
Enable the ipv4 context
21.2.R1
All
Most significant byte if the NE IPv4 address
configure system network-element-discovery profile string neip auto-generate ipv4 vendor-id-value number
1 to 255
140
21.2.R1
All
Enable the ipv6 context
21.2.R1
All
Most significant byte of the NE IPv6 address
configure system network-element-discovery profile string neip auto-generate ipv6 vendor-id-value number
1 to 255
140
21.2.R1
All
NEIP IPv4 address
19.5.R1
All
NEIP IPv6 address
19.5.R1
All
Platform name and chassis type to be advertised
configure system network-element-discovery profile string platform-type string
1 to 255
19.5.R1
All
MAC address of the advertised node
configure system network-element-discovery profile string system-mac string
19.5.R1
All
Vendor ID to be advertised
configure system network-element-discovery profile string vendor-id string
1 to 255
Nokia
19.5.R1
All
Process received OSPF dynamic hostname information
configure system ospf-dynamic-hostnames boolean
When configured to true, OSPF dynamic hostnames are enabled. The router receiving the new dynamic hostname within the OSPF Router Information (RI) LSA is instructed to process the received dynamic hostname information.
When configured to false, dynamic hostname information is not processed.
false
20.2.R1
All
Enter the persistence context
Commands in this context configure persistence on the system.
The persistence feature enables the system to retain state information learned through DHCP snooping across reboots. This information includes data such as the IP address and MAC binding information, lease-length information, and ingress SAP information (required for VPLS snooping to identify the ingress interface).
If persistence is enabled when there are no DHCP relay or snooping commands enabled, the system creates an empty file.
16.0.R1
All
Enter the ancp context
16.0.R1
All
Text description
configure system persistence ancp description string
1 to 80
16.0.R1
All
CPM flash card where the information is stored
configure system persistence ancp location keyword
cf1, cf2, cf3
16.0.R1
All
Enter the application-assurance context
Commands in this context configure AA persistence on the system.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Text description
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
CPM flash card where the information is stored
cf1, cf2, cf3
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the dhcp-server context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Text description
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
CPM flash card where the information is stored
configure system persistence dhcp-server location keyword
cf1, cf2, cf3
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Enter the nat-port-forwarding context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Text description
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
CPM flash card where the information is stored
cf1, cf2, cf3
16.0.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the options context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
DHCP lease time limit to be eligible for persistence
1 to 631152000
seconds
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Enter the python-policy-cache context
16.0.R1
All
Text description
1 to 80
16.0.R1
All
CPM flash card where the information is stored
cf1, cf2, cf3
16.0.R1
All
Enter the subscriber-mgmt context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Text description
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
CPM flash card where the information is stored
cf1, cf2, cf3
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, VSR
Enter the power-management list instance
16.0.R1
7750 SR-s, 7950 XRS
Power zone
1 to 2
This element is part of a list key.
16.0.R1
7750 SR-s, 7950 XRS
Power capacity mode algorithm
configure system power-management power-zone number mode keyword
basic
none, basic, advanced
16.0.R1
7750 SR-s, 7950 XRS
Power capacity to trigger a safety alert event
configure system power-management power-zone number power-safety-alert number
0 to 120000
0
watts
16.0.R1
7750 SR-s, 7950 XRS
Minimum threshold to power off devices
configure system power-management power-zone number power-safety-level number
0 to 100
100
percent
16.0.R1
7750 SR-s, 7950 XRS
Enter the ptp context
Commands in this context configure Precision Time Control (PTP) parameters based on IEEE 1588-2008, Precision Time Protocol.
The context is only supported on control assemblies that support 1588.
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of PTP
configure system ptp admin-state keyword
disable
enable, disable
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Expired intervals count before timeout event declared
This command configures the number of Announce message intervals that must expire with no received Announce messages before declaring an ANNOUNCE_RECEIPT_TIMEOUT event.
2 to 10
3
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Clock type
configure system ptp clock-type keyword
slave-only, master-only, boundary
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
PTP domain
This command configures the PTP domain. The default and valid range of the domain depend on the configured PTP profile.
0 to 255
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
PTP clock local priority
configure system ptp local-priority number
This command configures the local priority used to choose between PTP masters in the best master clock algorithm (BMCA). This setting applies when the PTP profile is either configured for G.8275.1 or G.8275.2 and is ignored for any other profile.
For G.8275.1 or G.8275.2, this command configures the localPriority parameter associated with the local clock (ptp context). See G.8275.1 or G.8275.2 for detailed information.
1 to 255
128
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Announce message interval in log form
configure system ptp log-announce-interval number
This command configures the Announce message interval used for both unicast and multicast messages.
For unicast messages, the Announce message interval is requested during unicast negotiation to any peer. This controls the Announce message rate sent from remote peers to the local node. It does not affect the announce message rate that may be sent from the local node to remote peers. Remote peers may request an Announce message rate within the acceptable grant range.
For multicast messages used on PTP Ethernet ports, this command specifies the message interval used for Announce messages transmitted by the local node.
This value also defines the interval between executions of the BMCA within the node.
To minimize BMCA driven reconfigurations, IEEE recommends that the announce interval should be consistent across the entire 1588 network.
-3 to 4
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
PTP network type
configure system ptp network-type keyword
This command configures the codeset (as defined in Table 1/G.8265.1) to be used for the encoding of QL values into PTP clockClass values when the profile is configured for G.8265.1.
This setting only applies to the range of values observed in the clockClass parameter transmitted out of the node in Announce messages. The router supports the reception of any valid value in Table 1/G.8265.1
sdh
sonet, sdh
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the port list instance
Commands in this context configure PTP over Ethernet on the physical port. The PTP process transmits and receives PTP messages through the port using Ethernet encapsulation (as opposed to UDP/IPv4 encapsulation).
Frames are transmitted with no VLAN tags, even if the port is configured for dot1q or qinq modes for encap-type. The received frames from the external PTP clock must also be untagged.
Two reserved multicast addresses are allocated for PTP messages (see Annex F IEEE Std 1588-2008). Either address can be configured for the PTP messages sent through the port.
A PTP port cannot be created if the PTP profile is configured for G.8265.1.
If the port supports 1588 port-based timestamping, Synchronous Ethernet must be enabled on the MDA when PTP over Ethernet is enabled.
De-provisioning of the card or MDA containing the specified port is not permitted while the port is configured within PTP.
Changing the encapsulation or the port type of the Ethernet port is not permitted when PTP Ethernet Multicast operation is configured on the port.
To allocate an Ethernet satellite client port as a PTP port, the Ethernet satellite must first be enabled for the transparent clock function. For more information, see the configure satellite ethernet-satellite ptp-tc command.
The SyncE/1588 ports of the CPM and CCMs can be specified as PTP ports. These use the ‘A/3’ and ‘B/3’ designation and both must be specified as two PTP ports if both are used. The active CPM sends and receives messages on both ports if they are specified and enabled.
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Ethernet PTP port ID
This element is part of a list key.
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Destination MAC address of the transmitted PTP messages
This command specifies the destination MAC address of the transmitted PTP messages. IEEE Std 1588-2008 Annex F defines two reserved addresses for 1588 messages, which include:
Both addresses are supported for reception, independent of the address configured by this command.
01:1B:19:00:00:00
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the PTP port
configure system ptp port reference admin-state keyword
enable
enable, disable
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
PTP port local priority
configure system ptp port reference local-priority number
This command configures the local priority used to choose between PTP masters in the best master clock algorithm (BMCA). This setting applies when the PTP profile is either configured for G.8275.1 or G.8275.2 and is ignored for any other profile.
For G.8275.1 or G.8275.2, this command configures the localPriority parameter associated with the Announce messages received from the external clocks (ptp port context). See G.8275.1 or G.8275.2 for detailed information.
1 to 255
128
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Minimum interval for Delay_Req messages in log form
configure system ptp port reference log-delay-interval number
This command configures the minimum interval used for multicast Delay_Req messages for the port. For ports in a slave state, the interval is used, unless the parent port indicates a longer interval. For a port in master state, the interval is advertised to external slave ports as the minimum acceptable interval for Delay_Req messages from the slave ports.
The router supports the 1588 standard requirement for a port in slave state to check the logMessageInterval field of received multicast Delay_Resp messages. If the value of the logMessageInterval field of the messages is greater than the value configured locally for the generation of Delay_Req messages, the slave must use the longer interval for the generation of Delay_Req messages.
The interval value is specified as the logarithm to the base 2.
-6 to 0
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Interval for transmission of Sync messages in log form
configure system ptp port reference log-sync-interval number
This command configures the interval used for Sync messages transmitted by the local node when the port is in master state.
The interval value is specified as the logarithm to the base 2.
-6 to 0
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Restrict the local port to master state
configure system ptp port reference master-only boolean
When configured to true, the local port is restricted to master state only, ensuring that the system does not obtain synchronization from attached external devices.
This command is supported only when the PTP profile is set for G.8275.1 or G.8275.2.
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Priority1 of the local clock
This command configures the priority1 parameter of the local clock. The setting is used when the profile is configured for IEEE 1588-2008.
This value is used by the Best Master Clock Algorithm to determine which clock should provide timing for the network and is advertised in Announce messages.
0 to 255
128
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Priority2 of the local clock
This command configures the priority2 parameter of the local clock. The setting is used when the profile is configured for IEEE 1588-2008, G.8275.1, or G.8275.2.
This value is used by the Best Master Clock algorithm to determine which clock should provide timing for the network and is advertised in Announce messages.
0 to 255
128
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
PTP profile
This command configures the profile to be used for the internal PTP clock. It defines the Best Master Clock Algorithm (BMCA) behavior.
Profile changes may affect the settings of other configuration elements, such as the clock type and default settings for the delay interval, announce interval, and the Sync interval.
The following clock types are supported for the indicated profiles:
g8265dot1-2010, ieee1588-2008, g8275dot1-2014, g8275dot2-2016
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ptsf context
Commands in this context configure the attributes of Packet Timing Signal Fail (PTSF).
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the monitor-ptsf-unusable context
Commands in this context configure monitoring of neighbor clocks for the PTSF-unusable state (condition) when the profile is set to g8275dot1-2014.
When administratively enabled, the local clock monitors the noise level of PTP event messages between external neighbor PTP ports and the local clock. If it detects a high variation in the network path between the external neighbor port and the local port, it considers the neighbor port unusable. Announce messages from the neighbor are discarded and excluded from the BMCA and the port cannot be selected as the parent clock. The unusable condition must be manually cleared.
When administratively disabled, the monitor PTSF function of the PTP clock clears PTSF-unusable states from all neighbor PTP ports. If no PTP messages are received from a neighbor for 15 minutes, the neighbor information is purged and the PTSF-unusable state is cleared.
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of PTSF unusable monitoring
disable
enable, disable
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the router list instance
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Router name or VPRN service name
This element is part of a list key.
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of PTP on the router instance
configure system ptp router string admin-state keyword
enable
enable, disable
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the peer list instance
Commands in this context configure a remote PTP peer.
In the current release, the system supports PTP using IPv4 only.
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP address of the remote PTP peer
This command specifies the IP address of the remote PTP peer.
In the current release, the system supports PTP using IPv4 only.
This element is part of a list key.
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the PTP peer
enable
enable, disable
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
PTP peer local priority
This command configures the local priority for the peer, which is used to choose between PTP masters in the best master clock algorithm (BMCA). This setting applies when the PTP profile is configured for G.8265.1, G.8275.1, or G.8275.2 and is ignored for any other profile.
For G.8265.1, this command configures the priority used to choose between master clocks with the same quality (see G.8265.1 for more details).
For G.8275.1 or G.8275.2, this command configures the localPriority parameter associated with the Announce messages received from the external clocks (ptp router peer context). See G.8275.1 or G.8275.2 for detailed information.
1 to 255
128
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
PTP peer interval for Sync messages in log form
This command configures the message interval used for Sync and Delay_Resp messages that are requested during unicast negotiation to the peer. The setting controls messages sent from remote peers to the local node but the packet rate from the local node to remote peers is not affected. Remote peers may request a packet rate within the acceptable range.
The interval value is specified as the logarithm to the base 2.
-6 to 0
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Number of discovered peers allowed for routing instance
configure system ptp router string peer-limit number
This command specifies the maximum number of discovered peers permitted within the routing instance. This ensures that a routing instance does not consume all the possible discovered peers and prevents the routing instance from blocking discovered peers in other routing instances.
The sum of all peer limit values for all routing instances cannot exceed the maximum number of discovered peers supported by the system.
0 to 512
21.7.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Send Announce messages while clock is unsynchronized
configure system ptp tx-while-sync-uncertain boolean
When configured to true, the local PTP clock transmits Announce messages to downstream clocks to indicate it has not yet stabilized on the recovered synchronization source (upstream clocks or GM clock). While the PTP clock is unsynchronized, the SyncUncertain state is true.
When configured to false, the local PTP clock does not send Announce messages to downstream clocks to indicate it is not synchronized to a valid timing source. If the SyncUncertain state of the clock is true while this command is configured to false, unicast negotiation grant requests are not granted and current grants are canceled.
true
22.2.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the script-control context
16.0.R1
All
Enter the script list instance
configure system script-control script string owner string
1500
16.0.R1
All
Script name
configure system script-control script string owner string
1 to 32
This element is part of a list key.
16.0.R1
All
Script owner
configure system script-control script string owner string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the script
configure system script-control script string owner string admin-state keyword
disable
enable, disable
16.0.R1
All
Text description
configure system script-control script string owner string description string
1 to 80
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Script location
1 to 255
16.0.R1
All
Enter the script-policy list instance
configure system script-control script-policy string owner string
1500
16.0.R1
All
Script policy name
configure system script-control script-policy string owner string
1 to 32
This element is part of a list key.
16.0.R1
All
Script policy owner
configure system script-control script-policy string owner string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the script policy
configure system script-control script-policy string owner string admin-state keyword
disable
enable, disable
16.0.R1
All
Maximum amount of time to keep a run history status
configure system script-control script-policy string owner string expire-time (number | keyword)
0 to 21474836
3600
seconds
forever
16.0.R1
All
Maximum amount of time the script may run
configure system script-control script-policy string owner string lifetime (number | keyword)
0 to 21474836
3600
seconds
forever
The following elements are part of a choice: (lifetime and script) or (python-lifetime and python-script).
16.0.R1
All
Allow EHS/CRON script to break database explicit lock
configure system script-control script-policy string owner string lock-override boolean
false
19.10.R1
All
Maximum number of script history status entries kept
configure system script-control script-policy string owner string max-completed number
1 to 1500
1
16.0.R1
All
Maximum time the Python application can run
configure system script-control script-policy string owner string python-lifetime number
30 to 86400
seconds
The following elements are part of a choice: (lifetime and script) or (python-lifetime and python-script).
21.10.R1
All
Enter the python-script context
configure system script-control script-policy string owner string python-script
The following elements are part of a choice: (lifetime and script) or (python-lifetime and python-script).
21.10.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Python application name
configure system script-control script-policy string owner string python-script name reference
configure python python-script string
21.10.R1
All
Location to receive CLI output of a script run
configure system script-control script-policy string owner string results string
1 to 255
16.0.R1
All
Enter the script context
configure system script-control script-policy string owner string script
The following elements are part of a choice: (lifetime and script) or (python-lifetime and python-script).
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Script name
configure system script-control script-policy string owner string script name string
1 to 32
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Script owner
configure system script-control script-policy string owner string script owner string
1 to 32
16.0.R1
All
Enter the security context
Commands in this context configure central security settings such as DDoS protection, users, authorization profiles, and certificates.
Access to these commands should be restricted to highly trusted users and device administrators.
16.0.R1
All
Enter the aaa context
16.0.R1
All
Enter the cli-session-group list instance
configure system security aaa cli-session-group string
16
16.0.R1
All
CLI session group name
configure system security aaa cli-session-group string
1 to 32
This element is part of a list key.
16.0.R2
All
Maximum number of concurrent SSH and Telnet sessions
configure system security aaa cli-session-group string combined-max-sessions number
0 to 50
16.0.R1
All
Text description
configure system security aaa cli-session-group string description string
1 to 80
16.0.R1
All
Maximum number of concurrent SSH sessions
configure system security aaa cli-session-group string ssh-max-sessions number
0 to 50
16.0.R1
All
Maximum number of concurrent Telnet sessions
configure system security aaa cli-session-group string telnet-max-sessions number
0 to 50
16.0.R1
All
Polling interval of RADIUS, TACACS+, and LDAP servers
configure system security aaa health-check (number | keyword)
6 to 1500
30
seconds
none
16.0.R1
All
Enter the local-profiles context
16.0.R1
All
Enter the profile list instance
128
16.0.R1
All
User profile name
1 to 32
This element is part of a list key.
16.0.R1
All
CLI session group to which the profile belongs
configure system security aaa local-profiles profile string cli-session-group reference
configure system security aaa cli-session-group string
16.0.R1
All
Maximum number of concurrent SSH and Telnet sessions
configure system security aaa local-profiles profile string combined-max-sessions number
0 to 50
16.0.R1
All
Action for non-matching entry
configure system security aaa local-profiles profile string default-action keyword
none
deny-all, permit-all, none, read-only-all
16.0.R1
All
User profile entry ID
1 to 9999
This element is part of a list key.
16.0.R1
All
Action when a user command matches the entry
none
deny, permit, none, read-only
16.0.R1
All
Text description
configure system security aaa local-profiles profile string entry number description string
1 to 80
16.0.R1
All
Command to match the entry
1 to 255
16.0.R1
All
Enter the grpc context
16.0.R1
All
Enter the rpc-authorization context
Commands in this context control the authorization of each RPC in gRPC interfaces.
