t Commands – Part I
tab
tab
Syntax
[no] tab
Context
[Tree] (config>system>management-interface>cli>md-cli>environment>command-completion tab)
Full Context
configure system management-interface cli md-cli environment command-completion tab
Description
This command enables completion on the tab character.
The no form of this command reverts to the default value.
Default
tab
Platforms
7705 SAR Gen 2
table-size
table-size
Syntax
table-size table-size
Context
[Tree] (config>service>vpls>proxy-nd table-size)
[Tree] (config>service>vpls>proxy-arp table-size)
Full Context
configure service vpls proxy-nd table-size
configure service vpls proxy-arp table-size
Description
This command adds a table-size limit per service. By default, the table-size limit is 250; it can be set up to 16k entries per service. A non-configurable implicit high watermark of 95% and low watermark of 90% exists, per service and per system. When those watermarks are reached, a syslog/trap is triggered. When the system/service limit is reached, entries for a specified IP can be replaced (a different MAC can be learned and added) but no new IP entries will be added, regardless of the type (Static, evpn, dynamic). If the user attempts to change the table-size value to a value that cannot accommodate the number of existing entries, the attempt will fail.
Default
table-size 250
Parameters
- table-size
-
Specifies the table-size as number of entries for the service.
Platforms
7705 SAR Gen 2
tacplus
tacplus
Syntax
no tacplus
tacplus [create]
Context
[Tree] (config>service>vprn>aaa>rmt-srv tacplus)
Full Context
configure service vprn aaa remote-servers tacplus
Description
This command creates the context to configure TACACS+ authentication on the VPRN.
Configure multiple server addresses for each router for redundancy.
The no form of this command removes the TACACS+ configuration.
Parameters
- create
-
Keyword to create the TACACS+ configuration.
Platforms
7705 SAR Gen 2
tacplus
Syntax
[no] tacplus
Context
[Tree] (config>system>security tacplus)
Full Context
configure system security tacplus
Description
This command creates the context to configure TACACS+ authentication on the router.
Configure multiple server addresses for each router for redundancy.
The no form of this command removes the TACACS+ configuration.
Platforms
7705 SAR Gen 2
tacplus-map-to-priv-lvl
tacplus-map-to-priv-lvl
Syntax
tacplus-map-to-priv-lvl [admin-priv-lvl]
no tacplus-map-to-priv-lvl
Context
[Tree] (config>system>security>password>enable-admin-control tacplus-map-to-priv-lvl)
Full Context
configure system security password enable-admin-control tacplus-map-to-priv-lvl
Description
When tacplus-map-to-priv-lvl is enabled, and tacplus authorization is enabled with the use-priv-lvl option, typing enable-admin starts an interactive authentication exchange from the node to the TACACS+ server. The start message (service=enable) contains the user-id and the requested admin-priv-lvl. Successful authentication results in the use of a new profile (as configured under config>system>security>tacplus>priv-lvl-map).
Platforms
7705 SAR Gen 2
tag
tag
Syntax
tag tag
no tag [tag]
Context
[Tree] (config>service>vprn>static-route-entry tag)
Full Context
configure service vprn static-route-entry tag
Description
This command associates a 4-byte route-tag with the static route. The tag value can be used in route policies to control distribution of the static route into other protocols.
The tag specified at this level of the static route causes tag values configured under the next-hop, black-hole, and indirect contexts of the static route to be ignored.
The no form of this command removes the tag association.
Default
no tag
Parameters
- tag
-
Specifies an integer value.
Platforms
7705 SAR Gen 2
tag
Syntax
tag tag-value
no tag [tag-value]
Context
[Tree] (config>service>vprn>static-route-entry>next-hop tag)
[Tree] (config>service>vprn>static-route-entry>ipsec-tunnel tag)
[Tree] (config>service>vprn>static-route-entry>indirect tag)
Full Context
configure service vprn static-route-entry next-hop tag
configure service vprn static-route-entry ipsec-tunnel tag
configure service vprn static-route-entry indirect tag
Description
This command adds a 32-bit integer tag to the associated static route.
The tag value can be used in route policies to control distribution of the route into other protocols.
Default
no tag
Parameters
- tag-value
-
Specifies an integer tag value.
Platforms
7705 SAR Gen 2
tag
Syntax
tag tag
no tag
Context
[Tree] (config>service>vprn>isis>if tag)
Full Context
configure service vprn isis interface tag
Description
This command configures a route tag to the specified IP address of an interface.
Parameters
- tag
-
Specifies the tag value.
Platforms
7705 SAR Gen 2
tag
Syntax
tag tag
no tag [tag]
Context
[Tree] (config>router>static-route-entry tag)
[Tree] (config>router>static-route-entry>black-hole tag)
[Tree] (config>router>static-route-entry>indirect tag)
[Tree] (config>router>static-route-entry>next-hop tag)
Full Context
configure router static-route-entry tag
configure router static-route-entry black-hole tag
configure router static-route-entry indirect tag
configure router static-route-entry next-hop tag
Description
This command associates a 4-byte route-tag with the static route. The tag value can be used in route policies to control distribution of the static route into other protocols.
The tag specified at this level of the static route causes tag values configured under the next-hop, black-hole and indirect contexts of the static route to be ignored.
The no form of this command removes the tag association.
Default
no tag
Parameters
- tag
-
Specifies an integer tag value.
Platforms
7705 SAR Gen 2
tag
Syntax
tag tag
no tag
Context
[Tree] (config>router>isis>interface tag)
Full Context
configure router isis interface tag
Description
This command configures a route tag to the specified IP address of an interface.
The no form of this command removes the tag value from the configuration.
Parameters
- tag
-
Specifies a route tag.
Platforms
7705 SAR Gen 2
tag
Syntax
tag {no-tag | tag}
no tag
Context
[Tree] (config>router>policy-options>policy-statement>entry>from tag)
Full Context
configure router policy-options policy-statement entry from tag
Description
This command matches the tag value in static or IGP routes. A decimal or hexadecimal value of 4 octets can be entered. For IS-IS, OSPF, and static routes, all four octets can be used. For RIP and RIPng, only the two most significant octets are used if more than two octets are configured.
The no form of this command removes the tag field match criterion.
Default
no tag
Parameters
- tag
-
Matches the configured tag value.
- no-tag
-
Specifies that no tag value is set.
Platforms
7705 SAR Gen 2
tag
Syntax
tag tag
no tag
Context
[Tree] (config>router>policy-options>policy-statement>entry>action tag)
[Tree] (config>router>policy-options>policy-statement>default-action tag)
Full Context
configure router policy-options policy-statement entry action tag
configure router policy-options policy-statement default-action tag
Description
This command assigns a tag to routes matching the entry, which is then applied to IGP routes. A decimal or hexadecimal value of 4 octets can be entered.
For IS-IS and OSPF, all four octets can be used.
For RIP and RIPng, only the two most significant octets are used if more than two octets are configured.
The no form of this command removes the tag.
Default
no tag
Parameters
- tag
-
Assigns an IS-IS, OSPF, RIP or RIPng tag to routes matching the entry.
Platforms
7705 SAR Gen 2
taii-type2
taii-type2
Syntax
taii-type2 global-id:prefix:ac-id
no taii-type2
Context
[Tree] (config>service>epipe>spoke-sdp-fec taii-type2)
Full Context
configure service epipe spoke-sdp-fec taii-type2
Description
taii-type2 configures the target attachment individual identifier for the SDP SDP. This is only applicable to FEC129 AII type 2.
This command is blocked in CLI if this end of the spoke SDP is configured for single-sided auto configuration (using the auto-config command).
Parameters
- global-id
-
Specifies a global ID of this router T-PE. This value must correspond to one of the global_id values configured for a local-prefix under config>service>pw-routing>local-prefix context.
- prefix
-
Speecifies prefix on this router T-PE that the spoke SDP SDP is associated with. This value must correspond to one of the prefixes configured under config>service>pw-routing>local-prefix context.
- ac-id
-
Specifies an unsigned integer representing a locally unique identifier for the spoke SDP.
Platforms
7705 SAR Gen 2
tail-end
tail-end
Syntax
[no] tail-end
Context
[Tree] (config>router>lsp-bfd tail-end)
Full Context
configure router lsp-bfd tail-end
Description
Commands in this context configure LSP BFD tail-end parameters.
The no form of this command removes the context.
Default
no tail-end
Platforms
7705 SAR Gen 2
target-name
target-name
Syntax
target-name {node-name | user-agent | custom-string name}
no target-name
Context
[Tree] (config>system>grpc-tunnel>tunnel target-name)
Full Context
configure system grpc-tunnel tunnel target-name
Description
This command assigns a target name that the node will register with.
The no form of this command removes the target name.
Default
no target-name
Parameters
- node-name
-
Keyword to register the tunnel with the node name configured using the configure system name command.
- user-agent
-
Keyword to register the tunnel with the user agent name string defined as node-name:vendor:model:software-version.
- custom-string
-
Assigns an arbitrary string as the target name.
- name
-
Specifies a string, up to 64 characters, that defines the target name.
Platforms
7705 SAR Gen 2
target-power
target-power
Syntax
target-power power
Context
[Tree] (config>port>dwdm>coherent target-power)
Full Context
configure port dwdm coherent target-power
Description
This command configures the target transmit optical power for the port.
Default
target-power 1.00
Parameters
- power
-
Specifies the desired average output power in dBm.
Platforms
7705 SAR Gen 2
target-type
target-type
Syntax
target-type {grpc-server | ssh-server | custom-type type}
no target-type
Context
[Tree] (config>system>grpc-tunnel>tunnel>handler target-type)
Full Context
configure system grpc-tunnel tunnel handler target-type
Description
This command assigns a server as a handler for all tunnel sessions.
The no form of this command disables the tunnel handler server.
Default
no target-type
Parameters
- grpc-server
-
Keyword that assigns the gRPC server as a handler for all tunnels sessions. The gRPC-tunnel protocol value corresponds to "GNMI_GNOI”.
- ssh-server
-
Keyword that assigns the SSH server as a handler for all tunnels sessions. The gRPC-tunnel protocol value corresponds to "SSH”.
- custom-type
-
Keyword that assigns an arbitrary string as the target type.
- type
-
Specifies a string, up to 255 characters, defining the client to serve as a handler for all tunnel sessions. Values used by gRPC tunnel protocol, such as "GNMI_GNOI” or "SSH” can also be used.
Platforms
7705 SAR Gen 2
targeted-session
targeted-session
Syntax
targeted-session
Context
[Tree] (config>router>ldp targeted-session)
Full Context
configure router ldp targeted-session
Description
This command configures targeted LDP sessions. Targeted sessions are LDP sessions between non-directly connected peers. Hello messages are sent directly to the peer platform instead of to all the routers on this subnet multicast address. The user can configure different default parameters for IPv4 and IPv6 LDP targeted hello adjacencies.
The discovery messages for an indirect LDP session are addressed to the specified peer and not to the multicast address.
Platforms
7705 SAR Gen 2
task
task
Syntax
task [detail]
no task
Context
[Tree] (debug>router>pcep>pcc task)
[Tree] (debug>router>pcep>pcc>conn task)
Full Context
debug router pcep pcc task
debug router pcep pcc connection task
Description
This command enables debugging for PCC or connection task events.
The no form of this command disables debugging.
Parameters
- detail
-
Keyword used to specify detailed information about PCC or connection task events.
Platforms
7705 SAR Gen 2
tcp
tcp
Syntax
tcp
Context
[Tree] (config>service>ies>ipt tcp)
[Tree] (config>service>vprn>ipt tcp)
Full Context
configure service ies ip-transport tcp
configure service vprn ip-transport tcp
Description
Commands in this context configure TCP parameters within the IP transport subservice.
Platforms
7705 SAR-Hx, 7705 SAR-Mx
tcp-ack
tcp-ack
Syntax
tcp-ack {true | false}
no tcp-ack
Context
[Tree] (config>filter>ip-filter>entry>match tcp-ack)
[Tree] (config>filter>ipv6-filter>entry>match tcp-ack)
Full Context
configure filter ip-filter entry match tcp-ack
configure filter ipv6-filter entry match tcp-ack
Description
This command configures an IP filter match criterion based on the Acknowledgment (ACK) TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.
The no form of the command removes the criterion from the match entry.
Default
no tcp-ack
Parameters
- true
-
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
- false
-
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.
Platforms
7705 SAR Gen 2
tcp-cwr
tcp-cwr
Syntax
tcp-cwr {true | false}
no tcp-cwr
Context
[Tree] (config>filter>ip-filter>entry>match tcp-cwr)
[Tree] (config>filter>ipv6-filter>entry>match tcp-cwr)
Full Context
configure filter ip-filter entry match tcp-cwr
configure filter ipv6-filter entry match tcp-cwr
Description
This command configures an IP filter match criterion based on the Congestion Window Reduced (CWR) TCP Flag bit, defined in RFC 3168, as being set or not in the TCP header of an IP packet.
The no form of the command removes the criterion from the match entry.
Default
no tcp-cwr
Parameters
- true
-
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
- false
-
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.
Platforms
7705 SAR Gen 2
tcp-ece
tcp-ece
Syntax
tcp-ece {true | false}
no tcp-ece
Context
[Tree] (config>filter>ip-filter>entry>match tcp-ece)
[Tree] (config>filter>ipv6-filter>entry>match tcp-ece)
Full Context
configure filter ip-filter entry match tcp-ece
configure filter ipv6-filter entry match tcp-ece
Description
This command configures an IP filter match criterion based on the ECN-Echo (ECE) TCP Flag bit, defined in RFC 3168, as being set or not in the TCP header of an IP packet.
The no form of the command removes the criterion from the match entry.
Default
no tcp-ece
Parameters
- true
-
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
- false
-
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.
Platforms
7705 SAR Gen 2
tcp-established
tcp-established
Syntax
tcp-established [hrs hours] [min minutes] [sec seconds]
no tcp-established
Context
[Tree] (config>service>nat>nat-policy>timeouts tcp-established)
Full Context
configure service nat nat-policy timeouts tcp-established
Description
This command configures the idle timeout applied to a TCP session in the established state.
Default
tcp-established hrs 2 min 4
Parameters
- hours
-
Specifies the timeout hours field.
- minutes
-
Specifies the timeout minutes field.
- seconds
-
Specifies the timeout seconds field.
