Basic System Configuration Guide 22.10.R1
Basic System Configuration Guide 22.10.R1
© 2022 Nokia.
Use subject to Terms available at: www.nokia.com/terms/.
Nokia is committed to diversity and inclusion. We are continuously reviewing our customer
documentation and consulting with standards bodies to ensure that terminology is inclusive and
aligned with the industry. Our future customer documentation will be updated accordingly.
This document includes Nokia proprietary and confidential information, which may not be distributed
or disclosed to any third parties without the prior written consent of Nokia.
This document is intended for use by Nokia’s customers (“You”/”Your”) in connection with a product
purchased or licensed from any company within Nokia Group of Companies. Use this document
as agreed. You agree to notify Nokia of any errors you may find in this document; however, should
you elect to use this document for any purpose(s) for which it is not intended, You understand and
warrant that any determinations You may make or actions You may take will be based upon Your
independent judgment and analysis of the content of this document.
Nokia reserves the right to make changes to this document without notice. At all times, the
controlling version is the one available on Nokia’s site.
Copyright and trademark: Nokia is a registered trademark of Nokia Corporation. Other product
names mentioned in this document may be trademarks of their respective owners.
© 2022 Nokia.
BASIC SYSTEM CONFIGURATION GUIDE Table of contents
RELEASE 22.10.R1
Table of contents
1 Getting started................................................................................................................................... 11
1.1 About this guide........................................................................................................................ 11
1.2 Router system configuration process........................................................................................12
1.3 Conventions............................................................................................................................... 12
1.3.1 Precautionary and information messages...................................................................... 12
1.3.2 Options or substeps in procedures and sequential workflows........................................13
2 File management............................................................................................................................... 14
2.1 The file system.......................................................................................................................... 14
2.1.1 Storage devices...............................................................................................................14
2.1.2 URLs................................................................................................................................14
2.1.3 HTTP digest authentication.............................................................................................16
2.1.4 Wildcards and special characters................................................................................... 17
2.2 Text editor.................................................................................................................................. 17
2.2.1 Summary of text editor commands.................................................................................18
2.2.2 Using text editor commands........................................................................................... 18
2.3 File management tasks in the classic CLI................................................................................25
2.3.1 Displaying directory and file information.........................................................................26
2.3.2 Modifying file attributes................................................................................................... 27
2.3.3 Creating directories......................................................................................................... 27
2.3.4 Copying files....................................................................................................................27
2.3.5 Moving files..................................................................................................................... 29
2.3.6 Deleting files and removing directories...........................................................................32
2.3.7 Unzipping files................................................................................................................. 32
2.3.8 Repairing the file system................................................................................................ 33
2.3.9 Displaying file checksums...............................................................................................33
2.4 File management tasks in the MD-CLI..................................................................................... 33
2.4.1 Displaying directory and file information.........................................................................34
2.4.2 Modifying file attributes................................................................................................... 35
2.4.3 Creating and navigating directories................................................................................ 36
2.4.4 Copying files....................................................................................................................37
2.4.5 Moving files..................................................................................................................... 39
2.4.6 Deleting files and removing directories...........................................................................42
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Table of contents
RELEASE 22.10.R1
3 Boot options.......................................................................................................................................45
3.1 System initialization................................................................................................................... 45
3.1.1 BOF and configuration file encryption............................................................................ 48
3.1.2 Configuration and image loading.................................................................................... 48
3.1.2.1 Persistent indexes in the classic and mixed configuration mode......................... 50
3.1.2.2 Lawful Intercept.....................................................................................................50
3.1.2.3 FIPS-140-2 mode..................................................................................................50
3.1.2.4 System profiles......................................................................................................52
3.2 Initial system startup process flow............................................................................................53
3.3 Configuration notes................................................................................................................... 54
3.4 Configuring boot options file with CLI.......................................................................................54
3.4.1 BOF configuration overview............................................................................................54
3.4.2 Basic BOF configuration................................................................................................. 55
3.4.3 Common configuration tasks.......................................................................................... 56
3.4.3.1 Searching for the BOF..........................................................................................56
3.4.3.2 Accessing the CLI.................................................................................................59
3.4.3.3 Configuring BOF encryption................................................................................. 60
3.4.3.4 Configuring the BOF interactive menu password................................................. 60
3.4.3.5 Configuring configuration file encryption.............................................................. 60
3.4.4 Autoconfigure...................................................................................................................61
3.4.4.1 Autoconfigure restrictions......................................................................................61
3.4.4.2 DHCP discovery of MAC addresses.................................................................... 62
3.4.4.3 IPv6 DUID............................................................................................................. 62
3.4.4.4 IPv6 DHCP RAs....................................................................................................62
3.5 System administration commands in the classic CLI............................................................... 63
3.5.1 Viewing the current configuration................................................................................... 63
3.5.2 Modifying and saving a configuration............................................................................. 64
3.5.3 Deleting BOF parameters............................................................................................... 65
3.5.4 Saving a configuration to a different filename................................................................ 65
3.5.5 Rebooting........................................................................................................................ 66
3.5.6 Setting the MTU value for the management port........................................................... 66
3.6 System administration commands in the MD-CLI.................................................................... 66
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Table of contents
RELEASE 22.10.R1
4 Debug configuration..........................................................................................................................71
4.1 Debug configuration in the classic CLI..................................................................................... 71
4.1.1 Logging debug events in the classic CLI....................................................................... 71
4.2 Debug configuration in the MD-CLI.......................................................................................... 72
4.2.1 Logging debug events in the MD-CLI.............................................................................73
4.3 Debug configuration in mixed and model-driven mode............................................................ 74
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Table of contents
RELEASE 22.10.R1
6 System management.......................................................................................................................103
6.1 System management parameters........................................................................................... 103
6.1.1 System information........................................................................................................103
6.1.1.1 Name................................................................................................................... 103
6.1.1.2 Contact................................................................................................................ 103
6.1.1.3 Location............................................................................................................... 103
6.1.1.4 Coordinates......................................................................................................... 103
6.1.1.5 Naming objects................................................................................................... 104
6.1.1.6 Common language location identifier................................................................. 104
6.1.1.7 DNS security extensions.....................................................................................104
6.1.2 System time...................................................................................................................104
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Table of contents
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Table of contents
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Table of contents
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Table of contents
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Getting started
RELEASE 22.10.R1
1 Getting started
Note: Unless otherwise indicated, CLI commands, contexts, and configuration examples in this
guide apply for both the classic CLI and the MD-CLI.
This guide is organized into functional chapters and provides concepts and descriptions of the
implementation flow.
The topics and commands described in this document apply to the:
• 7450 ESS
• 7750 SR
• 7950 XRS
• Virtualized Service Router
For a list of unsupported features by platform and chassis, see the SR OS R22.x.Rx Software Release
Notes, part number 3HE 18412 000 x TQZZA.
Command outputs shown in this guide are examples only; actual displays may differ depending on
supported functionality and user configuration.
Note:
The SR OS CLI trees and command descriptions can be found in the following guides:
• 7450 ESS, 7750 SR, 7950 XRS, and VSR Classic CLI Command Reference Guide
• 7450 ESS, 7750 SR, 7950 XRS, and VSR Clear, Monitor, Show, and Tools Command
Reference Guide (for both the MD-CLI and classic CLI)
• 7450 ESS, 7750 SR, 7950 XRS, and VSR MD-CLI Command Reference Guide
Note:
This guide generically covers Release 22.x.Rx content and may contain some content that will
be released in later maintenance loads. See the SR OS R22.x.Rx Software Release Notes, part
number 3HE 18412 000 x TQZZA, for information about features supported in each load of the
Release 22.x.Rx software.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Getting started
RELEASE 22.10.R1
Boot options Configure boot option files Configuring boot options file with CLI
(BOF)
1.3 Conventions
This section describes the general conventions used in this guide.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Getting started
RELEASE 22.10.R1
DANGER: Danger warns that the described activity or situation may result in serious personal
injury or death. An electric shock hazard could exist. Before you begin work on this equipment,
be aware of hazards involving electrical circuitry, be familiar with networking environments, and
implement accident prevention procedures.
WARNING: Warning indicates that the described activity or situation may, or will, cause
equipment damage, serious performance problems, or loss of data.
Caution: Caution indicates that the described activity or situation may reduce your component or
system performance.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
2 File management
Note:
To prevent corrupting open files in the file system, only remove a compact flash that is
administratively shutdown. SR OS gracefully closes any open files on the device, so it can be
safely removed.
2.1.2 URLs
The arguments for the SR OS file commands are modeled after standard universal resource locater (URL).
A URL refers to a file (a file-url) or a directory (a directory-url).
SR OS supports operations on both the local file system and on remote files. For the purposes of
categorizing the applicability of commands to local and remote file operations, URLs are divided into five
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
types of URLs: local, ftp, tftp, http, and https. The syntax for each of the URL types are listed in Table 2:
URL types and syntax .
ftp-url ftp://[username[:password]@]host/path An absolute FTP path from the root of the remote
file system.
username is the FTP username
password is the FTP user password
host is the remote host
path is the path to the directory or file
If the host portion of the URL is an IPv6 address, then the address should be enclosed in square brackets.
For example:
• ftp://username:password@[3ffe::97]/./testfile.txt
• tftp://[2001:db8:3333:4444:5555:6666:7777:8888]/./testfile.txt
The system accepts forward slash (/) or backslash (\) characters to delimit directory and/or filenames in
URLs. Similarly, the SR OS SCP client application can use either slash or backslash characters, but not
all SCP clients treat backslash characters as equivalent to slash characters. In particular, UNIX systems
often interprets the backslash character as an escape character. This can cause problems when using an
external SCP client application to send files to the SCP server. If the external system treats the backslash
like an escape character, the backslash delimiter gets stripped by the parser and is not transmitted to the
SCP server.
For example, a destination directory specified as ‟cf1:\dir1\file1” is transmitted to the SCP server as
‟cf1:dir1file1” where the backslash escape characters are stripped by the SCP client system before
transmission. On systems where the client treats the backslash like an escape character, a double
backslash (\\) or the forward slash (/) can typically be used to properly delimit directories and the filename.
When a special character is used in a password, it can cause issues when that password is encoded as
part of a URL. To prevent this issue, percent encoding can be used. Percent encoding is a mechanism
to encode 8-bit characters that have specific meaning in the context of URLs. The encoding consists of
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
substitution of a percent character (%) followed by the hexadecimal representation of the ASCII value of
the replaced character.
Some file manipulation commands such as copying, removing, or moving files, may request access to
an HTTP or HTTPS server. If an HTTP or HTTPS server redirects the system to a different URL (from an
"HTTP 301" error or similar response), the system prompts the user "y/n" to either repeat the operation
with the new URL or terminate it. These file commands can be configured to force the HTTP redirects
without prompting or they can be configured to refuse HTTP redirects. If a file command is redirected
more than eight times, or if it queries an HTTPS URL and gets redirected to an HTTP URL, the command
automatically terminates as a security measure.
Use the following command to refuse HTTP redirects:
• MD-CLI
• classic CLI
Use the following command to force the HTTP redirects without prompting:
• MD-CLI
• classic CLI
When connecting to an HTTPS server, the system verifies the server's TLS certificate. For the certificate to
pass verification, the system must have a CA profile already configured for the server's Certificate Authority
(CA), which specifies up-to-date certificate and CRL files. HTTPS file commands do not use the Online
Certificate Status Protocol (OCSP). If the certificate was issued by an intermediate CA, the system must
have a CA profile for every CA tracing back to the root CA. If the server's certificate fails verification for
any reason, the file command terminates. See the 7450 ESS, 7750 SR, and VSR Multiservice Integrated
Service Adapter and Extended Services Appliance Guide for more information about CA profiles.
Use the following CLI command to configure the CA profile:
An HTTPS file command may also include a client-tls-profile configuration parameter, referring to a
client TLS profile that provides the cipher list, client certificate, and trust anchor the system uses when
communicating with the HTTPS server. See the 7450 ESS, 7750 SR, 7950 XRS, and VSR System
Management Guide for more information about client TLS profiles.
A file command that connects to an HTTP or HTTPS server outside the local network may need to use an
HTTP proxy. The user may specify a proxy server (which must be an HTTP URL).
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
[/file "cf3:\"]
A:admin@node-2# copy bof.* testdir
11 file(s) copied.
[/file "cf3:\"]
A:admin@node-2#
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
The following table describes the commands used to move the cursor within the file.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
The following table describes the commands to move the cursor around the screen.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
The following table describes the commands to search for text or characters in the file.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
The following table describes the commands to manipulate character and line formatting.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
From the text editor, use the : command to enter a line editing command. To modify more than one line
using specific commands (such as :s and :w), the range must be specified before the command. For
example, to substitute lines 3 through 15, the command is :3,15s/from/this/g.
The following table describes the commonly used line editing commands.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
Table 12: File command local and remote file system support in the classic CLI
cd ✓ ✓
copy (recursive) ✓ ✓
checksum ✓ ✓ ✓
delete ✓ ✓ ✓ ✓
dir ✓ ✓
md ✓ ✓
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
move (recursive) ✓ ✓
rd ✓ ✓
type ✓ ✓ ✓ ✓ ✓
version ✓ ✓ ✓
vi ✓
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
The scp command copies files between hosts on a network. It uses SSH for data transfer, and uses the
same authentication and provides the same security as SSH. The source file for the scp command must
be local. The file must reside on the router. The destination file has to be of the format: user@host:file-
name. The destination does not need to be local.
The following example shows copy and scp command usage.
Example: Image file and network host copy
Use the recursive keyword to recursively copy files and directories. If files or directories already exist,
the operator is prompted to overwrite them. If the force keyword is specified, a positive response to the
overwrite prompts is assumed. The operator is not prompted for confirmation and the existing files or
directories are overwritten.
The following example shows a recursive directory copy.
Example: Recursive directory copy
Directory of cf3:\
Directory of cf3:\recursive3
09/21/2021 07:18p ./
09/21/2021 07:18p ../
09/21/2021 07:19p 7 file1.txt
09/21/2021 07:19p recursive2/
1 File(s) 7 bytes.
3 Dir(s) 612319232 bytes free.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
Directory of cf3:\
Directory of cf3:\recursive1
09/23/2021 02:42p ./
09/23/2021 02:42p ../
09/23/2021 02:42p 7 file1.txt
09/23/2021 02:42p recursive2/
1 File(s) 7 bytes.
3 Dir(s) 612298752 bytes free.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
Directory of cf3:\
Directory of cf3:\
Directory of cf3:\test_dir1\test_dir2\test_dir3
The following example shows a recursive move of the recursive1 directory to recursive3.
Example: Recursive directory move
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
Directory of cf3:\
Directory of cf3:\recursive1
09/23/2021 02:42p ./
09/23/2021 02:42p ../
09/23/2021 02:42p 7 file1.txt
09/23/2021 02:42p recursive2/
1 File(s) 7 bytes.
3 Dir(s) 612311040 bytes free.
Directory of cf3:\
Directory of cf3:\recursive4
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
09/23/2021 02:42p ./
09/23/2021 02:42p ../
09/23/2021 02:42p 7 file1.txt
09/23/2021 02:42p recursive2/
1 File(s) 7 bytes.
3 Dir(s) 612311040 bytes free.
Note:
• The destination for the unzipped files and directories must be a locally installed solid-state
storage device in the active CPM.
• ZIP filenames, or the filenames of any contained files, must not include special characters.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
Processing demodir/demosubdir/
Processing demodir/demosubdir/myfile3.txt
Writing...OK
The following example shows the output of the checksum operation to compute and display a checksum
based on the MD5 and SHA256 algorithms for the config.cfg file on cf3.
Example
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
When a file system operation is performed that can potentially remove or overwrite a file system entry, a
prompt appears to confirm the action. The force keyword performs the operation without displaying the
confirmation prompt.
All the commands can operate on the local file system. The following table indicates the commands that
also support remote file operations.
Table 13: File command local and remote file system support in the MD-CLI
checksum ✓ ✓ ✓
copy (recursive) ✓ ✓
list ✓ ✓
make-directory ✓ ✓
move ✓ ✓ ✓ ✓
move (recursive) ✓ ✓
permission ✓
remove ✓ ✓ ✓ ✓
remove-directory ✓ ✓
show ✓ ✓ ✓ ✓ ✓
version ✓ ✓ ✓
[/file "cf3:\"]
A:admin@node-2# list
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
Directory of cf3:\
[/file "cf3:\"]
A:admin@node-2# list size
Directory of cf3:\
[/file "cf3:\"]
A:admin@node-2# show md-config.cfg
File: md-config.cfg
-------------------------------------------------------------------------------
configure {
card 1 {
mda 1 {
}
}
log {
filter 1001 {
entry 10 {
description "Collect only events of major severity or higher"
action forward
match {
severity {
gte major
}
}
}
}
log-id 99 {
description "Default System Log"
source {
main true
Press Q to quit, Enter to print next line or any other key to print next page.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
Enter the permission command with no options to display the contents of the directory and the file
attributes.
A single local file can be specified or the wildcard character (*) can be used to indicate multiple files. If no
URL is specified, the command applies to all files in the directory.
The following example shows the command syntax. A file with an ‟R” preceding the filename indicate the
file is read-only; otherwise, the file is read-write.
Example
[/file "cf3:\"]
A:admin@node-2# permission
cf3:\NVRAM.DAT
cf3:\bof.cfg
cf3:\nvsys.info
cf3:\restcntr.txt
cf3:\.ssh
cf3:\my.txt
[/file "cf3:\"]
A:admin@node-2# permission read-only my.txt
[/file "cf3:\"]
A:admin@node-2# permission
cf3:\NVRAM.DAT
cf3:\bof.cfg
cf3:\nvsys.info
cf3:\restcntr.txt
cf3:\.ssh
R cf3:\my.txt
[/file "cf3:\"]
A:admin@node-2# permission read-only
[/file "cf3:\"]
A:admin@node-2# permission
R cf3:\NVRAM.DAT
R cf3:\bof.cfg
R cf3:\nvsys.info
R cf3:\restcntr.txt
R cf3:\.ssh
R cf3:\my.txt
[/file "cf3:\"]
A:admin@node-2# make-directory test1
[/file "cf3:\"]
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
[/file "cf3:\test1"]
A:admin@node-2# make-directory test2
[/file "cf3:\test1"]
A:admin@node-2# change-directory test2
[/file "cf3:\test1\test2"]
A:admin@node-2# make-directory test3
[/file "cf3:\test1\test2"]
A:admin@node-2# change-directory test3
[/file "cf3:\test1\test2\test3"]
A:admin@node-2# change-directory ..
[/file "cf3:\test1\test2"]
A:admin@node-2#
[/file "cf3:\"]
A:admin@node-2# list test_dir1
Directory of cf3:\test_dir1
[/file "cf3:\"]
A:admin@node-2# list
Directory of cf3:\
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
[/file "cf3:\"]
A:admin@node-2# copy md-config.cfg test_dir1
Copying file cf3:\md-config.cfg ... OK
1 file copied.
[/file "cf3:\"]
A:admin@node-2# list test_dir1
Directory of cf3:\test_dir1
The following example shows a recursive move of the recursive4 directory to recursive5.