16.0.R1
All
gNMI Capabilities RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnmi-capabilities keyword
permit
permit, deny
16.0.R1
All
gNMI Get RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnmi-get keyword
permit
permit, deny
16.0.R1
All
gNMI Set RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnmi-set keyword
permit
permit, deny
16.0.R1
All
gNMI Subscribe RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnmi-subscribe keyword
permit
permit, deny
16.0.R1
All
gNOI CanGenerateCSR RPC authorization
deny
permit, deny
19.10.R1
All
gNOI GetCertificates RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-cert-mgmt-getcert keyword
deny
permit, deny
19.10.R1
All
gNOI Install RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-cert-mgmt-install keyword
deny
permit, deny
19.10.R1
All
gNOI RevokeCertificates RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-cert-mgmt-revoke keyword
deny
permit, deny
20.2.R1
All
gNOI Rotate RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-cert-mgmt-rotate keyword
deny
permit, deny
19.10.R1
All
gNOI File Get RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-file-get keyword
permit
permit, deny
21.2.R1
All
gNOI File Put RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-file-put keyword
permit
permit, deny
21.2.R1
All
gNOI File Remove RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-file-remove keyword
permit
permit, deny
21.2.R1
All
gNOI File Stat RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-file-stat keyword
permit
permit, deny
21.2.R1
All
gNOI File TransferToRemote RPC authorization
permit
permit, deny
21.7.R1
All
gNOI System CancelReboot RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-cancelreboot keyword
deny
permit, deny
20.5.R1
All
gNOI System Ping RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-ping keyword
permit
permit, deny
21.7.R1
All
gNOI System Reboot RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-reboot keyword
deny
permit, deny
20.5.R1
All
gNOI System RebootStatus RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-rebootstatus keyword
deny
permit, deny
20.5.R1
All
gNOI System SetPackage RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-setpackage keyword
deny
permit, deny
20.5.R1
All
gNOI System SwitchControlProcessor RPC authorization
deny
permit, deny
20.5.R1
All
gNOI System Time RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-time keyword
permit
permit, deny
21.7.R1
All
gNOI System Traceroute RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization gnoi-system-traceroute keyword
permit
permit, deny
21.7.R1
All
gNOI MdCli Session RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization md-cli-session keyword
permit
permit, deny
20.5.R1
All
RibApi GetVersion RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization rib-api-getversion keyword
permit
permit, deny
16.0.R4
All
RibApi Modify RPC authorization
configure system security aaa local-profiles profile string grpc rpc-authorization rib-api-modify keyword
permit
permit, deny
16.0.R4
All
Allow lawful intercept profile ID
false
19.10.R1
All
Enter the netconf context
16.0.R1
All
Enter the base-op-authorization context
Commands in this context configure the permission to use NETCONF operations at the base operation level for the specified profile.
The NETCONF operations are authorized by default in the built-in system-generated administrative profile.
16.0.R1
All
Allow NETCONF action operation
configure system security aaa local-profiles profile string netconf base-op-authorization action boolean
false
21.7.R1
All
Allow NETCONF cancel-commit operation
configure system security aaa local-profiles profile string netconf base-op-authorization cancel-commit boolean
false
21.7.R1
All
Allow NETCONF close-session operation
configure system security aaa local-profiles profile string netconf base-op-authorization close-session boolean
false
21.7.R1
All
Allow NETCONF commit operation
configure system security aaa local-profiles profile string netconf base-op-authorization commit boolean
false
21.7.R1
All
Allow NETCONF copy-config operation
configure system security aaa local-profiles profile string netconf base-op-authorization copy-config boolean
false
21.7.R1
All
Allow NETCONF create-subscription operation
When configured to true, this command enables the NETCONF create-subscription operation in the default profile.
The base-op-authorization create-subscription configuration is not pre-emptive, which means that it is checked only at the time of the initial subscription. Configuration changes to base-op-authorization do not cancel any in-progress subscriptions and operators who successfully subscribed continue to receive messages.
When configured to false, this command disables the NETCONF create-subscription operation in the default profile.
The operation is enabled by default in the built-in system-generated administrative profile.
false
21.7.R1
All
Allow NETCONF delete-config operation
configure system security aaa local-profiles profile string netconf base-op-authorization delete-config boolean
false
21.7.R1
All
Allow NETCONF discard-changes operation
configure system security aaa local-profiles profile string netconf base-op-authorization discard-changes boolean
false
21.7.R1
All
Allow NETCONF edit-config operation
configure system security aaa local-profiles profile string netconf base-op-authorization edit-config boolean
false
21.7.R1
All
Allow NETCONF get operation
configure system security aaa local-profiles profile string netconf base-op-authorization get boolean
false
21.7.R1
All
Allow NETCONF get-config operation
configure system security aaa local-profiles profile string netconf base-op-authorization get-config boolean
false
21.7.R1
All
Allow NETCONF get-data operation
configure system security aaa local-profiles profile string netconf base-op-authorization get-data boolean
false
21.7.R1
All
Allow NETCONF get-schema operation
configure system security aaa local-profiles profile string netconf base-op-authorization get-schema boolean
false
21.7.R1
All
Allow NETCONF kill-session operation
configure system security aaa local-profiles profile string netconf base-op-authorization kill-session boolean
false
16.0.R1
All
Allow NETCONF lock and unlock operations
configure system security aaa local-profiles profile string netconf base-op-authorization lock boolean
false
16.0.R1
All
Allow NETCONF validate operation
configure system security aaa local-profiles profile string netconf base-op-authorization validate boolean
false
21.7.R1
All
Maximum number of concurrent SSH sessions
configure system security aaa local-profiles profile string ssh-max-sessions number
0 to 50
16.0.R1
All
Maximum number of concurrent Telnet sessions
configure system security aaa local-profiles profile string telnet-max-sessions number
0 to 50
16.0.R1
All
Enter the management-interface context
20.10.R1
All
Enter the md-cli context
20.10.R1
All
Perform remote command accounting during a load or rollback operation
true
20.10.R1
All
Enter the output-authorization context
Commands in this context configure output authorization for model-driven interfaces and telemetry.
When output authorization is performed, commands that display configuration or state output must authorize every element in the output. If a remote AAA server is configured, there may be delays in displaying output while the output is authorized. The remote AAA server may receive a large volume of authorization requests when substantial output displays are needed, such as for system configuration details.
Input to edit the configuration is always authorized, and is not affected by commands in this context.
20.10.R1
All
Authorize output in model-driven interfaces
When configured to true, output is authorized for the following:
true
20.10.R1
All
Authorize telemetry data in gNMI Subscribe RPC response
false
20.10.R1
All
Enter the remote-servers context
16.0.R1
All
Enter the ldap context
16.0.R1
All
Administrative state of the LDAP operation protocol
configure system security aaa remote-servers ldap admin-state keyword
enable
enable, disable
16.0.R1
All
Allow SSH public key authentication from LDAP server
false
16.0.R1
All
Route preference to reach the AAA server
This command specifies the routing preference to reach the AAA server. If the configured option is to use both in-band and out-of-band routes, the out-of-band routes in the Base routing instance are used to reach the server before the in-band routes in the management routing instance.
both
both, inband, outband
21.5.R1
All
Enter the server list instance
5
16.0.R1
All
LDAP server ID
1 to 5
This element is part of a list key.
16.0.R1
All
Enter the address list instance
1
16.0.R1
All
LDAP server address
This element is part of a list key.
16.0.R1
All
Port number on which to contact the LDAP server
1 to 65535
389
16.0.R1
All
Administrative state of the LDAP server
configure system security aaa remote-servers ldap server number admin-state keyword
disable
enable, disable
16.0.R1
All
Enter the bind-authentication context
16.0.R1
All
Password used for authentication with the LDAP server
configure system security aaa remote-servers ldap server number bind-authentication password string
1 to 199
16.0.R1
All
Root domain used for authentication with LDAP server
configure system security aaa remote-servers ldap server number bind-authentication root-dn string
1 to 512
16.0.R1
All
Enter the search context
16.0.R1
All
LDAP server search base domain name
1 to 512
16.0.R1
All
LDAP server name
configure system security aaa remote-servers ldap server number server-name string
1 to 32
16.0.R1
All
TLS client profile used to encrypt the LDAP connection
configure system security aaa remote-servers ldap server number tls-profile reference
configure system security tls client-tls-profile string
16.0.R1
All
Number of attempts to retry contacting the LDAP server
1 to 10
3
16.0.R1
All
Timeout for a response from the LDAP server
1 to 90
3
seconds
16.0.R1
All
Apply the default template to LDAP
true
16.0.R1
All
Enter the radius context
16.0.R1
All
Algorithm used to access the set of RADIUS servers
direct
direct, round-robin
16.0.R1
All
Enable RADIUS command accounting
configure system security aaa remote-servers radius accounting boolean
false
16.0.R1
All
Port number on RADIUS server for accounting requests
1 to 65535
1813
16.0.R1
All
Administrative state of the authentication server
enable
enable, disable
16.0.R1
All
Enable RADIUS authorization
false
16.0.R1
All
Enable RADIUS interactive authentication
false
16.0.R1
All
UDP port number on which to contact RADIUS server
1 to 65535
1812
16.0.R1
All
Route preference to reach the AAA server
This command specifies the routing preference to reach the AAA server. If the configured option is to use both in-band and out-of-band routes, the out-of-band routes in the Base routing instance are used to reach the server before the in-band routes in the management routing instance.
both
both, inband, outband
21.5.R1
All
Enter the server list instance
5
16.0.R1
All
RADIUS server ID
1 to 5
This element is part of a list key.
16.0.R1
All
IP address of the RADIUS server
This element is mandatory.
16.0.R1
All
Secret key to access the RADIUS server
1 to 115
16.0.R1
All
TLS client profile for the RADIUS server
configure system security aaa remote-servers radius server number tls-client-profile reference
This command specifies the TLS client profile used to encrypt RADIUS communication. When configured, RADIUS messages are sent using TLS.
configure system security tls client-tls-profile string
21.10.R1
All
Number of attempts to retry contacting RADIUS server
1 to 10
3
16.0.R1
All
Time to wait for a response from the RADIUS server
1 to 90
3
seconds
16.0.R1
All
Apply the RADIUS default user template to RADIUS user
false
16.0.R1
All
Enter the tacplus context
16.0.R1
All
Enable the accounting context
16.0.R1
All
Type of accounting record packet sent to TACACS+ server
stop-only
start-stop, stop-only
16.0.R1
All
Enter the admin-control context
16.0.R1
All
Interactive authentication from node to TACACS+ server
0 to 15
16.0.R1
All
Administrative state of the TACACS+ protocol
enable
enable, disable
16.0.R1
All
Enable the authorization context
16.0.R1
All
Enter the request-format context
Commands in this context configure access operations that are sent to the TACACS+ server during authorization.
21.10.R3
All
Access operations sent in authorization requests
This command sends an operation argument in authorization requests.
In model-driven interfaces, this command configures the system to send the operation in the cmd argument, and the path in the cmd-args argument, in TACACS+ authorization requests. This command does not apply to authorization requests in classic interfaces.
delete
1
21.10.R3
All
Allow privilege level mapping
When configured to true, this command automatically performs a single authorization request to the TACACS+ server for cmd* (all commands) immediately after login, and then uses the local profile associated (via the priv-lvl-map) with the priv-lvl returned by the TACACS+ server for all subsequent authorization (except enable-admin). After the initial authorization for cmd*, no further authorization requests are sent to the TACACS+ server (except enable-admin).
When configured to false, each command is sent to the TACACS+ server for authorization (this is true regardless of whether the tacplus use-default-template setting is enabled).
false
16.0.R1
All
Allows TACACS+ interactive authentication
false
16.0.R1
All
Enter the priv-lvl-map context
16.0.R1
All
Enter the priv-lvl list instance
16.0.R1
All
Privilege level for the mapping
0 to 15
This element is part of a list key.
16.0.R1
All
User profile for the mapping
configure system security aaa remote-servers tacplus priv-lvl-map priv-lvl number user-profile-name reference
This element is mandatory.
16.0.R1
All
Route preference to reach the AAA server
This command specifies the routing preference to reach the AAA server. If the configured option is to use both in-band and out-of-band routes, the out-of-band routes in the Base routing instance are used to reach the server before the in-band routes in the management routing instance.
both
both, inband, outband
21.5.R1
All
Enter the server list instance
5
16.0.R1
All
TACACS+ server ID
1 to 5
This element is part of a list key.
16.0.R1
All
IP address of the TACACS+ server
This element is mandatory.
16.0.R1
All
TCP port ID on which to contact TACACS+ server
0 | 1 to 65535
49
16.0.R1
All
Secret key to access the TACACS+ server
1 to 199
This element is mandatory.
16.0.R1
All
Time to wait for a response from the TACACS+ server
1 to 90
3
seconds
16.0.R1
All
Apply TACACS+ default user-template to TACACS+ user
true
16.0.R1
All
Enter the vprn-server context
22.2.R1
All
VPRN server used for AAA by in-band sessions
configure system security aaa remote-servers vprn-server inband reference
This command configures TACACS+ or RADIUS servers in a VPRN to be used for AAA by that VPRN and by sessions in the Base routing instance.
22.2.R1
All
VPRN server used for AAA by out-of-band sessions
configure system security aaa remote-servers vprn-server outband reference
This command configures TACACS+ and RADIUS servers in a VPRN to be used for AAA by that VPRN and by sessions on the console or out-of-band (OOB) Ethernet ports.
22.2.R1
All
VPRN server used for AAA in VPRNs without a AAA server
configure system security aaa remote-servers vprn-server vprn reference
This command configures TACACS+ or RADIUS servers in a VPRN to be used for AAA by that VPRN and by sessions in VPRNs without a AAA server configured.
22.2.R1
All
Enter the user-template list instance
configure system security aaa user-template keyword
16.0.R1
All
Default user template applied to the system user
configure system security aaa user-template keyword
ldap-default, radius-default, tacplus-default
This element is part of a list key.
16.0.R1
All
Enter the access context
16.0.R1
All
Allow console access (serial port or Telnet)
true
16.0.R1
All
Allow FTP access
false
16.0.R1
All
Allow gRPC access
false
16.0.R1
All
Allow access to lawful intercept
false
19.10.R1
All
Allow NETCONF session access
false
16.0.R1
All
Enter the console context
16.0.R1
All
File to execute for a successful user login via console
configure system security aaa user-template keyword console login-exec string
1 to 200
16.0.R1
All
User local home directory based on the template
configure system security aaa user-template keyword home-directory (sat-url | cflash-without-slot-url)
1 to 200
16.0.R1
All
User profile based on the template
1 to 32
16.0.R1
All
Prevent user navigation above the home directory
configure system security aaa user-template keyword restricted-to-home boolean
false
16.0.R1
All
Enter the cli-script context
16.0.R1
All
Enter the authorization context
16.0.R1
All
Enter the cron context
Commands in this context configure authorization for the cron job scheduler.
16.0.R1
All
User profile name for CLI command script authorization
configure system security cli-script authorization cron cli-user reference
configure system security user-params local-user user string
16.0.R1
All
Enter the event-handler context
Commands in this context configure authorization for the Event Handling System (EHS). EHS allows user-controlled programmatic exception handling by allowing a CLI script to be executed upon the detection of a log event.
16.0.R1
All
User profile name for CLI command script authorization
configure system security user-params local-user user string
16.0.R1
All
Enter the vsd context
Commands in this context configure authorization for the VSD server.
16.0.R1
All
User profile name for CLI command script authorization
configure system security cli-script authorization vsd cli-user reference
configure system security user-params local-user user string
16.0.R1
All
Enter the cpm-filter context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Action for packets that do not match any filter entries
configure system security cpm-filter default-action keyword
accept
drop, accept
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ip-filter context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the CPM filter
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the entry list instance
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Filter entry ID
1 to 131072
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the action context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Use default action for matching packets
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Drop matching packets
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets to the CPM hardware queue
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Text description
configure system security cpm-filter ip-filter entry number description string
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Log ID where matching packets are entered
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the match context
Commands in this context specify match criteria for the entry. When the match criteria have been satisfied, the action associated with the entry is executed.
If more than one match criterion is configured, all criteria must be met before the action associated with the entry is executed.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
DSCP used as the match criterion on the packet
be, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cs1, cp9, af11, cp11, af12, cp13, af13, cp15, cs2, cp17, af21, cp19, af22, cp21, af23, cp23, cs3, cp25, af31, cp27, af32, cp29, af33, cp31, cs4, cp33, af41, cp35, af42, cp37, af43, cp39, cs5, cp41, cp42, cp43, cp44, cp45, ef, cp47, nc1, cp49, cp50, cp51, cp52, cp53, cp54, cp55, nc2, cp57, cp58, cp59, cp60, cp61, cp62, cp63
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the dst-ip context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv4 address used as the match criterion
The following elements are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP4 address prefix list used as match criterion
configure system security cpm-filter ip-filter entry number match dst-ip ip-prefix-list reference
configure filter match-list ip-prefix-list string
The following elements are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv4 address mask used as the match criterion
The following elements are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the dst-port context
The following elements are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
0 to 65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
1 to 65535
65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure filter match-list port-list string
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Match criterion based on presence of fragmented packets
This command specifies the match criterion based on the existence or absence of fragmented IP packets.