Platforms
7705 SAR Gen 2
tcp-established
Syntax
[no] tcp-established
Context
[Tree] (config>filter>ip-filter>entry>match tcp-established)
[Tree] (config>filter>ipv6-filter>entry>match tcp-established)
Full Context
configure filter ip-filter entry match tcp-established
configure filter ipv6-filter entry match tcp-established
Description
This command matches packets with the TCP flag ACK or RST.
Default
tcp-established
Platforms
7705 SAR Gen 2
tcp-established
Syntax
tcp-established [hrs hours] [min minutes] [sec seconds]
no tcp-established
Context
[Tree] (config>service>nat>cpm-nat-policy>timeouts tcp-established)
Full Context
configure service nat cpm-nat-policy timeouts tcp-established
Description
This command configures the idle timeout applied to a TCP session in the established state.
The no form of this commands reverts to the default value.
Default
tcp-established hrs 2 min 4
Parameters
- hours
-
Specifies the timeout, in hours.
- minutes
-
Specifies the timeout, in minutes.
- seconds
-
Specifies the timeout, in seconds.
Platforms
7705 SAR Gen 2
tcp-fin
tcp-fin
Syntax
tcp-fin {true | false}
no tcp-fin
Context
[Tree] (config>filter>ip-filter>entry>match tcp-fin)
[Tree] (config>filter>ipv6-filter>entry>match tcp-fin)
Full Context
configure filter ip-filter entry match tcp-fin
configure filter ipv6-filter entry match tcp-fin
Description
This command configures an IP filter match criterion based on the FIN TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.
The no form of the command removes the criterion from the match entry.
Default
no tcp-fin
Parameters
- true
-
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
- false
-
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.
Platforms
7705 SAR Gen 2
tcp-keepalive
tcp-keepalive
Syntax
tcp-keepalive
Context
[Tree] (config>system>grpc tcp-keepalive)
Full Context
configure system grpc tcp-keepalive
Description
Commands in this context configure the sending of TCP keepalives by the router towards all gRPC clients.
Enabling TCP keepalive speeds up the detection of certain failures. The TCP keepalives sent by the router are controlled by three commands: idle-time, interval, and retries. The router starts sending TCP keepalives when the connection has been idle (no TCP segments sent or received) for more than idle-time seconds. At that point, the router sends a probe (TCP ACK with a sequence number = current sequence number - 1) and expects a TCP ACK. It repeats this probe every interval seconds for the configured number of retries. If no response is received to any of the probes, the connection is immediately closed, which starts the purge timer if the TCP connection is currently supporting the RibApi service.
Platforms
7705 SAR Gen 2
tcp-keepalive
Syntax
tcp-keepalive
Context
[Tree] (config>system>telemetry>destination-group tcp-keepalive)
[Tree] (config>system>grpc-tunnel>destination-group tcp-keepalive)
Full Context
configure system telemetry destination-group tcp-keepalive
configure system grpc-tunnel destination-group tcp-keepalive
Description
Commands in this context configure TCP keepalive commands.
Platforms
7705 SAR Gen 2
tcp-mss
tcp-mss
Syntax
tcp-mss mss-value
no tcp-mss
Context
[Tree] (config>service>ies>if>ipv6 tcp-mss)
[Tree] (config>service>ies>if tcp-mss)
Full Context
configure service ies interface ipv6 tcp-mss
configure service ies interface tcp-mss
Description
This command statically sets the TCP maximum segment size (MSS) for TCP connections originated from the associated IP interface to the specified value.
The no form of this command removes the static value and allows the TCP MSS value to be calculated based on the IP MTU value by subtracting the base IP and TCP header lengths from the IP MTU value (tcp_mss = ip_mtu – 40).
Default
no tcp-mss
Parameters
- mss-value
-
The TCP MSS value that should be used in the TCP SYN packet during the three-way handshake negotiation of a TCP connection.
Note: 9158 = max-IP_MTU (9198)-40
Platforms
7705 SAR Gen 2
tcp-mss
Syntax
tcp-mss mss-value
no tcp-mss
Context
[Tree] (config>service>vprn>nw-if tcp-mss)
[Tree] (config>service>vprn>if>ipv6 tcp-mss)
[Tree] (config>service>vprn>if tcp-mss)
Full Context
configure service vprn network-interface tcp-mss
configure service vprn interface ipv6 tcp-mss
configure service vprn interface tcp-mss
Description
This command statically sets the TCP maximum segment size (MSS) for TCP connections originated from the associated IP or network interface to the specified value.
The no form of this command removes the static value and allows the TCP MSS value to be calculated based on the IP MTU value by subtracting the base IP and TCP header lengths from the IP MTU value (tcp_mss = ip_mtu – 40).
Default
no tcp-mss
Parameters
- mss-value
-
Specifies the TCP MSS value that should be used in the TCP SYN packet during the three-way handshake negotiation of a TCP connection.
Note: 9746 = max-IP_MTU (9786)-40
Platforms
7705 SAR Gen 2
tcp-mss
Syntax
tcp-mss mss-value
no tcp-mss
Context
[Tree] (config>router>if>ipv6 tcp-mss)
[Tree] (config>router>if tcp-mss)
Full Context
configure router interface ipv6 tcp-mss
configure router interface tcp-mss
Description
This command statically sets the TCP maximum segment size (MSS) for TCP connections originated from the associated IP interface to the specified value.
The no form of this command removes the static value and allows the TCP MSS value to be calculated based on the IP MTU value by subtracting the base IP and TCP header lengths from the IP MTU value (tcp_mss = ip_mtu – 40).
Default
no tcp-mss
Parameters
- mss-value
-
Specifies the TCP MSS value that should be used in the TCP SYN packet during the three-way handshake negotiation of a TCP connection.
9158 = max-IP_MTU (9198)-40
Platforms
7705 SAR Gen 2
tcp-mss
Syntax
tcp-mss mss-value
no tcp-mss
Context
[Tree] (config>service>vprn>bgp tcp-mss)
[Tree] (config>router>bgp tcp-mss)
Full Context
configure service vprn bgp tcp-mss
configure router bgp tcp-mss
Description
This command configures an override for the TCP maximum segment size to use with a specific peer or set of peers (depending on the scope of the command).
The configured value controls two properties of the TCP connection as follows:
-
TCP MSS option — The router advertises the TCP MSS option value in the TCP SYN packet it sends as part of the 3-way handshake. The advertised value may be lower than the configured value, depending on the IP MTU of the first hop IP interface. The peers are asked to abide by this value when sending TCP segments to the local router.
-
TCP maximum segment size — The actual transmitted size may be lower than the configured value, depending on the TCP MSS option value signaled by the peers, the effect of path MTU discovery, or other factors.
The no form of this command removes the TCP MSS override values from the configuration.
Default
no tcp-mss
Parameters
- mss-value
-
Specifies the The router uses the TCP SYN to advertise the TCP MSS option value towards its peer. MSS value, in bytes, to use with the peers that fall within the scope of the command.
Platforms
7705 SAR Gen 2
tcp-mss
Syntax
tcp-mss ip-stack
tcp-mss mss-value
no tcp-mss
Context
[Tree] (config>service>vprn>bgp>group>neighbor tcp-mss)
[Tree] (config>router>bgp>group tcp-mss)
[Tree] (config>service>vprn>bgp>group tcp-mss)
[Tree] (config>router>bgp>group>neighbor tcp-mss)
Full Context
configure service vprn bgp group neighbor tcp-mss
configure router bgp group tcp-mss
configure service vprn bgp group tcp-mss
configure router bgp group neighbor tcp-mss
Description
This command configures an override for the TCP maximum segment size to use with a specific peer or set of peers (depending on the scope of the command).
The configured value controls two properties of the TCP connection as follows:
-
TCP MSS option — The router advertises the TCP MSS option value in the TCP SYN packet it sends as part of the 3-way handshake. The advertised value may be lower than the configured value, depending on the IP MTU of the first hop IP interface. The peers are asked to abide by this value when sending TCP segments to the local router.
-
TCP maximum segment size — The actual transmitted size may be lower than the configured value, depending on the TCP MSS option value signaled by the peers, the effect of path MTU discovery, or other factors.
The no form of this command removes the TCP MSS override values from the configuration.
Default
no tcp-mss
Parameters
- mss-value
-
Specifies the TCP MSS value, in bytes, to use with the peers that fall within the scope of the command.
- ip-stack
-
This keyword requests that TCP MSS be derived from mechanisms and configurations outside of BGP, including the configuration of tcp-mss at the IP interface level. It provides a method to override inheritance within the BGP configuration.
Platforms
7705 SAR Gen 2
tcp-mss-adjust
tcp-mss-adjust
Syntax
tcp-mss-adjust segment-size
no tcp-mss-adjust
Context
[Tree] (config>service>nat>nat-policy tcp-mss-adjust)
Full Context
configure service nat nat-policy tcp-mss-adjust
Description
This command configures the value to adjust the TCP Maximum Segment Size (MSS) option.
The no form of the command returns the segment size to the default.
Default
no tcp-mss-adjust
Parameters
- segment-size
-
Specifies the value to put into the TCP Maximum Segment Size (MSS) option if not already present, or if the present value is higher.
Platforms
7705 SAR Gen 2
tcp-mss-adjust
Syntax
tcp-mss-adjust segment-size
no tcp-mss-adjust
Context
[Tree] (config>service>nat>cpm-nat-policy tcp-mss-adjust)
Full Context
configure service nat cpm-nat-policy tcp-mss-adjust
Description
This command configures the value to adjust the TCP MSS option.
The no form of this command returns the segment size to the default values.
Default
no tcp-mss-adjust
Parameters
- segment-size
-
Specifies the value to put into the TCP MSS option if not already present, or if the present value is higher.
Platforms
7705 SAR Gen 2
tcp-mss-adjust
Syntax
tcp-mss-adjust
Context
[Tree] (config>filter>ip-filter>entry>action tcp-mss-adjust)
[Tree] (config>filter>ipv6-filter>entry>action tcp-mss-adjust)
Full Context
configure filter ip-filter entry action tcp-mss-adjust
configure filter ipv6-filter entry action tcp-mss-adjust
Description
This command activates the adjustment of the TCP Maximum Segment Size (MSS) option of TCP packets matching the entry.
Platforms
7705 SAR Gen 2
tcp-ns
tcp-ns
Syntax
tcp-ns {true | false}
no tcp-ns
Context
[Tree] (config>filter>ipv6-filter>entry>match tcp-ns)
[Tree] (config>filter>ip-filter>entry>match tcp-ns)
Full Context
configure filter ipv6-filter entry match tcp-ns
configure filter ip-filter entry match tcp-ns
Description
This command configures an IP filter match criterion based on the Nonce Sum (NS) TCP Flag bit, defined in RFC 3540, as being set or not in the TCP header of an IP packet.
The no form of the command removes the criterion from the match entry.
Default
no tcp-ns
Parameters
- true
-
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
- false
-
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.
Platforms
7705 SAR Gen 2
tcp-option-number
tcp-option-number
Syntax
tcp-option-number
Context
[Tree] (config>system>security>keychain tcp-option-number)
Full Context
configure system security keychain tcp-option-number
Description
Commands in this context configure the TCP option number to be placed in the TCP packet header.
Platforms
7705 SAR Gen 2
tcp-psh
tcp-psh
Syntax
tcp-psh {true | false}
no tcp-psh
Context
[Tree] (config>filter>ipv6-filter>entry>match tcp-psh)
[Tree] (config>filter>ip-filter>entry>match tcp-psh)
Full Context
configure filter ipv6-filter entry match tcp-psh
configure filter ip-filter entry match tcp-psh
Description
This command configures an IP filter match criterion based on the Push (PSH) TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.
The no form of the command removes the criterion from the match entry.
Default
no tcp-psh
Parameters
- true
-
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
- false
-
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.
Platforms
7705 SAR Gen 2
tcp-rst
tcp-rst
Syntax
tcp-rst {true | false}
no tcp-rst
Context
[Tree] (config>filter>ip-filter>entry>match tcp-rst)
[Tree] (config>filter>ipv6-filter>entry>match tcp-rst)
Full Context
configure filter ip-filter entry match tcp-rst
configure filter ipv6-filter entry match tcp-rst
Description
This command configures an IP filter match criterion based on the Reset (RST) TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.
The no form of the command removes the criterion from the match entry.
Default
no tcp-rst
Parameters
- true
-
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
- false
-
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.
Platforms
7705 SAR Gen 2
tcp-session-parameters
tcp-session-parameters
Syntax
tcp-session-parameters
Context
[Tree] (config>router>ldp tcp-session-parameters)
Full Context
configure router ldp tcp-session-parameters
Description
Commands in this context configure parameters applicable to TCP transport session of an LDP session to remote peer.
Platforms
7705 SAR Gen 2
tcp-syn
tcp-syn
Syntax
tcp-syn [hrs hours] [min minutes] [sec seconds]
no tcp-syn
Context
[Tree] (config>service>nat>nat-policy>timeouts tcp-syn)
Full Context
configure service nat nat-policy timeouts tcp-syn
Description
This command configures the timeout applied to a TCP session in the SYN state.
Default
tcp-syn sec 15
Parameters
- hours
-
Specifies the timeout hours field.
- minutes
-
Specifies the timeout minutes field.
- seconds
-
Specifies the timeout seconds field.
Platforms
7705 SAR Gen 2
tcp-syn
Syntax
tcp-syn {true | false}
no tcp-syn
Context
[Tree] (config>filter>ip-filter>entry>match tcp-syn)
[Tree] (config>filter>ipv6-filter>entry>match tcp-syn)
Full Context
configure filter ip-filter entry match tcp-syn
configure filter ipv6-filter entry match tcp-syn
Description
This command configures an IP filter match criterion based on the Synchronize (SYN) TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.
The no form of the command removes the criterion from the match entry.
Default
no tcp-syn
Parameters
- true
-
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
- false
-
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.
Platforms
7705 SAR Gen 2
tcp-syn
Syntax
tcp-syn [hrs hours] [min minutes] [sec seconds]
no tcp-syn
Context
[Tree] (config>service>nat>cpm-nat-policy>timeouts tcp-syn)
Full Context
configure service nat cpm-nat-policy timeouts tcp-syn
Description
This command configures the timeout applied to a TCP session in the SYN state.
The no form of this commands reverts to the default value.
Default
tcp-syn sec 15
Parameters
- hours
-
Specifies the timeout, in hours.