Example: Recursive directory move
[/]
A:admin@node-2# file list
Directory of cf3:\
[/]
A:admin@node-2# file copy recursive4 recursive5 recursive
Copying directory cf3:\recursive4
Copying directory cf3:\recursive4\recursive2
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
[/file "cf3:\"]
A:admin@node-2# list test_dir1
Directory of cf3:\test_dir1
[/file "cf3:\"]
A:admin@node-2# list
Directory of cf3:\
[/file "cf3:\"]
A:admin@node-2# move md-config.cfg test_dir1
Moving file cf3:\md-config.cfg ... OK
cf3:\md-config.cfg
[/file "cf3:\"]
A:admin@node-2# list test_dir1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
Directory of cf3:\test_dir1
[/file "cf3:\"]
A:admin@node-2# list
Directory of cf3:\
The following example shows a recursive move of the recursive1 directory to recursive3.
Example: Recursive directory move
[/file "cf3:\"]
A:admin@node-2# list
Directory of cf3:\
[/file "cf3:\"]
A:admin@node-2# list recursive1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
Directory of cf3:\recursive1
09/21/2021 07:18p ./
09/21/2021 07:18p ../
09/21/2021 07:19p 7 file1.txt
09/21/2021 07:19p recursive2/
1 File(s) 7 bytes.
3 Dir(s) 612347904 bytes free.
[/file "cf3:\"]
A:admin@node-2# list recursive1/recursive2
Directory of cf3:\recursive1\recursive2
09/21/2021 07:19p ./
09/21/2021 07:19p ../
09/21/2021 07:19p 7 file2.txt
09/21/2021 07:19p 7 file3.txt
2 File(s) 14 bytes.
2 Dir(s) 612347904 bytes free.
[/file "cf3:\"]
A:admin@sros# move recursive1 recursive3
Moving file cf3:\recursive1 ... OK
cf3:\recursive1
[/file "cf3:\"]
A:admin@node-2# list
Directory of cf3:\
[/file "cf3:\"]
A:admin@node-2# list recursive3
Directory of cf3:\recursive3
09/21/2021 07:18p ./
09/21/2021 07:18p ../
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
[/file "cf3:\test1\test2"]
A:admin@node-2# list
Directory of cf3:\test1\test2
[/file "cf3:\test1\test2"]
A:admin@node-2# list test3
Directory of cf3:\test1\test2\test3
[/file "cf3:\test1\test2"]
A:admin@node-2# remove-directory test3 ?
remove-directory
force - Force removal without prompting
recursive - Remove directory and its content recursively
[/file "cf3:\test1\test2"]
A:admin@node-2# remove-directory test3 recursive
Deleting all subdirectories and files in specified directory. y/n ?y
Deleting file cf3:\test1\test2\test3\mybof.cfg ... OK
Deleting file cf3:\test1\test2\test3\conf3.cfg ... OK
Deleting directory cf3:\test1\test2\test3 ... OK
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
[/file "cf3:\test1\test2"]
A:admin@node-2# list
Directory of cf3:\test1\test2
Note:
• The destination for the unzipped files and directories must be a locally installed solid-state
storage device in the active CPM.
• ZIP filenames, or the filenames of any contained files, must not include special characters.
[/file "cf3:\"]
A:admin@node-2# unzip demo.zip cf3:/mynewfolder/mynewsubfolder create-destination
force
Verifying cf3:\demo.zip .. ... OK
Unzipping cf3:\demo.zip to cf3:\mynewfolder\mynewsubfolder\ .. .Processing demodir/
Processing demodir/myfile1.txt
Processing demodir/myfile2.txt
Processing demodir/demosubdir/
Processing demodir/demosubdir/myfile3.txt
Writing...OK
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE File management
RELEASE 22.10.R1
Example
[/file "cf3:\"]
A:admin@node-2# repair cflash-id cf3:
Checking drive cf3: on slot A for errors...
Drive cf3: on slot A is OK.
[/file "cf3:\"]
A:admin@node-2# repair
Checking drive cf3: on slot A for errors...
Drive cf3: on slot A is OK.
[/file "cf3:\"]
A:admin@node-2# checksum image cpm.tim
TiMOS-C-20.10.R1
Wed Nov 4 09:18:17 PST 2020 by builder in /builds/c/2010B/R1/panos/main/sros
Checking file ... OK
The following example shows the output of the checksum operation to compute and display a checksum
based on the MD5 and SHA256 algorithms for the config.cfg file on cf3.
Example: Configure file checksum based on MD5 and SHA256 algorithms
[/]
A:admin@node2# file checksum md5 cf3:config.cfg
Checking file cf3:config.cfg
c65699dc05e6e35a2172eaac80485aa2
[/]
A:admin@node2# file checksum sha256 cf3:config.cfg
Checking file cf3:config.cfg
a1a813a696be04906f9faf1df9db0f90a990ff51cb3383099ade21241203bc1c
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
3 Boot options
Note:
• The modules contain three slots for removable compact flash cards. The drives are named
Compact Flash Slot #1 (cf1), Compact Flash Slot #2 (cf2), and Compact Flash Slot #3 (cf3).
Configurations and executable images can be stored on flash cards or an FTP file location.
• The flash card containing the bootstrap and boot option files must be installed in Compact
Flash Slot #3 (cf3).
• You must have a console connection.
Starting a router begins with hardware initialization (a reset or power cycle). By default, the system
searches Compact Flash Slot #3 (cf3) for the boot.ldr file (also known as the bootstrap file). The
boot.ldr file is the image that reads and executes the system initialization commands configured in
the boot option file (BOF). The default value to initially search for the boot.ldr file on cf3 cannot be
modified.
The following example shows a console display output when the boot.ldr file cannot be located on cf3.
...
(memory test messages)
(serial number information)
Searching for boot.ldr on local drives:
No disk in cf3
No disk in cf3
No disk in cf3
Error - file boot.ldr not found on any drive
Please insert CF containing boot.ldr. Rebooting in 5 seconds.
When the bootstrap image is loaded, the BOF is read to obtain the location of the image and configuration
files. The BOF must be located on the same compact flash drive as the boot.ldr file.
Figure 1: System initialization - part 1 displays the system initialization sequence. In the figure, ‟A” refers to
Figure 2: Files on the compact flash, and ‟B” refers to the list of files on the compact flash.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
Figure 2: Files on the compact flash displays the compact flash directory structure and filenames for the
multislot models.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
B — Beta release
M — Maintenance release
R — Released software
z — Version number
– cpm.tim — CPM image file
– iom.tim — XCM/IOM image file
– support.tim — required data for SR OS .tim files
– hmac-sha1.txt (in FIPS-140-2 mode only)
Figure 3: Files on the compact flash (1-slot and 1-slot non-redundant) displays the compact flash directory
structure and filenames for the 1-slot models (7750 SR-1 and 7750 SR-1s).
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
The 7750 SR includes a boot option for running the node in a FIPS-140-2 mode. This mode limits the
use of cryptographic algorithms on the CPM to only those that are in accordance with the FIPS-140-2
certifications associated with the 7750 SR.
Caution: The first time a file is encrypted and the original file is moved to filename.1, the
filename.1 file is unencrypted. Delete the unencrypted file to maintain node security.
When the BOF is encrypted on the compact flash, the BOF interactive menu can be used during node
startup to access the file and modify BOF fields. Use the following command to configure a password to
prevent unauthorized modification of the BOF using the BOF interactive menu:
• MD-CLI
• classic CLI
bof password
The BOF interactive menu is accessible only when the configured password is entered. If the correct
password is not entered in 30 s, the node reboots.
See Configuring BOF encryption for information about configuring BOF encryption. See Configuring the
BOF interactive menu password for information about configuring the BOF interactive menu password. See
Configuring configuration file encryption for information about configuring the configuration file encryption.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
When the runtime image is successfully loaded, control is passed from the bootstrap loader to the image.
The runtime image first attempts to read the license file if one has been included in the bof. If a license
file is found, it is activated. If there are any issues with the activation, a log event is raised but the startup
processing continues with the reading of the configuration file. The runtime image next attempts to locate
the configuration file as configured in the BOF. Like the runtime image, three locations can be configured
for the system to search for the configuration file. The locations can be local or remote. The first location
searched is the primary configuration location. If not found, the secondary configuration location is
searched, and lastly, the tertiary configuration location is searched. The configuration file includes chassis,
card, MDA, and port configurations, as well as system, routing, and service configurations.
The following usage guidelines apply:
• The primary, secondary, and tertiary image locations must have the same version of the SR OS runtime
image. They cannot be used to load a previous version of the SR OS.
• The primary, secondary, and tertiary configuration file locations must have the same version of the
saved configuration file. They cannot be used to load a previous version of the saved configuration. To
ensure the configuration files in the different locations have the same version, the user must copy the
file from one location to the other locations, or issue the admin save command with different locations
as the destination.
• In model-driven configuration mode with incremental saved configuration files enabled, the primary
configuration location supports complete and incremental saved configuration files. The secondary and
tertiary configuration locations support complete saved configuration files. The user must ensure that
complete saved configuration files are stored at these locations.
Figure 4: System initialization - part 2 displays the boot sequence.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
show bof
==================================================================
Memory BOF
==================================================================
no autonegotiate
duplex full
speed 100
address 10.10.0.1/20 active
wait 3
primary-image cf3:\both.tim
primary-config cf3:\test123.cfg
primary-dns 192.168.10.20
persist on
dns-domain test.nokia.com
==================================================================
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
• The node performs an HMAC-SHA-256 integrity test on the software images .tim files.
• The node limits the use of encryption and authentication algorithms to only those allowed for the
associated FIPS-140-2 certification of the 7750-SR.
• Cryptographic module startup tests are executed on the CPM when the node boots to ensure the
associated approved FIPS-140-2 algorithms are operating correctly.
• Cryptographic module conditional tests are executed when required during normal operation of
associated when using FIPS-140-2 approved algorithms.
• When configuring user-defined encryption or authentication keys, the CLI prompts for the key to be
re-entered. For keys entered in hash format, for example, the key must be re-entered in hash format,
followed by the appropriate hash keyword. If the re-entered key does not match the original, the CLI
command is canceled. This affects several protocols and applications.
To support FIPS-140-2, an HMAC-SHA-256 integrity check is performed to verify the integrity of the
software images. The hmac-sha256.txt file, containing the hmac-sha-256 signature, is included in the
TIMOS-m.n.Yz software bundle.
During the loading of the cpm.tim or both.tim, an HMAC-SHA-256 check is performed to ensure that
the calculated HMAC-SHA-256 of the loaded image matches that stored in the hmac-sha256.txt file.
The HMAC-SHA-256 check is performed on the data loaded from the .tim file. Note that when configuring
the primary-image, secondary-image and tertiary-image, the hmac-sha256.txt file must exist in the
same directory as the .tim files. If the load has been verified correctly from the HMAC-SHA-256 integrity
check, the load continues to start up as normal. If the load is not verified by the HMAC-SHA-256 integrity
check, the image load fails.
After the HMAC-SHA-256 integrity check passes, the nodes continue their normal startup sequence
including reading the config.cfg file and loading the configuration. The config.cfg file used to boot
the node in FIPS-140-2 mode must not contain any configuration that is not supported in FIPS-140-2
mode. If such configuration is present in the config.cfg file when the node boots, the node loads the
config.cfg file until the location of the offending configuration and then halt the configuration at that
point. Upon a failure to load the config.cfg file, a failure message is printed on the console.
Enabling FIPS-140-2 restricts the ability to configure and use cryptographic algorithms and functions that
are not FIPS approved. FIPS-140-2 impacts the ability to configure SSH, SNMP and certificates. See the
7450 ESS, 7750 SR, 7950 XRS, and VSR System Management Guide for details of FIPS-140-2 related
items.
In addition, signature algorithms of the following combinations only are approved for FIPS:
• FIPS-140 Approved - Digital Signature Standard (DSS)
– DSA
– RSA
– ECDSA
• FIPS-140 Approved - Secured Hash Standard (SHS)
– SHA-1
– SHA-224
– SHA-256
– SHA-384
– SHA-512
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
Any other combination is not supported in FIPS mode. Using other FIPS signature algorithms in certificates
affecting IPsec can cause tunnels to fail. Restrictions to cryptographic algorithms are listed in the 7450
ESS, 7750 SR, 7950 XRS, and VSR System Management Guide.
– classic CLI
• profile B
This profile is primarily targeted at infrastructure routing, core, peering, and DC-GW applications.
System profiles profile-a and profile-b support only FP4-based line cards. Provisioning FP2- or FP3-
based line cards is prohibited when the system profile is set to profile-a or profile-b. If FP2- or FP3-based
card types are present in the boot configuration when using these profiles, the boot sequence aborts the
loading of the configuration file when it encounters their configuration.
When changing between system profiles, it is mandatory to remove all configuration commands for
features that are not supported in the target system profile before rebooting the system, otherwise the
reboot fails at the unsupported configuration command on startup.
On 7750 SR-1 and 7750 SR-s systems, the following conditions apply about the profile parameter:
• The parameter should be configured to either profile-a or profile-b.
• If the parameter is omitted, profile profile-a is used by the system.
• If the parameter is configured to an invalid value, it is ignored and profile profile-a is used by the
system.
On 7750 SR-7-B/12-B/12e and 7950 XRS-20/20e systems, the following conditions apply about the profile
parameter:
• The default system profile is none when the parameter is omitted.
• The parameter can be configured to either profile-a or profile-b, in which case only FP4-based line
cards are supported.
• If the parameter is configured to an invalid value, it is ignored and profile none is used by the system.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
On all other systems, the following conditions apply about the profile parameter:
• These systems must use profile none (the existing system capabilities). As a result, the parameter must
not be configured.
• If the parameter is configured to profile-a or profile-b, the system boots, allowing access using
the console and CPM management interface, but FP2-based and FP3-based line cards cannot be
provisioned; if these card types are present in the boot configuration, the boot sequence aborts loading
the configuration file when it encounters their configuration. This issue can be corrected by removing
the parameter and rebooting the system.
• If the parameter is configured to an invalid value, it is ignored and profile none is used by the system.
If a system has two CPMs, and the standby CPM boots with a different profile parameter than is used
on the active CPM, the active CPM reboot the standby CPM and keep it in a down state. To correct the
situation, the BOF can be reconfigured on the standby CPM to match the one configured on the active
CPM, and then reboot the system. Alternatively, use the following command to enable automatic BOF
synchronization to keep both CPMs in sync.
When performing a minor or major ISSU software upgrade on dual CPM systems, it is important that the
system profile in the BOF on both the active and standby CPM is the same and has a value supported on
the pre-upgrade software release. If the standby CPM happened to have a system profile which is only
supported in the post-upgrade release, the active CPM reboots the standby and keeps it down because of
a system profile mis-match.
Use the following command to display the BOF system profile:
• MD-CLI
• classic CLI
The BOF system profile used by the system when it booted can be seen in the boot messages (using the
show boot-messages command), which display the BOF read when rebooting.
Use the following command to display the system profile that is in use on the system.
• classic CLI
bof system-profile
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
1. Sets up the CPM and CCM Ethernet port (speed, duplex, auto).
2. Assigns the IP address for the CPM and CCM Ethernet port.
3. Creates static routes for the CPM/CCM Ethernet port.
4. Sets the console port speed.
5. Configures the Domain Name System (DNS) name and DNS servers.
6. Configures the primary, secondary, tertiary configuration source.
7. Configures the primary, secondary, and tertiary image source.
8. Configures the license source.
9. Configures operational parameters.
[/]
A:admin@node-2# admin show configuration bof
# TiMOS-B-22.2.R1 both/x86_64 Nokia 7750 SR Copyright (c) 2000-2022 Nokia.
# All rights reserved. All use subject to applicable license agreements.
# Built on Sat Feb 26 15:31:00 PST 2022 by builder in /builds/c/222B/R1/panos/main/sros
# Configuration format version 22.2 revision 0
bof {
configuration {
primary-location "ftp://.../config.cfg"
}
console {
speed 115200
}
dns {
domain "alu-srpm.us"
primary-server 192.251.72.68
secondary-server 192.251.10.29
}
image {
primary-location "ftp://.../i386-both.tim"
}
li {
local-save false
separate false
}
license {
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
primary-location "ftp://.../license"
}
router "management" {
interface "management" {
cpm active {
ipv4 {
ip-address 192.168.189.52
prefix-length 24
}
ipv6 {
ipv6-address fdfd:abab:7e11:ebc:192:168:189:52
prefix-length 64
}
}
}
static-routes {
route 0.0.0.0/0 {
next-hop 192.168.189.1
}
}
}
system {
fips-140-2 false
persistent-indices true
}
}
# Finished 2022-03-07T17:09:40.4+00:00
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
###########################################
Sample output:
Hit a key within 3 seconds to change boot parameters...
Type "sros" and hit ENTER within 29 seconds to begin changing parameters: sros
You must supply some required Boot Options. At any prompt, you can type:
"restart" - restart the query mode.
"reboot" - reboot.
"exit" - boot with existing values.
Press ENTER to begin, or 'flash' to enter firmware update...
Software Location
-----------------
You must enter the URL of the TiMOS software.
The location can be on a Compact Flash device,
or on the network.
Here are some examples
cf3:/timos1.0R1
ftp://user:[email protected]/./timos1.0R1
ftp://user:passwd@[3FFE::1]/./timos1.0R1
The existing Image URL is 'ftp://*:*@192.168.192.20/./images'
Press ENTER to keep it.
Software Image URL: ftp://vxworks:[email protected]/./rel/0.0/xx
Configuration File Location
---------------------------
You must enter the location of configuration
file to be used by TiMOS. The file can be on
a Compact Flash device, or on the network.
Here are some examples
cf1:/config.cfg
ftp://user:[email protected]/./config.cfg
ftp://user:passwd@[3FFE::1]/./config.cfg
tftp://192.168.1.150/./config.cfg
tftp://[3FFE::1]/./config.cfg
The existing Config URL is 'ftp://*:*@192.168.192.20/./images/dut-b.cfg'
Press ENTER to keep it, or the word 'none' for no Config URL.
Config File URL: cf1:/config.cfg
License File Location
---------------------------
You must enter the location of the license
file to be used by TiMOS. The file can be on
a Compact Flash device, or on the network.
Here are some examples
cf1:/license.txt
ftp://user:[email protected]/./license.txt
ftp://user:passwd@[3FFE::1]/./license.txt
tftp://192.168.1.150/./license.txt
tftp://[3FFE::1]/./license.txt
License File URL:
No license file specified.
IP Autoconfiguration
--------------------
This device supports IP autoconfiguration of the management port.
When the Software Image URL and the License File URL are not local,
the network configuration must be static (no autoconfiguration).
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
Parameter Value
Baud Rate 115,200
Data Bits 8
Parity None
Stop Bits 1
Flow Control None
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
• classic CLI
bof encrypt on
• classic CLI
bof password
Caution: When entering the password in plaintext, ensure that the password is not visible to
bystanders.