Matching on fragmented IPv4 packets occurs when all packets have either the MF (more fragment) bit set or have the Fragment Offset field of the IP header set to a non-zero value. For IPv6, the existence of the IPv6 Fragmentation Extension Header results in a fragmented packet match.
Matching on non-fragmented IPv4 packets occurs when all packets have the MF bit set to zero and the Fragment Offset field is also set to zero. For IPv6, the absence of an IPv6 Fragmentation Extension Header results in a non-fragmented packet match.
false, true
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the icmp context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ICMP code to match
0 to 255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ICMP type to match
0 to 255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the ip-option context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Mask that is ANDed with ip-option value in the packet header
1 to 255
255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Specific IP option to match
0 to 255
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Match on packets containing multiple option fields
configure system security cpm-filter ip-filter entry number match multiple-option boolean
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Match on packets with option field present
configure system security cpm-filter ip-filter entry number match option-present boolean
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the port context
The following elements are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
0 to 65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
1 to 65535
65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure filter match-list port-list string
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP protocol as the match criterion
0 to 255
tcp-udp, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Router instance as the match criteria
configure system security cpm-filter ip-filter entry number match router-instance string
1 to 64
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the src-ip context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv4 address used as the match criterion
The following elements are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP4 address prefix list used as match criterion
configure system security cpm-filter ip-filter entry number match src-ip ip-prefix-list reference
configure filter match-list ip-prefix-list string
The following elements are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv4 address mask used as the match criterion
The following elements are part of a choice: (address and mask) or ip-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the src-port context
The following elements are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
0 to 65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
1 to 65535
65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure filter match-list port-list string
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the tcp-flags context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ACK bit in TCP header control bits as match criterion
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
SYN bit in TCP header control bits as match criterion
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the ipv6-filter context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the CPM filter
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the entry list instance
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Filter entry ID
1 to 131072
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the action context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Use default action for matching packets
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Drop matching packets
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets to the CPM hardware queue
configure system security cpm-filter ipv6-filter entry number action queue reference
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Text description
configure system security cpm-filter ipv6-filter entry number description string
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Log ID where matching packets are entered
configure system security cpm-filter ipv6-filter entry number log reference
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the match context
Commands in this context specify match criteria for the entry. When the match criteria have been satisfied, the action associated with the entry is executed.
If more than one match criterion is configured, all criteria must be met before the action associated with the entry is executed.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
DSCP used as the match criterion on the packet
configure system security cpm-filter ipv6-filter entry number match dscp keyword
be, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cs1, cp9, af11, cp11, af12, cp13, af13, cp15, cs2, cp17, af21, cp19, af22, cp21, af23, cp23, cs3, cp25, af31, cp27, af32, cp29, af33, cp31, cs4, cp33, af41, cp35, af42, cp37, af43, cp39, cs5, cp41, cp42, cp43, cp44, cp45, ef, cp47, nc1, cp49, cp50, cp51, cp52, cp53, cp54, cp55, nc2, cp57, cp58, cp59, cp60, cp61, cp62, cp63
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the dst-ip context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv6 address used as the match criterion
configure system security cpm-filter ipv6-filter entry number match dst-ip address (ipv6-address | ipv6-prefix-with-host-bits)
The following elements are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv6 address prefix list used as match criterion
configure system security cpm-filter ipv6-filter entry number match dst-ip ipv6-prefix-list reference
The following elements are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv6 address mask used as the match criterion
configure system security cpm-filter ipv6-filter entry number match dst-ip mask string
The following elements are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the dst-port context
The following elements are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
configure system security cpm-filter ipv6-filter entry number match dst-port eq number
0 to 65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
configure system security cpm-filter ipv6-filter entry number match dst-port mask number
1 to 65535
65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure system security cpm-filter ipv6-filter entry number match dst-port port-list reference
configure filter match-list port-list string
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match dst-port range end number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match dst-port range start number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the extension-header context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Match on existence of Hop-By-Hop Options Header
configure system security cpm-filter ipv6-filter entry number match extension-header hop-by-hop boolean
When configured to true, a match occurs when the Hop-by-Hop Options Extension Header is present.
When configured to false, a match occurs when the Hop-by-Hop Options Extension Header is not present.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Flow label in the IPv6 header as the match criterion
configure system security cpm-filter ipv6-filter entry number match flow-label number
0 to 1048575
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Match criterion based on presence of fragmented packets
configure system security cpm-filter ipv6-filter entry number match fragment keyword
This command specifies the match criterion based on the existence or absence of fragmented IP packets.
Matching on fragmented IPv4 packets occurs when all packets have either the MF (more fragment) bit set or have the Fragment Offset field of the IP header set to a non-zero value. For IPv6, the existence of the IPv6 Fragmentation Extension Header results in a fragmented packet match.
Matching on non-fragmented IPv4 packets occurs when all packets have the MF bit set to zero and the Fragment Offset field is also set to zero. For IPv6, the absence of an IPv6 Fragmentation Extension Header results in a non-fragmented packet match.
false, true
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the icmp context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ICMP code as the match criterion
configure system security cpm-filter ipv6-filter entry number match icmp code number
0 to 255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ICMP type as the match criterion
configure system security cpm-filter ipv6-filter entry number match icmp type number
0 to 255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IP protocol to match
configure system security cpm-filter ipv6-filter entry number match next-header (number | keyword)
0 to 255
tcp-udp, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the port context
The following elements are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
configure system security cpm-filter ipv6-filter entry number match port eq number
0 to 65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
configure system security cpm-filter ipv6-filter entry number match port mask number
1 to 65535
65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure system security cpm-filter ipv6-filter entry number match port port-list reference
configure filter match-list port-list string
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match port range end number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match port range start number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Router instance as the match criteria
configure system security cpm-filter ipv6-filter entry number match router-instance string
1 to 64
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the src-ip context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv6 address used as the match criterion
configure system security cpm-filter ipv6-filter entry number match src-ip address (ipv6-address | ipv6-prefix-with-host-bits)
The following elements are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv6 address prefix list used as match criterion
configure system security cpm-filter ipv6-filter entry number match src-ip ipv6-prefix-list reference
The following elements are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
IPv6 address mask used as the match criterion
configure system security cpm-filter ipv6-filter entry number match src-ip mask string
The following elements are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the src-port context
The following elements are part of a choice: port or (dst-port and src-port).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port number as the match criterion
configure system security cpm-filter ipv6-filter entry number match src-port eq number
0 to 65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port mask as the match criterion
configure system security cpm-filter ipv6-filter entry number match src-port mask number
1 to 65535
65535
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Port list as the match criterion
configure system security cpm-filter ipv6-filter entry number match src-port port-list reference
configure filter match-list port-list string
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following elements are part of a choice: (eq and mask), port-list, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match src-port range end number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the port number to match
configure system security cpm-filter ipv6-filter entry number match src-port range start number
0 to 65535
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the tcp-flags context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
ACK bit in TCP header control bits as match criterion
configure system security cpm-filter ipv6-filter entry number match tcp-flags ack boolean
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
SYN bit in TCP header control bits as match criterion
configure system security cpm-filter ipv6-filter entry number match tcp-flags syn boolean
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the mac-filter context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Administrative state of the CPM filter
disable
enable, disable
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the entry list instance
configure system security cpm-filter mac-filter entry number
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Filter entry ID
configure system security cpm-filter mac-filter entry number
1 to 131072
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the action context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Use default action for matching packets
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Drop matching packets
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Forward matching packets to the CPM hardware queue
configure system security cpm-filter mac-filter entry number action queue reference
The following elements are part of a choice: accept, default, drop, or queue.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Text description
configure system security cpm-filter mac-filter entry number description string
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Log ID where matching packets are entered
configure system security cpm-filter mac-filter entry number log reference
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the match context
Commands in this context specify match criteria for the entry. When the match criteria have been satisfied, the action associated with the entry is executed.
If more than one match criterion is configured, all criteria must be met before the action associated with the entry is executed.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the cfm-opcode context
Commands in this context specify match criteria based on the CFM opcode.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Equal to comparison operator for the CFM opcode
configure system security cpm-filter mac-filter entry number match cfm-opcode eq number
0 to 255
The following elements are part of a choice: eq, gt, lt, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Greater than comparison operator for the CFM opcode
configure system security cpm-filter mac-filter entry number match cfm-opcode gt number
0 to 254
The following elements are part of a choice: eq, gt, lt, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Less than comparison operator for the CFM opcode
configure system security cpm-filter mac-filter entry number match cfm-opcode lt number
1 to 255
The following elements are part of a choice: eq, gt, lt, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the range context
The following elements are part of a choice: eq, gt, lt, or range.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Upper bound of the Opcode range to match
configure system security cpm-filter mac-filter entry number match cfm-opcode range end number
1 to 255
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Lower bound of the OpCode range to match
configure system security cpm-filter mac-filter entry number match cfm-opcode range start number
0 to 254
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the dst-mac context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
MAC address used as the match criterion
configure system security cpm-filter mac-filter entry number match dst-mac address string
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
MAC address mask as the match criterion
configure system security cpm-filter mac-filter entry number match dst-mac mask string
ff:ff:ff:ff:ff:ff
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Ethernet type as the match criterion
configure system security cpm-filter mac-filter entry number match etype string
This command specifies an Ethernet type II Ethertype value to be used as a MAC filter match criterion.
The Ethernet type field is used by the Ethernet version-II frames and does not apply to IEEE 802.3 Ethernet frames.
5 to 6
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
MAC frame type as the match criterion
configure system security cpm-filter mac-filter entry number match frame-type keyword
802dot2-llc, ethernet-ii
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the llc-dsap context
Commands in this context specify match criteria based on the Destination Service Access Point (DSAP).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
8-bit DSAP as the match criterion
configure system security cpm-filter mac-filter entry number match llc-dsap dsap number
0 to 255
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Mask for DSAP value as the match criterion
configure system security cpm-filter mac-filter entry number match llc-dsap mask number
1 to 255
255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the llc-ssap context
Commands in this context specify match criteria based on the Source Service Access Point (SSAP).
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Mask for SSAP value as the match criterion
configure system security cpm-filter mac-filter entry number match llc-ssap mask number
1 to 255
255
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
8-bit SSAP as the match criterion
configure system security cpm-filter mac-filter entry number match llc-ssap ssap number
0 to 255
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Service ID used as the match condition
configure system security cpm-filter mac-filter entry number match service reference
16.0.R4
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enable the src-mac context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
MAC address used as the match criterion
configure system security cpm-filter mac-filter entry number match src-mac address string
This element is mandatory.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
MAC address mask as the match criterion
configure system security cpm-filter mac-filter entry number match src-mac mask string
ff:ff:ff:ff:ff:ff
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the cpm-queue context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the queue list instance
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
CPM queue ID
33 to 2000
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Buffer size that can be drawn from queue buffer pool
This command specifies the amount of buffer that can be drawn from the reserved buffer portion of the buffer pool of the queue.
0 to 131072
kilobps
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Maximum queue depth to which the queue can grow
0 to 131072
kilobps
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the rate context
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Amount of bandwidth committed to the queue
0 to 100000000
max
kilobps
max
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Peak Information Rate for the queue
1 to 100000000
max
kilobps
max
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the cpu-protection context
Commands in this context configure CPU protection policies.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the ip-src-monitoring context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the included-protocols context
Commands in this context specify the protocols included in IP source monitoring. The protocol packets will be subject to the per-source-rate of CPU protection policies.
This configuration applies system wide and applies to CPU protection globally.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Include extracted DHCP packets for IP source monitoring
true
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Include extracted GTP packets for IP source monitoring
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Include extracted ICMP packets for IP source monitoring
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Include extracted IGMP packets for IP source monitoring
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Packet arrival rate limit for link level protocols
configure system security cpu-protection link-specific-rate (number | keyword)
This command configures a link-specific rate for CPU protection. The limit is applied to all ports within the system. The CPU receives no more than the configured packet rate for all link level protocols, such as LACP, from any one port.
The measurement is cleared each second and is based on the ingress port.
1 to 65535
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the policy list instance
configure system security cpu-protection policy number
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Policy ID
configure system security cpu-protection policy number
1 to 255
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Generate an event when the rate is exceeded
When configured to true, an event is generated when the rate is exceeded. The event includes information about the offending source. Only one event is generated per monitor period.
When configured to false, notifications are disabled.
true
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Text description
configure system security cpu-protection policy number description string
1 to 80
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the eth-cfm context
Commands in this context configure CPU policy entries that determine match criteria and overall arrival rate of the Ethernet Connectivity and Fault Management (ETH-CFM) packets at the CPU.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the entry list instance
10
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Entry ID
1 to 100
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Add a list entry for level
Commands in this context specify the range of domain levels for the match criterion.
1
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Lower bound of the level range
0 to 7
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Upper bound of the level range
0 to 7
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Add a list entry for opcode
Commands in this context specify the range of operational codes (that identify the application) for the match criterion.
1
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Lower bound of the OpCode range
0 to 255
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Upper bound of the OpCode range
0 to 255
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Packet arrival rate limit
0 to 65534
max
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the out-profile-rate context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Generate a log event when the packet rate is exceeded
configure system security cpu-protection policy number out-profile-rate log-events boolean
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Packet arrival rate limit
configure system security cpu-protection policy number out-profile-rate pir (number | keyword)
1 to 65534
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Overall packet arrival rate limit to apply for all sources of packets
configure system security cpu-protection policy number overall-rate (number | keyword)
1 to 65534
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the per-source-parameters context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the ip-src-monitoring context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Apply per-source rate limiting to DHCP packets containing Client IP address zero
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Per-source packet arrival rate limit
configure system security cpu-protection policy number per-source-rate (number | keyword)
This command configures the per-source packet arrival rate limit.
A source is defined as a unique combination of SAP and MAC source address or SAP and source IP address. The CPU receives no more than the specified packet rate from each source. The measurement is cleared every second.
This configuration is applicable only if the policy is assigned to an interface (such as SAPs, subscriber interfaces, and spoke SDPs), and MAC monitoring or IP source monitoring is specified in the CPU protection configuration of the interface.
1 to 65534
max
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the port-overall-rate context
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Mark packets that exceed the rate as low-priority
When configured to true, packets that exceed the per-port packet arrival rate limit are marked as low priority for preferential discard later (if there is congestion in the control plane) rather than discarded immediately.
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Per-port packet arrival rate limit
configure system security cpu-protection port-overall-rate pir (number | keyword)
1 to 65535
packets per second
max
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enable the protocol-protection context
When enabled, the network processor on the CPM discards all packets received for protocols that are not configured on the interface. This action helps to mitigate DoS attacks by filtering invalid control traffic before it ingresses the CPU. For example, if IS-IS is not configured on an interface, protocol protection discards any IS-IS packets received on the interface.
Commands in this context further define the action when the context is enabled.
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Allow OSPF sham link traffic
When configured to true, tunneled OSPF packets received over the backbone network must be explicitly allowed when OSPF sham links form an adjacency over the MPLS-VPRN backbone network.
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Block extraction and processing of PIM packets
When configured to true, PIM packets arriving at the SR OS node inside a tunnel (for example, MPLS or GRE) on a network interface are blocked and not processed. PIM in an mVPN on the egress DR will not switch traffic from the (*,G) to the (S,G) tree.
false
16.0.R1
7450 ESS, 7750 SR-7/12/12e, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the dist-cpu-protection context
Commands in this context configure distributed CPU protection (DCP) attributes.
16.0.R1
All
Enter the policy list instance
Commands in this context configure the attributes of DCP policies. These policies can be applied to objects such as SAPs, network interfaces or ports
18
16.0.R1
All
Policy name
1 to 32
This element is part of a list key.
16.0.R1
All
Text description
configure system security dist-cpu-protection policy string description string
1 to 80
16.0.R1
All
Enter the local-monitoring-policer list instance
configure system security dist-cpu-protection policy string local-monitoring-policer string
1
16.0.R1
All
Local monitoring policer name
configure system security dist-cpu-protection policy string local-monitoring-policer string
1 to 32
This element is part of a list key.
16.0.R1
All
Text description
configure system security dist-cpu-protection policy string local-monitoring-policer string description string
1 to 80
16.0.R1
All
Action taken when policer rates are exceeded
configure system security dist-cpu-protection policy string local-monitoring-policer string exceed-action keyword
This command specifies the action taken on the extracted control packets when the configured policer rates are exceeded.
none
discard, low-priority, none
16.0.R1
All
Control of log events creation for status and activity
configure system security dist-cpu-protection policy string local-monitoring-policer string log-events keyword
This command controls the creation of log events related to the status and activity of the local monitoring policer.
true
false, true, verbose
16.0.R1
All
Enter the rate context
configure system security dist-cpu-protection policy string local-monitoring-policer string rate
Commands in this context specify the rate and burst tolerance for the policer.
The actual hardware may not be able to perfectly rate limit to the exact configured parameters. In this case, the configured parameters will be adapted to the closest supported rate.
16.0.R1
All
Enter the kbps context
configure system security dist-cpu-protection policy string local-monitoring-policer string rate kbps
The following elements are part of a choice: kbps or packets.
16.0.R1
All
Rate limit
configure system security dist-cpu-protection policy string local-monitoring-policer string rate kbps limit (keyword | number)
1 to 20000000
max
kilobps
max
16.0.R1
All
Tolerance for the rate
configure system security dist-cpu-protection policy string local-monitoring-policer string rate kbps mbs number
0 to 4194304
bytes
16.0.R1
All
Enter the packets context
configure system security dist-cpu-protection policy string local-monitoring-policer string rate packets
This element is the default part of a choice.
The following elements are part of a choice: kbps or packets.