- minutes
-
Specifies the timeout, in minutes.
- seconds
-
Specifies the timeout, in seconds.
Platforms
7705 SAR Gen 2
tcp-time-wait
tcp-time-wait
Syntax
tcp-time-wait [min minutes] [sec seconds]
no tcp-time-wait
Context
[Tree] (config>service>nat>nat-policy>timeouts tcp-time-wait)
Full Context
configure service nat nat-policy timeouts tcp-time-wait
Description
This command configures the timeout applied to a TCP session in a time-wait state.
Default
no tcp-time-wait
Parameters
- minutes
-
Specifies the timeout minutes field.
- seconds
-
Specifies the timeout seconds field.
Platforms
7705 SAR Gen 2
tcp-time-wait
Syntax
tcp-time-wait [min minutes] [sec seconds]
no tcp-time-wait
Context
[Tree] (config>service>nat>cpm-nat-policy>timeouts tcp-time-wait)
Full Context
configure service nat cpm-nat-policy timeouts tcp-time-wait
Description
This command configures the timeout applied to a TCP session in a time-wait state.
The no form of this commands removes the timeout.
Default
no tcp-time-wait
Parameters
- minutes
-
Specifies the timeout, in minutes.
- seconds
-
Specifies the timeout, in seconds.
Platforms
7705 SAR Gen 2
tcp-transitory
tcp-transitory
Syntax
tcp-transitory [hrs hours] [min minutes] [sec seconds]
no tcp-transitory
Context
[Tree] (config>service>nat>nat-policy>timeouts tcp-transitory)
Full Context
configure service nat nat-policy timeouts tcp-transitory
Description
This command configures the idle timeout applied to a TCP session in a transitory state.
Default
tcp-transitory min 4
Parameters
- hours
-
Specifies the timeout hours field.
- minutes
-
Specifies the timeout minutes field.
- seconds
-
Specifies the timeout seconds field.
Platforms
7705 SAR Gen 2
tcp-transitory
Syntax
tcp-transitory [hrs hours] [min minutes] [sec seconds]
no tcp-transitory
Context
[Tree] (config>service>nat>cpm-nat-policy>timeouts tcp-transitory)
Full Context
configure service nat cpm-nat-policy timeouts tcp-transitory
Description
This command configures the idle timeout applied to a TCP session in a transitory state.
The no form of this commands reverts to the default value.
Default
tcp-transitory min 4
Parameters
- hours
-
Specifies the timeout, in hours.
- minutes
-
Specifies the timeout, in minutes.
- seconds
-
Specifies the timeout, in seconds.
Platforms
7705 SAR Gen 2
tcp-urg
tcp-urg
Syntax
tcp-urg {true | false}
no tcp-urg
Context
[Tree] (config>filter>ipv6-filter>entry>match tcp-urg)
[Tree] (config>filter>ip-filter>entry>match tcp-urg)
Full Context
configure filter ipv6-filter entry match tcp-urg
configure filter ip-filter entry match tcp-urg
Description
This command configures an IP filter match criterion based on the Urgent (URG) TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.
The no form of the command removes the criterion from the match entry.
Default
no tcp-urg
Parameters
- true
-
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
- false
-
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.
Platforms
7705 SAR Gen 2
tdm
tdm
Syntax
tdm
Context
[Tree] (config>port tdm)
Full Context
configure port tdm
Description
Commands in this context configure E1 parameters for a port on a channelized 8-port T1/E1 ASAP Adapter card and TPIF parameters for ports 1/1/[5 to 8] on the Combination module m4-rs232-rj45+4-c3794-sfp MDA.
The TDM mechanism divides the bandwidth of a stream into separate channels or timeslots by assigning each stream a different timeslot in a set. TDM repeatedly transmits a fixed sequence of timeslots over a single transmission channel. Each individual data stream is reassembled at the receiving end based on the timing.
Platforms
7705 SAR-Hx, 7705 SAR-Mx
te
te
Syntax
[no] te
Context
[Tree] (debug>router>mpls>event te)
Full Context
debug router mpls event te
Description
This command debugs te events.
The no form of the command disables the debugging.
Platforms
7705 SAR Gen 2
te-class
te-class
Syntax
te-class te-class-number class-type ct-number priority priority
no te-class te-class-number
Context
[Tree] (config>router>rsvp>diffserv-te te-class)
Full Context
configure router rsvp diffserv-te te-class
Description
This command configures a TE class. A TE class is defined as:
TE Class = {Class Type (CT), LSP priority}
Eight TE classes are supported. There is no default TE class once Diff-Serv is enabled. The user has to explicitly define each TE class.
When Diff-Serv is disabled, there will be an internal use of the default CT (CT0) and eight pre-emption priorities as shown in Default Class Type.
|
Class Type (CT internal) |
LSP Priority |
|---|---|
|
0 |
7 |
|
0 |
6 |
|
0 |
5 |
|
0 |
4 |
|
0 |
3 |
|
0 |
2 |
|
0 |
1 |
|
0 |
0 |
The no form of this command deletes the TE class.
Parameters
- te-class te-class-number
-
Specifies the TE class number.
- class-type ct-number
-
Specifies the Diff-Serv Class Type number. One or more system forwarding classes can be mapped to a CT.
- priority priority
-
Specifies the LSP priority.
Platforms
7705 SAR Gen 2
te-down-threshold
te-down-threshold
Syntax
te-down-threshold threshold-level [threshold-level]
no te-down-threshold
Context
[Tree] (config>router>rsvp>interface te-down-threshold)
[Tree] (config>router>rsvp te-down-threshold)
Full Context
configure router rsvp interface te-down-threshold
configure router rsvp te-down-threshold
Description
This command configures the specific threshold levels per node and per interface. Threshold levels are for reserved bandwidth per interface. The te-threshold-update command is used to enable or disable threshold-based IGP TE updates. Any reserved bandwidth change per interface is compared with all the threshold levels and trigger an IGP TE update if a defined threshold level is crossed in either direction (LSP setup or teardown). Threshold-based updates must be supported with both ISIS and OSPF. A minimum of one and a maximum of 16 threshold levels is supported.
Threshold levels configured per node is inherited by all configured RSVP interfaces. Threshold levels defined under the RSVP interface is used to trigger IGP updates if non-default threshold levels are configured.
The no form of this command resets te-down-threshold to its default value.
Default
no te-down-threshold (equals following values 100 99 98 97 96 95 90 85 80 75 60 45 30 15 0)
Parameters
- threshold-level
-
Specifies the threshold level.
Platforms
7705 SAR Gen 2
te-metric
te-metric
Syntax
te-metric value
no te-metric
Context
[Tree] (config>router>mpls>interface te-metric)
Full Context
configure router mpls interface te-metric
Description
This command configures the TE metric used on the interface. This metric is in addition to the interface metric used by IGP for the shortest path computation.
This metric is flooded as part of the TE parameters for the interface using an opaque LSA or an LSP. The IS-IS TE metric is encoded as sub-TLV 18 as part of the extended IS reachability TLV. The metric value is encoded as a 24-bit unsigned integer. The OSPF TE metric is encoded as a sub-TLV Type 5 in the Link TLV. The metric value is encoded as a 32-bit unsigned integer.
When the use of the TE metric is enabled for an LSP, CSPF will first prune all links in the network topology which do not meet the constraints specified for the LSP path. Such constraints include bandwidth, admin-groups, and hop limit. Then, CSPF will run an SPF on the remaining links. The shortest path among the all SPF paths will be selected based on the TE metric instead of the IGP metric which is used by default.
The TE metric in CSPF LSP path computation can be configured by entering the command config>router>mpls>lsp>metric-type te.
Note that the TE metric is only used in CSPF computations for MPLS paths and not in the regular SPF computation for IP reachability.
The no form of this command reverts to the default value.
Default
no te-metric
The value of the IGP metric is advertised in the TE metric sub-TLV by IS-IS and OSPF.
Parameters
- value
-
Specifies the metric value.
Platforms
7705 SAR Gen 2
te-threshold-update
te-threshold-update
Syntax
[no] te-threshold-update
Context
[Tree] (config>router>rsvp te-threshold-update)
Full Context
configure router rsvp te-threshold-update
Description
This command is used to control threshold-based IGP TE updates. The te-threshold-update command must enable IGP TE update based only on bandwidth reservation thresholds per interface and must block IGP TE update on bandwidth changes for each reservation. Threshold levels can be defined using the te-up-threshold and te-down-threshold commands at the global RSVP or per-interface level.
The no form of this command should reset te-threshold-update to the default value and disable threshold based update.
Default
no te-threshold-update
Platforms
7705 SAR Gen 2
te-threshold-update
Syntax
te-threshold-update
no te-threshold-update
Context
[Tree] (debug>router>rsvp>event te-threshold-update)
Full Context
debug router rsvp event te-threshold-update
Description
This command debugs the TE threshold update and the dark bandwidth threshold events.
The no form of this command disables the debugging.
Platforms
7705 SAR Gen 2
te-up-threshold
te-up-threshold
Syntax
te-up-threshold threshold-level [threshold-level]
no te-up-threshold
Context
[Tree] (config>router>rsvp>interface te-up-threshold)
[Tree] (config>router>rsvp te-up-threshold)
Full Context
configure router rsvp interface te-up-threshold
configure router rsvp te-up-threshold
Description
This command configures the specific threshold levels per node and per interface. Threshold levels are for reserved bandwidth per interface. The te-threshold-update command is used to enable or disable threshold-based IGP TE updates. Any reserved bandwidth change per interface is compared with all the threshold levels and trigger an IGP TE update if a defined threshold level is crossed in either direction (LSP setup or teardown). Threshold-based updates must be supported with both ISIS and OSPF. A minimum of one and a maximum of 16 threshold levels must be supported.
Threshold levels configured per node is inherited by all configured RSVP interfaces. Threshold levels defined under the RSVP interface is used to trigger IGP updates if non-default threshold levels are configured.
The no form of this command resets te-up-threshold to its default value.
Default
no te-up-threshold (equals values of 0 15 30 45 60 75 80 85 90 95 96 97 98 99 100)
Parameters
- threshold-level
-
Specifies the threshold level.
Platforms
7705 SAR Gen 2
tech-support
tech-support
Syntax
tech-support [file-url]
Context
[Tree] (admin tech-support)
Full Context
admin tech-support
Description
This command creates a system core dump. If the file-url is omitted, and a ts-location is defined, then the tech support file will have an automatic SR OS generated file name based on the system name and the date and time and will be saved to the directory indicated by the configured ts-location.
The format of the auto-generated filename is ts-XXXXX.YYYYMMDD.HHMMUTC.dat where:
-
XXXXX: system name with special characters expanded to avoid problems with file systems (for example, a '.' is expanded to %2E.)
-
YYYYMMDD: Date with leading zeros on year, month and day
-
HHMM: Hours and Minutes in UTC time (24hr format, always 4 chars, with leading zeros on hours and minutes)
This command should only be used with authorized direction of Nokia support.
Parameters
- file-url
-
Specifies the file URL location to save the binary file.
Platforms
7705 SAR Gen 2
telemetry
telemetry
telemetry-data
telemetry-data
Syntax
[no] telemetry-data
Context
[Tree] (config>system>security>management-interface>output-authorization telemetry-data)
Full Context
configure system security management-interface output-authorization telemetry-data
Description
This command controls output authorization of telemetry configuration and state data in gNMI Subscribe RPC responses.
When enabled, telemetry data output authorization is performed, which may significantly increase the system response time with command authorization requests, especially when remote AAA servers are used.
By default, authorization checks are not performed for telemetry data.
The no form of this command reverts to the default value.
Default
no telemetry-data
Platforms
7705 SAR Gen 2
telnet
telnet
Syntax
telnet {ip-address | dns-name} [port] service-name service-name [source ip-address]
telnet {ip-address | dns-name} [port] [router router-instance] [source ip-address]
Context
[Tree] (telnet)
Full Context
telnet
Description
This command opens a Telnet session to a remote host. In 7705 SAR Gen 2 networks, the Telnet servers limit Telnet clients to three login attempts; if unsuccessful, the Telnet client session is disconnected. The number is not user configurable.
If a source address is specified, it is used for the source IP address in the originated IP packets for the Telnet session.
Parameters
- ip-address
-
Specifies the IP address or the DNS name (if DNS name resolution is configured).
- dns-name
-
Specifies the DNS name (if DNS name resolution is configured), up to 128 characters.
- port
-
Specifies the TCP port number to use Telnet to the remote host, expressed as a decimal integer.
- router-instance
-
Specifies the router name or service ID used to identify the router instance.
- service-name
-
Specifies the service name, up to 64 characters.
- source ip-address
-
Specifies the source IP address to use as the source of the Telnet packets.
Platforms
7705 SAR Gen 2
telnet
telnet-max-sessions
telnet-max-sessions
Syntax
telnet-max-sessions number-of-sessions
no telnet-max-sessions
Context
[Tree] (config>system>security>profile telnet-max-sessions)
[Tree] (config>system>security>cli-session-group telnet-max-sessions)
Full Context
configure system security profile telnet-max-sessions
configure system security cli-session-group telnet-max-sessions
Description
This command is used to limit the number of Telnet-based CLI sessions available to all users that are part of a particular profile, or to all users of all profiles that are part of the same cli-session-group.
The no form of this command disables the command and the profile/group limit is not applied on the number of sessions.
Default
no telnet-max-sessions
Parameters
- number-of-sessions
-
Specifies the maximum number of allowed Telnet-based CLI sessions.
Platforms
7705 SAR Gen 2
telnet-reply
telnet-reply
Syntax
[no] telnet-reply
Context
[Tree] (config>service>ies>if>ipv6>vrrp telnet-reply)
Full Context
configure service ies interface ipv6 vrrp telnet-reply
Description
This command enables the non-owner master to reply to TCP port 23 Telnet requests directed at the virtual router instances IP addresses. The Telnet request can be received on any routed interface. Telnet must not have been disabled at the management security level (either on the parental IP interface or based on the Telnet source host address). Proper login and CLI command authentication is still enforced.
When telnet-reply is not enabled, TCP port 23 Telnet packets to non-owner master virtual IP addresses are silently discarded.
Non-owner backup virtual routers never respond to Telnet requests regardless of the telnet-reply configuration.