• a hashed string between 1 and 64 characters; the selected hashing scheme can be hash, hash2, or
custom
Note: The hash2 encryption scheme is node-specific and the password cannot be transferred
between nodes.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
• MD-CLI
• classic CLI
bof encryption-key
When configuring an encryption key, the key can be in one of the following formats:
• a plaintext string between 8 and 32 characters; the plaintext string cannot contain embedded nulls or
end with “ hash”, “ hash2”, or “ custom”
Caution: When entering the encryption key in plaintext, ensure that the key is not visible to
bystanders.
• a hashed string between 1 and 64 characters; the selected hashing scheme can be hash, hash2, or
custom
Note: The hash2 encryption scheme is node-specific and the key cannot be transferred between
nodes.
Caution: In model-driven configuration mode with incremental saved configuration files enabled,
the admin save command must be executed after changing configuration file encryption keys
to ensure that a complete saved configuration file is saved with the new encryption key. After
changing the encryption key, previously saved configuration files are no longer readable or
loadable with the rollback command.
3.4.4 Autoconfigure
When autoconfigure is enabled, the router performs a DHCP discovery or solicit (IPv6) to get the IP
address of the out-of-band (OOB) management port.
The OOB management port can support a DHCP client for IPv4, IPv6, or dual stack. For dual stack,
both IPv4 and IPv6 DHCP are configured. When the offer for either of the address families arrives, the
management port is configured with the IP address in the offer. Eventually, both offers arrive and the
management port is configured with both address families.
When a DHCP client is configured using autoconfigure, all image and license files should be placed and
loaded from the CF. The configuration file could be loaded from the network, but Nokia recommends
that the config file be on the CF as well. The configuration file is not loaded until the DHCP client offer is
received and programmed successfully for the management port IP address, or the DHCP client timeout is
expired.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
The option 15 DNS domain name is not supported. The user can configure the DNS domain in the BOF so
that the domain is not blocked when autoconfigure is used. Otherwise, the user must use the absolute URL
with the hostname and domain included.
Note: The router must be rebooted when enabling autoconfigure for the first time to ensure that
the CPM card uses the chassis MAC address.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
routes advertised by the RA. If the same route is advertised by multiple upstream routers (next hops), the
SR OS installs the route with the highest preference. The SR OS does not support ECMP when the same
route is advertised from multiple next hops by multiple RAs.
To ensure that all the RAs are obtained before the auto-provisioning process is started for IPv6, SR OS
follows the RFC 4861 recommendation that the host (in this case SR OS) send a minimum of three route
solicitations. This is to ensure that if a route solicitation is lost, at least one of the three would reach the
upstream routers. Each route solicitation is followed by a 4 s timeout. If the first route solicitation is sent at
T0, the second is sent at T0+4 s and the third is sent at T0+8 s. The upstream routers must respond to the
route solicitation with in 0.5 s. This means that the SR OS has all of the RAs and the routes within 8.5 s of
the first route solicitation. Therefore, SR OS waits for a maximum of 9 s to receive all RAs.
If the DHCPv6 timeout is less than 9 s, the DHCPv6 timeout is honored even for the RA wait time. If
the node has received a single RA and DHCP offer, the process is considered a success. However, it is
possible that not all the RAs have arrived on the node because the node has waited less than 9 s.
admin display-config
admin reboot
admin save
admin display-config
info detail
The following example shows a configuration file for the 7750 SR.
Example
A:7750-3>admin# display-config
# TiMOS-B-22.2.R1 both/x86_64 Nokia 7750 SR Copyright (c) 2000-2022 Nokia.
# All rights reserved. All use subject to applicable license agreements.
# Built on Sat Feb 26 15:31:00 PST 2022 by builder in /builds/c/222B/R1/panos/main/sros
# Configuration format version 22.2 revision 0
exit all
configure
#--------------------------------------------------
echo "System Configuration"
#--------------------------------------------------
system
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
name "7750-3"
contact "Fred Information Technology"
location "Bldg.1-floor 2-Room 201"
clli-code "abcdefg1234"
coordinates "N 45 58 23, W 34 56 12"
ccm 1
exit
snmp
exit
login-control
idle-timeout 1440
motd text "7750-3"
exit
time
sntp
shutdown
exit
zone UTC
exit
thresholds
rmon
exit
exit
exit...
...
--------------------------------------------------
echo "Redundancy Configuration"
#--------------------------------------------------
redundancy
synchronize boot-env
exit
...exit all
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
Note: If the persist option is enabled and the admin save file-url command is executed with
an FTP path used as the file-url parameter, two FTP sessions simultaneously open to the FTP
server. The FTP server must be configured to allow multiple sessions from the same login,
otherwise, the configuration and index files are not saved correctly.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
3.5.5 Rebooting
When an admin>reboot command is issued, routers with redundant CPM are rebooted as well as the
XMAs, XCMs, and IOMs. Changes are lost unless the configuration is saved. Use the admin>save file-url
command to save the current configuration. If no command line options are specified, the user is prompted
to confirm the reboot operation.
The following example shows a reboot.
Example
A:node-2>admin# reboot
Are you sure you want to reboot (y/n)? y
bof ip-mtu
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
[/]
A:admin@node-2# admin show configuration bof units detail
...
# Generated THU SEP 03 15:29:11 2020 UTC
bof {
configuration {
primary-location "ftp://.../config.cfg"
## secondary-location
## tertiary-location
}
console {
speed 115200 bps
wait-time 3 seconds
}
dns {
## domain
## primary-server
## secondary-server
## tertiary-server
}
image {
primary-location "ftp://.../i386-both.tim"
## secondary-location
## tertiary-location
}
li {
local-save false
separate false
}
license {
primary-location "ftp://.../license"
}
port "management" {
autonegotiate true
duplex full
speed 100 megabps
}
router "management" {
interface "management" {
## ip-mtu
cpm active {
ipv4 {
ip-address 192.168.189.52
prefix-length 24
}
## ipv6
}
cpm standby {
## ipv4
## ipv6
}
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
}
static-routes {
route 192.168.0.0/16 {
next-hop 192.168.189.1
}
route 172.16.0.0/16 {
next-hop 192.168.189.1
}
}
}
system {
## base-mac-address
fips-140-2 false
## gateway-role
persistent-indices true
## profile
}
}
Note:
Changing the active and standby addresses without rebooting the standby CPM may cause
synchronization with the boot-env option to fail.
Deleting a BOF address entry is not allowed from a remote session.
Example
[/]
A:admin@node-2# bof exclusive
INFO: CLI #2060: Entering exclusive configuration mode
INFO: CLI #2061: Uncommitted changes are discarded on configuration mode exit
[ex:/bof]
A:admin@node-2# ?
See the 7450 ESS, 7750 SR, 7950 XRS, and VSR MD-CLI Command Reference Guide and the
7450 ESS, 7750 SR, 7950 XRS, and VSR MD-CLI User Guide for more information.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
The BOF configuration is saved to cf3:\bof.cfg with every commit command. The BOF configuration
can be manually saved to a backup file on a server or to a different location.
[/]
A:admin@node-2# admin save bof ftp://10.9.236.68/backup/node-2/bof.cfg
Writing configuration to ftp://10.9.236.68/backup/node-2/bof.cfg OK
Completed.
The following example saves the BOF configuration to the testbof.cfg file on cf3:
[/]
A:admin@node-2# admin save bof testbof.cfg
Writing configuration to cf3:\testbof.cfg OK
Completed.
3.6.4 Rebooting
When a reboot command is issued, routers with redundant CPM are rebooted as well as the XMAs,
XCMs, and IOMs. If the now option is not specified, the user is prompted to confirm the reboot operation.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Boot options
RELEASE 22.10.R1
Example
[ex:/bof]
A:admin@node-2# router "management" interface "management" ip-mtu ?
ip-mtu <number>
<number> - <512..9786> - bytes
Interface IP MTU
Note: The new value of this element takes effect when the candidate is
committed.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Debug configuration
RELEASE 22.10.R1
4 Debug configuration
The debug configuration commands enable detailed debugging information for various protocols.
The admin debug-save command saves the debugging configuration to config.dbg at the BOF primary-
config location if a URL is not specified.
Example: Save debug configuration
For a description of individual debug commands, see the 7450 ESS, 7750 SR, 7950 XRS, and VSR
Classic CLI Command Reference Guide.
A:node-2>config>log# log-id 7
*A:node-2>config>log>log-id$ from debug-trace
*A:node-2>config>log>log-id$ to cli 50
*A:node-2>config>log>log-id$ info
----------------------------------------------
from debug-trace
to cli 50
no shutdown
----------------------------------------------
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Debug configuration
RELEASE 22.10.R1
After the log is configured, execute the following tools command in the CLI session that is intended to
display output of the debug events. See the 7450 ESS, 7750 SR, 7950 XRS, and VSR Clear, Monitor,
Show, and Tools Command Reference Guide for more information about the tools command.
Example: Subscribe to debug log output to the CLI session
The following example shows terminating the output of the logs to the CLI session using the unsubscribe-
from command.
Example: Unsubscribe from debug log output to the CLI session
Debug events can be displayed using the show log command and cleared using the clear log command.
Example: Display and clear debug log events
---snip---
[/]
A:admin@node-2# admin show configuration debug
# TiMOS-B-22.2.R1 both/x86_64 Nokia 7750 SR Copyright (c) 2000-2022 Nokia.
# All rights reserved. All use subject to applicable license agreements.
# Built on Sat Feb 26 15:31:00 PST 2022 by builder in /builds/c/222B/R1/panos/main/sros
# Configuration format version 22.2 revision 0
debug {
system {
management-interface {
netconf info
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Debug configuration
RELEASE 22.10.R1
}
}
}
# Finished 2022-03-07T16:51:54.1+00:00
The admin save debug command saves the debugging configuration to debug.cfg at the bof
configuration primary-location if a URL is not specified.
Example: Save debug configuration
[/]
A:admin@node-2# admin save debug
Writing configuration to cf3:\debug.cfg
Saving configuration OK
Completed.
For descriptions of individual debug commands, see the 7450 ESS, 7750 SR, 7950 XRS, and VSR MD-
CLI Command Reference Guide.
(ex)[configure log]
A:admin@node-2# log-id 7
After the commit command is issued to include the log in the running configuration, the following tools
command can be executed in the CLI session that is intended to display output of the debug events. See
the 7450 ESS, 7750 SR, 7950 XRS, and VSR Clear, Monitor, Show, and Tools Command Reference Guide
for more information about the tools command.
Example: Subscribe to debug log output to the CLI session
[/]
A:admin@node-2# tools perform log subscribe-to log-id 7
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Debug configuration
RELEASE 22.10.R1
The following example shows terminating the output of the logs to the CLI session using the unsubscribe-
from command.
Example: Unsubscribe from debug log output to the CLI session
[/]
A:admin@node-2# tools perform log unsubscribe-from log-id 7
Debug events can be displayed using the show log command and cleared using the clear log command.
Example: Display and clear debug log events
[/]
A:admin@node-2# show log log-id 7
===============================================================================
Event Log 7 log-name 7
===============================================================================
Description : (Not Specified)
Log contents [size=50 next event=2 (not wrapped)]
---snip---
[/]
A:admin@node-2# clear log log-id 7
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Debug configuration
RELEASE 22.10.R1
The user must manually remove the classic and model-driven debug configuration before changing the
management interface configuration mode from model-driven to mixed mode. The system automatically
removes the classic and model-driven debug configuration during all other mode switches.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
Note: To support ZTP, make sure the new nodes are purchased with the auto-boot flag enabled
in the factory-loaded BOF.
Note: For breakout connectors, only the first breakout port on the first two connectors can be
used for ZTP.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
• file servers and DHCP server in the same subnet, separate from the node
Figure 7: Auto-provisioning with all components in a Layer 2 broadcast domain shows the scenario,
where only the file servers and DHCP server are in the same subnet. DHCP relay is used to fill Option
82 as the gateway address. The gateway address is used to find the appropriate pool in the DHCP
server to assign the correct subnet IP address to the system.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
DHCP allows the Option 3 router to define the default gateway. If multiple addresses are provided using
Option 3, the first address is used for the default gateway.
• node, file servers, and DHCP server in different subnets
Figure 8: Auto-provisioning with all components in different subnets shows the scenario, where all
components are in different subnets. DHCP relay adds the Option 82 gateway address to the DHCP
request, and the DHCP server adds the Option 3 gateway address of the file server.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
Option 66 contains the server URL or IP address, and Option 67 contains the URL of the provisioning file
location.
Options 66 and 67 are meant for use by PXE TFTP, but are also used for HTTP and FTP. If an offer arrives
with Options 66 and 67, Option 66 should resolve the server IP address and Option 67 should resolve the
file location. Option 66 can be omitted by the provider, in which case Option 67 is used for both the server
IP address and provider file URL. If an offer arrives with Option 67 only, it should resolve both the server IP
address and file URL.
The auto-provisioning process distinguishes the host part of the URL and can resolve it using DHCP DNS.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
NTP server
1 Option 42 — Option 56 —
Bootfile name Option 67 URL of the file Option 59 Server name and URL
of the file
Can be used without
Option 66, in which case
it contains the server
name and the URL
1 When the node is running in ZTP mode, the date and time are set by NTP. This information is required for
HTTPs certificate verification, and to record date and time stamps in events and logs.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
Note: The system uses the chassis serial number for ZTP pool selection and auto-provisioning.
The option to use Type 3 is configured in the BOF. For MAC, the chassis MAC address is configured in a
string format.
Type 1 is not supported.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
For ZTP processes, the node transmits both IPv4 and IPv6 discovery and solicitation messages. If offers
arrive from both IPv4 and IPv6 servers, both offers are cached and the first offer received is processed.
If the first offer does not fulfill the ZTP requirements and is rejected, the second offer is processed and
accepted or rejected. If both offers received on an interface are rejected, ZTP goes to the next interface.
The provisioning file only allows file transfer in the address family of the DHCP offer that is used. If the
offer is IPv4, the provisioning files are downloaded using IPv4. If the offer is IPv6, the provisioning files are
downloaded using IPv6.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
Note: A bof.cfg file with the auto-boot flag enabled can be shipped as an orderable part with
the applicable software license. The auto-boot flag can also be set using the bof auto-boot
command.
5.4.2 BOF
Two versions of each supported 7750 SR platform software license are currently available: one for non-
ZTP bootup, and one for ZTP bootup. Software packages for ZTP bootup contain a bof.cfg file with
the auto-boot flag set, which causes the node to automatically boot up in ZTP mode and execute ZTP
processes.
The auto-boot flag contains the following information:
• client ID
The client ID is sent to the DHCP server to identify the chassis or node and to find a pool for the DHCP
offer. If no client ID is configured, the chassis serial number is sent.
This option is used for both IPv4 client ID and IPv6 DUID Type 2.
• port (port:vlan)
The port is used to send DHCP discovery; the port number must be configured manually in the BOF.
For more information about the BOF, see Boot options.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
Note: For breakout connectors, only the first breakout port in the connector can be used for
ZTP.
ZTP attempts to discover the IP address of the node through DHCP and identifies the node using DHCP
client ID Option 61 (IPv4) or Option 1 (IPv6). The client ID uses the chassis serial number by default. The
chassis serial number is visible on the shipping box of the chassis.
Table 15: Supported DHCP client options for ZTP lists the default DHCP client options for ZTP. Some client
options can be manually configured in the BOF using the bof auto-boot command.
The auto-boot configuration options are as follows:
management port
Specify that ZTP should only be performed using the out-of-band management port (Mgmt
port).
in-band VLAN
Specify ZTP should only be performed using Ethernet ports on the first two card or MDA
slots. The VLAN ID can be used to specify an in-band VLAN to use for the auto-boot
process.
IPv4, IPv6
Specify that IPv4 discovery, IPv6 discovery, or both, should be performed. If both are
specified, the system dual-stacks.
client identifier
Identify the node to the DHCP server and find a pool for DHCP offers. This information
is sent using Option 61 (IPv4) or Option 1 (IPv6). If the client-identifier options are not
configured, the chassis serial number is sent by default. This option is used for both IPv4
client ID and IPv6 DUID Type 2.
include user class
You can specify to include Option 77.
timeout
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
You can specify in minutes the timeout for the ZTP process to be executed successfully
before the node is rebooted and ZTP is retried because of an unsuccessful ZTP
completion. The default ZTP timeout is 30 minutes.
See Configuring the ZTP timeout in the provisioning file for information about how to
configure the ZTP timeout in a ZTP provisioning file.
The auto-boot options can be modified using the bof auto-boot command, or by interrupting the bootup
process and manually modifying the bof.cfg file.
Caution: Manually modifying the bof.cfg file is not recommended. When modifying auto-boot
options using CLI, all required options must be explicitly configured because the default cases
are not used. When modifying the bof.cfg file manually, the format must be correct.
Note: The auto-boot flag can also be modified without interrupting the auto-boot process.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
Note: If there is no offer or the offer does not have the relevant or correct options, SR OS
floods the network with DHCP discovery messages on all remaining non-reserved VLANs (1
to 4094).
3. When a VLAN is discovered, the ZTP process is executed on the respective VLAN as described in the
following sections.
Note: If there is no offer on any VLAN or the offer does not have the relevant or correct
options, the node starts over from step 1.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
Note: Using the tools perform system auto-node-provisioning command while the auto-
boot process is running is not allowed.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
Caution: Ensure that the auto-boot flag is not set on the BOF to be downloaded by the auto-
provisioning process. Failure to do so causes the node to go back into ZTP mode after it
reboots.
The provisioning file is stored on the SD card and can be executed using the following command to re-
download the named files:
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
set {
timeout hours 1
timeout minutes 30
}
set {
hours 1
minutes 30
}
dns {
primary 192.0.2.1
secondary 192.0.2.2
tertiary 192.0.2.3
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
domain sample.domain.com
}
download {
image "cf3:/both.tim" {
primary-url "http://192.168.40.140:81/both.tim"
secondary-url "http://192.168.40.140:81/both.tim"
tertiary-url "http://192.168.40.140:81/both.tim"
}
image "cf3:/support.tim" {
primary-url "http://192.168.40.140:81/support.tim"
secondary-url "http://192.168.40.140:81/support.tim"
tertiary-url "http://192.168.40.140:81/support.tim"
}
config "cf3:/config.cfg" {
primary-url "ftp://ftpserv:[email protected]/./images/dut-a.cfg"
secondary-url "http://192.168.41.140:81/dut-a.cfg"
tertiary-url "http://192.168.42.140:81/dut-a.cfg"
}
file "cf3:/license.txt" {
primary-url "ftp://ftpserv:[email protected]/./images/provision_example.cfg"
secondary-url "http://192.168.41.140:81/dut-a.cfg"
tertiary-url "http://192.168.42.140:81/dut-a.cfg"
}
}
bof {
primary-image cf3:/both.tim
primary-config cf3:/config.tim
address 192.168.100.1 active
autonegotiate
duplex full
speed 100
wait 3
persist off
console-speed 115200
}
For an HTTPS URL, the trust anchor needs to be referenced in the provisioning file. The trust anchor name
references the entry in the import>trust-anchor section of the file. In the following example, the trust
anchor name is TRUST_ANCHOR.
