Swconfig System Basics
Swconfig System Basics
System Basics
Configuration Guide
Release 4.0.x
Juniper Networks is registered in the U.S. Patent and Trademark Office and in other countries as a
trademark of Juniper Networks, Inc. Broadband Cable Processor, ERX, ESP, G1, G10, G-series,
Internet Processor, JUNOS, JUNOScript, M5, M10, M20, M40, M40e, M160, M-series, NMC-RX,
SDX, ServiceGuard, T320, T640, T-series, UMC, and Unison are trademarks of Juniper Networks,
Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the
property of their respective owners. All specifications are subject to change without notice.
Products made or sold by Juniper Networks (including the M5, M10, M20, M40, M40e, M160, and
T320 routers, T640 routing node, and the JUNOS software) or components thereof might be covered
by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S.
Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,333,650, 6,359,479, and 6,406,312.
ERX Edge Routers System Basics Configuration Guide, Release 4.0.x
Copyright 2002, Juniper Networks, Inc.
All rights reserved. Printed in USA.
Writers: Justine Kangas, Helen Shaw, Brian Wesley Simmons, Michael Taillon
Editor: Fran Mues
Revision History
November 2002
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks
reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
a. If you and Juniper Networks, Inc., have executed another license agreement for the Program which
is now in effect, then such agreement (Negotiated Agreement) shall supersede this Software License Agreement and shall exclusively govern the use and license terms of the Program.
must return the Software, including any User Documentation, and all copies or portions thereof to
Juniper Networks. Termination of this License Agreement shall not prejudice Juniper Networks' rights
to damages or other available remedy.
5. Limited Software Warranty: Juniper Networks warrants, for your benefit alone, that for a period
of ninety (90) days from the date of shipment from Juniper Networks that the Software substantially
conforms to its published specifications.
The limited warranty extends only to you as the original licensee. Your exclusive remedy and the
entire liability of Juniper Networks and its suppliers under this limited warranty will be, at Juniper
Networks' option, repair or replacement of the Software, or refund of the amounts paid by you under
this License Agreement. You agree that this is your sole and exclusive remedy for breach by Juniper
Networks, its suppliers or its licensors of any warranties made under this License Agreement.
In no event does Juniper Networks warrant that the Software is error free or that you will be able to
operate the Software without problems or interruptions. Juniper Networks does not warrant: 1) that
the functions contained in the software will meet your requirements; 2) that the Software will operate
in the hardware or software combination that you may select; 3) that the operation of the Software
will be uninterrupted or error free; or 4) that all defects in the operation of the Software will be
corrected.
This warranty does not apply if the product: 1) has been altered, except by Juniper Networks; 2) has
not been installed, operated, repaired, or maintained in accordance with instruction supplied by
Juniper Networks; or 3) has been subjected to or damaged by improper environment, abuse, misuse,
accident, or negligence.
EXCEPT FOR THE WARRANTIES SET FORTH ABOVE, THE SOFTWARE IS LICENSED AS IS,
AND JUNIPER NETWORKS DISCLAIMS ANY AND ALL OTHER REPRESENTATIONS,
CONDITIONS, AND WARRANTIES, WHETHER EXPRESS, IMPLIED, OR STATUTORY,
INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE OR ANY WARRANTIES FOR NONINFRINGEMENT OR
ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. ANY AND ALL SUCH
WARRANTIES ARE HEREBY EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW.
JUNIPER NETWORKS' SUPPLIERS AND LICENSORS DO NOT MAKE OR PASS ON TO YOU OR
ANY THIRD PARTY ANY EXPRESS, IMPLIED, OR STATUTORY WARRANTY OR
REPRESENTATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR ANY WARRANTIES FOR
NONINFRINGEMENT.