The telnet-reply command is only available in non-owner VRRP nodal context. If the telnet-reply command is not executed, Telnet packets to the virtual router instance IP addresses will be silently discarded.
The no form of this command restores the default operation of discarding all Telnet packets destined to the non-owner virtual router instance IP addresses.
Default
no telnet-reply
Platforms
7705 SAR Gen 2
telnet-reply
Syntax
[no] telnet-reply
Context
[Tree] (config>service>ies>if>vrrp telnet-reply)
Full Context
configure service ies interface vrrp telnet-reply
Description
The telnet-reply command enables the non-owner master to reply to TCP port 23 Telnet Requests directed at the virtual router instances IP addresses. The Telnet request can be received on any routed interface. Telnet must not have been disabled at the management security level (either on the parental IP interface or based on the Telnet source host address). Proper login and CLI command authentication is still enforced.
When telnet-reply is not enabled, TCP port 23 Telnet packets to non-owner master virtual IP addresses are silently discarded.
Non-owner backup virtual routers never respond to Telnet Requests regardless of the telnet-reply configuration.
The telnet-reply command is only available in non-owner VRRP nodal context. If the telnet-reply command is not executed, Telnet packets to the virtual router instance IP addresses will be silently discarded.
The no form of this command restores the default operation of discarding all Telnet packets destined to the non-owner virtual router instance IP addresses.
Default
no telnet-reply
Platforms
7705 SAR Gen 2
telnet-reply
Syntax
[no] telnet-reply
Context
[Tree] (config>service>vprn>if>vrrp telnet-reply)
[Tree] (config>service>vprn>if>ipv6>vrrp telnet-reply)
Full Context
configure service vprn interface vrrp telnet-reply
configure service vprn interface ipv6 vrrp telnet-reply
Description
This command enables the non-owner master to reply to TCP port 23 Telnet Requests directed at the virtual router instance’s IP addresses. The Telnet request can be received on any routed interface. Telnet must not have been disabled at the management security level (either on the parental IP interface or based on the Telnet source host address). Proper login and CLI command authentication is still enforced.
When telnet-reply is not enabled, TCP port 23 Telnet packets to non-owner master virtual IP addresses are silently discarded.
Non-owner backup virtual routers never respond to Telnet Requests regardless of the telnet-reply configuration.
The telnet-reply command is only available in non-owner VRRP nodal context. If the telnet-reply command is not executed, Telnet packets to the virtual router instance IP addresses will be silently discarded.
The no form of this command restores the default operation of discarding all Telnet packets destined to the non-owner virtual router instance IP addresses.
Default
no telnet-reply
Platforms
7705 SAR Gen 2
telnet-reply
Syntax
[no] telnet-reply
Context
[Tree] (config>router>if>ipv6>vrrp telnet-reply)
[Tree] (config>router>if>vrrp telnet-reply)
Full Context
configure router interface ipv6 vrrp telnet-reply
configure router interface vrrp telnet-reply
Description
This command enables the non-owner master to reply to TCP port 23 Telnet requests directed at the virtual router instances’ IP addresses.
Non-owner virtual router instances are limited by the VRRP specifications to responding to ARP requests destined to the virtual router IP addresses and routing IP packets not addressed to the virtual router IP addresses. Many network administrators find this limitation frustrating when troubleshooting VRRP connectivity issues.
This limitation can be disregarded for certain applications. Ping, SSH and Telnet can each be individually enabled or disabled on a per-virtual-router-instance basis.
The telnet-reply command enables the non-owner master to reply to Telnet requests directed at the virtual router instances’ IP addresses. The Telnet request can be received on any routed interface. Telnet must not have been disabled at the management security level (either on the parental IP interface or based on the Telnet source host address). Correct login and CLI command authentication is still enforced.
When telnet-reply is not enabled, Telnet requests to non-owner master virtual IP addresses are silently discarded.
Non-owner backup virtual routers never respond to Telnet requests regardless of the telnet-reply setting.
The telnet-reply command is only available in non-owner vrrp nodal context.
By default, Telnet requests to the virtual router instance IP addresses will be silently discarded.
The no form of the command configures discarding all Telnet request messages destined to the non-owner virtual router instance IP addresses.
Default
no telnet-reply — Telnet requests to the virtual router instance IP addresses are discarded.
Platforms
7705 SAR Gen 2
telnet-server
telnet-server
Syntax
[no] telnet-server
Context
[Tree] (config>system>security telnet-server)
Full Context
configure system security telnet-server
Description
This command enables Telnet servers running on the system.
Telnet servers are shut down by default. At system startup, only SSH servers are enabled.
Telnet servers in networks limit a Telnet clients to three retries to login. The Telnet server disconnects the Telnet client session after three retries.
The no form of this command disables Telnet servers running on the system.
Platforms
7705 SAR Gen 2
telnet6-server
telnet6-server
Syntax
[no] telnet6-server
Context
[Tree] (config>system>security telnet6-server)
Full Context
configure system security telnet6-server
Description
This command enables Telnet IPv6 servers running on the system.
Telnet servers are shut down by default. At system startup, only SSH servers are enabled.
The no form of this command disables Telnet IPv6 servers running on the system.
Platforms
7705 SAR Gen 2
temp-flooding
temp-flooding
Syntax
temp-flooding flood-time
no temp-flooding
Context
[Tree] (config>service>template>vpls-template temp-flooding)
[Tree] (config>service>vpls temp-flooding)
Full Context
configure service template vpls-template temp-flooding
configure service vpls temp-flooding
Description
The temporary flooding is designed to minimize failover times by eliminating the time it takes to flush the MAC tables and if MVRP is enabled the time it takes for MVRP registration. Temporary flooding is initiated only upon xSTP TCN reception. During this procedure while the MAC flush takes place the frames received on one of the VPLS SAPs/pseudowires are flooded in a VPLS context which for MVRP case includes also the unregistered MVRP trunk ports. The MAC Flush action is initiated by the STP TCN reception or if MVRP is enabled for the data VPLS, by the reception of a MVRP New message for the SVLAN ID associated with the data VPLS. As soon as the MAC Flush is done, regardless of whether the temp-flooding timer expired or not, traffic will be delivered according to the regular FDB content which may be built from MAC Learning or based on MVRP registrations. This command provides a flood-time value that configures a fixed amount of time, in seconds, during which all traffic is flooded (BUM or known unicast) as a safety mechanism. Once the flood-time expires, traffic will be delivered according to the regular FDB content which may be built from MAC Learning or based on MVRP registrations. The temporary flooding timer should be configured in such a way to allow auxiliary processes like MAC Flush, MMRP and/or MVRP to complete/converge. The temporary flooding behavior applies to regular VPLS, VPLS instantiated with VPLS-template, IVPLS and BVPLS when MMRP is disabled.
The no form of this command disables the temporary flooding behavior.
Default
no temp-flooding
Parameters
- flood-time
-
Specifies the flood time, in seconds
Platforms
7705 SAR Gen 2
template
template
Syntax
template
Context
[Tree] (config>service template)
Full Context
configure service template
Description
This is the node for service templates.
Platforms
7705 SAR Gen 2
template
Syntax
[no] template name
Context
[Tree] (config>router>route-next-hop-policy template)
Full Context
configure router route-next-hop-policy template
Description
This command creates a template to configure the attributes of a Loop-Free Alternate (LFA) Shortest Path First (SPF) policy. An LFA SPF policy allows the user to apply specific criteria, such as admin group and SRLG constraints, to the selection of an LFA backup next-hop for a subset of prefixes that resolve to a specific primary next-hop.
The user first creates a route next-hop policy template under the global router context and then applies it to a specific OSPF or IS-IS interface in the global routing instance or in a VPRN instance.
A policy template can be used in both IS-IS and OSPF to apply the specific criteria to prefixes protected by LFA. Each instance of IS-IS or OSPF can apply the same policy template to one or more interface.
The commands within the route next-hop policy template use the begin-commit-abort model. The following are the steps to create and modify the template:
To create a template, the user enters the name of the new template directly under the route-next-hop-policy context.
-
To delete a template that is not in use, the user enters the no form for the template name under the route-next-hop-policy context.
-
The user enters the editing mode by executing the begin command under the route-next-hop-policy context. The user can then edit and change any number of route next-hop policy templates. However, the parameter value will still be stored temporarily in the template module until the commit is executed under the route-next-hop-policy context. Any temporary parameter changes will be lost if the user enters the abort command before the commit command.
-
The user is allowed to create or delete a template instantly once in the editing mode without the need to enter the commit command. Furthermore, the abort command, if entered, will have no effect on the prior deletion or creation of a template.
Once the commit command is issued, IS-IS or OSPF will re-evaluate the templates and if there are any net changes, it will schedule a new LFA SPF to re-compute the LFA next-hop for the prefixes associated with these templates.
Parameters
- name
-
Specifies the name of the template, up to 32 characters.
Platforms
7705 SAR Gen 2
terminal
terminal
Syntax
terminal
no terminal
Context
[Tree] (environment terminal)
Full Context
environment terminal
Description
Commands in this context configure the terminal screen length for the current CLI session.
Platforms
7705 SAR Gen 2
tertiary-config
tertiary-config
Syntax
tertiary-config file-url
no tertiary-config
Context
[Tree] (bof tertiary-config)
Full Context
bof tertiary-config
Description
This command specifies the name and location of the tertiary configuration file.
The system attempts to use the configuration specified in tertiary-config if both the primary and secondary config files cannot be located. If this file cannot be located, the system boots with the factory default configuration.
Note that if an error in the configuration file is encountered, the boot process aborts.
The no form of this command removes the tertiary-config configuration.
Parameters
- file-url
-
Specifies the tertiary configuration file location, expressed as a file URL.
Platforms
7705 SAR Gen 2
tertiary-dns
tertiary-dns
Syntax
tertiary-dns ip-address
no tertiary-dns
Context
[Tree] (config>service>vprn>dns tertiary-dns)
Full Context
configure service vprn dns tertiary-dns
Description
This command configures the tertiary DNS server for DNS name resolution. The tertiary DNS server is used only if the primary DNS server and the secondary DNS server do not respond.
DNS name resolution can be used when executing ping, traceroute, and service-ping, and also when defining file URLs. DNS name resolution is not supported when DNS names are embedded in configuration files.
The no form of this command removes the tertiary DNS server from the configuration.
Default
no tertiary-dns — No tertiary DNS server is configured.
Parameters
- ip-address
-
The IP or IPv6 address of the tertiary DNS server.
Platforms
7705 SAR Gen 2
tertiary-dns
Syntax
tertiary-dns ip-address
no tertiary-dns [ip-address]
Context
[Tree] (bof tertiary-dns)
Full Context
bof tertiary-dns
Description
This command configures the tertiary DNS server for DNS name resolution. The tertiary DNS server is used only if the primary DNS server and the secondary DNS server do not respond.
DNS name resolution can be used when executing ping, traceroute, and service-ping, and also when defining file URLs. DNS name resolution is not supported when DNS names are embedded in configuration files.
The no form of this command removes the tertiary DNS server from the configuration.
Default
no tertiary-dns
Parameters
- ip-address
-
Specifies the IP or IPv6 address of the tertiary DNS server.
Platforms
7705 SAR Gen 2
tertiary-image
tertiary-image
Syntax
tertiary-image file-url
no tertiary-image
Context
[Tree] (bof tertiary-image)
Full Context
bof tertiary-image
Description
This command specifies the tertiary directory location for runtime image file loading.
The system attempts to load all runtime image files configured in the primary-image first. If this fails, the system attempts to load the runtime images from the location configured in the secondary-image. If the secondary image load fails, the tertiary image specified in tertiary-image is used.
All runtime image files (*.tim files) must be located in the same directory.
The no form of this command removes the tertiary-image configuration.
Parameters
- file-url
-
Specifies the file URL; can be either local (this CPM) or a remote FTP server.
Platforms
7705 SAR Gen 2
tertiary-ip-address
tertiary-ip-address
Syntax
tertiary-ip-address ipv4-address
no tertiary-ip-address
Context
[Tree] (config>router>bgp>orr>location tertiary-ip-address)
Full Context
configure router bgp optimal-route-reflection location tertiary-ip-address
Description
This command specifies the tertiary IP address of a reference location used for BGP optimal route reflection. Up to three IPv4 addresses and three IPv6 addresses can be specified per location.
If the TE DB is unable to find a node in its topology database that matches the primary address, then the TE DB tries to find a node with the matching secondary address. If this attempt also fails, the TE DB then tries to find a node with the matching tertiary address.
The IP addresses specified for a location should be topologically "close” to a set of clients that should all receive the same optimal path for that location.
The no form of this command removes the tertiary IP address information.
Default
no tertiary-ip-address
Parameters
- ipv4-address
-
Specifies the tertiary IPv4 address of a location, expressed in dotted decimal notation.
Platforms
7705 SAR Gen 2
tertiary-ipv6-address
tertiary-ipv6-address
Syntax
tertiary-ipv6-address ipv6-address
no tertiary-ipv6-address
Context
[Tree] (config>router>bgp>orr>location tertiary-ipv6-address)
Full Context
configure router bgp optimal-route-reflection location tertiary-ipv6-address
Description
This command specifies the tertiary IPv6 address of a reference location used for BGP optimal route reflection. Up to three IPv4 addresses and three IPv6 addresses can be specified per location.
If the TE DB is unable find a node in its topology database that matches a primary address of the location, then it tries to find a node matching a secondary address. If this attempt also fails, the TE DB tries to find a node matching a tertiary address.
The IP addresses specified for a location should be topologically "close” to a set of clients that should all receive the same optimal path for that location.
The no form of this command removes the tertiary IPv6 address information.
Default
no tertiary-ipv6-address
Parameters
- ipv6-address
-
Specifies the tertiary IPv6 address of a location.
Platforms
7705 SAR Gen 2
test
test
Syntax
[no] test test-name [owner test-owner]
Context
[Tree] (config>saa test)
Full Context
configure saa test
Description
This command identifies a test and enables the context to provide the test parameters for the named test. After the creation of the test instance, the test can be started in the OAM context.
A test can only be modified while it is shut down.
The no form of this command removes the test from the configuration. To remove a test, it cannot be active at the time.
Parameters
- test-name
-
Identifies the SAA test name, up to 32 characters.
- test-owner
-
Specifies the owner, up to 32 characters, of an SAA operation. If a value is not specified, the default owner is used.