16.0.R1
All
Additional packets allowed in an initial burst
configure system security dist-cpu-protection policy string local-monitoring-policer string rate packets initial-delay number
This command specifies the number of packets allowed in an initial burst (or a burst after the policer bucket has drained to zero) in addition to the packets per interval limit. The typical setting would be a value equal to the number of received packets in several full handshakes or negotiations of the protocol.
0 to 255
0
packets
16.0.R1
All
Packets per interval limit
configure system security dist-cpu-protection policy string local-monitoring-policer string rate packets limit (keyword | number)
0 to 8000
max
packets per interval
max
16.0.R1
All
Measurement interval for packets rate
configure system security dist-cpu-protection policy string local-monitoring-policer string rate packets within number
1 to 32767
1
seconds
16.0.R1
All
Enter the protocol list instance
16.0.R1
All
Protocol name
arp, dhcp, http-redirect, icmp, igmp, mld, ndis, pppoe-pppoa, all-unspecified, mpls-ttl, bfd-cpm, bgp, eth-cfm, isis, ldp, ospf, pim, rsvp, icmp-ping-check, lacp
This element is part of a list key.
16.0.R1
All
Enter the dynamic-parameters context
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters
16.0.R1
All
Minimum time the dynamic policer remains allocated
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters detection-time number
1 to 128000
30
seconds
16.0.R1
All
Enter the exceed-action context
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters exceed-action
Commands in this context specify the settings for the scenario when the configured policer rates are exceeded.
16.0.R1
All
Action taken on control packets when rates are exceeded
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters exceed-action action keyword
none
discard, low-priority, none
16.0.R1
All
Hold down behavior
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters exceed-action hold-down (keyword | number)
This command specifies the behavior when the system detects that an enforcement policer has marked or discarded one or more packets and there is no action specified for the scenario when the rates are exceeded.
The hold time condition is cleared after the specified time has expired. The detection time (the minimum time that the policer remains allocated) begins after the hold down is complete. The hold down behavior is not applicable to a local monitoring policer.
An indefinite hold down behavior must be cleared using the tools perform security dist-cpu-protection release-hold-down command.
1 to 10080
none
seconds
indefinite, none
16.0.R1
All
Control of log events creation for status and activity
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters log-events keyword
This command controls the creation of log events related to the status and activity of the local monitoring policer.
true
false, true, verbose
16.0.R1
All
Enter the rate context
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate
Commands in this context specify the rate and burst tolerance for the policer.
The actual hardware may not be able to perfectly rate limit to the exact configured parameters. In this case, the configured parameters will be adapted to the closest supported rate.
16.0.R1
All
Enter the kbps context
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate kbps
The following elements are part of a choice: kbps or packets.
16.0.R1
All
Rate limit
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate kbps limit (keyword | number)
1 to 20000000
max
kilobps
max
16.0.R1
All
Tolerance for the rate
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate kbps mbs number
0 to 4194304
bytes
16.0.R1
All
Enter the packets context
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate packets
This element is the default part of a choice.
The following elements are part of a choice: kbps or packets.
16.0.R1
All
Additional packets allowed in an initial burst
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate packets initial-delay number
This command specifies the number of packets allowed in an initial burst (or a burst after the policer bucket has drained to zero) in addition to the packets per interval limit. The typical setting would be a value equal to the number of received packets in several full handshakes or negotiations of the protocol.
0 to 255
0
packets
16.0.R1
All
Packets per interval limit
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate packets limit (keyword | number)
0 to 8000
max
packets per interval
max
16.0.R1
All
Measurement interval for packets rate
configure system security dist-cpu-protection policy string protocol keyword dynamic-parameters rate packets within number
1 to 32767
1
seconds
16.0.R1
All
Enter the enforcement context
configure system security dist-cpu-protection policy string protocol keyword enforcement
16.0.R1
All
Enter the dynamic context
configure system security dist-cpu-protection policy string protocol keyword enforcement dynamic
The following elements are part of a choice: dynamic, dynamic-local-mon-bypass, or static.
16.0.R1
All
Dynamic enforcement policer for the protocol
configure system security dist-cpu-protection policy string protocol keyword enforcement dynamic mon-policer-name reference
This command specifies the dynamic enforcement policer that is instantiated when the associated local monitoring policer is determined to be in a nonconforming state (at the end of a minimum monitoring time of 60 seconds to reduce thrashing).
configure system security dist-cpu-protection policy string local-monitoring-policer string
16.0.R1
All
Do not include packets in the local monitoring function
When configured, packets from the protocol are not included in the local monitoring function and the dynamic enforcement policer is not instantiated for the protocol.
This element is the default part of a choice.
The following elements are part of a choice: dynamic, dynamic-local-mon-bypass, or static.
16.0.R1
All
Enter the static context
configure system security dist-cpu-protection policy string protocol keyword enforcement static
The following elements are part of a choice: dynamic, dynamic-local-mon-bypass, or static.
16.0.R1
All
Static policer enforced by the protocol
configure system security dist-cpu-protection policy string protocol keyword enforcement static policer-name reference
configure system security dist-cpu-protection policy string static-policer string
16.0.R1
All
Enter the static-policer list instance
configure system security dist-cpu-protection policy string static-policer string
Commands in this context configure a static enforcement policer that can be referenced by one or more protocols in the policy. When a policer is referenced by a protocol, the policer is instantiated for each object (for example, a SAP or network interface) that is created and references the policer.
If no policer resources are available on the associated card or FP, the object is not created.
18
16.0.R1
All
Static policer name
configure system security dist-cpu-protection policy string static-policer string
1 to 32
This element is part of a list key.
16.0.R1
All
Text description
configure system security dist-cpu-protection policy string static-policer string description string
1 to 80
16.0.R1
All
Minimum time the dynamic policer remains allocated
configure system security dist-cpu-protection policy string static-policer string detection-time number
1 to 128000
30
seconds
16.0.R1
All
Enter the exceed-action context
configure system security dist-cpu-protection policy string static-policer string exceed-action
Commands in this context specify the settings for the scenario when the configured policer rates are exceeded.
16.0.R1
All
Action taken on control packets when rates are exceeded
configure system security dist-cpu-protection policy string static-policer string exceed-action action keyword
none
discard, low-priority, none
16.0.R1
All
Hold down behavior
configure system security dist-cpu-protection policy string static-policer string exceed-action hold-down (keyword | number)
This command specifies the behavior when the system detects that an enforcement policer has marked or discarded one or more packets and there is no action specified for the scenario when the rates are exceeded.
The hold time condition is cleared after the specified time has expired. The detection time (the minimum time that the policer remains allocated) begins after the hold down is complete. The hold down behavior is not applicable to a local monitoring policer.
An indefinite hold down behavior must be cleared using the tools perform security dist-cpu-protection release-hold-down command.
1 to 10080
none
seconds
indefinite, none
16.0.R1
All
Control of log events creation for status and activity
configure system security dist-cpu-protection policy string static-policer string log-events keyword
This command controls the creation of log events related to the status and activity of the local monitoring policer.
true
false, true, verbose
16.0.R1
All
Enter the rate context
configure system security dist-cpu-protection policy string static-policer string rate
Commands in this context specify the rate and burst tolerance for the policer.
The actual hardware may not be able to perfectly rate limit to the exact configured parameters. In this case, the configured parameters will be adapted to the closest supported rate.
16.0.R1
All
Enter the kbps context
configure system security dist-cpu-protection policy string static-policer string rate kbps
The following elements are part of a choice: kbps or packets.
16.0.R1
All
Rate limit
configure system security dist-cpu-protection policy string static-policer string rate kbps limit (keyword | number)
1 to 20000000
max
kilobps
max
16.0.R1
All
Tolerance for the rate
configure system security dist-cpu-protection policy string static-policer string rate kbps mbs number
0 to 4194304
bytes
16.0.R1
All
Enter the packets context
configure system security dist-cpu-protection policy string static-policer string rate packets
This element is the default part of a choice.
The following elements are part of a choice: kbps or packets.
16.0.R1
All
Additional packets allowed in an initial burst
configure system security dist-cpu-protection policy string static-policer string rate packets initial-delay number
This command specifies the number of packets allowed in an initial burst (or a burst after the policer bucket has drained to zero) in addition to the packets per interval limit. The typical setting would be a value equal to the number of received packets in several full handshakes or negotiations of the protocol.
0 to 255
0
packets
16.0.R1
All
Packets per interval limit
configure system security dist-cpu-protection policy string static-policer string rate packets limit (keyword | number)
0 to 8000
max
packets per interval
max
16.0.R1
All
Measurement interval for packets rate
configure system security dist-cpu-protection policy string static-policer string rate packets within number
1 to 32767
1
seconds
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Policy type
access-network, port
21.5.R1
All
Enter the dot1x context
16.0.R1
All
Administrative state of 802.1x network access control
configure system security dot1x admin-state keyword
disable
enable, disable
16.0.R1
All
Enter the radius-policy list instance
configure system security dot1x radius-policy string
16.0.R1
All
RADIUS server policy name for 802.1X authentication
configure system security dot1x radius-policy string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the server for authentication
configure system security dot1x radius-policy string admin-state keyword
disable
enable, disable
16.0.R1
All
Number of RADIUS requests toward the same RADIUS server
1 to 10
3
16.0.R1
All
Enter the server list instance
5
16.0.R1
All
RADIUS server index
1 to 5
This element is part of a list key.
16.0.R1
All
UDP port number on which to contact the RADIUS server for accounting requests
configure system security dot1x radius-policy string server number accounting-port number
1 to 65535
1813
16.0.R1
All
IP address of the RADIUS dot1x server
This element is mandatory.
16.0.R1
All
UDP port number on which to contact the RADIUS server for authentication
configure system security dot1x radius-policy string server number authentication-port number
1 to 65535
1812
16.0.R1
All
Secret key associated with the RADIUS server
1 to 54
This element is mandatory.
16.0.R1
All
RADIUS server type
authorization
authorization, accounting, combined
16.0.R1
All
Source address of the RADIUS packet
configure system security dot1x radius-policy string source-address string
16.0.R1
All
Time assigned between the request retries toward the same RADIUS server
1 to 90
5
seconds
16.0.R1
All
Enable FTP servers running on the system
configure system security ftp-server boolean
false
16.0.R1
All
Enter the hash-control context
16.0.R4
All
Enter the management-interface context
Commands in this context configure encryption parameters for different management interfaces.
16.0.R4
All
Enter the classic-cli context
16.0.R4
All
Input encryption algorithm for configuration secrets
This command specifies how encrypted configuration secrets are interpreted and which encryption types are accepted when secrets are input into the system or read from a configuration file (for example, at system bootup time).
all-hash
all-hash, hash, hash2, custom
16.0.R4
All
Output encryption algorithm for configuration secrets
This command specifies the format of the output for encrypted configuration secrets (for example, in the saved configuration file, or in the output of the info or show commands).
hash2
cleartext, hash, hash2, custom
16.0.R4
All
Enter the grpc context
16.0.R4
All
Encryption algorithm for configuration secrets
This command specifies the format of the input and output for encrypted configuration secrets.
hash2
cleartext, hash, hash2, custom
16.0.R4
All
Enter the md-cli context
16.0.R4
All
Encryption algorithm for configuration secrets
This command specifies the format of the input and output for encrypted configuration secrets.
hash2
cleartext, hash, hash2, custom
16.0.R4
All
Enter the netconf context
16.0.R4
All
Encryption algorithm for configuration secrets
This command specifies the format of the input and output for encrypted configuration secrets.
hash2
cleartext, hash, hash2, custom
16.0.R4
All
Enter the keychains context
16.0.R1
All
Enter the keychain list instance
256
16.0.R1
All
Keychain name
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the keychain
enable
enable, disable
16.0.R1
All
Enter the bidirectional context
16.0.R1
All
Enter the entry list instance
16.0.R1
All
Keychain identifier
0 to 63 | 255
This element is part of a list key.
16.0.R1
All
Administrative state of the keychain entry
configure system security keychains keychain string bidirectional entry number admin-state keyword
enable
enable, disable
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Encryption algorithm used by the keychain key
aes-128-cmac-96, hmac-sha-1-96, password, message-digest, hmac-md5, hmac-sha-1, hmac-sha-256, aes-128-gcm-16
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Authentication key used by the encryption algorithm
configure system security keychains keychain string bidirectional entry number authentication-key string
1 to 54
16.0.R1
All
Calendar date and time when the system starts using the key
configure system security keychains keychain string bidirectional entry number begin-time string
16.0.R1
All
Keychain key option
none
none, basic, isis-enhanced
16.0.R1
All
Time within which an eligible receive key should overlap with the active send key
0 to 4294967294
300
seconds
infinite
16.0.R1
All
Text description
1 to 80
16.0.R1
All
Enter the receive context
16.0.R1
All
Enter the entry list instance
16.0.R1
All
Keychain identifier
0 to 63 | 255
This element is part of a list key.
16.0.R1
All
Administrative state of the keychain entry
enable
enable, disable
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Encryption algorithm used by the keychain key
aes-128-cmac-96, hmac-sha-1-96, password, message-digest, hmac-md5, hmac-sha-1, hmac-sha-256, aes-128-gcm-16
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Authentication key used by the encryption algorithm
1 to 54
16.0.R1
All
Calendar date and time when the system starts using the key
16.0.R1
All
Calendar date and time when the system should stop using the key
16.0.R1
All
Time within which an eligible receive key should overlap with the active send key
0 to 4294967294
300
seconds
infinite
16.0.R1
All
Enter the send context
16.0.R1
All
Enter the entry list instance
16.0.R1
All
Keychain identifier
0 to 63 | 255
This element is part of a list key.
16.0.R1
All
Administrative state of the keychain entry
enable
enable, disable
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Encryption algorithm used by the keychain key
aes-128-cmac-96, hmac-sha-1-96, password, message-digest, hmac-md5, hmac-sha-1, hmac-sha-256, aes-128-gcm-16
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Authentication key used by the encryption algorithm
1 to 54
16.0.R1
All
Calendar date and time when the system starts using the key
16.0.R1
All
Enter the tcp-option-number context
16.0.R1
All
TCP option value expected in the TCP header of received packets
option-254
option-253, option-254, both, tcp-ao
16.0.R1
All
TCP option value assigned in the TCP header of transmitted packets
option-254
option-253, option-254, tcp-ao
16.0.R1
All
Enter the management context
Commands in this context control which management protocols can be used to access the SR OS router via the 'Base' and 'management' router instances.
16.0.R5
All
Allow access to the FTP server
configure system security management allow-ftp boolean
When configured to true, this command allows FTP access to the SR OS router via the 'Base' and 'management' router instances.
When configured to false, this command disallows access to the SR OS FTP server.
true
16.0.R6
All
Allow access to the gRPC server
configure system security management allow-grpc boolean
When configured to true, the system allows access to the gRPC server via the 'Base' and 'management' router instances.
true
19.5.R1
All
Allow access to the NETCONF server
configure system security management allow-netconf boolean
When configured to true, the system allows NETCONF server access to the SR OS router via the 'Base' and 'management' router instances.
true
19.5.R1
All
Allow access to the SSH server
configure system security management allow-ssh boolean
When configured to true, this command allows SSH server access to the SR OS router via the 'Base' and 'management' router instances.
When configured to false, this command disallows SSH server access.
true
16.0.R5
All
Allow access to the IPv4 Telnet server
configure system security management allow-telnet boolean
When configured to true, this command allows IPv4 Telnet server access to the SR OS router via the 'Base' and 'management' router instances.
When configured to false, this command disallows access to the IPv4 Telnet server.
true
16.0.R5
All
Allow access to the Telnet IPv6 server
configure system security management allow-telnet6 boolean
When configured to true, this command allows IPv6 Telnet server access to the SR OS router via the 'Base' and 'management' router instances.
When configured to false, this command disallows access to the IPv6 Telnet server.
true
16.0.R5
All
Enter the management-access-filter context
Commands in this context configure the attributes for management access filters.
Management access filters control all traffic in and out of the CPM. The filters can be used to restrict management of the router by other nodes outside of specific networks (or sub-networks) or through designated ports.
Management filters are enforced by the system software.
16.0.R4
All
Enter the ip-filter context
16.0.R4
All
Administrative state of management-access filters
enable
enable, disable
16.0.R4
All
Default action for the management access filter
This command specifies the default action for management access in the absence of a specific management access filter match.
ignore-match
ignore-match, accept, drop, reject
16.0.R4
All
Entry ID to identify the match criteria and the action
This command specifies the entry ID to identify the match criteria and the corresponding action. It is recommended that entries are numbered in staggered increments. This allows users to insert a new entry in an existing policy without having to renumber the existing entries.
1 to 9999
This element is part of a list key.
16.0.R4
All
Action associated with the management access filter
This command specifies the action associated with the management access filter match criteria entry.
If the packet does not meet any of the match criteria, the configured default action is applied.
ignore-match
ignore-match, accept, drop, reject
16.0.R4
All
Text description
configure system security management-access-filter ip-filter entry number description string
1 to 80
16.0.R4
All
Enable match logging
configure system security management-access-filter ip-filter entry number log-events boolean
When configured to true, this command enables match logging. When enabled, matches on the entry cause the Security event mafEntryMatch to be raised.
When configured to false, match logging is disabled.
false
16.0.R4
All
Enter the match context
Commands in this context specify match criteria for the entry.
16.0.R4
All
Enable the dst-port context
Commands in this context specify match criteria based on the destination port.
16.0.R4
All
IP address mask as the match criterion
1 to 65535
65535
16.0.R4
All
TCP or UDP port number as the match criterion
1 to 65535
This element is mandatory.