Example: Trust anchor for HTTPS URL in provisioning file
import {
client {
cert "cf3:/client.crt" {
format pem
primary-url http://10.10.10.67:81/client.crt
}
key "cf3:/client.key" {
format pem
primary-url http://10.10.10.67:81/client.key
}
}
trust-anchor TRUST_ANCHOR{
cert "cf3:/ca.crt" {
format pem
primary-url ftp://user-name:[email protected]//user-name/logs/
fileserver-4/ca.crt
}
crl "cf3:/ca.crl" {
format der
primary-url ftp://user-name:[email protected]//user-name/logs/
fileserver-4/ca.crl
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
}
}
}
<snip>
download {
config "cf3:/ztp/ztp_dut-a.cfg" {
primary-url "https://10.10.10.64:81/ztp_node-2.cfg"
primary-trust-anchor "TRUST_ANCHOR"
}
image "cf3:/both.tim" {
primary-url "http://200.150.40.140:81/both.tim"
secondary-url "http://200.150.40.140:81/both.tim"
tertiary-url "http://200.150.40.140:81/both.tim"
primary-proxy http://132.2.3.1:8080
secondary-proxy http://133.3.4.1:8080
}
5.5 SZTP
The SR OS implementation of SZTP is a partial application of RFC 8572 and is evolving to meet all RFC
8572 aspects. SZTP is an extension of ZTP as follows:
• The provisioning file and the node discovery of the MDAs, IOMs, and ports with links up are supported
in both ZTP and SZTP.
• The ports that are ZTP-capable are also SZTP-capable.
SZTP securely bootstraps the node and provides it with the information required to boot up the node
in an operational mode; this information includes all the initial artifacts required to create a mutual trust
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
relationship between the node and the bootstrap server. After the node boots, it discovers the bootstrap
server IP address, communicates with the server, and authenticates both the server and itself. Finally, the
node securely downloads the encrypted boot image and initial configuration information.
SR OS uses different bootstrapping methods to obtain the required TLS certificates, trust anchors, and
redirect information to connect securely to the server and download all the necessary information to boot in
an operational mode.
In the example shown in the preceding figure, one of the following methods can be used to bootstrap the
node securely.
• The operator stages the node at their own site and bootstraps it using ZTP through a secure or private
network. The node obtains the TLS certificates, trust anchors, and keys from a conveyed information
file, which must be copied into the compact flash (CF). The Uniform Resource Identifier (URI) of this file
is included in the ZTP provisioning file.
• If the node has CF, the operator copies manually to the CF the certificates, trust anchors, and
conveyed information file. Optionally, the operator can also include redirect information in the conveyed
information file.
After the node is bootstrapped securely, it is shipped to the installation site, where it boots.
If the node has redirect information, it tries to connect the bootstrap server specified in the redirect
information and establish a TLS session to create mutual trust between the node and the server.
If the node does not have redirect information, it performs a DHCP discovery and tries to obtain the redirect
information using DHCP option 143 (IPv4) or 136 (IPv6). After obtaining the redirect information, the node
tries to connect to the bootstrap server using TLS.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
The node uses option 67 from the DHCP server or the URI from the file field of the redirect information to
locate the conveyed information from the bootstrap server. The conveyed information provides the node
with one of the following:
• more redirect information for a new file server and other required resources to connect to the file server
to download all the required information and files
• onboarding information containing the URI of the boot image and the initial configuration
• both redirect information and onboarding information, in which case the node executes the onboarding
information first and then executes the redirect information
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
• Redirect the node from the first bootstrap server to consecutive bootstrap servers. The bootstrap server
can provide the node with additional redirect information in a secure encrypted manner. The redirect
and onboarding information are provided in the conveyed information file.
– redirect information to another bootstrap server
– required TLS certificates and trust anchors, and private keys
– onboarding information
After staging, the port that has the link up is selected and SZTP is executed on it.
The node loads the security artifacts to install the TLS certificates and trust anchors. DHCP discovery
messages are sent out on each port in sequence. If no DHCP offer is received, SZTP moves to the next
port with the link up. The OOB port is examined first, followed by the untagged in-band ports. If no DHCP
offer is received, VLAN discovery is performed on the in-band ports only by flooding VLAN 0 to 4196 with
DHCP discovery.
After DHCP discovery completes, the node obtains an IP address and can optionally obtain option 143
(IPv4) or option 136 (IPv6) for redirect information. If the redirect information is present in the conveyed
information file, it is preferred over the DHCP redirect information.
The node is connected to the bootstrap server as indicated by the redirect information and a TLS mutual
authentication is established using the certificates. The bootstrap server must have the correct certificates,
keys, and trust anchors to create the mutual TLS trust.
After the node authenticates the server and authenticates itself to the server, it downloads the conveyed
information file from the server using HTTPS. The node obtains the server location of the conveyed
information from DHCP option 67 or the file field in the redirect information.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
If the conveyed information file contains redirect information, the node tries to connect to the new bootstrap
server indicated in the new redirect information. The node can download the new certificates indicated in
the conveyed information.
If the conveyed information file contains only onboarding information, the node downloads the onboarding
file.
If the conveyed information file contains both onboarding and redirect information to the next bootstrap
server, the node executes the onboarding information first, then the redirect information.
The process is successful if the node executes the onboarding information without errors.
import {
client {
cert "cf3:/artifacts/node.cert"
key "cf3:/artifacts/node.key" {
format der
}
}
trust-anchor BOOTSERVER {
cert "cf3:/artifacts/bootserver.cert"
}
}
The certificates, keys, and trust anchor information can be encrypted using the encrypt command, as
shown in the following example. When the encrypt keyword is present, the information is downloaded from
the URI and encrypted using AES256.
import {
client {
encrypt
cert "cf3:/artifacts/node.cert"
key "cf3:/artifacts/node.key" {
format der
}
}
trust-anchor BOOTSERVER {
encrypt
cert "cf3:/artifacts/bootserver.cert"
}
}
Optionally, the file can contain the redirect information as shown in the following example. It is not
mandatory to include the redirect information in the file because the preliminary redirect information can be
obtained using DHCP.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
Note: The redirect information in the file is preferred over the DHCP redirect information because
it is trusted.
import {
client {
encrypt
cert "cf3:/artifacts/node.cert"
key "cf3:/artifacts/node.key" {
format der
}
}
trust-anchor BOOTSERVER {
encrypt
cert "cf3:/artifacts/bootserver.cert"
}
}
redirect-information {
boot-server "https://mybootserver.com/" {
port 50
trust-anchor BOOTSERVER
file "conveyed.info"
}
boot-server "https://backupserver.com/" {
port 50
trust-anchor BOOTSERVER
file "conveyed.info"
}
}
The following example shows a file containing the entire conveyed information, including redirect and
onboarding information. See Onboarding information.
import {
client {
encrypt
cert "cf3:/artifacts/node.cert"
key "cf3:/artifacts/node.key" {
format der
}
}
trust-anchor BOOTSERVER {
encrypt
cert "cf3:/artifacts/bootserver.cert"
}
}
redirect-information {
boot-server "https://mybootserver.com/" {
port 50
trust-anchor BOOTSERVER
file "conveyed.info"
}
boot-server "https://backupserver.com/" {
port 50
trust-anchor BOOTSERVER
file "conveyed.info"
}
}
onboarding-information {
boot-image
download-uri https://images.com/$(sys.platform).zip
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
pre-configuration-script "https://config.com/provisioning.cfg"
}
onboarding-information {
boot-image
download-uri https://images.com/$(sys.platform).zip
pre-configuration-script "https://config.com/provisioning.cfg"
}
The download-uri is the URI to the boot image in ZIP format only. A URI list can exist, each pointing to the
primary, secondary, or tertiary images.zip file. SR OS has multiple images, for example, CPM image and
IOM image, and these images can be downloaded in a ZIP file. The URI can point to the ZIP file bundle
to download all the images from a primary source. If the image is downloaded using download-uri, the
destination of the image is always cf3:.
The following example shows the download-uri information.
onboarding-information {
boot-image {
# Download-URI(Mandatory): URL to ZIP file of images. Up to 3 for primary, secondary,
tertiary
# -> Base directory is "cf3:/"
download-uri "https://server.download.com/images.zip"
download-uri "https://server2.download.com/images.zip"
download-uri "https://server3.download.com/images.zip"
# VERIFICATION (Optional): File within ZIP file to verify images
image-verification {
hash-algorithm sha256
hash-value "53473e2727caf55f3a38fa466622af2147762e26a8587e9248240a572cdee849"
}
}
Optionally, the node can run a checksum on the downloaded ZIP file using a hash to ensure there are
no download errors. The hash algorithm and the hash value are noted in the onboarding information, as
shown in the previous onboarding information example. The supported hash algorithms are SHA256 and
MD5.
The preconfiguration script can be used to download the provisioning file. The provisioning file and the ZTP
provisioning file have the same format. The provisioning file has to be executed to completion for the ZTP
process to be successful. The provisioning file can also contain the location of the image. The image can
be downloaded using the download URI or the provisioning file. When downloading the image using the
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
provisioning file, the destination of the image can be dictated. The BOF must be configured accordingly to
boot from the image destination. The image destination must always be cf3: or a folder in cf3:.
Note: The preconfiguration script is always required to clear the auto-boot flag from the BOF. A
minimal BOF configuration is required in the provisioning file.
import {
client {
cert "$(CERT-PATH)/device.crt" {
primary-url "$(FILESERVER)/device.crt"
encrypt
verification {
hash-algorithm sha256
hash-value
"53473e2727caf55f3a38fa466622af2147762e26a8587e9248240a572cdee849"
}
}
key "$(CERT-PATH)/device.key" {
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
format pem
primary-url "$(FILESERVER)/device.key"
encrypt
verification {
hash-algorithm sha256
hash-value
"53473e2727caf55f3a38fa466622af2147762e26a8587e9248240a572cdee849"
}
}
}
trust-anchor "NokiaSvcs" {
cert "$(CERT-PATH)/owner-ca.crt" {
format pem
primary-url "$(FILESERVER)/owner-ca.crt"
encrypt
verification {
hash-algorithm sha256
hash-value
"53473e2727caf55f3a38fa466622af2147762e26a8587e9248240a572cdee849"
}
}
crl "$(CERT-PATH)/owner-ca.crl"
format der
primary-url "$(FILESERVER)/owner-ca.crl"
encrypt
verification {
hash-algorithm sha256
hash-value
"53473e2727caf55f3a38fa466622af2147762e26a8587e9248240a572cdee849"
}
}
}
}
Note: The specified directory path must end with a forward slash (/).
image "$(BOOT-PATH)/images.zip" {
primary-url "$(FILESERVER)/images.zip"
unzip {
directory "cf3:/ztp/"
}
verification {
hash-algorithm sha256
hash-value
"53473e2727caf55f3a38fa466622af2147762e26a8587e9248240a572cdee849"
}
}
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
17717f13ecf19179e367d990277e943993d53d771b44d19fddf5d349b1e7e7c4 cf3:/ztp/cpm.tim
616656b2224e65e29d71355ea41d9dc548c281e9f729c97fe46f3a5c643acb09 cf3:/ztp/iom.tim
dd9455158dc2dfbf937eb372bbef73ebab97f951efa742eec16a4ed4edd3ca9b cf3:/ztp/support.tim
Checksum or file decryption errors cause the failure of the ZTP or SZTP procedure, in which case the node
generates an error and logs the event.
onboarding-information {
boot-image
download-uri https://images.com/$(sys.platform).zip
pre-configuration-script "https://config.com/provisioning.cfg"
}
The conveyed information can also contain redirect information, in which case a recursive redirect can
happen to another bootstrap server. If the conveyed information contains onboarding information and
redirect information, the node executes the onboarding information first, then the redirect to the next
bootstrap server.
The following conveyed information file example contains onboarding and redirect information, and the
certificates required for the second redirect.
Example: Onboarding information, redirect files, and certificates for second redirect
onboarding-information {
boot-image
download-uri https://images.com/$(sys.platform).zip
pre-configuration-script "https://config.com/provisioning.cfg"
}
import {
client {
cert "cf3:/artifacts/node.cert"
key "cf3:/artifacts/node.key" {
format der
}
}
trust-anchor BOOTSERVER {
cert "cf3:/artifacts/bootserver.cert"
}
}
redirect-information {
boot-server "https://mybootserver.com/" {
port 50
trust-anchor BOOTSERVER
file "conveyed.info"
}
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Zero touch provisioning
RELEASE 22.10.R1
boot-server "https://backupserver.com/" {
port 50
trust-anchor BOOTSERVER
file "conveyed.info"
}
}
After the conveyed information is executed successfully, the BOF is loaded in the provisioning file to which
the preconfiguration script is pointing and the auto-boot flag is cleared.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
6 System management
6.1.1.1 Name
You can configure a name for the system device. The name is used in the prompt string. Only one system
name can be configured. If multiple system names are configured the last one encountered overwrites the
previous entry. Use the following command to configure the system name.
6.1.1.2 Contact
Use the contact command to specify the name of a system administrator, IT staff member, or other
administrative entity. Use the following command to configure the system contact.
6.1.1.3 Location
Use the location command to specify the system location of the device. For example, enter the city,
building address, floor, room number, and so on, where the router is located. Use the following command
to configure the system location.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
6.1.1.4 Coordinates
You can optionally configure the GPS location of the device. If the string contains special characters (#, $,
spaces, and so on), the entire string must be enclosed within double quotes. Use the following command to
configure the system coordinates.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
The SR OS system-defined time zones are listed in Table 17: System-defined time zones, which includes
both time zones with and without summer time correction.
Europe
US and Canada
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Australia
6.1.2.2 NTP
NTP is the Network Time Protocol defined in RFC 1305, Network Time Protocol (Version 3) Specification,
Implementation and Analysis and RFC 5905, Network Time Protocol Version 4: Protocol and Algorithms
Specification. It allows for the participating network nodes to keep time more accurately and more
importantly they can maintain time in a more synchronized fashion between all participating network nodes.
SR OS uses an NTP process based on a reference build provided by the Network Time Foundation. Nokia
strongly recommends that the users review RFC 8633, Network Time Protocol Best Current Practices,
when they plan to use NTP with the router. The RFC section ‟Using Enough Time Sources” indicates that
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
using only two time sources (NTP servers) can introduce instability if they provide conflicting information.
To maintain accurate time, Nokia recommends configuring three or more NTP servers.
NTP uses stratum levels to define the number of hops from a reference clock. The reference clock is
considered to be a stratum-0 device that is assumed to be accurate with little or no delay. Stratum-0
servers cannot be used in a network. However, they can be directly connected to devices that operate
as stratum-1 servers. A stratum-1 server is an NTP server with a directly-connected device that provides
Coordinated Universal Time (UTC), such as a GPS or atomic clock.
The higher stratum levels are separated from the stratum-1 server over a network path, therefore, a
stratum-2 server receives its time over a network link from a stratum-1 server. A stratum-3 server receives
its time over a network link from a stratum-2 server.
SR OS routers normally operate as a stratum-2 or higher device. The router relies on an external stratum-1
server to source accurate time into the network. However, SR OS also allows for the use of the local PTP
recovered time to be sourced into NTP. In this latter case, the local PTP source appears as a stratum-0
server and SR OS advertises itself as a stratum-1 server. Activation of the PTP source into NTP may
impact the network NTP topology because the SR OS router is promoted to stratum-1.
SR OS router runs a single NTP clock which then operates NTP message exchanges with external NTP
clocks. Exchanges can be made with external NTP clients, servers, and peers. These exchanges can be
through the base, management, or VPRN routing instances.
NTP operates associations between clocks as either client or server, symmetric active and symmetric
passive, or broadcast modes. These modes of operation are applied according to which elements are
configured on the router. To run server mode, the operator must enable NTP server mode for the base and
each needed VPRN routing instance. To run client mode, the operator must configure external servers. If
both the local router and remote router are configured with each other as peers, then the router operates
in symmetric active mode. If only one side of the association has peering configured, then the modes
are symmetric passive. To operate using broadcast mode, interfaces must be configured to transmit as
broadcast servers or receive as broadcast clients.
NTP server operation for both unicast and broadcast communication within a VPRN is configured within
the VPRN (see the NTP Within a VPRN Service section in 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer
3 Services Guide: IES and VPRN).
Note: NTP provides lightweight synchronization across a network for alignment of system
time for logging purposes. NTP does not provide the high accuracy time needed for the on-air
applications of the mobile base stations. The more recent PTP protocol has been developed for
these applications (see Network synchronization).
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
6.1.2.3 Synchronization
Synchronization between the CPMs includes the following:
• Configuration and boot-env synchronization
• State database synchronization
6.1.2.4 CRON
The CRON feature supports periodic and date and time-based scheduling in SR OS. CRON can be used,
for example, to schedule Service Assurance Agent (SAA) functions. CRON functionality includes the
ability to specify scripts that need to be run, when they are scheduled, including one-time only functionality
(one-shot), interval and calendar functions. Scheduled reboots, peer turn ups, service assurance agent
tests and more can all be scheduled with CRON, as well as OAM events, such as connectivity checks, or
troubleshooting runs.
CRON supports the schedule element. The schedule function configures the type of schedule to run,
including one-time only (one-shot), periodic, or calendar-based runs. All runs are determined by month,
day of month or weekday, hour, minute, and interval (seconds).
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
6.2.1 HA features
As more and more critical commercial applications move onto the IP/MPLS networks, providing high
availability services becomes increasingly important. This section describes high availability features for
routers. Most of these features only apply to routers with two Control Processor Modules (CPM).
6.2.1.1 Redundancy
The redundancy features enable the duplication of data elements and software functionality to maintain
service continuation in case of outages or component failure.
See the 7450 ESS, 7750 SR, and VSR Multiservice ISA and ESA Guide for information about redundancy
for the Integrated Service Adapter (ISA).
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
• BGP default session timeout is approximately 120 seconds. The timeout intervals are configurable for
the 7750 SR and 7950 XRS only.
Therefore, router software has to recover faster than the specified time interval to maintain up time.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
• hot swap
Components in a live system can be replaced or become active without taking the system down or
affecting traffic flow to/from other modules.
Router hardware architecture plays a key role in the availability of the system. The principle router
architecture styles are centralized and distributed. In these architectures, both active and standby route
processors, I/O modules (IOMs) (also called line cards), fans, and power supplies maintain a low MTTR for
the routing system.
However, in a centralized architecture, packet processing and forwarding is performed in a central shared
route processor and the individual line cards are relatively simple. The cards rely solely on the route
processor for routing and forwarding intelligence and, should the centralized route processor fail, there is
greater impact to the system overall, as all routing and packet forwarding stops.
In a distributed system, the packet forwarding functionality is situated on each line card. Distributing the
forwarding engines off the central route processor and positioning one on each line card lowers the impact
of route processor failure as the line cards can continue to forward traffic during an outage.
The distributed system is better suited to enable the convergence of business critical services such as real-
time voice (VoIP), Video, and VPN applications over IP networks with superior performance and scalability.