Platforms
7705 SAR Gen 2
test-completion-enable
test-completion-enable
Syntax
[no] test-completion-enable
Context
[Tree] (config>saa>test>trap-gen test-completion-enable)
Full Context
configure saa test trap-gen test-completion-enable
Description
This command enables the generation of a trap when an SAA test completes.
The no form of this command disables the trap generation.
Platforms
7705 SAR Gen 2
test-duration
test-duration
Syntax
test-duration seconds
no test-duration
Context
[Tree] (config>oam-pm>session>ip>twamp-light test-duration)
Full Context
configure oam-pm session ip twamp-light test-duration
Description
This command defines the length of time the test runs before stopping automatically. This optional command is only valid when a session has been configured with a session-type of on-demand. This is not an option when the session-type is configured as proactive. On-demand tests do not start until the config>oam-pm>session>start command has been issued and they stop when the config>oam-pm>session>stop command is issued.
The no form of this command removes a previously configured test-duration value and allows the TWAMP Light test to execute until it is stopped manually.
Parameters
- seconds
-
Specifies the length of time, in seconds, that the TWAMP Light test runs.
Platforms
7705 SAR Gen 2
test-duration
Syntax
test-duration seconds
no test-duration
Context
[Tree] (config>oam-pm>session>eth>slm test-duration)
[Tree] (config>oam-pm>session>ethernet>dmm test-duration)
Full Context
configure oam-pm session ethernet slm test-duration
configure oam-pm session ethernet dmm test-duration
Description
This command, which is optional, configures the length of time the test runs before stopping automatically. This command is only a valid option when a session is configured with a session-type of on-demand.
This is not an option when the session-type is configured as proactive. On-demand tests do not start until the oam-pm session start command has been issued and they stop when the oam-pm session stop command is issued.
The no form of this command removes a previously configured test duration and allows the test to run until manually stopped.
Default
no test-duration
Parameters
- seconds
-
Specifies the number of seconds the test runs from its start time.
Platforms
7705 SAR Gen 2
test-fail-enable
test-fail-enable
Syntax
[no] test-fail-enable
Context
[Tree] (config>saa>test>trap-gen test-fail-enable)
Full Context
configure saa test trap-gen test-fail-enable
Description
This command enables the generation of a trap when a test fails. In the case of a ping test, the test is considered failed (for trap generation) if the number of failed probes is at least the value of the test-fail-threshold parameter.
The no form of this command disables the trap generation.
Platforms
7705 SAR Gen 2
test-fail-threshold
test-fail-threshold
Syntax
test-fail-threshold threshold
no test-fail-threshold
Context
[Tree] (config>saa>test>trap-gen test-fail-threshold)
Full Context
configure saa test trap-gen test-fail-threshold
Description
This command configures the threshold for trap generation on test failure.
This command has no effect when test-fail-enable is disabled. This command is not applicable to SAA trace route tests.
The no form of this command returns the threshold value to the default.
Default
test-fail-threshold 1
Parameters
- threshold
-
Specifies the number of consecutive test failures required to generate a trap.
Platforms
7705 SAR Gen 2
test-oam
test-oam
Syntax
test-oam
Context
[Tree] (config test-oam)
Full Context
configure test-oam
Description
Commands in this context configure operations, administration, and maintenance (OAM) test parameters.
Platforms
7705 SAR Gen 2
test-pattern
test-pattern
Syntax
test-pattern {all-zeros | all-ones} [crc-enable]
no test-pattern
Context
[Tree] (config>service>epipe>sap>eth-cfm>mep>eth-test-enable test-pattern)
[Tree] (config>service>epipe>spoke-sdp>eth-cfm>mep>eth-test-enable test-pattern)
Full Context
configure service epipe sap eth-cfm mep eth-test-enable test-pattern
configure service epipe spoke-sdp eth-cfm mep eth-test-enable test-pattern
Description
This command configures the test pattern for ETH-test frames.
The no form of this command removes the values from the configuration.
Default
test-pattern all-zeros
Parameters
- all-zeros
-
Keyword used to specify the use of all zeros in the test pattern.
- all-ones
-
Keyword used to specify the use of all ones in the test pattern.
- crc-enable
-
Keyword used to generate a CRC checksum.
Platforms
7705 SAR Gen 2
test-pattern
Syntax
test-pattern {all-zeros | all-ones} [crc-enable]
no test-pattern
Context
[Tree] (config>service>vpls>sap>eth-cfm>mep>eth-test-enable test-pattern)
[Tree] (config>service>vpls>spoke-sdp>eth-cfm>mep>eth-test-enable test-pattern)
[Tree] (config>service>vpls>mesh-sdp>eth-cfm>mep>eth-test-enable test-pattern)
Full Context
configure service vpls sap eth-cfm mep eth-test-enable test-pattern
configure service vpls spoke-sdp eth-cfm mep eth-test-enable test-pattern
configure service vpls mesh-sdp eth-cfm mep eth-test-enable test-pattern
Description
This command configures the test pattern for ETH-test frames.
The no form of this command removes the values from the configuration.
Default
test-pattern all-zeros
Parameters
- all-zeros
-
Keyword used to specify to use all zeros in the test pattern.
- all-ones
-
Keyword used to specify to use all ones in the test pattern.
- crc-enable
-
Keyword used to generate a CRC checksum.
Platforms
7705 SAR Gen 2
test-pattern
Syntax
test-pattern {all-zeros | all-ones} [crc-enable]
no test-pattern
Context
[Tree] (config>router>if>eth-cfm>mep>eth-test test-pattern)
[Tree] (config>port>ethernet>eth-cfm>mep>eth-test-enable test-pattern)
Full Context
configure router interface eth-cfm mep eth-test-enable test-pattern
configure port ethernet eth-cfm mep eth-test-enable test-pattern
Description
This command configures the test pattern of the ETH-TEST frames. The test pattern does not have to be configured the same on the sender and the receiver.
The no form of this command reverts to the default value.
Default
test-pattern all-zeros
Parameters
- all-zeros
-
Keyword used to specify the use all zeros in the test pattern.
- all-ones
-
Keyword used to specify the use all ones in the test pattern.
- crc-enable
-
Keyword to generate a CRC checksum.
Platforms
7705 SAR Gen 2
third-party-nexthop
third-party-nexthop
Syntax
third-party-nexthop
no third-party-nexthop
Context
[Tree] (config>service>vprn>bgp>group>neighbor third-party-nexthop)
[Tree] (config>service>vprn>bgp third-party-nexthop)
[Tree] (config>service>vprn>bgp>group third-party-nexthop)
Full Context
configure service vprn bgp group neighbor third-party-nexthop
configure service vprn bgp third-party-nexthop
configure service vprn bgp group third-party-nexthop
Description
Use this command to enable the router to send third-party next-hop to EBGP peers in the same subnet as the source peer, as described in RFC 4271. If enabled when an IPv4 or IPv6 route is received from one EBGP peer and advertised to another EBGP peer in the same IP subnet, the BGP next-hop is left unchanged. Third-party next-hop is not done if the address family of the transport does not match the address family of the route.
The no form of this command prevents BGP from performing any third party next-hop processing toward any single-hop EBGP peers within the scope of the command. No third-party next-hop means the next-hop will always carry the IP address of the interface used to establish the TCP connection to the peer.
Default
no third-party-nexthop
Platforms
7705 SAR Gen 2
third-party-nexthop
Syntax
third-party-nexthop
no third-party-nexthop
Context
[Tree] (config>router>bgp>group>neighbor third-party-nexthop)
[Tree] (config>router>bgp third-party-nexthop)
Full Context
configure router bgp group neighbor third-party-nexthop
configure router bgp third-party-nexthop
Description
Use this command to enable the router to send third-party next-hop to EBGP peers in the same subnet as the source peer, as described in RFC 4271. If enabled when an IPv4 or IPv6 route is received from one EBGP peer and advertised to another EBGP peer in the same IP subnet, the BGP next-hop is left unchanged. Third-party next-hop is not done if the address family of the transport does not match the address family of the route.
The no form of this command prevents BGP from performing any third party next-hop processing toward any single-hop EBGP peers within the scope of the command. No third-party next-hop means the next-hop will always carry the IP address of the interface used to establish the TCP connection to the peer.
Default
no third-party-nexthop
Platforms
7705 SAR Gen 2
three-way-hello
three-way-hello
Syntax
[no] three-way-hello
Context
[Tree] (config>service>vprn>pim>if three-way-hello)
Full Context
configure service vprn pim interface three-way-hello
Description
This command configures the compatibility mode for enabling the three way hello.
Platforms
7705 SAR Gen 2
three-way-hello
Syntax
three-way-hello [compatibility-mode]
no three-way-hello
Context
[Tree] (config>router>pim>interface three-way-hello)
Full Context
configure router pim interface three-way-hello
Description
This command sets the compatibility mode to enable three-way hello. By default, the value is disabled on all interface which specifies that the standard two-way hello is supported. When enabled, the three-way hello is supported.
The no form of this command disables three-way hello.
Default
no three-way-hello
Platforms
7705 SAR Gen 2
threshold
threshold
Syntax
threshold threshold
no threshold
Context
[Tree] (config>router>segment-routing>maintenance-policy threshold)
Full Context
configure router segment-routing maintenance-policy threshold
Description
This command configures the minimum number of S-BFD sessions that must be up in order to consider the SR policy candidate path to which the maintenance template is bound to be up. If it is below this number, then the policy candidate path is marked as BFD degraded by the system. This command is only valid in the ecmp-protected mode.
The no form of this command reverts to the default.
Default
threshold 1
Parameters
- threshold
-
Specifies the minimum number of S-BFD sessions that must be up.
Platforms
7705 SAR Gen 2
thresholds
thresholds
Syntax
thresholds
Context
[Tree] (config>router>dhcp6>server>pool thresholds)
[Tree] (config>router>dhcp6>server>pool>prefix thresholds)
[Tree] (config>service>vprn>dhcp6>server>pool thresholds)
[Tree] (config>service>vprn>dhcp6>server>pool>prefix thresholds)
Full Context
configure router dhcp6 local-dhcp-server pool thresholds
configure router dhcp6 local-dhcp-server pool prefix thresholds
configure service vprn dhcp6 local-dhcp-server pool thresholds
configure service vprn dhcp6 local-dhcp-server pool prefix thresholds
Description
Commands in this context configure pool level thresholds.
Default
thresholds
Platforms
7705 SAR Gen 2
thresholds
Syntax
thresholds
Context
[Tree] (config>system thresholds)
Full Context
configure system thresholds
Description
Commands in this context configure monitoring thresholds.
Platforms
7705 SAR Gen 2
throttle-rate
throttle-rate
Syntax
throttle-rate events [interval seconds]
no throttle-rate
Context
[Tree] (config>log throttle-rate)
Full Context
configure log throttle-rate
Description
This command configures the number of events and interval length to be applied to all event types that have throttling enabled by the event-control command and do not have a specific-throttle-rate configured.
The no form of this command reverts to the default values.
Default
throttle-rate 2000 interval 1
Parameters
- events
-
Specifies the number of log events that can be logged within the specified interval for a specific event. Once the limit has been reached, any additional events of that type will be dropped, for example, the event drop count will be incremented. At the end of the throttle interval if any events have been dropped a trap notification will be sent.
- seconds
-
Specifies the number of seconds that an event throttling interval lasts.
Platforms
7705 SAR Gen 2
ti-lfa
ti-lfa
Syntax
ti-lfa [max-sr-frr-labels value] [max-srv6-frr-sids sids-value]
no ti-lfa
Context
[Tree] (config>router>isis>lfa ti-lfa)
Full Context
configure router isis loopfree-alternates ti-lfa
Description
This command enables the use of the Topology-Independent LFA (TI-LFA) algorithm in the LFA SPF calculation for this IS-IS instance.
The no form of this command disables the use of the TI-LFA algorithm in the LFA SPF calculation for this IS-IS instance.
Default
no ti-lfa
Parameters
- value
-
Specifies the maximum number of labels allowed in the segment list of the TI-LFA repair tunnel. A higher value results in better coverage by TI-LFA at the expense of increased packet encapsulation overhead. The TI-LFA algorithm uses this value to limit the search for the Q-node from the P-node on the post-convergence path.
- sids-value
-
Specifies the maximum number of SRv6 SIDs allowed in the segment list of the TI-LFA repair tunnel. A higher value results in better coverage by TI-LFA at the expense of increased packet encapsulation overhead. The TI-LFA algorithm uses this value to limit the search for the Q-node from the P-node on the post-convergence path.
Platforms
7705 SAR Gen 2
ti-lfa
Syntax
ti-lfa [max-sr-frr-labels value]
no ti-lfa
Context
[Tree] (config>router>ospf>loopfree-alternates ti-lfa)
Full Context
configure router ospf loopfree-alternates ti-lfa
Description
This command enables the use of the Topology Independent Loop-Free Alternate (TI-LFA) algorithm in the LFA SPF calculation for this OSPF or OSPFv3 instance.
The no form of this command disables the use of the TI-LFA algorithm in the LFA SPF calculation in this OSPF or OSPFv3 instance.
Default
no ti-lfa
Parameters
- max-sr-frr-labels [value]]
-
Specifies the maximum number of labels allowed in the segment list of the TI-LFA repair tunnel. A higher value results in better coverage by TI-LFA at the expense of increased packet encapsulation overhead. The TI-LFA algorithm uses this value to limit the search for the Q-node from the P-node on the post-convergence path.
Platforms
7705 SAR Gen 2
tier
tier
Syntax
tier {1 | 2}
Context
[Tree] (config>qos>policer-control-policy tier)
Full Context
configure qos policer-control-policy tier
Description
This command is used to create, configure, and delete tiered arbiters. Two tiers are supported that always exist, specified as tier 1 and tier 2. Tiered arbiters enable the creation of a bandwidth control hierarchy for managing child policers in an arbitrary fashion. Each arbiter enables parenting of child policers within eight strict levels of priority and a maximum aggregate rate may be defined for the children that the arbiter will enforce. Arbiters created on tier 1 are automatically parented to the root arbiter that is always present. Arbiters created on tier 2 default to the root arbiter as parent but can also be explicitly parented to a tier 2 arbiter. Child policers associated with an instance of the policer-control-policy can be parented to any tiered arbiter or to the root arbiter.