16.0.R4
All
Enter the mgmt-port context
Commands in this context specify match criteria based on the Ethernet port.
16.0.R4
All
Match any traffic received on any Ethernet port
The following elements are part of a choice: cpm, (lag and lag-id), or port-id.
16.0.R4
All
LAG ID as the match criterion
1 to 27
The following elements are part of a choice: cpm, (lag and lag-id), or port-id.
21.2.R1
All
Port ID as the match criterion
The following elements are part of a choice: cpm, (lag and lag-id), or port-id.
16.0.R4
All
IP protocol as the match criterion
0 to 255
tcp-udp, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
16.0.R4
All
Router instance as the match criterion
configure system security management-access-filter ip-filter entry number match router-instance string
16.0.R4
All
Enter the src-ip context
Commands in this context specify match criteria based on the source IP address.
16.0.R4
All
IP address or IP prefix as the match criterion
The following elements are part of a choice: (address and mask) or ip-prefix-list.
16.0.R4
All
IP prefix list as the match criterion
configure system security management-access-filter ip-filter entry number match src-ip ip-prefix-list reference
configure filter match-list ip-prefix-list string
The following elements are part of a choice: (address and mask) or ip-prefix-list.
20.7.R1
All
IP address mask as the match criterion
The following elements are part of a choice: (address and mask) or ip-prefix-list.
16.0.R4
All
Enable the src-port context
21.7.R1
All
IP address mask as the match criterion
1 to 65535
65535
21.7.R1
All
TCP or UDP port number as the match criterion
1 to 65535
This element is mandatory.
21.7.R1
All
Enter the ipv6-filter context
16.0.R4
All
Administrative state of management-access filters
enable
enable, disable
16.0.R4
All
Default action for the management access filter
This command specifies the default action for management access in the absence of a specific management access filter match.
ignore-match
ignore-match, accept, drop, reject
16.0.R4
All
Enter the entry list instance
16.0.R4
All
Entry ID to identify the match criteria and the action
This command specifies the entry ID to identify the match criteria and the corresponding action. It is recommended that entries are numbered in staggered increments. This allows users to insert a new entry in an existing policy without having to renumber the existing entries.
1 to 9999
This element is part of a list key.
16.0.R4
All
Action associated with the management access filter
configure system security management-access-filter ipv6-filter entry number action keyword
This command specifies the action associated with the management access filter match criteria entry.
If the packet does not meet any of the match criteria, the configured default action is applied.
ignore-match
ignore-match, accept, drop, reject
16.0.R4
All
Text description
configure system security management-access-filter ipv6-filter entry number description string
1 to 80
16.0.R4
All
Enable match logging
configure system security management-access-filter ipv6-filter entry number log-events boolean
When configured to true, this command enables match logging. When enabled, matches on the entry cause the Security event mafEntryMatch to be raised.
When configured to false, match logging is disabled.
false
16.0.R4
All
Enter the match context
Commands in this context specify match criteria for the entry.
16.0.R4
All
Enable the dst-port context
Commands in this context specify match criteria based on the destination port.
16.0.R4
All
IP address mask as the match criterion
configure system security management-access-filter ipv6-filter entry number match dst-port mask number
1 to 65535
65535
16.0.R4
All
TCP or UDP port number as the match criterion
configure system security management-access-filter ipv6-filter entry number match dst-port port number
1 to 65535
This element is mandatory.
16.0.R4
All
Flow identifier used to discriminate traffic flows
configure system security management-access-filter ipv6-filter entry number match flow-label number
0 to 1048575
16.0.R4
All
Enter the mgmt-port context
Commands in this context specify match criteria based on the Ethernet port.
16.0.R4
All
Match any traffic received on any Ethernet port
The following elements are part of a choice: cpm, (lag and lag-id), or port-id.
16.0.R4
All
LAG ID as the match criterion
configure system security management-access-filter ipv6-filter entry number match mgmt-port lag string
1 to 27
The following elements are part of a choice: cpm, (lag and lag-id), or port-id.
21.2.R1
All
Port ID as the match criterion
configure system security management-access-filter ipv6-filter entry number match mgmt-port port-id string
The following elements are part of a choice: cpm, (lag and lag-id), or port-id.
16.0.R4
All
IP protocol to match
configure system security management-access-filter ipv6-filter entry number match next-header (number | keyword)
0 to 255
tcp-udp, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
16.0.R4
All
Router instance as the match criterion
configure system security management-access-filter ipv6-filter entry number match router-instance string
16.0.R4
All
Enter the src-ip context
Commands in this context specify match criteria based on the source port.
16.0.R4
All
IPv6 address or IPv6 prefix to match
configure system security management-access-filter ipv6-filter entry number match src-ip address (ipv6-prefix | ipv6-address)
The following elements are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R4
All
IPv6 prefix list as the match criterion
configure system security management-access-filter ipv6-filter entry number match src-ip ipv6-prefix-list reference
The following elements are part of a choice: (address and mask) or ipv6-prefix-list.
20.7.R1
All
IP address mask as the match criterion
configure system security management-access-filter ipv6-filter entry number match src-ip mask string
The following elements are part of a choice: (address and mask) or ipv6-prefix-list.
16.0.R4
All
Enable the src-port context
Commands in this context specify match criteria based on the source port.
21.7.R1
All
IP address mask as the match criterion
configure system security management-access-filter ipv6-filter entry number match src-port mask number
1 to 65535
65535
21.7.R1
All
TCP or UDP port number as the match criterion
configure system security management-access-filter ipv6-filter entry number match src-port port number
1 to 65535
This element is mandatory.
21.7.R1
All
Enter the mac-filter context
16.0.R4
All
Administrative state of management access MAC filter
enable
enable, disable
16.0.R4
All
Default action for the management access filter
This command specifies the default action for management access in the absence of a specific management access filter match.
ignore-match
ignore-match, accept, drop
16.0.R4
All
Enter the entry list instance
16.0.R4
All
Entry ID to identify the match criteria and the action
This command specifies the entry ID to identify the match criteria and the corresponding action. It is recommended that entries are numbered in staggered increments. This allows users to insert a new entry in an existing policy without having to renumber the existing entries.
1 to 9999
This element is part of a list key.
16.0.R4
All
Action associated with the management access filter
configure system security management-access-filter mac-filter entry number action keyword
This command specifies the action associated with the management access filter match criteria entry.
If the packet does not meet any of the match criteria, the configured default action is applied.
ignore-match
ignore-match, accept, drop
16.0.R4
All
Text description
configure system security management-access-filter mac-filter entry number description string
1 to 80
16.0.R4
All
Enable match logging
configure system security management-access-filter mac-filter entry number log-events boolean
When configured to true, this command enables match logging. When enabled, matches on the entry cause the Security event mafEntryMatch to be raised.
When configured to false, match logging is disabled.
false
16.0.R4
All
Enter the match context
Commands in this context specify match criteria for the entry.
16.0.R4
All
Enter the cfm-opcode context
Commands in this context specify match criteria based on the CFM opcode.
16.0.R4
All
Equal to comparison operator for the CFM opcode
configure system security management-access-filter mac-filter entry number match cfm-opcode eq number
0 to 255
The following elements are part of a choice: eq, gt, lt, or range.
16.0.R4
All
Greater than comparison operator for the CFM opcode
configure system security management-access-filter mac-filter entry number match cfm-opcode gt number
0 to 254
The following elements are part of a choice: eq, gt, lt, or range.
16.0.R4
All
Less than comparison operator for the CFM opcode
configure system security management-access-filter mac-filter entry number match cfm-opcode lt number
1 to 255
The following elements are part of a choice: eq, gt, lt, or range.
16.0.R4
All
Enable the range context
The following elements are part of a choice: eq, gt, lt, or range.
16.0.R4
All
Upper bound of the range for the OpCode to match
configure system security management-access-filter mac-filter entry number match cfm-opcode range end number
1 to 255
This element is mandatory.
16.0.R4
All
Lower bound of the range for the OpCode to match
configure system security management-access-filter mac-filter entry number match cfm-opcode range start number
0 to 254
This element is mandatory.
16.0.R4
All
Enable the dot1p context
Commands in this context specify match criteria based on the IEEE 802.1p value.
16.0.R4
All
3-bit mask as the match criterion
configure system security management-access-filter mac-filter entry number match dot1p mask number
1 to 7
7
16.0.R4
All
IEEE 802.1p value as the match criterion
configure system security management-access-filter mac-filter entry number match dot1p priority number
0 to 7
This element is mandatory.
16.0.R4
All
Enable the dst-mac context
Commands in this context specify match criteria based on the destination MAC.
16.0.R4
All
MAC address used as the match criterion
configure system security management-access-filter mac-filter entry number match dst-mac address string
This element is mandatory.
16.0.R4
All
MAC address mask as the match criterion
configure system security management-access-filter mac-filter entry number match dst-mac mask string
ff:ff:ff:ff:ff:ff
16.0.R4
All
Ethernet type II Ethertype value as the match criterion
configure system security management-access-filter mac-filter entry number match etype string
This command specifies an Ethernet type II Ethertype value to be used as a MAC filter match criterion.
The Ethernet type field is used by the Ethernet version-II frames and does not apply to IEEE 802.3 Ethernet frames.
5 to 6
16.0.R4
All
MAC frame type as the match criterion
configure system security management-access-filter mac-filter entry number match frame-type keyword
802dot3
802dot3, 802dot2-llc, 802dot2-snap, ethernet-ii, 802dot1-ag
16.0.R4
All
Enable the llc-dsap context
Commands in this context specify match criteria based on the Destination Service Access Point (DSAP).
16.0.R4
All
8-bit DSAP as the match criterion
configure system security management-access-filter mac-filter entry number match llc-dsap dsap number
0 to 255
This element is mandatory.
16.0.R4
All
Mask for DSAP value as the match criterion
configure system security management-access-filter mac-filter entry number match llc-dsap mask number
1 to 255
255
16.0.R4
All
Enable the llc-ssap context
Commands in this context specify match criteria based on the Source Service Access Point (SSAP).
16.0.R4
All
Mask for SSAP value as the match criterion
configure system security management-access-filter mac-filter entry number match llc-ssap mask number
1 to 255
255
16.0.R4
All
8-bit SSAP as the match criterion
configure system security management-access-filter mac-filter entry number match llc-ssap ssap number
0 to 255
This element is mandatory.
16.0.R4
All
Service ID used as the match condition
configure system security management-access-filter mac-filter entry number match service string
1 to 64
16.0.R4
All
IEEE 802.3 LLC SNAP Ethernet Frame OUI value for match
configure system security management-access-filter mac-filter entry number match snap-oui keyword
This command specifies the IEEE 802.3 LLC SNAP Ethernet Frame OUI value as the MAC filter match criterion.
zero, non-zero
16.0.R4
All
IEEE 802.3 LLC SNAP Ethernet Frame PID as the match
configure system security management-access-filter mac-filter entry number match snap-pid number
This command specifies an IEEE 802.3 LLC SNAP Ethernet Frame PID value used as the MAC filter match criterion.
The SNAP PID match criterion is independent of the OUI field within the SNAP header. Two packets with different 3-byte OUI fields but the same PID field match the same filter entry based on a SNAP PID match criterion.
0 to 65535
16.0.R4
All
Enable the src-mac context
Commands in this context specify match criteria based on the source MAC.
16.0.R4
All
MAC address used as the match criterion
configure system security management-access-filter mac-filter entry number match src-mac address string
This element is mandatory.
16.0.R4
All
MAC address mask as the match criterion
configure system security management-access-filter mac-filter entry number match src-mac mask string
ff:ff:ff:ff:ff:ff
16.0.R4
All
Allow CPM hardware queuing per peer
configure system security per-peer-queuing boolean
When configured to true, the router automatically allocates a separate CPM hardware queue for the peer when a peering session is established.
When configured to false, a separate CPM hardware queue is not allowed.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the pki context
16.0.R1
All
Enter the ca-profile list instance
configure system security pki ca-profile string
128
16.0.R1
All
CA profile name
configure system security pki ca-profile string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the CA profile
configure system security pki ca-profile string admin-state keyword
disable
enable, disable
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enable the auto-crl-update context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Administrative state of the automatic CRL update
configure system security pki ca-profile string auto-crl-update admin-state keyword
disable
enable, disable
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the crl-urls context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the url-entry list instance
configure system security pki ca-profile string auto-crl-update crl-urls url-entry number
16.0.R1
All
URL on this system
configure system security pki ca-profile string auto-crl-update crl-urls url-entry number
1 to 8
This element is part of a list key.
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
File transmission profile to update CRL
configure system security pki ca-profile string auto-crl-update crl-urls url-entry number transmission-profile reference
configure system transmission-profile string
16.0.R4
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Location of updated CRL
configure system security pki ca-profile string auto-crl-update crl-urls url-entry number url http-url-path-loose
1 to 180
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Interval between two consecutive CRL updates
configure system security pki ca-profile string auto-crl-update periodic-update-interval number
3600 to 31622400
86400
seconds
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Time prior to the next update time of the current CRL
configure system security pki ca-profile string auto-crl-update pre-update-time number
0 to 31622400
3600
seconds
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Interval before retrying to update CRL
configure system security pki ca-profile string auto-crl-update retry-interval number
0 to 31622400
3600
seconds
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Time scheduler type for an automated CRL update
configure system security pki ca-profile string auto-crl-update schedule-type keyword
next-update-based
next-update-based, periodic
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Certificate file name
1 to 95
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the cmpv2 context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the accept-unprotected-message context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept unprotected error messages
configure system security pki ca-profile string cmpv2 accept-unprotected-message error-message boolean
false
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept unprotected PKI confirmation messages
configure system security pki ca-profile string cmpv2 accept-unprotected-message pkiconf-message boolean
false
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Subject name in CMPv2 header for all Initial Registration (IR) messages
configure system security pki ca-profile string cmpv2 always-set-sender-for-ir boolean
false
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the http context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
HTTP response timeout
configure system security pki ca-profile string cmpv2 http response-timeout number
1 to 3600
30
seconds
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
HTTP version for CMPv2 messages
1.1
1.0, 1.1
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the key-list context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the key list instance
128
16.0.R1
All
Unique identifier for the CA initial authentication key
1 to 64
This element is part of a list key.
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Shared secret for this CA initial authentication key
1 to 115
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
File name of the certificate to verify the signature of received CMPv2 responses
configure system security pki ca-profile string cmpv2 response-signing-cert string
1 to 95
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Same recipNonce as the last CMPv2 response for a poll request
configure system security pki ca-profile string cmpv2 same-recipient-nonce-for-poll-request boolean
false
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the url context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Administrative service name
configure system security pki ca-profile string cmpv2 url service-name string
1 to 64
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
URL for CMPv2
configure system security pki ca-profile string cmpv2 url url-string http-optional-url-loose
1 to 180
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Certificate Revocation List (CRL) file name
1 to 95
16.0.R1
All
Text description
configure system security pki ca-profile string description string
1 to 80
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the ocsp context
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
HTTP URL of the OCSP responder for the CA
configure system security pki ca-profile string ocsp responder-url http-optional-url-loose
1 to 180
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Administrative service name
configure system security pki ca-profile string ocsp service-name string
1 to 64
16.0.R1
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Transmission profile for the OCSP
configure system security pki ca-profile string ocsp transmission-profile reference
configure system transmission-profile string
16.0.R6
All
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Method to verify the revocation status of certificates issued by the CA
configure system security pki ca-profile string revocation-check keyword
crl
crl, crl-optional
16.0.R1
All
Display format for certificates and Certificate Revocation Lists (CRLs)
ascii
ascii, utf8
16.0.R1
All
Enter the certificate-expiration-warning context
16.0.R1
All
Time at which the system generates the certificate expiration warning trap for in-use certificates
0 to 8760
hours
16.0.R1
All
Time period when the system repeatedly generates the certificate expiration warning trap
0 to 8760
0
hours
16.0.R1
All
Enter the common-name-list list instance
configure system security pki common-name-list string
64
16.0.R1
All
CN list name
configure system security pki common-name-list string
1 to 32
This element is part of a list key.
16.0.R1
All
Enter the common-name list instance
configure system security pki common-name-list string common-name number
16.0.R1
All
Common name index
configure system security pki common-name-list string common-name number
1 to 128
This element is part of a list key.
16.0.R1
All
Common name type
configure system security pki common-name-list string common-name number cn-type keyword
ip-address, domain-name
This element is mandatory.
16.0.R1
All
Common name value
configure system security pki common-name-list string common-name number cn-value string
1 to 255
This element is mandatory.
16.0.R1
All
Enter the crl-expiration-warning context
16.0.R1
All
Time when the system generates the Certificate Revocation List (CRL) expiration warning trap
0 to 8760
hours
16.0.R1
All
Time when the system repeatedly generates the Certificate Revocation List (CRL) expiration warning trap
0 to 8760
0
hours
16.0.R1
All
Enter the est-profile list instance
configure system security pki est-profile string
Commands in this context configure an Enrollment over Secure Transport (EST) profile.
128
21.10.R1
All
Enrollment over Secured Transport profile name
configure system security pki est-profile string
This command configures the EST profile name.
1 to 32
This element is part of a list key.
21.10.R1
All
Check id-kp-cmcra in the EST certificate
configure system security pki est-profile string check-id-kp-cmcra-only boolean
When configured to true, only the id-kp-cmcRA existence in the extended key usage extension of the EST server certificate is checked, instead of the subject or subject alternative name.