The centralized architecture can be prone to performance bottleneck issues and limits service offerings
through poor scalability which may lead to customer and service SLA violations.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
6.2.1.3 NSR
With nonstop routing (NSR) on the SR-series router devices, routing neighbors are unaware of a routing
process fault. If a fault occurs, a reliable and deterministic activity switch to the inactive control complex
occurs such that routing topology and reachability are not affected, even in the presence of routing
updates. NSR achieves high availability through parallelization by maintaining up to date routing state
information, at all times, on the standby route processor. This capability is achieved independently of
protocols or protocol extensions, providing a more robust solution than graceful restart protocols between
network routers.
The NSR implementation on the SR-series routers supports all routing protocols. NSR makes it possible to
keep the existing sessions (BGP, LDP, OSPF, and so on) during a CPM switchover, including support for
MPLS signaling protocols. Peers do not see any change.
Protocol extensions are not required. There are no interoperability issues and there is no need to define
protocol extensions for every protocol. Unlike nonstop forwarding and graceful restart, the forwarding
information in NSR is always up to date, which eliminates possible blackholes or forwarding loops.
Traditionally, addressing high availability issues have been patched through non-stop forwarding solutions.
With the implementation of NSR, these limitations are overcome by delivering an intelligent hitless failover
solution. This enables a carrier-class foundation for transparent networks, required to support business
IP services backed by stringent SLAs. This level of high availability poses a major issue for conventional
routers whose architectural design limits or prevents them from implementing NSR.
• classic CLI
6.2.1.5 Synchronization
Synchronization between the CPMs includes the following:
• Configuration and boot-env synchronization
• State database synchronization
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
If the active and standby are not synchronized, use the folowing command on the active or standby CPM to
manually reboot and synchronize the standby CPM.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
configuration files. Use the following commands to configure which types of changes cause automatic
synchronization.
If the schema YANG files are not found, the files are not copied but the rest of the synchronization is not
affected.
Automatic synchronization also occurs whenever the BOF is modified and when you execute an admin
save command with no file URL specified.
• manually
You can manually synchronize the BOF, boot.ldr, configuration, YANG schema, and image files, only
the configuration files, or the imported certificate/key/CRL files. Use the following commands to perform
manual synchronization:
– MD-CLI
– classic CLI
Note: Use the classic CLI command to manually synchronize certificate, key, and CRL files.
===============================================================================
Card Summary
===============================================================================
Slot Provisioned Type Admin Operational Comments
Equipped Type (if different) State State
-------------------------------------------------------------------------------
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
1 xcm-x20 up provisioned
A cpm-x20 up up/active
B cpm-x20 up up/standby
===============================================================================
The following example shows the console message when a CPM boots, sees an active CPM, and
becomes the standby CPM.
Example: Console message for CPM switch to standby
...
Slot A contains the Active CPM
This CPM (Slot B) is the Standby CPM
...
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
6.3.4 Persistence
The persistence feature on the 7750 SR allows information learned through DHCP snooping across
reboots to be kept. This information can include data such as the IP address, MAC binding information,
lease length information, and ingress SAP information (required for VPLS snooping to identify the ingress
interface). This information is referred to as the DHCP lease-state information.
When a DHCP message is snooped, there are steps that make the data persistent in a system with dual
CPMs. In systems with only one CPM, only Step 1 applies. In systems with dual CPMs, all steps apply.
1. When a DHCP ACK is received from a DHCP server, the entry information is written to the active CPM
Compact Flash. If writing was successful, the ACK is forwarded to the DHCP client. If persistency fails
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
completely (bad cflash), a trap is generated indicating that persistency can no longer be guaranteed.
If the complete persistency system fails the DHCP ACKs are still forwarded to the DHCP clients. Only
during small persistency interruptions or in overload conditions of the Compact Flash, DHCP ACKs may
get dropped and not forwarded to the DHCP clients.
2. DHCP message information is sent to the standby CPM and also there the DHCP information is logged
on the Compact Flash. If persistency fails on the standby also, a trap is generated.
A:node-2>config>system>persistence# info
----------------------------------------------
subscriber-mgmt
location cf2:
exit
dhcp-server
location cf2:
exit
options
dhcp-leasetime-threshold days 1 hrs 1 min 1 sec 1
exit
----------------------------------------------
When the offered lease time of the DHCP lease is less than the configured threshold, the lease is flagged
to skip persistency updates and is installed with its full lease time upon a persistency recovery after a
reboot.
The dhcp-leasetime-threshold command controls persistency updates for:
• DHCPv4 and DHCPv6 leases for a DHCP relay or proxy (enabled with persistence subscriber-mgmt)
• DHCPv4 leases for DHCP snooping in a VPLS service (enabled with persistence subscriber-mgmt)
• DHCPv4 and DHCPv6 leases for a DHCP server (enabled with persistence dhcp-server)
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
To check if a DHCP relay or proxy lease is flagged to skip persistency updates, use the tools dump
persistence submgt record record-key CLI command. When flagged to skip persistency updates, the
persistency record output includes ‟Skip Persistency Updates: true”.
To check if a DHCP server lease is flagged to skip persistency updates, use the tools dump persistence
dhcp-server record record-key CLI command. When flagged to skip persistency updates, the persistency
record output includes ‟lease mode : LT” (LT = Lease Time) and a ‟lease time : …” field. When not flagged
to skip persistency updates, the persistency record output includes ‟lease mode : ET” (ET = Expiry Time)
and an ‟expires : …” field.
The architecture shown in Figure 13: Conventional network timing architecture (North American
nomenclature) provides the following benefits:
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
• Limits the need for high quality clocks at each network element and only requires that they reliably
replicate input to remain traceable to its reference.
• Uses reliable physical media to provide transport of the timing signal; it does not consume any
bandwidth and requires limited additional processing.
The synchronization network is designed so a clock always receives timing from a clock of equal or higher
stratum or quality level. This ensures that if an upstream clock has a fault condition (for example, loses
its reference and enters a holdover or free-run state) and begins to drift in frequency, the downstream
clock is able to follow it. For greater reliability and robustness, most offices and nodes have at least two
synchronization references that can be selected in priority order (such as primary and secondary).
Further levels of resiliency can be provided by designing a capability in the node clock that operates
within prescribed network performance specifications without any reference for a specified time-frame. A
clock operating in this mode holds the last known state over (or holdover) until the reference lock is again
achieved. Each level in the timing hierarchy is associated with minimum levels of network performance.
Each synchronization capable port can be independently configured to transmit data using the node
reference timing or loop timing. In addition, some TDM channels can use adaptive timing.
Transmission of a reference clock through a chain of Ethernet equipment requires that all equipment
supports Synchronous Ethernet. A single piece of equipment that is not capable of performing
Synchronous Ethernet breaks the chain. Ethernet frames still get through but downstream devices should
not use the recovered line timing as it is be traceable to an acceptable stratum source.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
The recovered clock can derive its timing from any of the following:
• OC3/STM1, OC12/STM4, OC48/STM16, OC192/STM64 ports (7450 ESS and 7750 SR only)
• T1/E1 CES channel (adaptive clocking) (7750 SR only)
• Synchronous Ethernet ports
• T1/E1 port (7750 SR only)
• BITS port on the CPM or CCM module
• 10GE ports in WAN PHY mode
• IEEE 1588v2 timeReceiver port (PTP) (7450 ESS and 7750 SR only)
• SyncE/1588 port on the CPM or the CCM
The BITS ports accept T1 or E1 signal formats. Some hardware also supports the 2048 kHz signal format.
The format must be common between all BITSin and BITSout ports.
All settings of the signal characteristics for the BITS input apply to both ports. When the active CPM
considers the BITS input as a possible reference, it first considers the BITS input port on the active CPM
or CCM followed by the BITS input port on the standby CPM or CCM in that relative priority order. This
relative priority order is in addition to the user-definable ref-order. For example, a ref-order of bits
ref1 ref2 would actually be BITS in (active CPM or CCM), followed by BITS in (standby CPM or CCM),
followed by ref1, followed by ref2. When ql-selection is enabled, the QL of each BITS input port is viewed
independently. The higher QL source is chosen.
When the active CPM considers the SyncE/1588 as a possible reference, the active CPM first considers
the SyncE/1588 port on the active CPM or CCM, followed by the SyncE/1588 port on the standby CPM or
CCM in that relative priority order. This relative priority order is in addition to the user-definable ref-order.
For example, a ref-order of synce ref1 ref2 would actually be SyncE/1588 (active CPM or CCM), followed
by SyncE/1588 (standby CPM or CCM), followed by ref1, followed by ref2. When ql-selection is enabled,
the QL of each SyncE/1588 input port is viewed independently. The higher QL source is chosen.
The following behavior applies to the platform architecture existing on 7750 SR-7/12/12e, 7750
SR-2s/7s/14s, 7750 SR-1e/2e/3e, 7750 SR-a4/a8, and 7450 ESS-7/12. When the BITS or SyncE port on
the standby CPM is an option as input reference into the central clock of the active CPM, a display of the
central clock data on the standby CPM indicates that it is locked to its local BITS or SyncE input. This is
expected behavior and required to make the BITS input on the standby available to the active CPM as an
option for reference selection.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
The restrictions on the location for the source-port or source-bits for ref1 and ref2 are listed in Table 18:
Ref1 and ref2 timing references.
7450 ESS-12 1 to 5 6 to 10 —
7750 SR-7 1 to 2 3 to 5 —
7750 SR-12 1 to 5 6 to 10 —
7750 SR-12e 1 to 5 6 to 9 —
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
The BITS output ports can be configured to provided either the unfiltered recovered line clock from a
line card port or the output of the central clock. The first case would be used if the port was connected to
deliver an input reference directly to dedicated timing device in the facility (BITS or SASE device). The
second case would be used to test the quality of the clocking used by the router.
When QL selection mode is disabled, then the reversion setting controls when the central clock can re-
select a previously failed reference.
Table 19: Revertive, non-revertive timing reference switching operation shows the selection followed for
two reference in both revertive and non-revertive modes:
Failed OK B B
OK OK B A
OK Failed A A
OK OK A A
OK Failed A A
Failed OK B B
OK OK A or B A
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Master chassis central clocks. See the Installation Guide for appropriate physical cabling to support this
architecture.
6.4.3 SSM
Synchronization status messages (SSM) provide a mechanism to allow the synchronization distribution
network to both determine the quality level of the clock sourcing a specific synchronization trail and
to allow a network element to select the best of multiple input synchronization trails. Synchronization
Status messages have been defined for various transport protocols including SONET/SDH, T1/E1, and
Synchronous Ethernet, for interaction with office clocks, such as BITS or SSUs and embedded network
element clocks.
SSM allows equipment to autonomously provision and reconfigure (by reference switching) their
synchronization references, while helping to avoid the creation of timing loops. These messages are
particularly useful to allow synchronization reconfigurations when timing is distributed in both directions
around a ring.
The following sections provide details about the SSM message functionality for different signal types.
These functions apply to all platforms that support the signal type.
6.4.3.2 E1 signals
E1 signals can carry an indication of the quality level of the source generating the timing information using
the SSM as specified in Recommendation G.704.
One of the Sa4 to Sa8 bits, (the actual Sa bit is for operator selection), is allocated for Synchronization
Status Messages. To prevent ambiguities in pattern recognition, it is necessary to align the first bit (San1)
with frame 1 of a G.704 E1 multi-frame.
The numbering of the San (n = 4, 5, 6, 7, 8) bits. A San bit is organized as a 4-bit nibble San1 to San4.
San1 is the most significant bit; San4 is the least significant bit.
The message set in San1 to San4 is a copy of the set defined in SDH bits 5 to 8 of byte S1.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
6.4.3.4 DS3/E3
DS3/E3 signals are not required to be synchronous. However, it is acceptable for their clocking to be
generated from a synchronization source. The 7750 SR and the 7450 ESS allow E3/DS3 physical ports to
be specified as a central clock input reference.
DS3/E3 signals do not support an SSM channel. QL-override should be used for these ports if ql-selection
is enabled
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
In addition to the QL values received over SSM of an interface, the standards also define additional codes
for internal use. These include the following:
• QL INVx is generated internally by the system if and when an unallocated SSM value is received, where
x represents the binary value of this SSM. All of these independent values are assigned as the singled
value of QL-INVALID.
• QL FAILED is generated internally by the system if and when the terminated network synchronization
distribution trail is in the signal fail state.
There is also an internal quality level of QL-UNKNOWN. This is used to differentiate from a received QL-
STU code but is equivalent for the purposes of QL selection.
Table 20: Synchronization message coding and source priorities — SSM value received on port lists the
synchronization message coding and source priorities for SSM received.
Table 20: Synchronization message coding and source priorities — SSM value received on port
0010 (prc) 0001 (prs) 0010 (prc) 00000100 11111111 (prs) 1 - Best quality
14- QL-FAILED
15 - QL-UNC
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Table 21: Synchronization message coding and source priorities — SSM values transmitted by interface of
types lists the synchronization message coding and source priorities for SSM transmitted.
Table 21: Synchronization message coding and source priorities — SSM values transmitted by interface of types
1 - Best quality 0010 (prc) 0001 (PRS) 0010 (prc) 00000100 11111111 (PRS)
8 - Lowest quality 1011 (sec/ eec1) 1100 (smc) 1011 (sec) 00100010 11111111 (smc)
qualified in QL-
enabled mode
13- QL_INVALID 1111 (dnu) 1111 (dus) 1111 (dnu) 00110000 11111111 (dus)
14- QL-FAILED 1111 (dnu) 1111 (dus) 1111 (dnu) 00110000 11111111 (dus)
15 - QL-UNC 1011 (sec/eec1) 1010 (st3/eec2) 1011 (sec) 00010000 11111111 (st3)
Note: When the internal Quality level is in the range of 9 through 14, the output codes shown in
Table 21: Synchronization message coding and source priorities — SSM values transmitted by
interface of types, only appear if QL selection is disabled. If ql-selection is enabled, then all of
these internal states are changed to internal state 15 (Holdover) and the ssm value generated
reflects the holdover quality of the internal clock.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
acceptable QL value for the BITS output port, the ability to squelch the BITS output signal, and the
specification of a Wait To Restore timer for input references. These features allow for more options in the
management of the synchronization topology.
Precision Time Protocol (PTP) is a timing-over-packet protocol defined in the IEEE 1588v2 standard 1588
PTP 2008.
PTP may be deployed as an alternative timing-over-packet option to Adaptive Clock Recovery (ACR). PTP
provides the capability to synchronize network elements to a Stratum-1 clock or primary reference clock
(PRC) traceable frequency source over a network that may or may not be PTP-aware. PTP has several
advantages over ACR. It is a standards-based protocol, has lower bandwidth requirements, can transport
both frequency and time, and can potentially provide better performance.
Support is provided for an ordinary clock in timeReceiver or timeTransmitter mode or a boundary clock.
When configured as an ordinary clock timeTransmitter, PTP can only be used for the distribution of a
frequency reference, not a time reference. The boundary clock and ordinary clock timeReceiver can be
used for both frequency and time distribution.
The ordinary clock timeTransmitter, ordinary clock timeReceiver, and boundary clock communicate
with neighboring IEEE 1588v2 clocks. These neighbor clocks can be ordinary clock timeTransmitters,
ordinary clock timeReceivers, or boundary clocks. The communication can be based on either unicast IPv4
sessions transported through IP interfaces or multicast Ethernet transported through Ethernet ports.
For the unicast IP sessions, the external clocks are labeled 'peers'. There are two types of peers:
configured and discovered. An ordinary clock timeReceiver or a boundary clock should have configured
peers for each PTP neighbor clock from which it may accept synchronization information. The router
initiates unicast sessions with all configured peers. An ordinary clock timeTransmitter or boundary
clock accepts unicast session requests from external peers. If the peer is not a configured peer, then
it is considered a discovered peer. An ordinary clock timeTransmitter or boundary clock can deliver
synchronization information toward discovered peers. Figure 15: Peer clocks shows the relationship
of various neighbor clocks using unicast IP sessions to communicate with a 7750 SR configured as a
boundary clock with two configured peers.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
For multicast Ethernet operation, the router listens for and transmit PTP messages using the configured
multicast MAC address. Neighbor clocks are discovered via the reception of messages through an enabled
Ethernet port. An ordinary clock timeTransmitter, ordinary clock timeReceiver, and a boundary clock
support more than one neighbor PTP clock connecting into a single port. This may be encountered with
the deployment of an Ethernet multicast LAN segment between the local clock and the neighbor PTP ports
using an end-to-end transparent clock or an Ethernet switch. The Ethernet switch is not recommended
because of the introduction of PDV and the potential degradation of performance but it can be used
if appropriate to the application. Figure 16: Ethernet multicast ports shows the relationship of various
neighbor clocks using multicast Ethernet sessions to a 7750 SR configured as a boundary clock. The 7750
SR has three ports configured for multicast Ethernet communications. Port 1/2/1 of the 7750 SR shows a
connection where there are two neighbor clocks connecting to one port of the 7750 SR through an end-to-
end transparent clock.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
The ordinary clock timeTransmitter, ordinary clock timeReceiver, and boundary clock allow for PTP
operation over both unicast IPv4 and multicast Ethernet at the same time.
The IEEE 1588v2 standard includes the concept of PTP profiles. These profiles are defined by industry
groups or standards bodies that define how IEEE 1588v2 is to be used for a particular application.
The following profiles are supported:
• IEEE 1588v2 (ieee1588-2008)
• G.8265.1 (g8265dot1-2010)
• G.8275.1 (g8275dot1-2014)
• G.8275.2 (g8275dot2-2016)
When an ordinary clock timeReceiver or a boundary clock receive Announce messages from one or more
configured peers or multicast neighbors, it executes a Best TimeTransmitter Clock Algorithm (BTCA)
to determine the state of communication between itself and the peers. The system uses the BTCA to
create a hierarchical topology allowing the flow of synchronization information from the best source (the
grandmaster clock) out through the network to all boundary and timeReceiver clocks. Each profile has a
dedicated BTCA.
If the profile setting for the clock is ieee1588-2008, the precedence order for the BTCA is as follows:
1. priority1
2. clockClass
3. clockAccuracy
4. PTP variance (offsetScaledLogVariance)
5. priority2
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
6. clockIdentity
7. stepsRemoved from the grandmaster
The ordinary clock timeTransmitter, ordinary clock timeReceiver, and boundary clock set their local
parameters as listed in Table 22: Local clock parameters when profile is set to ieee1588-2008.
Parameter Value
clockIdentity Chassis MAC address following the guidelines of 7.5.2.2.2 of
IEEE 1588
clockAccuracy FE — unknown
If the profile setting for the clock is g8265dot1-2010, the precedence order for the best timeTransmitter
selection algorithm is:
1. clockClass
2. priority
The ordinary clock timeTransmitter, ordinary clock timeReceiver, and boundary clock set their local
parameters as listed in Table 23: Local clock parameters when profile is set to itu-telecom-freq.
Parameter Value
clockClass 80-110 — value corresponding to the QL out of the central
clock as per Table 1/G.8265.1
255 — the clock is configured as ordinary clock timeReceiver
The g8265dot1-2010 profile is for use in an environment with only ordinary clock timeTransmitters and
timeReceivers for frequency distribution.