Platforms
7705 SAR Gen 2
tier
Syntax
[no] tier tier
Context
[Tree] (config>qos>scheduler-policy tier)
Full Context
configure qos scheduler-policy tier
Description
This command identifies the level of hierarchy that a group of schedulers are associated with. Within a tier level, a scheduler can be created or edited. Schedulers created within a tier can only be a child (take bandwidth from a scheduler in a higher tier). Tier levels increase sequentially with 1 being the highest tier. All tier 1 schedulers are considered to be root and cannot be a child of another scheduler. Schedulers defined in tiers other than 1 can also be root (parentless).
3 tiers (levels 1, 2, and 3) are supported.
The save config and show config commands only display information on scheduler tiers that contain defined schedulers. When all schedulers have been removed from a level, that level ceases to be included in output from these commands.
Parameters
- tier
-
This parameter is required to indicate the group of schedulers to create or be edited. Tier levels cannot be created or deleted. If a value for level is given that is out-of-range, an error will occur and the current context of the CLI session will not change.
Platforms
7705 SAR Gen 2
time
time
Syntax
time
Context
[Tree] (config>system time)
Full Context
configure system time
Description
Commands in this context configure the system time zone and time synchronization parameters.
Platforms
7705 SAR Gen 2
time-display
time-display
Syntax
time-display {local | utc}
Context
[Tree] (environment time-display)
Full Context
environment time-display
Description
This command displays time stamps in the CLI session based on local time or Coordinated Universal Time (UTC).
The system keeps time internally in UTC and is capable of displaying the time in either UTC or local time based on the time zone configured.
This environment command only applies to times displayed in the current CLI session. This includes displays of event logs and all other places where a time stamp is displayed.
In event logs, the selected time is used to control the timestamps in the CLI output of show log log-id and in YANG state in the /state/log/log-id branch (for logs such as session, cli, memory, SNMP and NETCONF).
Also see the configure log log-id time-format command.
Default
time-display local
Parameters
- local
-
Indicates that local time should be used.
- utc
-
Indicates that UTC time should be used.
Platforms
7705 SAR Gen 2
time-display
Syntax
time-display {local | utc}
Context
[Tree] (config>system>management-interface>cli>md-cli>environment time-display)
Full Context
configure system management-interface cli md-cli environment time-display
Description
This command configures whether the time is displayed in coordinated Universal Time (UTC) or local time (as configured in config>system>time).
Default
time-display local
Parameters
- local
-
Specifies that the local time zone is used.
- utc
-
Specifies that UTC is used.
Platforms
7705 SAR Gen 2
time-exceeded
time-exceeded
Syntax
time-exceeded [number seconds]
no time-exceeded
Context
[Tree] (config>service>ies>if>ipv6>icmp6 time-exceeded)
Full Context
configure service ies interface ipv6 icmp6 time-exceeded
Description
This command specifies whether time-exceeded ICMP messages should be sent. When enabled, ICMPv6 time-exceeded messages are generated by this interface.
When disabled, ICMPv6 time-exceeded messages are not sent.
The no form of this command reverts to the default.
Default
time-exceeded 100 10
Parameters
- number
-
Specifies the number of time-exceeded ICMP messages are to be issued in the time frame specified by the seconds parameter.
- seconds
-
Specifies the time frame, in seconds, that is used to limit the number of time-exceeded ICMP message to be issued.
Platforms
7705 SAR Gen 2
time-exceeded
Syntax
time-exceeded [number seconds]
no time-exceeded
Context
[Tree] (config>service>vprn>if>ipv6>icmp6 time-exceeded)
[Tree] (config>router>if>ipv6>icmp6 time-exceeded)
Full Context
configure service vprn interface ipv6 icmp6 time-exceeded
configure router interface ipv6 icmp6 time-exceeded
Description
This command configures rate for ICMPv6 time-exceeded messages.
Parameters
- number
-
Limits the number of time-exceeded messages issued per the time frame specified in seconds parameter.
- seconds
-
Determines the time frame, in seconds, that is used to limit the number of time-exceeded messages issued per time frame.
Platforms
7705 SAR Gen 2
time-format
time-format
Syntax
time-format {local | utc}
Context
[Tree] (config>service>vprn>log>log-id time-format)
Full Context
configure service vprn log log-id time-format
Description
This command specifies whether the time should be displayed in local or Coordinated Universal Time (UTC) format.
Default
time-format utc
Parameters
- local
-
Specifies that timestamps are written in the system’s local time.
- utc
-
Specifies that timestamps are written using the UTC value. This was formerly called Greenwich Mean Time (GMT) and Zulu time.
Platforms
7705 SAR Gen 2
time-format
Syntax
time-format {local | utc}
Context
[Tree] (config>log>log-id time-format)
Full Context
configure log log-id time-format
Description
This command specifies whether the time should be output in local or Coordinated Universal Time (UTC) format in the following event log locations:
- in the syslog TIMESTAMP field
- in the timestamp of log events inside log files on local storage devices
The timestamp in the filename of event log files is not affected by this command.
The output of show log log-id and the output of YANG state under /state/log/log-id are not affected by this command. See the environment time-display command.
Default
time-format utc
Parameters
- local
-
Specifies that timestamps are written in the system’s local time.
- utc
-
Specifies that timestamps are written using the UTC value. This was formerly called Greenwich Mean Time (GMT) and Zulu time.
Platforms
7705 SAR Gen 2
time-inaccuracy
time-inaccuracy
Syntax
time-inaccuracy 0..10000000
no time-inaccuracy
Context
[Tree] (config>system>ptp time-inaccuracy)
Full Context
configure system ptp time-inaccuracy
Description
This command overrides the system-generated value for the PTP clock’s time inaccuracy with a specified value. The clock’s time inaccuracy value is added to the total time inaccuracy value in IEEE_C37_238 TLVs sent to downstream clocks in Announce messages. If there is no time inaccuracy override configured, the system uses 50 ns as the default for boundary clocks.
This command is applicable only for boundary clocks and only when the profile is configured as c37dot238-2017.
The no form of this command removes the time inaccuracy override value.
Parameters
- 0..10000000
-
Specifies the time inaccuracy of the PTP clock, in nanoseconds, to be added to the total time inaccuracy in the IEEE_C37_238 TLV.
Platforms
7705 SAR-Hx, 7705 SAR-Mx
time-stamp
time-stamp
Syntax
[no] time-stamp
Context
[Tree] (environment time-stamp)
Full Context
environment time-stamp
Description
This command specifies whether the time-stamp should be displayed before the prompt.
Platforms
7705 SAR Gen 2
timeout
timeout
Syntax
timeout [sec seconds] [min minutes]
no timeout
Context
[Tree] (config>aaa>radius-srv-plcy>servers timeout)
Full Context
configure aaa radius-server-policy servers timeout
Description
This command configures the time the router waits for a response from a RADIUS server.
The no form of this command reverts to the default value.
Default
timeout sec 5
Parameters
- seconds
-
Specifies the number of seconds for the timeout.
- minutes
-
Specifies the number of minutes for the timeout.
Platforms
7705 SAR Gen 2
timeout
Syntax
timeout seconds
no timeout
Context
[Tree] (config>service>vprn>aaa>rmt-srv>radius timeout)
[Tree] (config>system>security>radius timeout)
Full Context
configure service vprn aaa remote-servers radius timeout
configure system security radius timeout
Description
This command configures the number of seconds the router waits for a response from a RADIUS server.
The no form of this command reverts to the default value.
Default
timeout 3
Parameters
- seconds
-
Specifies the number of seconds the router waits for a response from a RADIUS server, expressed as a decimal integer.
Platforms
7705 SAR Gen 2
timeout
Syntax
timeout seconds
no timeout
Context
[Tree] (config>service>vprn>aaa>rmt-srv>tacplus timeout)
[Tree] (config>system>security>tacplus timeout)
Full Context
configure service vprn aaa remote-servers tacplus timeout
configure system security tacplus timeout
Description
This command configures the number of seconds the router waits for a response from a TACACS+ server.
The no form of this command reverts to the default value.
Default
timeout 3
Parameters
- seconds
-
Specifies the number of seconds the router waits for a response from a TACACS+ server, expressed as a decimal integer.
Platforms
7705 SAR Gen 2
timeout
Syntax
timeout seconds
Context
[Tree] (config>system>file-trans-prof timeout)
Full Context
configure system file-transmission-profile timeout
Description
This command specifies timeout value in seconds for transport protocol. The timeout is the maximum waiting time to receive any data from the server (e.g., FTP or HTTP server).
Default
timeout 60
Parameters
- seconds
-
Specifies the connection timeout (in seconds) for the file transmission.
Platforms
7705 SAR Gen 2
timeout
Syntax
timeout timeout
no timeout
Context
[Tree] (config>saa>test>type-multi-line>lsp-ping timeout)
[Tree] (config>saa>test>type-multi-line>lsp-ping>sr-policy timeout)
Full Context
configure saa test type-multi-line lsp-ping timeout
configure saa test type-multi-line lsp-ping sr-policy timeout
Description
This command configures the number, in seconds, used to override the default timeout value and is the amount of time that the router waits for a message reply after sending the last probe for a specific test. Upon the expiration of the time out, the test is marked complete and no more packets are processed for any of the request probes.
The no form of this command reverts to the default value.
Default
timeout 5
Parameters
- timeout
-
Specifies the timeout value in seconds.
Platforms
7705 SAR Gen 2
timeout
Syntax
timeout [seconds]
no timeout
Context
[Tree] (config>filter>redirect-policy>dest>ping-test timeout)
Full Context
configure filter redirect-policy destination ping-test timeout
Description
Specifies the amount of time, in seconds, that is allowed for receiving a response from the far-end host. If a reply is not received within this time the far-end host is considered unresponsive.
Default
timeout 1
Parameters
- seconds
-
Specifies the amount of time, in seconds, that is allowed for receiving a response from the far end host.
Platforms
7705 SAR Gen 2
timeout
Syntax
timeout seconds
no timeout
Context
[Tree] (config>vrrp>policy>priority-event>host-unreachable timeout)
Full Context
configure vrrp policy priority-event host-unreachable timeout
Description
This command defines the time, in seconds, that must pass before considering the far-end IP host unresponsive to an outstanding ICMP echo request message.
The timeout value is not directly related to the configured interval parameter. The timeout value may be larger, equal, or smaller, relative to the interval value.
If the timeout value is larger than the interval value, multiple ICMP echo request messages may be outstanding. Every ICMP echo request message transmitted to the far end host is tracked individually according to the message identifier and sequence number.
With each consecutive attempt to send an ICMP echo request message, the timeout timer is loaded with the timeout value. The timer decrements until:
-
an internal error occurs preventing message sending (request unsuccessful)
-
an internal error occurs preventing message reply receiving (request unsuccessful)
-
a required route table entry does not exist to reach the IP address (request unsuccessful)
-
a required ARP entry does not exist and ARP request timed out (request unsuccessful)
-
a valid reply is received (request successful)
It is possible for a required ARP request to succeed or timeout after the message timeout timer expires. In this case, the message request is unsuccessful.
If an ICMP echo reply message is not received prior to the timeout period for a given ICMP echo request, that request is considered to be dropped and increments the consecutive message drop counter for the priority event.
If an ICMP echo reply message with the same sequence number as an outstanding ICMP echo request message is received prior to that message timing out, the request is considered successful. The consecutive message drop counter is cleared and the request message no longer is outstanding.
If an ICMP Echo Reply message with a sequence number equal to an ICMP echo request sequence number that had previously timed out is received, that reply is silently discarded while incrementing the priority event reply discard counter.
The no form of the command reverts to the default value.
Default
timeout 1
Parameters
- seconds
-
The number of seconds before an ICMP echo request message is timed out. Once a message is timed out, a reply with the same identifier and sequence number is discarded.
Platforms
7705 SAR Gen 2
timeout
Syntax
timeout timeout
no timeout
Context
[Tree] (config>service>sdp>keep-alive timeout)
Full Context
configure service sdp keep-alive timeout
Description
This command configures the time interval that the SDP waits before tearing down the session.
Default
timeout 5
Parameters
- timeout
-
Specifies the timeout time, in seconds.
Platforms
7705 SAR Gen 2
timeout
Syntax
timeout seconds
no timeout
Context
[Tree] (config>system>security>ldap timeout)
Full Context
configure system security ldap timeout
Description
The timeout value is the number of seconds that the SR OS will wait for a response from the current server that it is trying to establish a connection with. If the server does not reply within the configured timeout value, the SR OS will increment the retry counter by 1. The SR OS attempts to establish the connection to the current server up to the configured retry value before it moves to the next configured server.
The no form of this command reverts to the default value.
Default
timeout 3
Parameters
- seconds
-
The length of time that the SR OS waits for a response from the server.
Platforms
7705 SAR Gen 2
timeouts
timeouts
Syntax
[no] timeouts
Context
[Tree] (config>service>nat>nat-policy timeouts)
Full Context
configure service nat nat-policy timeouts
Description
This command configures session idle timeouts for this policy.
Platforms
7705 SAR Gen 2
timeouts
Syntax
[no] timeouts
Context
[Tree] (config>service>nat>cpm-nat-policy timeouts)
Full Context
configure service nat cpm-nat-policy timeouts
Description
Commands in this context configure session idle timeouts for this policy.
Platforms
7705 SAR Gen 2
timers
timers
Syntax
[no] timers
Context
[Tree] (config>service>vprn>isis timers)
Full Context
configure service vprn isis timers
Description
Commands in this context configure the IS-IS timer values.
Default
n/a
Platforms
7705 SAR Gen 2
timers
Syntax
timers
Context
[Tree] (config>service>vprn>ospf timers)
[Tree] (config>service>vprn>ospf3 timers)
Full Context
configure service vprn ospf timers
configure service vprn ospf3 timers
Description
Commands in this context configure OSPF timers. Timers control the delay between receipt of a LSA requiring a Dijkstra (Shortest Path First (SPF)) calculation and the minimum time between successive SPF calculations.
Changing the timers affect CPU utilization and network reconvergence times. Lower values reduce convergence time but increase CPU utilization. Higher values reduce CPU utilization but increase reconvergence time.