When configured to false, the subject or subject alternative name is also checked.
false
21.10.R1
All
TLS client profile assigned to applications
configure system security pki est-profile string client-tls-profile string
This command specifies the TLS client profile to be assigned to applications for encryption. The profile creates the TLS connection to the EST server.
1 to 32
21.10.R1
All
Enter the http-authentication context
21.10.R1
All
Password for EST authentication
configure system security pki est-profile string http-authentication password string
1 to 115
21.10.R1
All
Username for the EST authentication
configure system security pki est-profile string http-authentication username string
1 to 32
21.10.R1
All
Enter the server context
Commands in this context configure EST server parameters.
21.10.R1
All
Fully Qualified Domain Name (FQDN) of the EST server
This command specifies to use the FQDN of the EST server.
1 to 255
The following elements are part of a choice: fqdn, ipv4, or ipv6.
21.10.R1
All
IPv4 address of the EST server
The following elements are part of a choice: fqdn, ipv4, or ipv6.
21.10.R1
All
IPv6 address of the EST server
The following elements are part of a choice: fqdn, ipv4, or ipv6.
21.10.R1
All
Port number of the EST server
1 to 65535
443
21.10.R1
All
Transmission profile name for EST
configure system security pki est-profile string transmission-profile string
This command associates a file transmission profile to the EST profile.
The transmission profile defines transport parameters for protocol such as HTTP, include routing instance, source address, timeout value, and so on.
1 to 32
21.10.R1
All
The supported encrypted file formats
configure system security pki imported-format keyword
any
any, secure
16.0.R6
All
Maximum depth of certificate chain verification
1 to 7
7
16.0.R1
All
Enter the python-script context
21.10.R1
All
Enter the authorization context
21.10.R1
All
Enter the cron context
21.10.R1
All
User profile name when executing a Python application
configure system security python-script authorization cron cli-user reference
configure system security user-params local-user user string
21.10.R1
All
Enter the event-handler context
21.10.R1
All
User profile name when executing a Python application
configure system security user-params local-user user string
21.10.R1
All
Enter the snmp context
16.0.R1
All
Enter the access list instance
configure system security snmp access string context string security-model keyword security-level keyword
16.0.R1
All
Group name
configure system security snmp access string context string security-model keyword security-level keyword
1 to 32
This element is part of a list key.
16.0.R1
All
String against which the context name should match to gain access rights
configure system security snmp access string context string security-model keyword security-level keyword
0 to 32
This element is part of a list key.
16.0.R1
All
Security model
configure system security snmp access string context string security-model keyword security-level keyword
snmpv1, snmpv2c, usm
This element is part of a list key.
16.0.R1
All
Minimum level of security required to gain the access rights allowed by this entry
configure system security snmp access string context string security-model keyword security-level keyword
no-auth-no-privacy, auth-no-privacy, privacy
This element is part of a list key.
16.0.R1
All
SNMP view for notification access
configure system security snmp access string context string security-model keyword security-level keyword notify string
This command specifies the SNMP view used to control which MIB objects can be accessed for notifications.
1 to 32
16.0.R1
All
Match type for the context
configure system security snmp access string context string security-model keyword security-level keyword prefix-match keyword
exact, prefix
16.0.R1
All
SNMP view for read access
configure system security snmp access string context string security-model keyword security-level keyword read string
This command specifies the SNMP view used to control which MIB objects can be accessed using a read (get) operation.
1 to 32
16.0.R1
All
SNMP view for write access
configure system security snmp access string context string security-model keyword security-level keyword write string
This command specifies the SNMP view used to control which MIB objects can be accessed using a write (set) operation.
1 to 32
16.0.R1
All
Enter the attempts context
16.0.R1
All
Maximum unsuccessful SNMP attempts that are allowed for the specified time
1 to 64
20
16.0.R1
All
Lockout period during which the host is not allowed to log in
0 to 1440
10
minutes
16.0.R1
All
Time when a number of unsuccessful attempts are made before the host is locked out
0 to 60
5
minutes
16.0.R1
All
Enter the community list instance
16.0.R1
All
Management information that is accessed when using the community string
1 to 114
This element is part of a list key.
16.0.R1
All
SNMP community name(s) to be used with the associated VPRN instance
r, rw, rwa, mgmt, vpls-mgmt
This element is mandatory.
16.0.R1
All
Management information to be accessed when using the community string
16.0.R1
All
SNMP version
both
v1, v2c, both
16.0.R1
All
Enter the source-access-list list instance
16
16.0.R1
All
Value for the name given to source access list
1 to 32
This element is part of a list key.
16.0.R1
All
Enter the source-host list instance
configure system security snmp source-access-list string source-host string
16
16.0.R1
All
Source host entry name
configure system security snmp source-access-list string source-host string
1 to 32
This element is part of a list key.
16.0.R1
All
Source IP address entry used to validate SNMP requests
configure system security snmp source-access-list string source-host string address (ipv4-address-no-zone | ipv6-address-no-zone)
This element is mandatory.
16.0.R1
All
Enter the usm-community list instance
configure system security snmp usm-community string
16.0.R1
All
SNMPv1/SNMPv2 community string to determine the SNMPv3 access permission
configure system security snmp usm-community string
1 to 114
This element is part of a list key.
16.0.R1
All
Group to manage the access rights of the community string
1 to 32
16.0.R1
All
Management information to be accessed when using the community string
configure system security snmp usm-community string source-access-list reference
16.0.R1
All
Enter the view list instance
16.0.R1
All
View name
1 to 32
This element is part of a list key.
16.0.R1
All
Object Identifier (OID) value
1 to 256
This element is part of a list key.
16.0.R1
All
Mask value as binary value, or hex value
1 to 16
16.0.R1
All
Type of SNMP security view mask
included, excluded
16.0.R1
All
Enter the source-address context
Commands in this context configure the IP source address that is used in all unsolicited packets sent by the specified applications.
This configuration applies to packets transmitted in-band (for example, a network port on an IOM) and does not apply to packets transmitted out-of-band on the management interface on the CPM Ethernet port. Packets transmitted using the CPM Ethernet port use the address of the CPM Ethernet port as the IP source address in the packet.
When a source address is specified for the PTP application, the port-based 1588 hardware timestamping assist function is applied to PTP packets matching the IPv4 address of the router interface used to ingress the SR/ESS or IP address specified in this command. If the IP address is removed, the port-based 1588 hardware timestamping assist function is only applied to PTP packets matching the IPv4 address of the router interface.
16.0.R1
All
Enter the ipv4 list instance
configure system security source-address ipv4 keyword
16.0.R1
All
Application that uses the source IP address
configure system security source-address ipv4 keyword
telnet, ftp, ssh, radius, tacplus, snmptrap, syslog, ping, traceroute, dns, sntp, ntp, cflowd, ptp, mcreporter, sflow, icmp-error, ldap
This element is part of a list key.
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Source IPv4 address
The following elements are part of a mandatory choice: address or interface-name.
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
IP interface name
configure system security source-address ipv4 keyword interface-name string
1 to 32
The following elements are part of a mandatory choice: address or interface-name.
16.0.R1
All
Enter the ipv6 list instance
configure system security source-address ipv6 keyword
16.0.R1
All
Application which uses the source IPv6 address
configure system security source-address ipv6 keyword
telnet, ftp, radius, tacplus, snmptrap, syslog, ping, traceroute, dns, cflowd, ntp, sflow, icmp6-error, ldap
This element is part of a list key.
16.0.R1
All
![]() | Warning: Modifying this element recreates the parent element automatically for the new value to take effect. |
Source IPv6 address
This element is mandatory.
16.0.R1
All
Enter the ssh context
16.0.R1
All
Enter the client-cipher-list-v1 context
16.0.R1
All
Enter the cipher list instance
Commands in this context configure a client-cipher instance. Client-ciphers are used when SR OS is acting as an SSH client.
16.0.R1
All
Cipher index in the list
1 to 255
This element is part of a list key.
16.0.R1
All
Algorithm for performing encryption or decryption
des, 3des, blowfish
This element is mandatory.
16.0.R1
All
Enter the client-cipher-list-v2 context
16.0.R1
All
Enter the cipher list instance
Commands in this context configure a client-cipher instance. Client-ciphers are used when the SR OS is acting as an SSH client.
16.0.R1
All
Cipher index in the list
1 to 255
This element is part of a list key.
16.0.R1
All
Algorithm for performing encryption or decryption
3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes128-cbc, aes192-cbc, aes256-cbc, rijndael-cbc, aes128-ctr, aes192-ctr, aes256-ctr
This element is mandatory.
16.0.R1
All
Enter the client-kex-list-v2 context
19.10.R3
All
Enter the kex list instance
Commands in this context configure SSH Key Exchange (KEX) algorithms for SR OS as a client.
If a list is configured, SSH uses the list with the first-listed algorithm having the highest priority.
By default, the client list is empty. The default list contains the following:
19.10.R3
All
SSHv2 KEX algorithm index
This command configures the index of the KEX algorithm in the list. The lowest index in the list is negotiated first on the SSH negotiation list, while the highest index is at the bottom of the SSH negotiation list.
1 to 255
This element is part of a list key.
19.10.R3
All
KEX algorithm for computing a shared secret key
diffie-hellman-group1-sha1, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha256, diffie-hellman-group16-sha512
This element is mandatory.
19.10.R3
All
Enter the client-mac-list-v2 context
16.0.R1
All
Enter the mac list instance
Commands in this context configure SSH MAC algorithms for SR OS as a client.
16.0.R1
All
MAC algorithm index
1 to 255
This element is part of a list key.
16.0.R1
All
Algorithm for calculating message authentication code
hmac-sha2-512, hmac-sha2-256, hmac-sha1, hmac-sha1-96, hmac-md5, hmac-ripemd160, hmac-ripemd160-openssh-com, hmac-md5-96
This element is mandatory.
16.0.R1
All
Enter the key-re-exchange context
16.0.R1
All
Enter the client context
16.0.R1
All
Administrative state of the key re-exchange
enable
enable, disable
16.0.R1
All
Maximum bytes transmitted before key re-exchange begins
1 to 64000
1024
megabytes
infinite
16.0.R1
All
Maximum time before key re-exchange is initiated
1 to 1440
60
minutes
infinite
16.0.R1
All
Enter the server context
16.0.R1
All
Administrative state of the key re-exchange
enable
enable, disable
16.0.R1
All
Maximum bytes transmitted before key re-exchange begins
1 to 64000
1024
megabytes
infinite
16.0.R1
All
Maximum time before key re-exchange is initiated
1 to 1440
60
minutes
infinite
16.0.R1
All
Preserve keys and restore on system or server restart
configure system security ssh preserve-key boolean
When configured to true, private, public, and host keys are saved by the server. The keys are restored following a system reboot or a restart of an SSH server.
When configured to false, the keys are held in memory by an SSH server but are not restored following a system reboot.
false
16.0.R1
All
Administrative state of the SSH server
configure system security ssh server-admin-state keyword
enable
enable, disable
16.0.R1
All
Enter the server-cipher-list-v1 context
16.0.R1
All
Enter the cipher list instance
Commands in this context configure a server-cipher instance. Server-ciphers are used when SR OS is acting as an SSH server.
16.0.R1
All
Cipher index in the list
1 to 255
This element is part of a list key.
16.0.R1
All
Algorithm for performing encryption or decryption
des, 3des, blowfish
This element is mandatory.
16.0.R1
All
Enter the server-cipher-list-v2 context
16.0.R1
All
Enter the cipher list instance
Commands in this context configure a server-cipher instance. Server-ciphers are used when SR OS is acting as an SSH server.
16.0.R1
All
Cipher index in the list
1 to 255
This element is part of a list key.
16.0.R1
All
Algorithm for performing encryption or decryption
3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes128-cbc, aes192-cbc, aes256-cbc, rijndael-cbc, aes128-ctr, aes192-ctr, aes256-ctr
This element is mandatory.
16.0.R1
All
Enter the server-kex-list-v2 context
19.10.R3
All
SSHv2 KEX algorithm index
This command configures the index of the KEX algorithm in the list. The lowest index in the list is negotiated first on the SSH negotiation list, while the highest index is at the bottom of the SSH negotiation list.
1 to 255
This element is part of a list key.
19.10.R3
All
KEX algorithm for computing a shared secret key
diffie-hellman-group1-sha1, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha256, diffie-hellman-group16-sha512
This element is mandatory.
19.10.R3
All
Enter the server-mac-list-v2 context
16.0.R1
All
MAC algorithm index
1 to 255
This element is part of a list key.
16.0.R1
All
Algorithm for calculating message authentication code
hmac-sha2-512, hmac-sha2-256, hmac-sha1, hmac-sha1-96, hmac-md5, hmac-ripemd160, hmac-ripemd160-openssh-com, hmac-md5-96
This element is mandatory.
16.0.R1
All
SSH protocol version supported by the SSH server
2
1, 2, 1-2
16.0.R1
All
Enter the system-passwords context
16.0.R1
All
Password that assigns the user as administrator
3 to 136
16.0.R1
All
Password that allows the user to assign VSD services
3 to 136
16.0.R1
All
Enter the tech-support context
16.0.R1
All
Default file path for generated tech-support files
configure system security tech-support ts-location (ts-sat-url | cflash-url | string)
1 to 180
16.0.R1
All
Enable Telnet servers running on the system
configure system security telnet-server boolean
false
16.0.R1
All
Enable Telnet IPv6 servers running on the system
configure system security telnet6-server boolean
false
16.0.R1
All
Enter the tls context
16.0.R1
All
Enter the cert-profile list instance
configure system security tls cert-profile string
16
16.0.R1
All
TLS certificate profile name
configure system security tls cert-profile string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the certificate profile
configure system security tls cert-profile string admin-state keyword
disable
enable, disable
16.0.R1
All
Enter the entry list instance
8
16.0.R1
All
Certificate profile ID
1 to 8
This element is part of a list key.
16.0.R1
All
Certificate file name
configure system security tls cert-profile string entry number certificate-file string
1 to 95
16.0.R1
All
Key file name
1 to 95
16.0.R1
All
Enter the send-chain context
configure system security tls cert-profile string entry number send-chain
16.0.R1
All
Add a list entry for ca-profile
configure system security tls cert-profile string entry number send-chain ca-profile reference
7
16.0.R1
All
CA profile name
configure system security tls cert-profile string entry number send-chain ca-profile reference
configure system security pki ca-profile string
This element is part of a list key.
16.0.R1
All
Enter the client-cipher-list list instance
configure system security tls client-cipher-list string
16
16.0.R1
All
Client cipher list name
configure system security tls client-cipher-list string
1 to 32
This element is part of a list key.
16.0.R1
All
Enter the tls12-cipher list instance
configure system security tls client-cipher-list string tls12-cipher number
22.2.R1
All
Index of the cipher
configure system security tls client-cipher-list string tls12-cipher number
1 to 255
This element is part of a list key.
22.2.R1
All
Cipher suite code
configure system security tls client-cipher-list string tls12-cipher number name keyword
tls-rsa-with3des-ede-cbc-sha, tls-rsa-with-aes128-cbc-sha, tls-rsa-with-aes256-cbc-sha, tls-rsa-with-aes128-cbc-sha256, tls-rsa-with-aes256-cbc-sha256, tls-rsa-with-aes128-gcm-sha256, tls-rsa-with-aes256-gcm-sha384
This element is mandatory.
22.2.R1
All
Enter the client-tls-profile list instance
configure system security tls client-tls-profile string
16
16.0.R1
All
Client TLS profile name
configure system security tls client-tls-profile string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the client TLS profile
configure system security tls client-tls-profile string admin-state keyword
disable
enable, disable
16.0.R1
All
Certificate profile ID
configure system security tls client-tls-profile string cert-profile reference
configure system security tls cert-profile string
16.0.R1
All
Cipher list for negotiation in the client Hello message
configure system security tls client-tls-profile string cipher-list reference
configure system security tls client-cipher-list string
16.0.R1
All
Trust anchor profile
configure system security tls client-tls-profile string trust-anchor-profile reference
16.0.R1
All
Enter the server-cipher-list list instance
configure system security tls server-cipher-list string
16
16.0.R1
All
Server cipher list name
configure system security tls server-cipher-list string
1 to 32
This element is part of a list key.
16.0.R1
All
Enter the tls12-cipher list instance
configure system security tls server-cipher-list string tls12-cipher number
22.2.R1
All
Index of the cipher
configure system security tls server-cipher-list string tls12-cipher number
1 to 255
This element is part of a list key.
22.2.R1
All
Cipher suite code
configure system security tls server-cipher-list string tls12-cipher number name keyword
tls-rsa-with3des-ede-cbc-sha, tls-rsa-with-aes128-cbc-sha, tls-rsa-with-aes256-cbc-sha, tls-rsa-with-aes128-cbc-sha256, tls-rsa-with-aes256-cbc-sha256, tls-rsa-with-aes128-gcm-sha256, tls-rsa-with-aes256-gcm-sha384
This element is mandatory.
22.2.R1
All
Enter the server-tls-profile list instance
configure system security tls server-tls-profile string
16
16.0.R1
All
TLS server profile name
configure system security tls server-tls-profile string
1 to 32
This element is part of a list key.