If the profile setting for the clock is g8275dot1-2014, the precedence order for the best timeTransmitter
selection algorithm is very similar to that used with the default profile. It ignores priority1, includes a
localPriority and includes the ability to force a port to never enter timeReceiver state (timeTransmitter-
only).
The precedence is as follows:
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
1. clockClass
2. clockAccuracy
3. PTP variance (offsetScaledLogVariance)
4. priority2
5. localPriority
6. clockIdentity (See Note)
7. stepsRemoved from the grandmaster
Note: If the two clocks being compared have a clockClass less than 128, then this step is
skipped. Skipping this step is the normal case as most clocks used as grandmasters advertise a
clockClass less than 128.
The ordinary clock timeTransmitter, ordinary clock timeReceiver, and boundary clock set their local
parameters as listed in Table 24: Local clock parameters when profile is set to g8275dot1-2014.
Parameter Value
clockIdentity Chassis MAC address following the guidelines of 7.5.2.2.2 of
IEEE 1588
clockAccuracy FE — unknown
If the profile setting for the clock is g8275dot2-2016, the precedence order for the best master selection
algorithm is very similar to that used with the g8275dot1-2014 profile. It ignores the priority1 parameter,
includes a localPriority parameter, and includes the ability to force a port to never enter slave state
(master-only). The precedence is as follows:
• clockClass
• clockAccuracy
• PTP variance (offsetScaledLogVariance)
• priority2
• localPriority
• clockIdentity
• stepsRemoved from the grandmaster
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Note:
If the two clocks being compared have a clockClass of less than 128, the comparison of the
clockIdentity is skipped. Skipping the comparison of the clockIdentity is the normal case because
the vast majority of clocks used as grandmasters advertise a clockClass of less than 128.
The following table describes the local parameter settings when the profile setting for the clock is
g8275dot2-2016.
clockIdentity Chassis MAC address following the guidelines of 7.5.2.2.2 of IEEE 1588
There is a limit on the number of external PTP clocks to which the ordinary clock timeReceiver or boundary
clock requests unicast service (number of configured peers) and also a limit to the number of external PTP
clocks to which the ordinary clock timeTransmitter or boundary clock grants unicast service (number of
discovered peers). An association where the boundary clock has a symmetric relationship with another
boundary clock (in other words, they both have the other as a configured peer) consumes a request and a
grant unicast service in each router.
The number of configured Ethernet ports is not restricted.
There are limits to the maximum transmitted and received event message rates supported in the router.
Each unicast IP service established consumes a portion of one of the unicast message limits. When either
limit is reached, additional unicast service requests are refused by sending a grant response with zero in
the duration field.
See the scaling guide for the appropriate release for the specific unicast message limits related to PTP.
Multicast messages are not considered when validating the unicast message limit. When multicast
messaging on Ethernet ports is enabled, the PTP load needs to be monitored to ensure the load does not
exceed the capabilities. There are several commands that you can use for this monitoring. If the capacity
usage reaches 100%, the PTP software process on the router is at its limit of transmitting and receiving
PTP packets.
Use the following command to identify the load of the PTP software process:
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Because you cannot control the amount of PTP messages being received over the Ethernet ports, you can
use statistics commands to identify the source of the message load.
Use the following command to display aggregate packet rates:
Figure 17: Messaging sequence between the PTP timeReceiver clock and PTP timeTransmitter clock
shows the unicast negotiation procedure performed between a timeReceiver and a peer clock that is
selected to be the timeTransmitter clock. The timeReceiver clock requests Announce messages from
all peer clocks but only request Sync and Delay_Resp messages from the clock selected to be the
timeTransmitter clock.
Figure 17: Messaging sequence between the PTP timeReceiver clock and PTP timeTransmitter clock
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
When using IEEE 1588v2 for distribution of a frequency reference, the timeReceiver calculates a message
delay from the timeTransmitter to the timeReceiver based on the timestamps exchanged. A sequence of
these calculated delays contain information of the relative frequencies of the timeTransmitter clock and
timeReceiver clock but has a noise component related to the packet delay variation (PDV) experienced
across the network. The timeReceiver must filter the PDV effects so as to extract the relative frequency
data and then adjust the timeReceiver frequency to align with the timeTransmitter frequency.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
When using IEEE 1588v2 for distribution of time, the 7750 SR and 7450 ESS use the four timestamps
exchanged using the IEEE 1588v2 messages to determine the offset between the router time base and the
external timeTransmitter clock time base. The router determines the offset adjustment and then in between
these adjustments, the router maintains the progression of time using the frequency from the central clock
of the router. This allows time to be maintained using a BITS input source or a Synchronous Ethernet input
source even if the IEEE 1588v2 communications fail. When using IEEE 1588v2 for time distribution, the
central clock should at a minimum have a system timing input reference enabled. Figure 19: Using IEEE
1588v2 for time distribution displays how IEEE 1588v2 is used for time distribution.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
• classic CLI
If this command is used to stop the transmission of Announce messages while the local clock is in a
state of SyncUncertain TRUE, unicast negotiation grant requests are not granted and current grants are
canceled.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Because upgrading IOM, IMM, and MDA firmware is service impacting, this upgrade is not performed
automatically on a soft reset of the MDA. The IOM/IMM firmware is upgraded when the IOM/IMM card is
hard reset. The MDA firmware is programmed during system initialization, when the MDA is inserted, or
when the MDA is hard reset via a clear mda or clear card command. However, when an MDA is soft reset
via either a clear card soft command or during a major ISSU, the MDA firmware is not updated.
Port-based timestamping of 1588 packets cannot be used at the same time for Ethernet encapsulation and
IP encapsulation on a specific port. This means that PTP cannot be configured on an Ethernet port if ptp-
hw-assist is already configured on a Layer 3 interface associated with that port. Similarly, ptp-hw-assist
cannot be configured on a Layer 3 interface if its associated port is already configured as a PTP port.
Message type Rates requested by the 7450 ESS, Rates granted by the 7450 ESS, 7750 SR,
7750 SR, 7950 XRS, and VSR 7950 XRS, and VSR
Min Max Min Max
Announce 1 packet every 16 8 packets/second packet every 16 8 packets/second
seconds seconds
State and statistics data for each PTP peer are available to assist in the detection of failures or unusual
situations.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
The PTP timeReceiver capability is implemented on the CPM, version 3 or later. The IEEE 1588v2
messages can ingress and egress the router on any line interface. Figure 21: Ordinary timeReceiver clock
operation shows the operation of an ordinary PTP clock in timeReceiver mode.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
All packets are routed to their destination via the best route as determined in the route table; see Figure 23:
Ordinary timeTransmitter clock operation. It does not matter which ports are used to ingress and egress
these packets (unless port based time stamping is enabled for higher performance).
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
many hops is split into multiple shorter segments, allowing better PDV control and improved timeReceiver
performance. This allows PTP to function as a valid timing option in more network deployments and allows
for better scalability and increased robustness in various topologies, such as rings. Boundary clocks can
simultaneously function as a PTP timeReceiver of an upstream grandmaster (ordinary clock) or boundary
clock, and as a PTP timeTransmitter of downstream timeReceivers (ordinary clock) and boundary clocks,
as shown in Figure 24: Boundary clock.
In addition, the use of port-based timestamping in every network element between the grandmaster and
the end timeReceiver application is highly recommended for delivering time to meet one microsecond
accuracies required of mobile applications.
The router always uses the frequency output of the central clock to maintain the timebase within the router.
The PTP reference into the central clock should always be enabled as an option if the router is configured
as a boundary clock. This avoids the situation of the router entering holdover while propagating time with
1588.
Note: The ITU-T defined a network architecture for node-by-node time distribution in their
Recommendations. These recommendations require that Synchronous Ethernet be used with
IEEE 1588 (using the G.8275.1 profile) to meet the target performance.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
peers are shared across all router instances. If it is needed to control the number of dynamic peers that
can be consumed by a routing instance, then it must be configured for that routing instance.
Note:
The last two cases described in the preceding list may be useful if external clocks require
different domain numbers or announce message rates.
Alternate profiles are associated with PTP ports and peers. Alternate profile associations are configured
for PTP ports and learned by PTP peers. PTP peer alternate profiles are learned by matching the domain
number of received unicast messaging with the domain of the configured alternate profile.
Caution:
When a PTP port is configured, the log-delay-interval and log-sync-interval command options
are automatically configured based on the primary profile that is configured using the configure
system ptp profile command. When an alternate profile is assigned to the PTP port, these
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
parameters are not changed. The user must configure the log-delay-interval and log-sync-
interval parameters to align with the requirements of the attached equipment.
Additionally, if the log-delay-interval and log-sync-interval parameters are not changed from
their default values, the parameter values change if the primary profile changes. This behavior
may result in an unexpected message rate if the default parameter values are retained.
The following table lists the profile interworking between the primary and alternate profiles depending on
the standard profile used in the primary.
Standard profile used in primary profile Standard profile allowed in alternate profile
g8275dot1-2014 ieee1588-2008
g8265dot1-2010
g8275dot1-2014
g8275dot2-2016
g8275dot2-2016 ieee1588-2008
g8265dot1-2010
g8275dot1-2014
g8275dot2-2016
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
When enabled, the egress IOM limits are changed to allow a maximum of 11 MPLS labels instead of 12.
Table 28: QinQ combination (✓) and restriction (x) table lists the allowed and restricted QinQ
combinations.
SAP x.* ✓ x ✓ x x x ✓ ✓ ✓ x
SAP x.z ✓ ✓ ✓ x x ✓ ✓ ✓ ✓ ✓
Nw x x x x x ✓ ✓ ✓ ✓ x
interface
x.0
Nw x x x x x x ✓ ✓ ✓ x
interface
x.*
Nw x x ✓ ✓ x ✓ ✓ ✓ ✓ x
interface
x.z
SAP *.* ✓ ✓ ✓ ✓ ✓ ✓ x ✓ ✓ ✓
SAP ✓ ✓ ✓ ✓ ✓ ✓ ✓ x ✓ x
*.NULL
SAP 0.* ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ x x
Inverse x x ✓ x x x ✓ x x x
SAP
6.6 LLDP
The IEEE 802.1ab Link Layer Discovery Protocol (LLDP) is a unidirectional protocol that uses the MAC
layer to transmit specific information related to the capabilities and status of the local device. Separately
from the transmit direction, the LLDP agent can also receive the same kind of information for a remote
device which is stored in the related MIBs.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
LLDP itself does not contain a mechanism for soliciting specific information from other LLDP agents, nor
does it provide a specific means of confirming the receipt of information. LLDP allows the transmitter and
the receiver to be separately enabled, making it possible to configure an implementation so the local LLDP
agent can either transmit only or receive only, or can transmit and receive LLDP information.
The information fields in each LLDP frame are contained in a LLDP Data Unit (LLDPDU) as a sequence
of variable length information elements, that each include type, length, and value fields (known as TLVs),
where:
• Type identifies what kind of information is being sent.
• Length indicates the length of the information string in octets.
• Value is the actual information that needs to be sent (for example, a binary bit map or an alphanumeric
string that can contain one or more fields).
Each LLDPDU contains four mandatory TLVs and can contain optional TLVs as selected by network
management:
• Chassis ID TLV
• Port ID TLV
• Time To Live TLV
• Zero or more optional TLVs, as allowed by the maximum size of the LLDPDU
• End Of LLDPDU TLV
The chassis ID and the port ID values are concatenated to form a logical identifier that is used by the
recipient to identify the sending LLDP agent/port. Both the chassis ID and port ID values can be defined in
a number of convenient forms. After selected however, the chassis ID/port ID value combination remains
the same as long as the particular port remains operable.
A non-zero value in the TTL field of the time-to-live TLV tells the receiving LLDP agent how long all
information pertaining to this LLDPDU’s identifier is valid so that all the associated information can later
be automatically discarded by the receiving LLDP agent if the sender fails to update it in a timely manner.
A zero value indicates that any information pertaining to this LLDPDU’s identifier is to be discarded
immediately.
A TTL value of zero can be used, for example, to signal that the sending port has initiated a port shutdown
procedure.
The end of a LLDPDU TLV marks the end of the LLDPDU.
The IEEE 802.1ab standard defines a protocol that:
• Advertises connectivity and management information about the local station to adjacent stations on the
same IEEE 802 LAN.
• Receives network management information from adjacent stations on the same IEEE 802 LAN.
• Operates with all IEEE 802 access protocols and network media.
• Establishes a network management information schema and object definitions that are suitable for
storing connection information about adjacent stations.
• Provides compatibility with a number of MIBs as depicted in Figure 25: LLDP internal architecture for a
network node.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Network operators must be able to discover the topology information to detect and address network
problems and inconsistencies in the configuration. Moreover, standard-based tools can address the
complex network scenarios where multiple devices from different vendors are interconnected using
Ethernet interfaces.
The example displayed in Figure 26: Customer use example for LLDP depicts a MPLS network that uses
Ethernet interfaces in the core or as an access/hand off interfaces to connect to different kind of Ethernet
enabled devices such as service gateway/routers, QinQ switches, DSLAMs or customer equipment.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
IEEE 802.1ab LLDP running on each Ethernet interfaces in between all the above network elements may
be used to discover the topology information.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Use the following context to configure lbl-only, lbl-ip, and ip-only on a system-wide basis or override
them on a per-IP-interface basis.
6.8 Satellites
There are two types of SAS-Sx satellites supported on the 7750 SR:
• Ethernet satellites
• TDM satellites
The following primary tasks must be performed to configure a satellite.
1. Create a software repository that specifies where the SAS-Sx should obtain its correct software image.
2. Create an Ethernet or TDM satellite association that binds a chassis to a set of uplinks and a software
repository.
3. Configure the satellite ports to specify port configuration and service association.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Note:
• The 7210 SAS-Sx 64-port 10GE Ethernet satellite supports both 10GE and 1GE optics. See
the 7210 Optics Guide for a list of supported modules.
• The 64x10GE + 4xQSFP28 SAS-Sx and IXR satellites do not support the local-forwarding
feature.
• The 7210 SAS-Mxp does not support the local forwarding feature.
• PoE functionality is not supported when the 7210 PoE capable switches are used in satellite
mode.
• For traffic sent by the 7750 SR or 7950 XRS host to the 7210 SAS satellite, the satellite Q-tag
P-bits and DEI bits are set based on the forwarding class and profile associated with the traffic
through the 7750 SR or 7950 XRS system.
The SONET/SDH ETR chassis is the only available TDM satellite and can be configured for different
modes. Table 31: Supported SONET/SDH satellite chassis lists the supported modes of the satellite
chassis.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
The default type on a supplied TDM satellite is ts4-choc3-sfp. Updating to another type initiates a reboot of
the satellite.
The TDM satellite provides CEM functionalities supported on the 7750 SR OC3/OC12 CES MDAs. The
satellite is built using the same architecture as the 7705 SAR-8 adapter cards and is designed to transport
existing TDM services including:
• Cpipe service of DS1/E1 channels within SONET/SDH in structure-agnostic mode (SATOP) as
described in RFC4553
• MEF8 service of DS1/E1 channels within SONET/SDH in structure-agnostic mode
The following types of synchronization are supported:
• DS1/E1 channels can be independently loop-timed, node-timed, or differentially-timed
• OC3/STM1/OC12/STM4 ports can be node-timed
To provide a stable frequency from the host to the SONET/SDH satellite, ensure that the host's clock is
referenced to a suitable timing source (for example, BITS) and configure Synchronous Ethernet from the
host's Ethernet port connecting to the satellite. Copper Ethernet SFPs are not supported because they do
not support Synchronous Ethernet.
The TDM satellite is entirely managed through a 7750 SR host system, such as 7750 SR, 7750 SR-
a, or 7750 SR-e. As a satellite, no new IP address needs to be assigned. Services on the satellite are
configured on the host in the same manner as any ports in a native MDA. The TDM satellite connects to
the SR host using a Gigabit Ethernet link, thereby not occupying valuable slots space in the host system.
APS is supported across satellites connecting to a single host.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Note: First configure the software repository in the system context and then reference it in the
satellite software-repository context.
• classic CLI
Caution: Software for TDM satellites and Ethernet satellites should be stored in separate
software repositories. There is one file that has the same name for both types of software, that is
overwritten if they are placed in the same repository.
• classic CLI
Step 4. Reboot the satellite to load the new software. Depending on whether a firmware update is
needed, perform one of the following steps to reboot the satellite.
• If a satellite firmware update is not required:
a. The satellite loads the new software the next time it reboots.
b. If required, use the following administrative command to reset the satellite:
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
– MD-CLI
– classic CLI
– classic CLI
b. Use the following command to reboot the satellite to update the firmware image. This
causes the 7210 SAS-Sx to upgrade the included firmware images. This process takes
longer than a normal reboot.
– MD-CLI
– classic CLI
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
The satellite chassis type must be specified and must match the chassis type that the satellite
advertises during the boot process. This is mandatory.
• software repository
A preconfigured software repository must be specified in the satellite configuration. This defines the
location of the software image to boot the associated 7210 SAS-Sx. This is mandatory.
• enabled state
By default, a new satellite is in the disabled state and must be administratively enabled. This is
mandatory.
• description
Configure an optional description string associated with the satellite.
• sync-e
Enable sync-e for an Ethernet satellite.
port esat-sat-id/1/portNum
port esat-4/1/2
port esat-sat-id/1/uportNum
port esat-5/1/u2
In the classic CLI, use the following format to reference TDM satellite client ports:
port tsat-sat-id/1/portNum.channel
port tsat-3/1/4.1
In the classic CLI, use the following format to reference TDM satellite uplink ports:
port tsat-sat-id/1/uport.channel
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
port tsat-4/1/u1.1
Ethernet satellite client ports support all port modes (access, network, and client).
Configuring services associated with satellite client ports is the same as configuring services on local 7750
SR ports, except that satellite client ports are referenced with the syntax for the Ethernet satellite port
described above. It is required that a port-scheduler-policy is created to ensure that the 7750 SR is able
to shape the traffic for the egress satellite port type and speed.
A local-forward bypass is created by using the following commands to create a local-forward bypass, then
associating a set of two satellite access points as endpoints for the local-forward bypass.
• The two endpoints must be ports on the same Ethernet satellite chassis.
• If a LAG is used as an endpoint, all member links must be ports on the same Ethernet satellite.
• All satellite ports must be client ports by default, or must be configured as a client port using the port-
template command.
The following example shows the commands to configure a local-forward bypass between client ports
esat-2/1/1:66 and esat-2/1/50:101.
Example: MD-CLI
[ex:/configure satellite]
A:admin@node-2# info
ethernet-satellite 10 {
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
admin-state enable
description "local-forward to offload router"
port-map esat-2/1/1 {
}
port-map esat-2/1/50 {
}
}
A:node-2>config>system>satellite# info
----------------------------------------------
local-forward 10 create
description "local-forward to offload router"
sap esat-2/1/1:66 create
exit
sap esat-2/1/50:101 create
exit
no shutdown
exit
----------------------------------------------
• classic CLI
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
these satellite chassis. These two 100GE ports can be reconfigured as client ports using the port-
template configuration commands. The port template must be configured before port topology bindings are
configured as well as before SAPs, interfaces, or services can be applied to the associated satellite ports.