Platforms
7705 SAR Gen 2
timers
Syntax
timers update timeout flush
no timers
Context
[Tree] (config>service>vprn>ripng>group>neighbor timers)
[Tree] (config>service>vprn>rip>group timers)
[Tree] (config>service>vprn>rip>group>neighbor timers)
[Tree] (config>service>vprn>ripng>group timers)
[Tree] (config>service>vprn>rip timers)
[Tree] (config>service>vprn>ripng timers)
Full Context
configure service vprn ripng group neighbor timers
configure service vprn rip group timers
configure service vprn rip group neighbor timers
configure service vprn ripng group timers
configure service vprn rip timers
configure service vprn ripng timers
Description
This command configures the values for the update, timeout, and flush timers:
-
update timer
Determines how often RIP updates are sent.
-
timeout timer
If a router is not updated by the time the timer expires, the route is declared invalid, but maintained in the RIP database.
-
flush timer
Determines how long a route is maintained in the RIP database, after it has been declared invalid. Once this timer expires it is flushed from the RIP database completely.
The no form of this command resets all timers to their default values of 30, 180, and 120 seconds respectively.
Default
no timers
Parameters
- update
-
The RIP update timer value in seconds.
- timeout
-
The RIP timeout timer value in seconds.
- flush
-
The RIP flush timer value in seconds.
Platforms
7705 SAR Gen 2
timers
Syntax
timers [neighbor ip-address | group name]
no timers
Context
[Tree] (debug>router>bgp timers)
Full Context
debug router bgp timers
Description
This command logs all BGP timer events to the debug log.
The no form of this command disables debugging.
Parameters
- neighbor ip-address
-
Debugs only events affecting the specified BGP neighbor.
- group name
-
Debugs only events affecting the specified peer group name, up to 64 characters, and associated neighbors.
Platforms
7705 SAR Gen 2
timers
Syntax
[no] timers
Context
[Tree] (config>router>isis timers)
Full Context
configure router isis timers
Description
This command configures the IS-IS timer values.
Platforms
7705 SAR Gen 2
timers
Syntax
timers
Context
[Tree] (config>router>ospf3 timers)
[Tree] (config>router>ospf timers)
Full Context
configure router ospf3 timers
configure router ospf timers
Description
Commands in this context configure OSPF timers. Timers control the delay between receipt of a link state advertisement (LSA) requiring a Dijkstra (Shortest Path First (SPF)) calculation and the minimum time between successive SPF calculations.
Changing the timers affects CPU utilization and network re-convergence times. Lower values reduce convergence time but increase CPU utilization. Higher values reduce CPU utilization but increase re-convergence time.
Platforms
7705 SAR Gen 2
timers
Syntax
timers update timeout flush
no timers
Context
[Tree] (config>router>ripng timers)
[Tree] (config>router>rip>group timers)
[Tree] (config>router>rip timers)
[Tree] (config>router>ripng>group>neighbor timers)
[Tree] (config>router>rip>group>neighbor timers)
[Tree] (config>router>ripng>group timers)
Full Context
configure router ripng timers
configure router rip group timers
configure router rip timers
configure router ripng group neighbor timers
configure router rip group neighbor timers
configure router ripng group timers
Description
This command configures values for the update, timeout and flush RIP timers.
The RIP update timer determines how often RIP updates are sent.
If the route is not updated by the time the RIP timeout timer expires, the route is declared invalid but is maintained in the RIP database.
The RIP flush timer determines how long a route is maintained in the RIP database after it has been declared invalid. After the flush timer expires, the route is removed from the RIP database.
The no form of the command reverts to the default values.
Default
timers 30 180 120
Parameters
- update
-
Specifies the RIP update timer value in seconds expressed as a decimal integer.
- timeout
-
Specifies the RIP timeout timer value in seconds expressed as a decimal integer.
- flush
-
Specifies the RIP flush timer value in seconds expressed as a decimal integer.
Platforms
7705 SAR Gen 2
timeslots
timeslots
Syntax
timeslots timeslots
Context
[Tree] (config>port>tdm>tpif>channel-group timeslots)
Full Context
configure port tdm tpif channel-group timeslots
Description
This command configures the list of 64k timeslots to be used in the TPIF channel group.
Default
timeslots 1
Parameters
- timeslots
-
Specifies the number of consecutive timeslots to be associated with the channel group. The value must start from the first timeslot. It represents line bandwidth of n x 64 kb/s, where n is the number of timeslots.
Platforms
7705 SAR-Hx, 7705 SAR-Mx
timeslots
Syntax
timeslots timeslots
no timeslots
Context
[Tree] (config>port>tdm>e1>channel-group timeslots)
Full Context
configure port tdm e1 channel-group timeslots
Description
This command configures the list of 64 kb/s timeslots used in the channel group. The timeslots do not need to be consecutive. If the port is configured for fractional E1, use this command to specify the number of timeslots used on the port. Only the specified timeslots can be used.
The no form of this command removes DS0 timeslots from a channel group.
Default
no timeslots
Parameters
- timeslots
-
Specifies the number of consecutive timeslots to be associated with the channel group. The value can consist of a list of timeslots, expressed either as a single timeslot or a range of timeslots.
Platforms
7705 SAR-Hx, 7705 SAR-Mx
timestamp
timestamp
Syntax
[no] timestamp
Context
[Tree] (config>system>management-interface>cli>md-cli>environment>prompt timestamp)
Full Context
configure system management-interface cli md-cli environment prompt timestamp
Description
This command displays the timestamp before the first prompt line.
The no form of this command suppresses the timestamp before the first prompt line.
Default
timestamp
Platforms
7705 SAR Gen 2
timestamp-format
timestamp-format
Syntax
timestamp-format millisecond
no timestamp-format
Context
[Tree] (config>log>syslog timestamp-format)
Full Context
configure log syslog timestamp-format
Description
This command controls the format of the syslog timestamp.
The no form of this command reverts to the default.
Default
no timestamp-format
Parameters
- millisecond
-
Keyword to set the timestamp format to milliseconds.
Platforms
7705 SAR Gen 2
timing
timing
Syntax
timing frames-per-delta-t frames consec-delta-t deltas chli-threshold threshold
no timing
Context
[Tree] (config>oam-pm>session>ip>twamp-light>loss timing)
Full Context
configure oam-pm session ip twamp-light loss timing
Description
This command defines various availability parameters but not the probe interval. A single TWAMP-Light frame is used to collect both delay and loss metrics; the interval is common to both and as such not unique per metric type. Any TWAMP light test that is attempting to become active validates the configuration of the timing parameter regardless of which statistics are being recorded.
The no form of this command restores the default values for all timing parameters and use those values to compute availability and set the loss frequency.
Default
timing frames-per-delta-t 1 consec-delta-t 10 chli-threshold 5
Parameters
- frames
-
Defines the size of the small measurement window. Each delta-t is marked as available of unavailable based on the flr-threshold. The size of the delta-t measurement is the product of the number of frames and the interval. This value defaults to a different value thank single probe per metric approaches.
- deltas
-
Specifies the number of consecutive delta-t small measurement intervals that make up the sliding window over which availability and unavailability are determined. Transitions from one state to another occurs when the consec-delta-t are now in a new state. The sliding window cannot exceed 100 seconds.
- threshold
-
Specifies the number of consecutive high loss intervals (unavailable delta-t) that when equal to or exceeded increments the CHLI counter. A CHLI counter is an indication that the sliding window is available but has crossed a threshold consecutive of unavailable delta-t intervals. A CHLI can only be incremented once during a sliding window and, by default, is only incremented during times of availability.
Platforms
7705 SAR Gen 2
timing
Syntax
timing frames-per-delta-t frames consec-delta-t deltas interval milliseconds chli-threshold threshold
no timing
Context
[Tree] (config>oam-pm>session>eth>slm timing)
Full Context
configure oam-pm session ethernet slm timing
Description
This command configures availability parameters and the probe spacing (interval) for the SLM frames. The maximum size of the availability window cannot exceed 10 s (10 000 ms).
The no form of this command installs the default values for all timing parameters and uses those values to compute availability and set the SLM frequency. If an SLM test is in the no shutdown state, it always has timing parameters, default or user configured.
Parameters
- frames
-
Specifies the of SLM frames that define the size of the Delta-T (small measurement window). Each Delta-T is marked as available or unavailable based on the flr-threshold. The size of the Delta-T measurement is the product of the number of frames and the interval.
- deltas
-
Specifies the number of consecutive Delta-T small measurement intervals that make up the sliding window over which availability and unavailability is determined. Transitions from one state to another occurs when the consec-delta-t parameter is in a new state.
- milliseconds
-
Specifies the number of milliseconds between the transmission of the SLM frames.
- threshold
-
Specifies the number of consecutive high-loss intervals (CHLI) (unavailable Delta-T) that when equal to or exceeded increments the CHLI counter. A CHLI counter is an indication that the sliding window is available but has crossed a threshold consecutive of unavailable Delta-T intervals. A CHLI can only be incremented once during a sliding window and, by default, it is only incremented during times of availability.
Platforms
7705 SAR Gen 2
tls
tls
Syntax
tls
Context
[Tree] (config>system>security tls)
Full Context
configure system security tls
Description
This command configures TLS parameters.
Platforms
7705 SAR Gen 2
tls-authentication
tls-authentication
Syntax
tls-authentication
Context
[Tree] (config>system>security>management-interface>grpc tls-authentication)
Full Context
configure system security management-interface grpc tls-authentication
Description
Commands in this context configure the gRPC TLS authentication parameters.
Platforms
7705 SAR Gen 2
tls-client-profile
tls-client-profile
Syntax
tls-client-profile name
no tls-client-profile
Context
[Tree] (config>system>grpc-tunnel>destination-group tls-client-profile)
[Tree] (config>system>telemetry>destination-group tls-client-profile)
Full Context
configure system grpc-tunnel destination-group tls-client-profile
configure system telemetry destination-group tls-client-profile
Description
This command configures a TLS client profile to a destination group.
This command is mutually exclusive with the allow-unsecured-connection command.
The no form of this command removes the TLS client profile.
Default
no tls-client-profile
Parameters
- name
-
Specifies the TLS client profile name, up to 32 characters.
Platforms
7705 SAR Gen 2
tls-client-profile
Syntax
tls-client-profile tls-client-profile
no tls-client-profile
Context
[Tree] (config>log>syslog tls-client-profile)
[Tree] (config>service>vprn>log>syslog tls-client-profile)
Full Context
configure log syslog tls-client-profile
configure service vprn log syslog tls-client-profile
Description
This command specifies the Transport Layer Security (TLS) client profile used to encrypt syslog communications. When configured, syslog messages are sent using TLS.
Any change to this command results in a brief interruption of the event log, which may cause the loss of a few syslog messages.
The no form of this command removes TLS encryption of syslog communications and sends syslog messages over UDP.
Parameters
- tls-client-profile
-
Specifies the name of a TLS profile configured in the config>system>security>tls context, up to 32 characters.
Platforms
7705 SAR Gen 2
tls-client-profile
Syntax
tls-client-profile profile-name
no tls-client-profile
Context
[Tree] (config>router>pcep>pcc>peer tls-client-profile)
Full Context
configure router pcep pcc peer tls-client-profile
Description
This command configures a TLS client profile on the PCC. When the TLS profile is configured, the PCC tries to establish a PCEP connection with the PCE over TLS. Because SR OS supports a strict TLS-only mode, both the PCE and PCC must support TLS. If a TLS failure occurs, the connection over TLS is closed and a new connection is retried within 60 seconds.
The no form of this command removes TLS encryption from the communication between this PCC and the PCE.
Default
no tls-client-profile
Parameters
- profile-name
-
Specifies the TLS client profile name, up to 32 characters.
Platforms
7705 SAR Gen 2
tls-profile
tls-profile
Syntax
tls-profile tls-profile-name
no tls-profile
Context
[Tree] (config>system>security>ldap>server tls-profile)
Full Context
configure system security ldap server tls-profile
Description
This command attaches a TLS client profile to the LDAP client. The parameter in the TLS profile is used to encrypt the LDAP connection to the server. Each LDAP server can use its own TLS profile.
When a TLS profile is assigned, the LDAP application will send encrypted PDUs from the client to the LDAP server. If TLS is operationally down, the LDAP application should not send any PDUs.
The no form of this command removes the TLS profile from LDAP and disables the TLS encryption from LDAP.
Parameters
- tls-profile-name
-
Specifies the TLD profile for encryption.
Platforms
7705 SAR Gen 2
tls-re-negotiate-timer
tls-re-negotiate-timer
Syntax
tls-re-negotiate-timer timer-min
no tls-re-negotiate-timer
Context
[Tree] (config>system>security>tls>server-tls-profile tls-re-negotiate-timer)
Full Context
configure system security tls server-tls-profile tls-re-negotiate-timer
Description
This command configures the timed interval after which the server is triggered to send a Hello request message to all clients and force a renegotiation of the symmetric encryption key. When an interval of 0 is configured, the server will never send a hello request message.
Default
tls-re-negotiate-timer 0
Parameters
- timer-min
-
Specifies the interval, in minutes, after which the server is triggered to send a Hello request message.
Platforms
7705 SAR Gen 2
tls-server-profile
tls-server-profile
Syntax
tls-server-profile name
no tls-server-profile
Context
[Tree] (config>system>grpc tls-server-profile)
Full Context
configure system grpc tls-server-profile
Description
This command adds a configured TLS server profile to the gRPC session. The TLS server is used for encryption of the gRPC session. gRPC will not transmit any PDUs if there is a TLS server profile assigned to it and the TLS connection is down.
The no form of this command removes the specified TLS server profile from the gRPC session.
Parameters
- name
-
Specifies the name of the TLS server profile configured under the config>system>security>tls context.
Platforms
7705 SAR Gen 2
tls-wait-timer
tls-wait-timer
Syntax
tls-wait-timer tls-wait-timer
no tls-wait-timer
Context
[Tree] (config>router>pcep>pcc>peer tls-wait-timer)
Full Context
configure router pcep pcc peer tls-wait-timer
Description
This command configures the time that the PCC waits before declaring a TLS handshake failure if the handshake is not established.
The no form of this command reverts to the default.
Default
tls-wait-timer 60
Parameters
- tls-wait-timer
-
Specifies the time, in seconds.
Platforms
7705 SAR Gen 2
tls13-cipher
tls13-cipher
Syntax
tls13-cipher index name cipher-suite-code
no tls13-cipher index
Context
[Tree] (config>system>security>tls>client-cipher-list tls13-cipher)
[Tree] (config>system>security>tls>server-cipher-list tls13-cipher)
Full Context
configure system security tls client-cipher-list tls13-cipher
configure system security tls server-cipher-list tls13-cipher
Description
This command configures the TLS 1.3-supported ciphers that are used by the client and server.