16.0.R1
All
Administrative state of the server TLS profile
configure system security tls server-tls-profile string admin-state keyword
disable
enable, disable
16.0.R1
All
Enter the authenticate-client context
16.0.R1
All
Common name list for TLS client certificate authentication
configure system security tls server-tls-profile string authenticate-client common-name-list reference
configure system security pki common-name-list string
16.0.R1
All
Trust anchor profile for TLS client certificate authentication
configure system security tls server-tls-profile string authenticate-client trust-anchor-profile reference
16.0.R1
All
Certificate profile ID
configure system security tls server-tls-profile string cert-profile reference
configure system security tls cert-profile string
16.0.R1
All
Cipher list used by the TLS server profile
configure system security tls server-tls-profile string cipher-list reference
configure system security tls server-cipher-list string
16.0.R1
All
TLS HELLO request timer
configure system security tls server-tls-profile string tls-re-negotiate-timer number
0 to 65000
0
minutes
16.0.R1
All
Enter the trust-anchor-profile list instance
16
16.0.R1
All
Trust anchor profile name
1 to 32
This element is part of a list key.
16.0.R1
All
Add a list entry for trust-anchor
configure system security tls trust-anchor-profile string trust-anchor reference
8
16.0.R1
All
Trusted CA profile name
configure system security tls trust-anchor-profile string trust-anchor reference
configure system security pki ca-profile string
This element is part of a list key.
16.0.R1
All
Enter the user-params context
16.0.R1
All
Enter the attempts context
16.0.R1
All
Number of unsuccessful login attempts
1 to 64
3
16.0.R1
All
Lockout period after unsuccessful login attempts
0 to 1440
10
minutes
16.0.R1
All
Time frame of unsuccessful login attempts
0 to 60
5
minutes
16.0.R1
All
Enter the authentication-order context
16.0.R1
All
Ignore subsequent AAA methods in authentication order when a reject is received
false
16.0.R1
All
Sequence of password authentication, authorization, and accounting
local, radius, tacplus, ldap
4
This element is ordered by the user.
16.0.R1
All
Enter the local-user context
16.0.R1
All
Enter the password context
16.0.R1
All
Maximum time during which a user password is valid
1 to 500
days
16.0.R1
All
Enter the complexity-rules context
16.0.R1
All
Allow the username to be used as part of the password
false
16.0.R1
All
Enter the credits context
The following elements are part of a choice: credits or required.
16.0.R1
All
Maximum credits given for the usage of lowercase letters
1 to 10
16.0.R1
All
Maximum credits given for the usage of numeric characters
1 to 10
16.0.R1
All
Maximum credits given for the usage of special characters
1 to 10
16.0.R1
All
Maximum credits given for the usage of uppercase letters
1 to 10
16.0.R1
All
Force the use of different character classes for a minimum number
2 to 4
16.0.R1
All
Minimum length required for local passwords
6 to 50
6
16.0.R1
All
Number of times the same character appears consecutively
2 to 8
16.0.R1
All
Enter the required context
The following elements are part of a choice: credits or required.
16.0.R1
All
Number required for lowercase letters
1 to 10
16.0.R1
All
Number required for numeric characters
1 to 10
16.0.R1
All
Number required for special characters
1 to 10
16.0.R1
All
Number required for uppercase letters
1 to 10
16.0.R1
All
Password hashing algorithm
bcrypt
bcrypt, sha2-pbkdf2, sha3-pbkdf2
20.7.R1
All
New password to match against previous ones
0 to 20
16.0.R1
All
Minimum age required for a password before changing it
0 to 86400
600
seconds
16.0.R1
All
Minimum distance required between the old and the new password
1 to 20
5
16.0.R1
All
Enter the user list instance
configure system security user-params local-user user string
16.0.R1
All
Local user name
configure system security user-params local-user user string
1 to 32
This element is part of a list key.
16.0.R1
All
Enter the access context
16.0.R1
All
Allow console access (serial port or Telnet)
configure system security user-params local-user user string access console boolean
false
16.0.R1
All
Allow FTP access
configure system security user-params local-user user string access ftp boolean
false
16.0.R1
All
Allow gRPC access
configure system security user-params local-user user string access grpc boolean
false
16.0.R1
All
Enable/disable access to LI.
configure system security user-params local-user user string access li boolean
false
19.10.R1
All
Allow NETCONF session access
configure system security user-params local-user user string access netconf boolean
false
16.0.R1
All
Allow SNMP access
configure system security user-params local-user user string access snmp boolean
false
16.0.R1
All
User level override for CLI engine access
configure system security user-params local-user user string cli-engine keyword
md-cli
classic-cli, md-cli
2
This element is ordered by the user.
16.0.R1
All
Enter the console context
16.0.R1
All
Change password privileges
configure system security user-params local-user user string console cannot-change-password boolean
false
16.0.R1
All
File to execute when a user successfully logs in
configure system security user-params local-user user string console login-exec (sat-url | cflash-url | ftp-tftp-url | filename)
1 to 200
16.0.R1
All
User profiles for this user
configure system security user-params local-user user string console member reference
8
This element is ordered by the user.
16.0.R1
All
Prompt a user to change password at next console login
configure system security user-params local-user user string console new-password-at-login boolean
false
16.0.R1
All
Home directory for the user
configure system security user-params local-user user string home-directory (sat-url | cflash-without-slot-url)
1 to 200
16.0.R1
All
Password to authenticate the user for console and FTP access
configure system security user-params local-user user string password string
3 to 136
This element is mandatory.
16.0.R1
All
Enter the public-keys context
16.0.R1
All
Enter the ecdsa context
16.0.R1
All
Enter the ecdsa-key list instance
configure system security user-params local-user user string public-keys ecdsa ecdsa-key number
16.0.R1
All
Number of the Secure Shell version 2 (SSHv2) ECDSA public key that is associated with system user
configure system security user-params local-user user string public-keys ecdsa ecdsa-key number
1 to 32
This element is part of a list key.
16.0.R1
All
Text description
configure system security user-params local-user user string public-keys ecdsa ecdsa-key number description string
1 to 80
16.0.R1
All
Number of the Secure Shell version 2 (SSHv2) ECDSA public key that is associated with system user
configure system security user-params local-user user string public-keys ecdsa ecdsa-key number key-value string
1 to 255
16.0.R1
All
Enter the rsa context
16.0.R1
All
Enter the rsa-key list instance
configure system security user-params local-user user string public-keys rsa rsa-key number
16.0.R1
All
Number of the Secure Shell version 2 (SSHv2) RSA public key that is associated with system user
configure system security user-params local-user user string public-keys rsa rsa-key number
1 to 32
This element is part of a list key.
16.0.R1
All
Text description
configure system security user-params local-user user string public-keys rsa rsa-key number description string
1 to 80
16.0.R1
All
Number of the Secure Shell version 2 (SSHv2) RSA public key that is associated with system user
configure system security user-params local-user user string public-keys rsa rsa-key number key-value string
1 to 800
16.0.R1
All
Users prevented from navigating above their home directories to access file
configure system security user-params local-user user string restricted-to-home boolean
false
16.0.R1
All
Enter the snmp context
configure system security user-params local-user user string snmp
16.0.R1
All
Enable the authentication context
Commands in this context configure the SNMPv3 authentication and privacy protocols for the user to communicate with the router. The keys are stored in an encrypted format in the configuration.
The keys configured with these commands must be localized keys, which are a hash of the SNMP engine ID and a password. The password is not entered directly in this command. Use the tools perform system management-interface snmp generate-key command to generate localized authentication and privacy keys.
16.0.R1
All
Localized authentication key
configure system security user-params local-user user string snmp authentication authentication-key string
This command specifies the authentication key for the authentication protocol. The key must be a localized key, which is a hash of the SNMP engine ID and a password. The password is not entered directly in this command. Use the tools perform system management-interface snmp generate-key command to generate a localized authentication key.
1 to 115
16.0.R1
All
Authentication protocol
configure system security user-params local-user user string snmp authentication authentication-protocol keyword
hmac-md5-96, hmac-sha1-96, hmac-sha2-224, hmac-sha2-256, hmac-sha2-384, hmac-sha2-512
16.0.R1
All
Enable the privacy context
16.0.R1
All
Localized privacy key
configure system security user-params local-user user string snmp authentication privacy privacy-key string
This command specifies the privacy key for the privacy protocol. The key must be a localized key, which is a hash of the SNMP engine ID and a password. The password is not entered directly in this command. Use the tools perform system management-interface snmp generate-key command to generate a localized privacy key.
1 to 71
This element is mandatory.
16.0.R1
All
Privacy protocol
configure system security user-params local-user user string snmp authentication privacy privacy-protocol keyword
cbc-des, cfb128-aes-128, cfb128-aes-192, cfb128-aes-256
This element is mandatory.
16.0.R1
All
User to associate with a group name
configure system security user-params local-user user string snmp group string
1 to 32
16.0.R1
All
Enable the vprn-network-exceptions context
Commands in this context configure the rate limiting attributes for processing packets with label TTL expiry received within an LSP shortcut or VPRN instances in the system and from all network IP interfaces. This includes labeled user and control plan packets, ping, and traceroute packets within GRT and VPRN, and ICMP replies.
These commands do not rate limit MPLS or service OAM packets.
16.0.R1
All
Limit of exception messages received
This command specifies the threshold limit of exception messages. If the threshold value is exceeded within the configured time interval, packets are dropped.
10 to 1000
100
16.0.R1
All
Time interval to measure exception messages
This command configures the time interval within which exception messages are counted. If the threshold value is exceeded within the configured time interval, packets are dropped.
1 to 60
10
seconds
16.0.R1
All
FIB assigned to the system
configure system selective-fib boolean
false
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the software-repository list instance
configure system software-repository string
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Software repository name
configure system software-repository string
1 to 32
This element is part of a list key.
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Text description
configure system software-repository string description string
1 to 80
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Primary location for the files in the software repository
configure system software-repository string primary-location string
1 to 180
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Secondary location for the files in the software repository
configure system software-repository string secondary-location string
1 to 180
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Tertiary location for the files in the software repository
configure system software-repository string tertiary-location string
1 to 180
16.0.R1
7450 ESS, 7750 SR, 7750 SR-a, 7750 SR-e, 7750 SR-s, 7950 XRS
Enter the switch-fabric context
Commands in this context configure system level attributes related to the switch fabric.
20.5.R1
7450 ESS, 7750 SR-7, 7750 SR-7s, 7750 SR-14s, 7950 XRS
Enter the failure-recovery context
Commands in this context configure the attributes related to the automatic switch fabric recovery process. This process is triggered when there are two resets of an IOM/XCM due to ICC failures within a small time frame. The recovery process involves the sequential resetting of SFM in case the issues are due to one of the SFM in the ICC communication path. As the final step in the recovery process, a CPM switchover is triggered to reset the active CPM.
21.2.R1
7450 ESS, 7750 SR-7, 7950 XRS
Administrative state of the failure recovery process
disable
enable, disable
21.2.R1
7450 ESS, 7750 SR-7, 7950 XRS
Number of SFMs that can fail before SFM overload state
This command specifies the number of SFMs that are permitted to fail before the system goes into SFM overload state.
The default value for the 7750 SR-7s is 1 and the default value for the 7750 SR-14s is 2. Users can select the SFM limit based on the number possible for the system minus one. For the 7750 SR-7s, the limit is 3 and the limit for the 7750 SR-14s is 7.
1 to 7
20.5.R1
7750 SR-7s, 7750 SR-14s
Enter the telemetry context
Commands in this context configure the parameters for the dial-out telemetry functionality.
20.2.R1
All
Enter the destination-group list instance
Commands in this context configure parameters for destination groups.
225
20.5.R1
All
Destination group name
1 to 32
This element is part of a list key.
20.5.R1
All
Allow connection without secured transport protocol
When configured, this command allows an unsecured connection to remote managers; TCP connections are not encrypted, including username and password information.
The following elements are part of a choice: allow-unsecure-connection or tls-client-profile.
20.5.R1
All
Text description
configure system telemetry destination-group string description string
1 to 80
20.5.R1
All
Enter the destination list instance
configure system telemetry destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number
4
This element is ordered by the user.
20.5.R1
All
Address of the destination within the destination group
configure system telemetry destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number
1 to 255
This element is part of a list key.
20.5.R1
All
TCP port number for the destination
configure system telemetry destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number
0 | 1 to 65535
This element is part of a list key.
20.5.R1
All
Router instance for the destination group
configure system telemetry destination-group string destination (ipv4-address-no-zone | ipv6-address-no-zone | fully-qualified-domain-name) port number router-instance string
20.5.R1
All
Enter the tcp-keepalive context
20.5.R1
All
Administrative state of the TCP keep-alive algorithm
configure system telemetry destination-group string tcp-keepalive admin-state keyword
disable
enable, disable
20.5.R1
All
Time until the first TCP keepalive probe is sent
configure system telemetry destination-group string tcp-keepalive idle-time number
1 to 100000
600
seconds
20.5.R1
All
Time between TCP keepalive probes
configure system telemetry destination-group string tcp-keepalive interval number
1 to 100000
15
seconds
20.5.R1
All
Number of probe retries before closing the connection
configure system telemetry destination-group string tcp-keepalive retries number
This command configures the number of missed TCP keepalive probes before closing the TCP connection and attempting to reach the other destinations within the same destination group.
3 to 100
4
20.5.R1
All
TLS client profile assigned to the destination group
configure system telemetry destination-group string tls-client-profile reference
configure system security tls client-tls-profile string
The following elements are part of a choice: allow-unsecure-connection or tls-client-profile.
20.5.R1
All
Enter the notification-bundling context
Commands in this context configure the bundling of multiple notifications into one telemetry message.
21.10.R1
All
Administrative state of notification bundling
disable
enable, disable
21.10.R1
All
Max number of notifications in telemetry message bundle
2 to 1000
100
21.10.R1
All
Max time interval when bundling of notifications occurs
This command sets the maximum time interval during which telemetry notifications are bundled. All bundled notifications will have the same timestamp, which is the timestamp of the bundle.
1 to 1000
100
milliseconds
21.10.R1
All
Enter the persistent-subscriptions context
20.5.R1
All
Enter the subscription list instance
225
20.5.R1
All
Persistent subscription name
1 to 32
This element is part of a list key.
20.5.R1
All
Administrative state of the persistent subscription
configure system telemetry persistent-subscriptions subscription string admin-state keyword
disable
enable, disable
20.5.R1
All
Text description
configure system telemetry persistent-subscriptions subscription string description string
1 to 80
20.5.R1
All
Name of the destination group used in the subscription
configure system telemetry persistent-subscriptions subscription string destination-group reference
20.5.R1
All
Encoding used for telemetry notifications
configure system telemetry persistent-subscriptions subscription string encoding keyword
This command specifies the encoding used for telemetry notifications as defined by the gNMI OpenConfig standard.
json
json, bytes, proto, json-ietf
20.5.R1
All
Local IP address of packets sent from the source
configure system telemetry persistent-subscriptions subscription string local-source-address (ipv4-address-no-zone | ipv6-address-no-zone)
20.5.R1
All
Mode for telemetry notifications
configure system telemetry persistent-subscriptions subscription string mode keyword
This command specifies the subscription path mode for telemetry notifications sent out for the persistent subscription.
target-defined, on-change, sample
20.5.R1
All
QoS marking used for telemetry notification packets
be, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cs1, cp9, af11, cp11, af12, cp13, af13, cp15, cs2, cp17, af21, cp19, af22, cp21, af23, cp23, cs3, cp25, af31, cp27, af32, cp29, af33, cp31, cs4, cp33, af41, cp35, af42, cp37, af43, cp39, cs5, cp41, cp42, cp43, cp44, cp45, ef, cp47, nc1, cp49, cp50, cp51, cp52, cp53, cp54, cp55, nc2, cp57, cp58, cp59, cp60, cp61, cp62, cp63
20.5.R1
All
Sampling interval for the persistent subscription
configure system telemetry persistent-subscriptions subscription string sample-interval number
This command configures the sampling interval for the persistent subscription. The interval applies only in sampling or target-defined modes.
1000 to 18446744073709551615
10000
milliseconds
20.5.R1
All
Sensor group used in the persistent subscription
configure system telemetry persistent-subscriptions subscription string sensor-group reference
This command specifies the sensor group to be used in the persistent subscription. If no valid paths exist in the sensor group, the configuration is accepted, however, no gRPC connection is established when persistent subscription is activated.
20.5.R1
All
Enter the sensor-groups context
20.5.R1
All
Enter the sensor-group list instance
225
20.5.R1
All
Sensor group name
1 to 32
This element is part of a list key.
20.5.R1
All
Text description
configure system telemetry sensor-groups sensor-group string description string
1 to 80
20.5.R1
All
Add a list entry for path
configure system telemetry sensor-groups sensor-group string path string
4500
20.5.R1
All
YANG model path indicating the data to be streamed
configure system telemetry sensor-groups sensor-group string path string
The command specifies the path from which data is streamed to the collector. Streamed data includes all descendants of the tree indicated by the path.
1 to 512
This element is part of a list key.
20.5.R1
All
Enter the thresholds context
16.0.R1
All
Enter the cflash-cap-alarm-percent list instance
16.0.R1
All
cflash device name monitored for capacity
1 to 200
This element is part of a list key.
16.0.R1
All
Falling threshold for the sampled statistic
configure system thresholds cflash-cap-alarm-percent string falling-threshold number
This command specifies a falling threshold for the sampled statistic. When the current sampled value is less than or equal to this threshold, and the value at the last sampling interval was greater than this threshold, a single threshold-crossing event is generated. A single threshold-crossing event is also generated if the first sample taken is less than or equal to this threshold and the associated startup-alarm command is equal to the falling or either values.
After a falling threshold-crossing event is generated, another such event is not generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold command.
0 to 100
percent
16.0.R4
All
Polling period over which data is sampled and compared
configure system thresholds cflash-cap-alarm-percent string interval number
This command specifies the polling interval over which the data is sampled and compared with the rising and falling thresholds.