[ex:/configure satellite]
A:admin@node-2# info
port-template "10gUp" {
admin-state enable
sat-type es64-10gb-sfpp+4-100gb-cfp4
port "1/1/1" {
role uplink
}
port "1/1/2" {
role uplink
}
port "1/1/3" {
role uplink
}
...
port "1/1/9" {
uplink 1/1/1
}
port "1/1/10" {
uplink 1/1/1
}
...
port "1/1/16" {
uplink 1/1/2
}
port "1/1/17" {
uplink 1/1/2
}
port "1/1/65" {
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
role none
}
port "1/1/66" {
role none
}
...
}
ethernet-satellite 20 {
admin-state enable
mac-address d0:99:d5:96:ee:41
sat-type es64-10gb-sfpp+4-100gb-cfp4
software-repository rep1
port-template "10gUp"
}
A:node-2>config>system>satellite# info
----------------------------------------------
port-template "10gUp" sat-type "es64-10gb-sfpp+4-100gb-cfp4" create
port 1/1/1
role uplink
uplink none
exit
port 1/1/2
role uplink
uplink none
exit
port 1/1/3
role uplink
uplink none
exit
...
port 1/1/9
uplink 1/1/1
exit
port 1/1/10
uplink 1/1/1
exit
...
port 1/1/16
uplink 1/1/2
exit
port 1/1/17
uplink 1/1/2
exit
...
port 1/1/65
role none
exit
port 1/1/66
role none
exit
...
no shutdown
exit
eth-sat 20 create
mac-address d0:99:d5:96:ee:41
sat-type "es64-10gb-sfpp+4-100gb-cfp4"
port-template "10gUp"
software-repository "rep1"
no shutdown
exit
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
----------------------------------------------
• classic CLI
To configure a secondary uplink, after the primary uplink is specified, the secondary keyword should be
included, followed by the intended uplink to be used as the secondary uplink.
Example: MD-CLI
[ex:/configure satellite]
A:admin@node-2# info
ethernet-satellite 1 {
port-map esat-1/1/2 {
primary esat-1/1/u1
secondary esat-1/1/u3
}
}
A:node-2>config>system>satellite# info
----------------------------------------------
eth-sat 1 create
port-map esat-1/1/2
primary esat-1/1/u1
secondary esat-1/1/u3
exit
----------------------------------------------
• If there are no SAPs or interfaces bound to a client port, then any change can be made to the uplinks.
• If a SAP or interface is bound to a client port, or the client port is member of a LAG or ETH tunnel, then
only one uplink change per configuration command is allowed (see below).
• The primary cannot be changed directly, this requires multiple steps.
1. swap primary and secondary
2. remove secondary
3. add new secondary
4. do a second swap of primary and secondary
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Basic configuration
The following example shows dynamic uplink resiliency configuration.
Example: MD-CLI
[ex:/configure satellite]
A:admin@node-2# info
ethernet-satellite 1 {
admin-state enable
sat-type es48-1gb-sfp
dynamic-uplink true
uplink-distribution dual-complex
}
A:node-2>config>system>satellite# info
----------------------------------------------
eth-sat 1 create
sat-type es48-1gb-sfp
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
dynamic-uplink true
uplink-distribution dual-complex
no shutdown
exit
----------------------------------------------
6.9 Auto-provisioning
Auto-provisioning is used to provision a node using an external DHCP server and file server. It is used to
obtain a configuration file and an image file from an external server using an in-band mechanism. Auto-
provisioning is not compatible with an out-of-band management port.
Before using auto-provisioning, the SR OS must be booted up and running the application image. In
addition, it needs to have some minimum configuration before the auto-provision script is executed by the
operator.
After the auto-provision application is triggered using a tools command, SR OS checks all operationally
up ports without IP addresses and send DHCP discovery to these interfaces. The DHCP server needs to
be configured with Option 67 and the user must provide the SR OS with the URL of a file server and the
corresponding directory for the image.
Figure 28: Example of a network with no DHCP relay to Figure 30: Example of a network with multiple
subnets describe scenarios in which auto-provisioning are used.
In Figure 28: Example of a network with no DHCP relay, there is no DHCP relay and all IP addresses are
assigned from a single pool.
In Figure 29: Example of a network with a DHCP relay, there is a DHCP relay which injects the Option 82
as a gateway address. The DHCP server is assigned the IP address from the pool dictated by the gateway
address option 82. The DHCP server and HTTP server are in the same subnet. The DHCP offer has option
3 "router" which is used for a default gateway creation on the 7750 SR.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
In Figure 30: Example of a network with multiple subnets, all components are in different subnets. The
DHCP relay adds Option 82 to the DHCP request as the gateway address which is used for pool selection.
The DHCP server must add option 3 configured with the gateway address of the HTTP server.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Note: If no other interface with port up is found, the auto-provisioning task stops and a failure
error is displayed on the CLI and in the log.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
For example, after a configuration file is successfully loaded, the specified URL can contain a nearly
identical configuration file with specific commands enabled or disabled, or particular parameters specified
and according to the script which loads that file.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
You can also use this context to synchronize only the configuration files in redundant systems.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
configured under configure router [Base]) and IES services and interfaces exist in the Base router
instance. The Base router instance is identified in SNMP as vRtrType = baseRouter (1) and has a
vRtrID of 1.
• VPRN instances
Another type of router instance is the set of operator configured VPRN services. Each VPRN service
has a unique router instance. For more information about VPRN services and their associated router
instances, see the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 3 Services Guide: IES and VPRN.
VPRN router instances are identified in SNMP as vRtrType = vprn (2), and the vRtrID is dynamically
allocated.
• Special system router instances
SR OS routers also support the following special router instances:
– management
The management router instance is a system created router instance that is used for management
of the router. The management router instance is bound to CPM/CCM ports A/1 and B/1. This is a
CPM router instance which cannot be renamed or deleted by an operator. The management router
instance is identified in SNMP as vRtrType = vr(3), and the vRtrID is 4095.
– vpls-management
The vpls-management router instance is used for management of VPLS services. It is identified in
SNMP as vRtrType = vr(3), and the vRtrID is 4094.
– User created CPM router instances
User created CPM router instances are user defined router instances that are mainly used with
Ethernet ports on the CPM/CCM cards: CPM router instances only use CPM/CCM Ethernet ports
as interfaces. CPM router instances have a user-defined name and are the only types of non-VPRN
router instances that can be created by the user. User created CPM router instances are identified in
SNMP as vRtrType = vr(3), and the vRtrID is dynamically allocated.
Some management protocols can use either the base routing instance (in-band) or the management
routing instance (out-of-band). A listing of these protocols can be found in the CPM Filter: Protocols
and Ports section of the 7450 ESS, 7750 SR, 7950 XRS, and VSR System Management Guide. Unless
otherwise stated in the detailed description of the protocol, when the server or client for the protocol is
reachable via the management routing instance, those protocol messages use the management interface
for the protocol communication.
If BOF is set up with autoconfiguration and the DHCP server provides a general default route such as
0.0.0.0/0, with some protocols (like PCEP, TACACS+, RADIUS, and LDAP), Authentication, Authorization,
Accounting (AAA) always prefers OOB over in-band connectivity. This is because these protocols prefer to
use the OOB management port first. If a matching route is not found, in-band is attempted. The static route
provided by DHCP must be properly set to ensure the correct route preference is made by these protocols.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
The save command includes an option to save both default and non-default configuration (the detail
option).
The index option specifies that the system preserves system indexes when a save command is executed,
regardless of the persistent status in the BOF file. During a subsequent boot, the index file is read along
with the configuration file. As a result, a number of system indexes are preserved between reboots,
including the interface index, LSP IDs, path IDs, and so on. This reduces resynchronizations of the
Network Management System (NMS) with the affected network element.
If the save attempt fails at the destination, an error occurs and is logged. The system does not try to save
the file to the secondary or tertiary configuration sources unless the path and filename are explicitly named
with the save command.
6.14.3.1.1.1 Name
You can configure a name for the system device. The name is used in the prompt string. Only one system
name can be configured. If multiple system names are configured the last one encountered overwrites the
previous entry. Use the following command to configure the system name.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
6.14.3.1.1.2 Contact
Use the contact command to specify the name of a system administrator, IT staff member, or other
administrative entity. Use the following command to configure the system contact.
6.14.3.1.1.3 Location
Use the location command to specify the system location of the device. For example, enter the city,
building address, floor, room number, and so on, where the router is located. Use the following command
to configure the system location.
6.14.3.1.2 Coordinates
You can optionally configure the GPS location of the device. If the string contains special characters (#, $,
spaces, and so on), the entire string must be enclosed within double quotes. Use the following command to
configure the system coordinates.
6.14.3.1.3.1 Zone
The zone command sets the time zone and time zone offset for the router. The router supports system-
defined and user-defined time zones. The system-defined time zones are listed in Table 32: System-
defined time zones. Use the following command to configure the system time zone.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
US and Canada
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
If the time zone configured is listed in Table 32: System-defined time zones, the starting, ending, and offset
do not need to be configured with this command unless there is a need to override the system defaults.
The command returns an error if the start and ending dates and times are not available either in Table 32:
System-defined time zones or entered as configuration options in this command.
6.14.3.1.3.3 NTP
NTP is the Network Time Protocol defined in RFC 1305, Network Time Protocol (Version 3) Specification,
Implementation and Analysis and RFC 5905, Network Time Protocol Version 4: Protocol and Algorithms
Specification. It allows for the participating network nodes to keep time more accurately and more
importantly they can maintain time in a more synchronized fashion between all participating network nodes.
SR OS uses an NTP process based on a reference build provided by the Network Time Foundation. Nokia
strongly recommends that the users review RFC 8633, Network Time Protocol Best Current Practices,
when they plan to use NTP with the router. The RFC section ‟Using Enough Time Sources” indicates that
using only two time sources (NTP servers) can introduce instability if they provide conflicting information.
To maintain accurate time, Nokia recommends configuring three or more NTP servers.
NTP uses stratum levels to define the number of hops from a reference clock. The reference clock is
considered to be a stratum-0 device that is assumed to be accurate with little or no delay. Stratum-0
servers cannot be used in a network. However, they can be directly connected to devices that operate
as stratum-1 servers. A stratum-1 server is an NTP server with a directly-connected device that provides
Coordinated Universal Time (UTC), such as a GPS or atomic clock.
The higher stratum levels are separated from the stratum-1 server over a network path, therefore, a
stratum-2 server receives its time over a network link from a stratum-1 server. A stratum-3 server receives
its time over a network link from a stratum-2 server.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
SR OS routers normally operate as a stratum-2 or higher device. The router relies on an external stratum-1
server to source accurate time into the network. However, SR OS also allows for the use of the local PTP
recovered time to be sourced into NTP. In this latter case, the local PTP source appears as a stratum-0
server and SR OS advertises itself as a stratum-1 server. Activation of the PTP source into NTP may
impact the network NTP topology because the SR OS router is promoted to stratum-1.
SR OS router runs a single NTP clock which then operates NTP message exchanges with external NTP
clocks. Exchanges can be made with external NTP clients, servers, and peers. These exchanges can be
through the base, management, or VPRN routing instances.
NTP operates associations between clocks as either client or server, symmetric active and symmetric
passive, or broadcast modes. These modes of operation are applied according to which elements are
configured on the router. To run server mode, the operator must enable NTP server mode for the base and
each needed VPRN routing instance. To run client mode, the operator must configure external servers. If
both the local router and remote router are configured with each other as peers, then the router operates
in symmetric active mode. If only one side of the association has peering configured, then the modes
are symmetric passive. To operate using broadcast mode, interfaces must be configured to transmit as
broadcast servers or receive as broadcast clients.
NTP server operation for both unicast and broadcast communication within a VPRN is configured within
the VPRN (see the NTP Within a VPRN Service section in 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer
3 Services Guide: IES and VPRN).
Note: NTP provides lightweight synchronization across a network for alignment of system
time for logging purposes. NTP does not provide the high accuracy time needed for the on-air
applications of the mobile base stations. The more recent PTP protocol has been developed for
these applications (see Network synchronization).
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
When none of the configured servers are reachable on the node, the system reverts to manual
timekeeping and issues a critical alarm. When a server becomes available, a trap is issued indicating
that standard operation has resumed.
• NTP and SNTP
If both NTP and SNTP are enabled on the node, then SNTP transitions to an operationally down state.
If NTP is removed from the configuration or shut down, then SNTP resumes an operationally up state.
• gradual clock adjustment
As several applications (such as Service Assurance Agent (SAA)) can use the clock, and if determined
that a major (128 ms or more) adjustment needs to be performed, the adjustment is performed by
programmatically stepping the clock. If a minor (less than 128 ms) adjustment must be performed, then
the adjustment is performed by either speeding up or slowing down the clock.
• To avoid the generation of too many events/trap the NTP module rates limit the generation of events/
traps to three per second. At that point a single trap is generated that indicates that event/trap
squashing is taking place.
6.14.3.1.3.3.1 Authentication-check
NTP supports an authentication mechanism to provide some security and access control to servers and
clients. The default behavior when any authentication keys are configured is to reject all NTP protocol
PDUs that have a mismatch in either the authentication key ID, type, or key. The authentication-check
command provides for the options to skip or maintain this rejection of NTP PDUs that do not match the
authentication requirements.
When authentication-check is configured, NTP PDUs are authenticated on receipt. However, mismatches
cause a counter to be increased, one counter for key ID, one for type, and one for key value mismatches.
The following example enables authentication-check.
Example: MD-CLI
A:node-2>config>system>time>ntp# info
----------------------------------------------
authentication-check
no shutdown
----------------------------------------------
6.14.3.1.3.3.2 Authentication-key
The authentication-key command configures an authentication key-id, key type, and key used to
authenticate NTP PDUs sent to and received from other network elements participating in the NTP
protocol. For authentication to work, the authentication-key ID, authentication type and authentication-key
value must match. The following example enables NTP and configures the authentication-key.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Example: MD-CLI
A:node-2>config>system>time>ntp# info
----------------------------------------------
shutdown
authentication-key 1 key "OAwgNUlbzgI" hash2 type des
----------------------------------------------
6.14.3.1.3.3.3 Broadcast
The broadcast command is used to transmit broadcast packets on a given interface. Interfaces in the
base routing context or the management interface may be specified. Due the relative ease of spoofing
of broadcast messages, it is strongly recommended to use authentication with broadcast mode. The
messages are transmitted using a destination address that is the NTP Broadcast address. The following
example enables NTP and configures the broadcast interface.
Example: MD-CLI
A:node-2>config>system>time>ntp# info
----------------------------------------------
broadcast interface int11 version 4 ttl 127
no shutdown
----------------------------------------------
6.14.3.1.3.3.4 Broadcastclient
The broadcastclient command enables listening to NTP broadcast messages on the specified interface.
Interfaces in the base routing context or the management interface may be specified. Due the relative ease
of spoofing of broadcast messages, it is strongly recommended to use authentication with broadcast mode.
The messages must have a destination address of the NTP Broadcast address. The following example
enables NTP and configures the broadcast client.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Example: MD-CLI
A:node-2>config>system>time>ntp# info
----------------------------------------------
broadcastclient interface int11
no shutdown
----------------------------------------------
6.14.3.1.3.3.5 Multicast
When configuring NTP the node can be configured to transmit or receive multicast packets on the CPM
MGMT port (CPM applies to the 7450 ESS and 7750 SR). Broadcast and multicast messages can
easily be spoofed; therefore, authentication is strongly recommended. Multicast is used to configure the
transmission of NTP multicast messages. When transmitting multicast NTP messages the default address
of 224.0.1.1 is used. The following example enables NTP and multicast.
Example: MD-CLI
A:node-2>config>system>time>ntp# info
----------------------------------------------
multicast
no shutdown
----------------------------------------------
6.14.3.1.3.3.6 Multicastclient
The multicastclient command is used to configure an address to receive multicast NTP messages on the
CPM MGMT port (7450 ESS and 7750 SR). Broadcast and multicast messages can easily be spoofed,
therefore, authentication is strongly recommended. If multicastclient is not configured, all NTP multicast
traffic is ignored. The following example enables NTP and configures the address to receive multicast NTP
messages.
Example: MD-CLI
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
authenticate true
}
A:node-2>config>system>time>ntp# info
----------------------------------------------
multicastclient
no shutdown
----------------------------------------------
6.14.3.1.3.3.7 NTP-server
The ntp-server command configures the node to assume the role of an NTP server. Unless the server
command is used this node functions as an NTP client only and does not distribute the time to downstream
network elements. If authentication is specified in this command, the NTP server requires client packets to
be authenticated based on the key received in the client request. The following example enables NTP and
configures the node to assume the role of an NTP server.
Example: MD-CLI
A:node-2>config>system>time>ntp# info
----------------------------------------------
ntp-server
no shutdown
----------------------------------------------
6.14.3.1.3.3.8 Peer
Configuration of an NTP peer configures symmetric active mode for the configured peer. Although any
system can be configured to peer with any other NTP node, it is recommended to configure authentication
and to configure known time servers as their peers. The following example enables NTP and configures
the peer.
Example: MD-CLI
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
A:node-2>config>system>time>ntp# info
----------------------------------------------
no shutdown
peer 192.168.1.1 key-id 1
----------------------------------------------
6.14.3.1.3.3.9 Server
The server command is used when the node should operate in client mode with the NTP server specified
in the address field. Up to ten NTP servers can be configured. The following example enables NTP and
configures the server.
Example: MD-CLI
A:node-2>config>system>time>ntp# info
----------------------------------------------
no shutdown
server 192.168.1.1 key 1
----------------------------------------------
6.14.3.1.3.4 SNTP
SNTP is a compact, client-only version of the NTP. SNTP can only receive the time from SNTP/NTP
servers; it cannot be used to provide time services to other systems. SNTP can be configured in either
broadcast or unicast client mode.
6.14.3.1.3.4.1 Broadcast-client
You can enable listening at the global device level to SNTP broadcast messages on interfaces with
broadcast client enabled. The following example enables SNTP in broadcast mode.
Example: MD-CLI
A:node-2>config>system>time>sntp# info
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
----------------------------------------------
broadcast-client
no shutdown
----------------------------------------------
6.14.3.1.3.4.2 Server-address
You can configure an SNTP server for SNTP unicast client mode. The following example enables SNTP
and configures the server address.
Example: MD-CLI
A:node-2>config>system>time>sntp# info
----------------------------------------------
server-address 10.10.0.94 version 1 preferred interval 100
no shutdown
----------------------------------------------
6.14.3.1.3.5 CRON
The CRON feature supports periodic and date and time-based scheduling in SR OS. CRON can be used,
for example, to schedule Service Assurance Agent (SAA) functions. CRON functionality includes the
ability to specify scripts that need to be run, when they are scheduled, including one-time only functionality
(one-shot), interval and calendar functions. Scheduled reboots, peer turn ups, service assurance agent
tests and more can all be scheduled with CRON, as well as OAM events, such as connectivity checks, or
troubleshooting runs.