The no form of this command removes the cipher suite.
Parameters
- index
-
Specifies the index number, which provides the location of the cipher in the negotiation list. The lower index numbers are higher in the negotiation list, and the higher index numbers are at the bottom of the list.
- cipher-suite-code
- Specifies the cipher suite code.
Platforms
7705 SAR Gen 2
tls13-group
tls13-group
Syntax
tls13-group index name group-suite-code
no tls13-group index
Context
[Tree] (config>system>security>tls>server-group-list tls13-group)
[Tree] (config>system>security>tls>client-group-list tls13-group)
Full Context
configure system security tls server-group-list tls13-group
configure system security tls client-group-list tls13-group
Description
This command configures the TLS 1.3-supported group suite codes sent by the client or server in their respective Hello messages.
SR OS supports the use of Elliptic-curve Diffie-Hellman Ephemeral (ECDHE) groups.
The no form of this command removes the group suite code.
Parameters
- index
-
Specifies the index number , which provides the location of the group suite code in the client or server group list. The lower index numbers are higher in the list and the higher index numbers are at the bottom of the list.
- group-suite-code
-
Specifies the group suite code.
Platforms
7705 SAR Gen 2
tls13-signature
tls13-signature
Syntax
tls13-signature index name signature-suite-code
no tls13-signature index
Context
[Tree] (config>system>security>tls>server-signature-list tls13-signature)
[Tree] (config>system>security>tls>client-signature-list tls13-signature)
Full Context
configure system security tls server-signature-list tls13-signature
configure system security tls client-signature-list tls13-signature
Description
This command configures the TLS 1.3-supported signature suite codes sent by the client or server in their respective Hello messages.
The no form of this command removes the signature suite code.
Parameters
- index
-
Specifies the index number, which provides the location of the signature suite code in the client or server group list. The lower index numbers are higher in the list, and the higher index numbers are at the bottom of the list.
- signature-suite-code
-
Specifies the signature suite code.
Platforms
7705 SAR Gen 2
to
to
Syntax
to [ip-address | node-id [a.b.c.d | 1...4294967295]]
Context
[Tree] (config>router>mpls>lsp to)
Full Context
configure router mpls lsp to
Description
This command specifies the IP address or MPLS-TP node-id of the egress router for the LSP. This command is mandatory to create an LSP.
An IP address for which a route does not exist is allowed in the configuration. If the LSP signaling fails because the destination is not reachable, an error is logged and the LSP operational status is set to down.
For a non MPLS-TP LSP, the to ip-address can be an IP address of a network IP interface, the system interface, or a loopback interface of the egress router. When used in a SDP, if the LSP to address does not match the SDP address, the LSP is not included in the SDP definition.
For an MPLS-TP LSP, the to node-id may be either in 4-octet IPv4 address format, or a 32-bit unsigned integer. This command is mandatory to create an MPLS-TP LSP. A value of zero is invalid. This to address is used in the MPLS-TP LSP ID, and the MPLS-TP MEP ID for the LSP.
Default
no default
Parameters
- ip-address
-
Specifies the IP address of the egress router. When the LSP type is sr-te, then an IPv6 address can be used.
- node-id a.b.c.d. | 1...4294967295
-
4-octet IPv4 formatted or unsigned 32-bit integer MPLS-TP node-id of the egress router.
Platforms
7705 SAR Gen 2
to
Syntax
to ip-address
Context
[Tree] (config>router>mpls>static-lsp to)
Full Context
configure router mpls static-lsp to
Description
This command specifies the IP address of the egress router for the static LSP. When creating an LSP this command is required. The to IP address may be the address of a local interface, the system IP interface, or of a loopback interface of the egress router. When used in a SDP and the to address does not match the far-end SDP address, the LSP is not included in the SDP definition.
Parameters
- ip-address
-
Specifies the system IP address of the egress router.
Platforms
7705 SAR Gen 2
to
Syntax
to file file-id
Context
[Tree] (config>log>accounting-policy to)
Full Context
configure log accounting-policy to
Description
This command specifies the destination for the accounting records selected for the accounting policy.
Parameters
- file-id
-
Specifies the destination for the accounting records selected for this destination. The characteristics of the file ID must have already been defined in the config>log>file context. A file ID can only be used once.
The file is generated when the file policy is referenced. This command identifies the type of accounting file to be created. The file definition defines its characteristics.
If the to command is executed while the accounting policy is in operation, then it becomes active during the next collection interval.
Platforms
7705 SAR Gen 2
to
Syntax
[no] to
Context
[Tree] (config>router>policy-options>policy-statement>entry to)
Full Context
configure router policy-options policy-statement entry to
Description
This command creates the context to configure export policy match criteria based on a route’s destination or the protocol into which the route is being advertised.
If no condition is specified, all route destinations are considered to match.
The to command context only applies to export policies. If it is used for an import policy, match criteria is ignored.
The no form of this command deletes export match criteria for the route policy statement entry.
Platforms
7705 SAR Gen 2
to
Syntax
to cli [size]
to console
to file log-file-id
to memory [size]
to netconf [size]
to session
to snmp [size]
to syslog syslog-id
Context
[Tree] (config>log>log-id to)
Full Context
configure log log-id to
Description
This command specifies a destination for the log event data.
The source of the data stream must be specified in the from command before configuring the destination with the to command.
The to command cannot be modified or re-entered. If the destination or maximum size of an SNMP or memory log needs to be modified, the log ID must be removed and then recreated.
Parameters
- cli
-
Specifies that log events are directed to any subscribed CLI session. Subscribe to a CLI log from within a CLI session using the tools>perform>log>subscribe-to log-id log-id command. Events are sent to the CLI session for the duration of that CLI session, or until an unsubscribe-from command is issued. A local circular memory log is maintained for CLI logs.
- console
-
Specifies that log events events are directed to the console port. If the console is not connected, all the entries are dropped.
- file log-file-id
-
Specifies that log events are directed to a file with the specified log-file-id. The characteristics of the log-file-id referenced in this parameter must have already been defined in the config>log>file file-id context. When the file-id location parameter is modified, log files are not written to the new location until a rollover occurs or the log is manually cleared. A rollover can be forced by using the clear>log command. Subsequent log entries are then written to the new location. If a rollover does not occur or the log is not cleared, the old location continues to be used.
- memory
-
Specifies that log events are directed to a memory file. A memory file is a circular buffer; when the file is full, each new entry replaces the oldest entry in the log. If the optional size parameter is not configured, the default value is used.
- netconf
-
Specifies that log events are directed to a NETCONF session as notifications. A NETCONF client can subscribe to a NETCONF log using the configured netconf-stream stream-name for the log in a subscription request. One or more NETCONF sessions can subscribe to a NETCONF log or stream.
- session
-
Specifies that log events are directed to the current console or telnet session. This command is only valid for the duration of the session. When the session is terminated, the to session configuration is removed. A log ID with a session destination is saved in the configuration file but the to session part is not stored.
- size
-
Specifies the maximum size of the log data destination, in bytes.
- snmp
-
Specifies that log events are directed to the snmp-trap-group associated with the log ID. A local circular memory log is maintained for SNMP logs.
- syslog syslog-id
-
Specifies that log events are directed to the specified syslog collector. To remain consistent with the standards governing syslog, messages to syslog are truncated to 1024 bytes. The characteristics of the syslog-id referenced in this parameter must have already been defined in the config>log>syslog syslog-id context.
Platforms
7705 SAR Gen 2
to
Syntax
to ipv4-address
no to
Context
[Tree] (config>oam-pm>session>ip>tunnel>mpls>rsvp-te-auto to)
Full Context
configure oam-pm session ip tunnel mpls rsvp-te-auto to
Description
This command configures the termination point of the RSV LSP. Configure the following three commands to identify an RSVP-TE Auto LSP: from, to, and lsp-template.When all three of these values are configured, the specific RSVP LSP can be identified and the test packets can be carried across the tunnel
The no form of this command removes the IPv4 address.
Parameters
- ipv4-address
-
Specifies IPv4 address.
Platforms
7705 SAR Gen 2
tolerance
tolerance
Syntax
tolerance [seconds | forever]
no tolerance
Context
[Tree] (config>system>security>keychain>direction>bi>entry tolerance)
[Tree] (config>system>security>keychain>direction>uni>receive>entry tolerance)
Full Context
configure system security keychain direction bi entry tolerance
configure system security keychain direction uni receive entry tolerance
Description
This command configures the amount of time that an eligible receive key should overlap with the active send key or to never expire.
Parameters
- seconds
-
Specifies the duration that an eligible receive key overlaps with the active send key.
- forever
-
Specifies that an eligible receive key overlap with the active send key forever.
Platforms
7705 SAR Gen 2
tos-marking-state
tos-marking-state
Syntax
tos-marking-state {trusted | untrusted}
no tos-marking-state
Context
[Tree] (config>service>vprn>interface tos-marking-state)
[Tree] (config>service>ies>if tos-marking-state)
Full Context
configure service vprn interface tos-marking-state
configure service ies interface tos-marking-state
Description
This command is used to alter the default trusted state to a non-trusted state. When unset or reverted to the trusted default, the ToS field are not remarked by egress network IP interfaces unless the egress network IP interface has the remark-trusted state set, in which case the egress network interface treats all VPRN and network IP interface as untrusted.
When the ingress interface is set to untrusted, all egress network IP interfaces remark IP packets received on the network interface according to the egress marking definitions on each network interface. The egress network remarking rules also apply to the ToS field of IP packets routed using IGP shortcuts (tunneled to a remote next-hop). However, the tunnel QoS markings are always derived from the egress network QoS definitions.
Egress marking and remarking is based on the internal forwarding class and profile state of the packet once it reaches the egress interface. The forwarding class is derived from ingress classification functions. The profile of a packet is either derived from ingress classification or ingress policing.
The default marking state for network IP interfaces is trusted. This is equivalent to declaring no tos-marking-state on the network IP interface. When undefined or set to tos-marking-state trusted, the trusted state of the interface will not be displayed when using show config or show info unless the detail parameter is given. The save config command will not store the default tos-marking-state trusted state for network IP interfaces unless the detail parameter is also specified.
The no form of this command restores the trusted state to a network IP interface. This is equivalent to executing the tos-marking-state trusted command.
Default
tos-marking-state trusted
Parameters
- trusted
-
The default prevents the ToS field to not be remarked by egress network IP interfaces unless the egress network IP interface has the remark-trusted state set.
- untrusted
-
Specifies that all egress network IP interfaces will remark IP packets received on the network interface according to the egress marking definitions on each network interface.
Platforms
7705 SAR Gen 2
tos-marking-state
Syntax
tos-marking-state {trusted | untrusted}
no tos-marking-state
Context
[Tree] (config>service>vprn>nw-if tos-marking-state)
Full Context
configure service vprn network-interface tos-marking-state
Description
This command is used to alter the default trusted state to a non-trusted state. When unset or reverted to the trusted default, the ToS field will not be remarked by egress network IP interfaces unless the egress network IP interface has the remark-trusted state set, in which case the egress network interface treats all VPRN and network IP interface as untrusted.
When the ingress interface is set to untrusted, all egress network IP interfaces will remark IP packets received on the network interface according to the egress marking definitions on each network interface. The egress network remarking rules also apply to the ToS field of IP packets routed using IGP shortcuts (tunneled to a remote next-hop). However, the tunnel QoS markings are always derived from the egress network QoS definitions. Egress marking and remarking is based on the internal forwarding class and profile state of the packet once it reaches the egress interface. The forwarding class is derived from ingress classification functions. The profile of a packet is either derived from ingress classification or ingress policing.
The default marking state for network IP interfaces is trusted. This is equivalent to declaring no tos-marking-state on the network IP interface. When undefined or set to tos-marking-state trusted, the trusted state of the interface will not be displayed when using show config or show info unless the detail parameter is given. The save config command will not store the default tos-marking-state trusted state for network IP interfaces unless the detail parameter is also specified.
The no tos-marking-state command is used to restore the trusted state to a network IP interface. This is equivalent to executing the tos-marking-state trusted command.
Default
tos-marking-state trusted
Parameters
- trusted
-
The default prevents the ToS field to not be remarked by egress network IP interfaces unless the egress network IP interface has the remark-trusted state set.
- untrusted
-
Specifies that all egress network IP interfaces will remark IP packets received on the network interface according to the egress marking definitions on each network interface.
Platforms
7705 SAR Gen 2
tos-marking-state
Syntax
tos-marking-state {trusted | untrusted}
no tos-marking-state
Context
[Tree] (config>router>if tos-marking-state)
Full Context
configure router interface tos-marking-state
Description
This command is used on a network IP interface to alter the default trusted state to a non-trusted state. When unset or reverted to the trusted default, the ToS field will not be remarked by egress network IP interfaces unless the egress network IP interface has the remark-trusted state set, in which case the egress network interface treats all IES and network IP interface as untrusted. When the ingress network IP interface is set to untrusted, all egress network IP interfaces will remark IP packets received on the network interface according to the egress marking definitions on each network interface. The egress network remarking rules also apply to the ToS field of IP packets routed using IGP shortcuts (tunneled to a remote next-hop). However, the tunnel QoS markings are always derived from the egress network QoS definitions. Egress marking and remarking is based on the internal forwarding class and profile state of the packet once it reaches the egress interface. The forwarding class is derived from ingress classification functions. The profile of a packet is either derived from ingress classification or ingress policing. The default marking state for network IP interfaces is trusted. This is equivalent to declaring no tos-marking-state on the network IP interface. When undefined or set to tos-marking-state trusted, the trusted state of the interface will not be displayed when using show config or show info unless the detail parameter is given. The save config command will not store the default tos-marking-state trusted state for network IP interfaces unless the detail parameter is also specified.
The no form of this command is used to restore the trusted state to a network IP interface. This is equivalent to executing the tos-marking-state trusted command.
Default
tos-marking-state trusted
Parameters
- trusted
-
Specifies that the default prevents the ToS field to not be remarked by egress network IP interfaces unless the egress network IP interface has the remark-trusted state set
- untrusted
-
Specifies that all egress network IP interfaces will remark IP packets received on the network interface according to the egress marking definitions on each network interface.
Platforms
7705 SAR Gen 2