1 to 2147483647
This element is mandatory.
16.0.R1
All
Rising threshold for the sampled statistic
configure system thresholds cflash-cap-alarm-percent string rising-threshold number
This command specifies a rising threshold for the sampled statistic. When the current sampled value is greater than or equal to this threshold, and the value at the last sampling interval was less than this threshold, a single threshold-crossing event is generated. A single threshold crossing event is also generated if the first sample taken is greater than or equal to this threshold and the associated startup-alarm command is equal to the rising or either values.
After a rising threshold-crossing event is generated, another such event is not generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold command.
0 to 100
percent
This element is mandatory.
16.0.R4
All
Notification type specifying action when event occurs
configure system thresholds cflash-cap-alarm-percent string rmon-event-type keyword
both
none, log, trap, both
16.0.R1
All
Alarm type when the alarm is first created
configure system thresholds cflash-cap-alarm-percent string startup-alarm keyword
This command specifies the alarm type that may be sent when this alarm is first created.
If the first sample is greater than or equal to the rising threshold value and startup-alarm is equal to rising or either, a single rising threshold crossing event is generated.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
either
rising, falling, either
16.0.R1
All
Enter the cflash-cap-warn-percent list instance
Commands in this context configure the capacity monitoring of the compact flash. The usage is monitored as a percentage of the capacity of the compact flash. The severity level is warning. Both a rising and falling threshold can be specified.
16.0.R1
All
cflash device name monitored for capacity
1 to 200
This element is part of a list key.
16.0.R1
All
Falling threshold for the sampled statistic
configure system thresholds cflash-cap-warn-percent string falling-threshold number
This command specifies a falling threshold for the sampled statistic. When the current sampled value is less than or equal to this threshold, and the value at the last sampling interval was greater than this threshold, a single threshold-crossing event is generated. A single threshold-crossing event is also generated if the first sample taken is less than or equal to this threshold and the associated startup-alarm command is equal to the falling or either values.
After a falling threshold-crossing event is generated, another such event is not generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold command.
0 to 100
percent
16.0.R4
All
Polling period over which data is sampled and compared
configure system thresholds cflash-cap-warn-percent string interval number
This command specifies the polling interval over which the data is sampled and compared with the rising and falling thresholds.
1 to 2147483647
This element is mandatory.
16.0.R1
All
Rising threshold for the sampled statistic
configure system thresholds cflash-cap-warn-percent string rising-threshold number
This command specifies a rising threshold for the sampled statistic. When the current sampled value is greater than or equal to this threshold, and the value at the last sampling interval was less than this threshold, a single threshold-crossing event is generated. A single threshold crossing event is also generated if the first sample taken is greater than or equal to this threshold and the associated startup-alarm command is equal to the rising or either values.
After a rising threshold-crossing event is generated, another such event is not generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold command.
0 to 100
percent
This element is mandatory.
16.0.R4
All
Notification type specifying action when event occurs
configure system thresholds cflash-cap-warn-percent string rmon-event-type keyword
both
none, log, trap, both
16.0.R1
All
Alarm type when the alarm is first created
configure system thresholds cflash-cap-warn-percent string startup-alarm keyword
This command specifies the alarm type that may be sent when this alarm is first created.
If the first sample is greater than or equal to the rising threshold value and startup-alarm is equal to rising or either, a single rising threshold crossing event is generated.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
either
rising, falling, either
16.0.R1
All
Enable the kb-memory-use-alarm context
16.0.R4
All
Falling threshold for the sampled statistic
This command specifies a falling threshold for the sampled statistic. When the current sampled value is less than or equal to this threshold, and the value at the last sampling interval was greater than this threshold, a single threshold-crossing event is generated. A single threshold-crossing event is also generated if the first sample taken is less than or equal to this threshold and the associated startup-alarm command is equal to the falling or either values.
After a falling threshold-crossing event is generated, another such event is not generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold command.
-2147483648 to 2147483647
16.0.R4
All
Polling period over which data is sampled and compared
This command specifies the polling interval over which the data is sampled and compared with the rising and falling thresholds.
1 to 2147483647
This element is mandatory.
16.0.R4
All
Rising threshold for the sampled statistic
This command specifies a rising threshold for the sampled statistic. When the current sampled value is greater than or equal to this threshold, and the value at the last sampling interval was less than this threshold, a single threshold-crossing event is generated. A single threshold crossing event is also generated if the first sample taken is greater than or equal to this threshold and the associated startup-alarm command is equal to the rising or either values.
After a rising threshold-crossing event is generated, another such event is not generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold command.
-2147483648 to 2147483647
This element is mandatory.
16.0.R4
All
Notification type specifying action when event occurs
both
none, log, trap, both
16.0.R4
All
Alarm type when the alarm is first created
This command specifies the alarm type that may be sent when this alarm is first created.
If the first sample is greater than or equal to the rising threshold value and startup-alarm is equal to rising or either, a single rising threshold crossing event is generated.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
either
rising, falling, either
16.0.R4
All
Enable the kb-memory-use-warn context
16.0.R4
All
Falling threshold for the sampled statistic
This command specifies a falling threshold for the sampled statistic. When the current sampled value is less than or equal to this threshold, and the value at the last sampling interval was greater than this threshold, a single threshold-crossing event is generated. A single threshold-crossing event is also generated if the first sample taken is less than or equal to this threshold and the associated startup-alarm command is equal to the falling or either values.
After a falling threshold-crossing event is generated, another such event is not generated until the sampled value rises above this threshold and reaches greater than or equal to the rising-threshold command.
-2147483648 to 2147483647
16.0.R4
All
Polling period over which data is sampled and compared
This command specifies the polling interval over which the data is sampled and compared with the rising and falling thresholds.
1 to 2147483647
This element is mandatory.
16.0.R4
All
Rising threshold for the sampled statistic
This command specifies a rising threshold for the sampled statistic. When the current sampled value is greater than or equal to this threshold, and the value at the last sampling interval was less than this threshold, a single threshold-crossing event is generated. A single threshold crossing event is also generated if the first sample taken is greater than or equal to this threshold and the associated startup-alarm command is equal to the rising or either values.
After a rising threshold-crossing event is generated, another such event is not generated until the sampled value falls below this threshold and reaches less than or equal the falling-threshold command.
-2147483648 to 2147483647
This element is mandatory.
16.0.R4
All
Notification type specifying action when event occurs
both
none, log, trap, both
16.0.R4
All
Alarm type when the alarm is first created
This command specifies the alarm type that may be sent when this alarm is first created.
If the first sample is greater than or equal to the rising threshold value and startup-alarm is equal to rising or either, a single rising threshold crossing event is generated.
If the first sample is less than or equal to the falling threshold value and startup-alarm is equal to falling or either, a single falling threshold crossing event is generated.
either
rising, falling, either
16.0.R4
All
Enter the rmon context
16.0.R1
All
Enter the alarm list instance
configure system thresholds rmon alarm number
1200
16.0.R1
All
Index ID for an entry in the alarm table
configure system thresholds rmon alarm number
0 to 65400
This element is part of a list key.
16.0.R1
All
RMON event ID used when a falling threshold crossing event occurs
configure system thresholds rmon alarm number falling-event number
0 to 65400
16.0.R1
All
Falling threshold for the sampled statistic
configure system thresholds rmon alarm number falling-threshold number
This command specifies a falling threshold for the sampled statistic. When the current sampled value is less than or equal to this threshold and the value at the last sampling interval was greater than this threshold, a single threshold crossing event is generated. A single threshold crossing event is also generated if the first sample taken is less than or equal to this threshold and the associated startup-alarm command is set to falling or either.
After a falling threshold crossing event is generated, another such event is not generated until the sampled value exceeds this threshold and reaches or exceeds the rising-threshold command setting.
-2147483648 to 2147483647
16.0.R1
All
Polling period over which data is sampled and compared
This command specifies the polling interval over which the data is sampled and compared with the rising and falling thresholds
1 to 2147483647
This element is mandatory.
16.0.R1
All
Owner that created this entry and uses the resources
1 to 80
TiMOS CLI
16.0.R1
All
RMON event ID used when a rising event threshold event occurs
configure system thresholds rmon alarm number rising-event number
0 to 65400
16.0.R1
All
Rising threshold for the sampled statistic
configure system thresholds rmon alarm number rising-threshold number
This command specifies the rising threshold for the sampled statistic. When the current sampled value is greater than or equal to this threshold and the value at the last sampling interval was below this threshold, a single threshold crossing event is generated. A single threshold crossing event is also generated if the first sample taken is greater than or equal to this threshold and the associated startup-alarm command is set to rising or either.
After a rising threshold crossing event is generated, another such event is not generated until the sampled value falls below this threshold and reaches or falls below the falling-threshold command setting.
-2147483648 to 2147483647
16.0.R1
All
Method to sample the selected variable and calculate the value comparing against the thresholds
configure system thresholds rmon alarm number sample-type keyword
absolute
absolute, delta
16.0.R1
All
Alarm to send when this entry is first set to valid
configure system thresholds rmon alarm number startup-alarm keyword
either
rising, falling, either
16.0.R1
All
Object identifier to sample the specific variable
configure system thresholds rmon alarm number variable-oid string
1 to 255
This element is mandatory.
16.0.R1
All
Enter the event list instance
configure system thresholds rmon event number
1200
16.0.R1
All
Index ID for an entry in the event table
configure system thresholds rmon event number
1 to 65400
This element is part of a list key.
16.0.R1
All
Text description
configure system thresholds rmon event number description string
1 to 80
16.0.R1
All
Type of notification action to be taken when this event occurs
configure system thresholds rmon event number event-type keyword
both
none, log, trap, both
16.0.R1
All
Owner that created this entry and uses the resources
1 to 80
TiMOS CLI
16.0.R1
All
Enter the time context
16.0.R1
All
Enter the dst-zone list instance
1
16.0.R1
All
Name of a summer time zone
1 to 5
This element is part of a list key.
16.0.R1
All
Enter the end context
16.0.R1
All
Day of the week when the daylight savings time setting ends
sunday
sunday, monday, tuesday, wednesday, thursday, friday, saturday
16.0.R1
All
Hour and number of minutes after which the daylight savings time ends
5
00:00
16.0.R1
All
Month of the week when the daylight savings time setting ends
january
january, february, march, april, may, june, july, august, september, october, november, december
16.0.R1
All
Week of the month when the daylight savings time setting ends
first
first, second, third, fourth, last
16.0.R1
All
Offset for summer time setting
0 to 60
60
minutes
16.0.R1
All
Enter the start context
16.0.R1
All
Day of the week when the daylight savings time setting starts
sunday
sunday, monday, tuesday, wednesday, thursday, friday, saturday
16.0.R1
All
Hour and number of minutes after which the daylight savings time starts
5
00:00
16.0.R1
All
Month of the week when the daylight savings time setting starts
january
january, february, march, april, may, june, july, august, september, october, november, december
16.0.R1
All
Week of the month when the daylight savings time setting starts
first
first, second, third, fourth, last
16.0.R1
All
Enable the ntp context
16.0.R1
All
Administrative state of NTP execution
configure system time ntp admin-state keyword
disable
enable, disable
16.0.R1
All
Reject NTP PDUs that do not match the authentication key-id, type, or key requirements
configure system time ntp authentication-check boolean
true
16.0.R1
All
Enter the authentication-key list instance
configure system time ntp authentication-key number
16.0.R1
All
Index of the NTP authentication key table that uniquely identifies an authentication key and type
configure system time ntp authentication-key number
1 to 255
This element is part of a list key.
16.0.R1
All
Key to authenticate NTP packets
1 to 71
This element is mandatory.
16.0.R1
All
Type of authentication method to authenticate NTP packet
des, message-digest
This element is mandatory.
16.0.R1
All
Enter the broadcast list instance
16.0.R1
All
Router name
This element is part of a list key.
16.0.R1
All
Interface to transmit or receive NTP broadcast packets
1 to 32
This element is part of a list key.
16.0.R1
All
Specifies the key-id of the authentication key and its authentication type used by this node to receive and transmit NTP packets to and from an NTP node.
configure system time ntp authentication-key number
16.0.R1
All
TTL value of messages transmitted by this broadcast address
1 to 255
127
16.0.R1
All
NTP version number generated or accepted by this node in NTP packets
2 to 4
4
16.0.R1
All
Enter the broadcast-client list instance
configure system time ntp broadcast-client string interface-name string
16.0.R1
All
Router name or VPRN service name
configure system time ntp broadcast-client string interface-name string
This element is part of a list key.
16.0.R1
All
Interface to transmit or receive NTP broadcast packets
configure system time ntp broadcast-client string interface-name string
1 to 32
This element is part of a list key.
16.0.R1
All
NTP PDUs authentication required when acting as a broadcast client
configure system time ntp broadcast-client string interface-name string authenticate boolean
false
16.0.R1
All
Enable the multicast context
16.0.R1
All
Specifies the key-id of the authentication key and its authentication type used by this node to receive and transmit NTP packets to and from an NTP node.
configure system time ntp authentication-key number
16.0.R1
All
NTP version number generated by the node
This command specifies the NTP version number that is generated by the node. This command does not need to be configured when in client mode, in which case all three versions are accepted.
2 to 4
4
16.0.R1
All
Enable the multicast-client context
16.0.R1
All
Authentication of NTP PDUs required when acting as a client
configure system time ntp multicast-client authenticate boolean
false
16.0.R1
All
Enable the ntp-server context
16.0.R1
All
Authentication of NTP PDUs when acting as a server
configure system time ntp ntp-server authenticate boolean
false
16.0.R1
All
Enter the peer list instance
16.0.R1
All
IP address of the peer for a peering relationship
This element is part of a list key.
16.0.R1
All
Router name or VPRN service name
This element is part of a list key.
16.0.R1
All
Specifies the key-id of the authentication key and its authentication type used by this node to receive and transmit NTP packets to and from an NTP node.
configure system time ntp authentication-key number
16.0.R1
All
NTP server from which is preferred to receive time
false
16.0.R1
All
NTP version number generated by the node
This command specifies the NTP version number that is generated by the node. This command does not need to be configured when in client mode, in which case all three versions are accepted.
2 to 4
4
16.0.R1
All
Enter the server list instance
16.0.R1
All
IP address of an external NTP server
ptp
This element is part of a list key.
16.0.R1
All
Router name or VPRN service name
This element is part of a list key.
16.0.R1
All
Specifies the key-id of the authentication key and its authentication type used by this node to receive and transmit NTP packets to and from an NTP node.
configure system time ntp authentication-key number
16.0.R1
All
NTP server from which is preferred to receive time
false
16.0.R1
All
NTP version number generated by the node
This command specifies the NTP version number that is generated by the node. This command does not need to be configured when in client mode, in which case all three versions are accepted.
2 to 4
4
16.0.R1
All
Use local time over UTC time in the system
configure system time prefer-local-time boolean
When configured to true, the system uses local time. This preference is applied to objects such as log file names, created and completed times reported in log files, NETCONF and gRPC date-and-time leafs, and rollback times displayed in show command outputs.
When configured to false, the system uses UTC time.
Note: The timezone used for show command outputs during a CLI session can be controlled using the environment time-display command.
Note: The format used for the date-time strings may change, depending on the command setting. For example, when this command is set to true, all date-time strings include a suffix of three to five characters that indicates the timezone used.
Note: The time format for timestamps on log events is controlled on a per-log basis, using the configure log log-id time-format command.
false
16.0.R1
All
Enter the sntp context
16.0.R1
All
Administrative state of SNTP
configure system time sntp admin-state keyword
disable
enable, disable
16.0.R1
All
Enter the server list instance
16.0.R1
All
IP address of the SNTP server
This element is part of a list key.
16.0.R1
All
Frequency of querying the server
64 to 1024
64
seconds
16.0.R1
All
Preference value for this SNTP server
false
16.0.R1
All
SNTP version supported by this server
1 to 3
3
16.0.R1
All
Mode for Simple Network Time Protocol (SNTP)
configure system time sntp sntp-state keyword
unicast
unicast, broadcast
16.0.R1
All
Enter the zone context
16.0.R1
All
Enter the non-standard context
The following elements are part of a choice: non-standard or standard.
16.0.R1
All
Non-standard time zone name
1 to 5
16.0.R1
All
Number of hours and minutes by which the time zone offsets from UTC
5 to 6
16.0.R1
All
Enter the standard context
The following elements are part of a choice: non-standard or standard.
16.0.R1
All
Standard time zone name
utc
hst, akst, pst, mst, cst, est, ast, nst, utc, gmt, wet, cet, eet, msk, msd, awst, acst, aest, nzst
16.0.R1
All
Enter the transmission-profile list instance
configure system transmission-profile string
16.0.R4
All
File transmission profile name
configure system transmission-profile string
1 to 32
This element is part of a list key.
16.0.R4
All
IPv4 source address of the file transmission connections
configure system transmission-profile string ipv4-source-address string
16.0.R4
All
IPv6 source address of the file transmission connections
configure system transmission-profile string ipv6-source-address string
16.0.R4
All
Maximum level of redirection
configure system transmission-profile string redirection number
1 to 8
16.0.R4
All
Number of attempts to reconnecting to the server
configure system transmission-profile string retry number
1 to 256
16.0.R4
All
Router instance that hosts the file transmission connection
configure system transmission-profile string router-instance string
1 to 64
Base
16.0.R4
All
Timeout for a response from the server
configure system transmission-profile string timeout number
1 to 3600
60
seconds
16.0.R4
All