CRON supports the schedule element. The schedule function configures the type of schedule to run,
including one-time only (one-shot), periodic, or calendar-based runs. All runs are determined by month,
day of month or weekday, hour, minute, and interval (seconds).
6.14.3.1.3.5.1 Schedule
The schedule function configures the type of schedule to run, including one-time only (oneshot), periodic
or calendar-based runs. All runs are determined by month, day of month or weekday, hour, minute and
interval (seconds). If end-time and interval are both configured, whichever condition is reached first is
applied. The following example schedules a script named test to run every 15 minutes on the 17th of each
month and every Friday until noon on July 17, 2007.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
Example: MD-CLI
A:node-2>config>system>cron# info
----------------------------------------------
schedule "test2"
shutdown
day-of-month 17
minute 0 15 30 45
weekday friday
end-time 2007/07/17 12:00
exit
----------------------------------------------
A:node-2>config>system>persistence# info
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
----------------------------------------------
subscriber-mgmt
description "cf3:SubMgmt-Test"
location cf3:
exit
----------------------------------------------
• classic CLI
=================================================================
Synchronization Information
=================================================================
Standby Status : disabled
Last Standby Failure : N/A
Standby Up Time : N/A
Standby Version : N/A
Failover Time : N/A
Failover Reason : N/A
Boot/Config Sync Mode : Boot Environment
Boot/Config Sync Status : No synchronization
Last Config File Sync Time : Never
Last Boot Env Sync Time : Never
Rollback Sync Mode : None
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
• classic CLI
If the active and standby are not synchronized, use the following command on the active or the standby
CPM to manually reboot and synchronize the standby CPM.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
admin-state enable
lag "lag-1" {
lacp-key 32666
system-id 00:00:00:33:33:33
system-priority 32888
}
}
}
A:node-2>config>redundancy>multi-chassis# info
---------------------------------------------
peer 10.10.10.2 create
description "Mc-Lag peer 10.10.10.2"
mc-lag
no shutdown
exit
no shutdown
exit
---------------------------------------------
A:node-2>config>system# info
----------------------------------------------
power-supply 1 dc
----------------------------------------------
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
• xyz.cfg.3
• xyz.cfg.4
• xyz.cfg.5
• xyz.ndx
Each persistent index file is updated at the same time as the associated configuration file. When the
index file is updated, the save is performed to xyz.cfg and the index file is created as xyz.ndx.
Synchronization between the active and standby SF/CPMSF/CPM is performed for all configurations and
their associated persistent index files. Use the following command to configure the maximum number of
backup versions:
• MD-CLI
• classic CLI
If an extension file was executed, the command also indicates if it completed successfully or not.
The following example shows the show output for the 7750 SR.
Output example: Show system information output for the 7750 SR
===============================================================================
System Information
===============================================================================
System Name : node-2
...
BOF Source : cf1:
Image Source : primary
Config Source : primary
Last Booted Config File: ftp://test:[email protected]/./12.cfg
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
When executing a post-boot configuration extension file, status messages are displayed on the console
before the "Login" prompt.
The following example shows a failed bootup configuration that caused a boot-bad-exec file containing
another error to be executed.
Example: Failed bootup configuration causing execution of a boot-bad-exec file
Login:
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
config>system>sync-if-timing# begin
The following error message shows when the you try to modify sync-if-timing parameters without entering
the keyword begin.
Example
• classic CLI
The source port specified for ref1 and ref2 is dependent on the router model type and chassis slot. See the
details in the specific command descriptions in the 7450 ESS, 7750 SR, 7950 XRS, and VSR Classic CLI
Command Reference Guide.
• classic CLI
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
If the current reference goes offline or becomes unstable the revert command allows the clock to revert to
a higher-priority reference.
When revertive switching enabled a valid timing reference of the highest priority is used. If a reference
with a higher priority becomes valid, a reference switch over to that reference is initiated. If a failure on the
current reference occurs, the next highest reference takes over.
If non-revertive switching is enabled, the valid active reference always remains selected even if a higher
priority reference becomes available. If the active reference becomes invalid, a reference switch over to
a valid reference with the highest priority is initiated. The failed reference is eligible for selection when it
becomes operational. Use the following command to turn off revert mode:
• MD-CLI
• classic CLI
• classic CLI
Use the following command to discard changes that have been made to the timing references during a
session:
• MD-CLI
• classic CLI
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
When the command is executed, the CPM clock on the active CPM immediately switches its input
reference to that specified by the command. If the specified input is not available (shutdown), or in a
disqualified state, the CPM clock shall use the next qualified input reference based on the selection rules.
This command also affects the BITS output port. If the BITS output port selection is set to line-reference
and the reference being forced is not the BITS input port, then the system uses the forced reference to
generate the signal out the BITS output port. If the BITS output port selection is set to internal-clock, then
the system uses the output of the CPM clock to generate the signal for the BITS output port.
On a CPM activity switch, the force command is cleared and normal reference selection is determined.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
}
kb-memory-use-alarm {
rising-threshold 50000000
falling-threshold 45999999
interval 500
startup-alarm either
}
rmon {
event 5 {
description "alarm testing"
owner "Timos CLI"
}
}
A:node-2>config>system>thresholds# info
----------------------------------------------
rmon
event 5 description "alarm testing" owner "Timos CLI"
exit
cflash-cap-warn cf1-B: rising-threshold 2000000 falling-threshold
1999900 interval 240 trap
memory-use-alarm rising-threshold 50000000 falling-threshold
45999999 interval 500
----------------------------------------------
• classic CLI
Use the following command to configure the normal state as open or closed.
Nokia recommends the normal-state closed configuration so that an external power source failure triggers
all the alarm pins to detect a change of state. If normal-state open is used with an external power source,
an external power source failure does not generate any notifications.
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
WARNING: When an external, isolated DC power supply is used to source the voltage for any
alarm, the negative rail must not be connected to the chassis ground and the rail should be 18 to
50 VDC at 100 mA.
A:node-2>config>port>ethernet>lldp# info
----------------------------------------------
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE System management
RELEASE 22.10.R1
dest-mac nearest-bridge
admin-status tx-rx
tx-tlvs port-desc sys-cap
tx-mgmt-address system
exit
----------------------------------------------
A:node-2>config>system>lldp# info
----------------------------------------------
tx-interval 10
tx-hold-multiplier 2
reinit-delay 5
notification-interval 10
----------------------------------------------
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
7.5 Broadband Network Gateway (BNG) Control and User Plane Separation
(CUPS)
3GPP 23.007, Restoration procedures
3GPP 29.244, Interface between the Control Plane and the User Plane nodes
3GPP 29.281, General Packet Radio System (GPRS) Tunnelling Protocol User Plane (GTPv1-U)
BBF TR-459, Control and User Plane Separation for a Disaggregated BNG
RFC 8300, Network Service Header (NSH)
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
7.8 Ethernet
IEEE 802.1AB, Station and Media Access Control Connectivity Discovery
IEEE 802.1ad, Provider Bridges
IEEE 802.1ag, Connectivity Fault Management
IEEE 802.1ah, Provider Backbone Bridges
IEEE 802.1ak, Multiple Registration Protocol
IEEE 802.1aq, Shortest Path Bridging
IEEE 802.1ax, Link Aggregation
IEEE 802.1D, MAC Bridges
IEEE 802.1p, Traffic Class Expediting
IEEE 802.1Q, Virtual LANs
IEEE 802.1s, Multiple Spanning Trees
IEEE 802.1w, Rapid Reconfiguration of Spanning Tree
IEEE 802.1X, Port Based Network Access Control
IEEE 802.3ac, VLAN Tag
IEEE 802.3ad, Link Aggregation
IEEE 802.3ah, Ethernet in the First Mile
IEEE 802.3x, Ethernet Flow Control
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
RFC 8570, IS-IS Traffic Engineering (TE) Metric Extensions – Min/Max Unidirectional Link Delay metric for
flex-algo, RSVP, SR-TE
RFC 8919, IS-IS Application-Specific Link Attributes
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
RFC 4632, Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation
Plan
RFC 5082, The Generalized TTL Security Mechanism (GTSM)
RFC 5246, The Transport Layer Security (TLS) Protocol Version 1.2 – TLS client, RSA public key
RFC 5425, Transport Layer Security (TLS) Transport Mapping for Syslog – RFC 3164 with TLS
RFC 5656, Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer – ECDSA
RFC 5925, The TCP Authentication Option
RFC 5926, Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)
RFC 6398, IP Router Alert Considerations and Usage – MLD
RFC 6528, Defending against Sequence Number Attacks
RFC 7011, Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow
Information
RFC 7012, Information Model for IP Flow Information Export
RFC 7230, Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing
RFC 7231, Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
RFC 7232, Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests
RFC 7301, Transport Layer Security (TLS) Application Layer Protocol Negotiation Extension
RFC 7616, HTTP Digest Access Authentication
RFC 8446, The Transport Layer Security (TLS) Protocol Version 1.3
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
RFC 8534, Explicit Tracking with Wildcard Routes in Multicast VPN – (C-*,C-*) wildcard
RFC 8556, Multicast VPN Using Bit Index Explicit Replication (BIER)
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
RFC 3736, Stateless Dynamic Host Configuration Protocol (DHCP) Service for IPv6
RFC 3971, SEcure Neighbor Discovery (SEND)
RFC 3972, Cryptographically Generated Addresses (CGA)
RFC 4007, IPv6 Scoped Address Architecture
RFC 4193, Unique Local IPv6 Unicast Addresses
RFC 4291, Internet Protocol Version 6 (IPv6) Addressing Architecture
RFC 4443, Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6)
Specification
RFC 4861, Neighbor Discovery for IP version 6 (IPv6)
RFC 4862, IPv6 Stateless Address Autoconfiguration – router functions
RFC 4890, Recommendations for Filtering ICMPv6 Messages in Firewalls
RFC 4941, Privacy Extensions for Stateless Address Autoconfiguration in IPv6
RFC 5007, DHCPv6 Leasequery
RFC 5095, Deprecation of Type 0 Routing Headers in IPv6
RFC 5722, Handling of Overlapping IPv6 Fragments
RFC 5798, Virtual Router Redundancy Protocol (VRRP) Version 3 for IPv4 and IPv6 – IPv6
RFC 5952, A Recommendation for IPv6 Address Text Representation
RFC 6092, Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for
Providing Residential IPv6 Internet Service – Internet Control and Management, Upper-Layer Transport
Protocols, UDP Filters, IPsec and Internet Key Exchange (IKE), TCP Filters
RFC 6106, IPv6 Router Advertisement Options for DNS Configuration
RFC 6164, Using 127-Bit IPv6 Prefixes on Inter-Router Links
RFC 6437, IPv6 Flow Label Specification
RFC 6603, Prefix Exclude Option for DHCPv6-based Prefix Delegation
RFC 8021, Generation of IPv6 Atomic Fragments Considered Harmful
RFC 8200, Internet Protocol, Version 6 (IPv6) Specification
RFC 8201, Path MTU Discovery for IP version 6
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
RFC 7427, Signature Authentication in the Internet Key Exchange Version 2 (IKEv2)
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
RFC 3623, Graceful OSPF Restart Graceful OSPF Restart – helper mode
RFC 3630, Traffic Engineering (TE) Extensions to OSPF Version 2
RFC 4203, OSPF Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)
RFC 4222, Prioritized Treatment of Specific OSPF Version 2 Packets and Congestion Avoidance
RFC 4552, Authentication/Confidentiality for OSPFv3
RFC 4576, Using a Link State Advertisement (LSA) Options Bit to Prevent Looping in BGP/MPLS IP Virtual
Private Networks (VPNs)
RFC 4577, OSPF as the Provider/Customer Edge Protocol for BGP/MPLS IP Virtual Private Networks
(VPNs)
RFC 5185, OSPF Multi-Area Adjacency
RFC 5187, OSPFv3 Graceful Restart – helper mode
RFC 5243, OSPF Database Exchange Summary List Optimization
RFC 5250, The OSPF Opaque LSA Option
RFC 5309, Point-to-Point Operation over LAN in Link State Routing Protocols
RFC 5340, OSPF for IPv6
RFC 5642, Dynamic Hostname Exchange Mechanism for OSPF
RFC 5709, OSPFv2 HMAC-SHA Cryptographic Authentication
RFC 5838, Support of Address Families in OSPFv3
RFC 6549, OSPFv2 Multi-Instance Extensions
RFC 6987, OSPF Stub Router Advertisement
RFC 7471, OSPF Traffic Engineering (TE) Metric Extensions – Min/Max Unidirectional Link Delay metric
for flex-algo, RSVP, SR-TE
RFC 7684, OSPFv2 Prefix/Link Attribute Advertisement
RFC 7770, Extensions to OSPF for Advertising Optional Router Capabilities
RFC 8362, OSPFv3 Link State Advertisement (LSA) Extensibility
RFC 8920, OSPF Application-Specific Link Attributes
7.25 OpenFlow
TS-007 Version 1.3.1, OpenFlow Switch Specification – OpenFlow-hybrid switches
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
RFC 8491, Signaling Maximum SID Depth (MSD) Using IS-IS – node MSD
RFC 8660, Segment Routing with the MPLS Data Plane
RFC 8661, Segment Routing MPLS Interworking with LDP
RFC 8663, MPLS Segment Routing over IP – BGP SR with SR-MPLS-over-UDP/IP
RFC 8665, OSPF Extensions for Segment Routing
RFC 8666, OSPFv3 Extensions for Segment Routing
RFC 8667, IS-IS Extensions for Segment Routing
RFC 8669, Segment Routing Prefix Segment Identifier Extensions for BGP
RFC 8754, IPv6 Segment Routing Header (SRH)
RFC 8814, Signaling Maximum SID Depth (MSD) Using the Border Gateway Protocol - Link State
RFC 8986, Segment Routing over IPv6 (SRv6) Network Programming
RFC 9252, BGP Overlay Services Based on Segment Routing over IPv6 (SRv6)
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
RFC 1215, A Convention for Defining Traps for use with the SNMP
RFC 1724, RIP Version 2 MIB Extension
RFC 1901, Introduction to Community-based SNMPv2
RFC 2021, Remote Network Monitoring Management Information Base Version 2 using SMIv2
RFC 2206, RSVP Management Information Base using SMIv2
RFC 2213, Integrated Services Management Information Base using SMIv2
RFC 2494, Definitions of Managed Objects for the DS0 and DS0 Bundle Interface Type
RFC 2578, Structure of Management Information Version 2 (SMIv2)
RFC 2579, Textual Conventions for SMIv2
RFC 2580, Conformance Statements for SMIv2
RFC 2787, Definitions of Managed Objects for the Virtual Router Redundancy Protocol
RFC 2819, Remote Network Monitoring Management Information Base
RFC 2856, Textual Conventions for Additional High Capacity Data Types
RFC 2863, The Interfaces Group MIB
RFC 2864, The Inverted Stack Table Extension to the Interfaces Group MIB
RFC 2933, Internet Group Management Protocol MIB
RFC 3014, Notification Log MIB
RFC 3165, Definitions of Managed Objects for the Delegation of Management Scripts
RFC 3231, Definitions of Managed Objects for Scheduling Management Operations
RFC 3273, Remote Network Monitoring Management Information Base for High Capacity Networks
RFC 3410, Introduction and Applicability Statements for Internet Standard Management Framework
RFC 3411, An Architecture for Describing Simple Network Management Protocol (SNMP) Management
Frameworks
RFC 3412, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)
RFC 3413, Simple Network Management Protocol (SNMP) Applications
RFC 3414, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol
(SNMPv3)
RFC 3415, View-based Access Control Model (VACM) for the Simple Network Management Protocol
(SNMP)
RFC 3416, Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)
RFC 3417, Transport Mappings for the Simple Network Management Protocol (SNMP) – SNMP over UDP
over IPv4
RFC 3418, Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)
RFC 3419, Textual Conventions for Transport Addresses
RFC 3498, Definitions of Managed Objects for Synchronous Optical Network (SONET) Linear Automatic
Protection Switching (APS) Architectures
RFC 3584, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network
Management Framework
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
RFC 3592, Definitions of Managed Objects for the Synchronous Optical Network/Synchronous Digital
Hierarchy (SONET/SDH) Interface Type
RFC 3593, Textual Conventions for MIB Modules Using Performance History Based on 15 Minute Intervals
RFC 3635, Definitions of Managed Objects for the Ethernet-like Interface Types
RFC 3637, Definitions of Managed Objects for the Ethernet WAN Interface Sublayer
RFC 3826, The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security
Model
RFC 3877, Alarm Management Information Base (MIB)
RFC 3895, Definitions of Managed Objects for the DS1, E1, DS2, and E2 Interface Types
RFC 3896, Definitions of Managed Objects for the DS3/E3 Interface Type
RFC 4001, Textual Conventions for Internet Network Addresses
RFC 4022, Management Information Base for the Transmission Control Protocol (TCP)
RFC 4113, Management Information Base for the User Datagram Protocol (UDP)
RFC 4220, Traffic Engineering Link Management Information Base
RFC 4273, Definitions of Managed Objects for BGP-4
RFC 4292, IP Forwarding Table MIB
RFC 4293, Management Information Base for the Internet Protocol (IP)
RFC 4631, Link Management Protocol (LMP) Management Information Base (MIB)
RFC 4878, Definitions and Managed Objects for Operations, Administration, and Maintenance (OAM)
Functions on Ethernet-Like Interfaces
RFC 7420, Path Computation Element Communication Protocol (PCEP) Management Information Base
(MIB) Module
RFC 7630, HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3
SFLOW-MIB revision 200309240000Z, sFlowMIB
7.36 Timing
GR-1244-CORE Issue 3, Clocks for the Synchronized Network: Common Generic Criteria
GR-253-CORE Issue 3, SONET Transport Systems: Common Generic Criteria
IEEE 1588-2008, IEEE Standard for a Precision Clock Synchronization Protocol for Networked
Measurement and Control Systems
ITU-T G.781, Synchronization layer functions
ITU-T G.813, Timing characteristics of SDH equipment slave clocks (SEC)
ITU-T G.8261, Timing and synchronization aspects in packet networks
ITU-T G.8262, Timing characteristics of synchronous Ethernet equipment slave clock (EEC)
ITU-T G.8262.1, Timing characteristics of an enhanced synchronous Ethernet equipment slave clock
(eEEC)
ITU-T G.8264, Distribution of timing information through packet networks
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
ITU-T G.8265.1, Precision time protocol telecom profile for frequency synchronization
ITU-T G.8275.1, Precision time protocol telecom profile for phase/time synchronization with full timing
support from the network
RFC 3339, Date and Time on the Internet: Timestamps
RFC 5905, Network Time Protocol Version 4: Protocol and Algorithms Specification
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
RFC 4585, Extended RTP Profile for Real-time Transport Control Protocol (RTCP)-Based Feedback (RTP/
AVPF)
RFC 4588, RTP Retransmission Payload Format
SPACER TEXT
BASIC SYSTEM CONFIGURATION GUIDE Standards and protocol support
RELEASE 22.10.R1
SPACER TEXT
Customer document and product support
Customer documentation
Customer documentation welcome page
Technical support
Product support portal
Documentation feedback
Customer documentation feedback