6. Proprietary Rights Indemnification. Juniper Networks shall at its expense defend you against
and, subject to the limitations set forth elsewhere herein, pay all costs and damages made in
settlement or awarded against you resulting from a claim that the Program as supplied by Juniper
Networks infringes a United States copyright or a United States patent, or misappropriates a United
States trade secret, provided that you: (a) provide prompt written notice of any such claim, (b) allow
Juniper Networks to direct the defense and settlement of the claim, and (c) provide Juniper Networks
with the authority, information, and assistance that Juniper Networks reasonably deems necessary
for the defense and settlement of the claim. You shall not consent to any judgment or decree or do
any other act in compromise of any such claim without first obtaining Juniper Networks written
consent. In any action based on such a claim, Juniper Networks may, at its sole option, either: (1)
obtain for you the right to continue using the Program, (2) replace or modify the Program to avoid the
claim, or (3) if neither (1) nor (2) can reasonably be effected by Juniper Networks, terminate the
license granted hereunder and give you a pro rata refund of the license fee paid for such Program,
calculated on the basis of straight-line depreciation over a five-year useful life. Notwithstanding the
preceding sentence, Juniper Networks will have no liability for any infringement or misappropriation
claim of any kind if such claim is based on: (i) the use of other than the current unaltered release of
the Program and Juniper Networks has provided or offers to provide such release to you for its then
current license fee, or (ii) use or combination of the Program with programs or data not supplied or
approved by Juniper Networks if such use or combination caused the claim.
7. Limitation of Liability. IN NO EVENT WILL JUNIPER NETWORKS OR ITS SUPPLIERS OR
LICENSORS BE LIABLE FOR ANY COST FOR SUBSTITUTE PROCUREMENT; SPECIAL,
INDIRECT, INCIDENTAL, PUNITIVE, EXEMPLARY, OR CONSEQUENTIAL DAMAGES; OR ANY
DAMAGES RESULTING FROM INACCURATE OR LOST DATA OR LOSS OF USE OR PROFITS
ARISING OUT OF OR IN CONNECTION WITH THE PERFORMANCE OF THE SOFTWARE, EVEN
IF JUNIPER NETWORKS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Juniper Networks' cumulative liability to you or any other party for any loss or damages resulting from
any claims, demands, or actions arising out of or relating to this License Agreement shall not exceed
the total fees paid to Juniper Networks for the Software.
8. Export Control. Software, including technical data, is subject to U.S. export control laws,
including the U.S. Export Administration Act and its associated regulations, and may be subject to
export or import regulations in other countries. You agree to comply strictly with all such regulations
and acknowledge that you have the responsibility to obtain licenses to export, re-export, or import
Software.
9. Government Licensees: If any Software or associated documentation is acquired by or on
behalf of a unit or agency of the United States government, the government agrees that such
Software or documentation is a commercial item as that term is defined in 48 C.F.R. 2.101,
consisting of commercial computer software or commercial computer software documentation as
such terms are used in 48 C.F.R. 12.212 of the Federal Acquisition Regulations and its successors
and 48 C.F.R. 227.7202-1 through 227.7202-4 of the DoD FAR Supplement and its successors. The
use, duplication, or disclosure by the United States government of technical, data, computer software
and documentation is subject to the restrictions set forth in FAR section 12.212(a), FAR section
52.227-14(g)(2), FAR section 52.227-19, DFARS section 252.227-7015(b), DFARS section
227.7202-1(a), and DFARS section 227.7202-3(a), as applicable. All United States government end
users acquire the Software with only the rights set forth in this License Agreement.
10. General: This License shall be governed by and construed in accordance with the laws of the
Commonwealth of Massachusetts, United States of America, as if performed wholly within the state
and without giving effect to the principles of conflict of law. Any dispute arising out of this Agreement
shall be referred to an arbitration proceeding in Boston, Massachusetts, in accordance with the
commercial arbitration rules of the American Arbitration Association (the AAA). If the parties cannot
agree upon an arbitrator, arbitration shall be conducted by a neutral arbitrator selected by the AAA
who is knowledgeable in electronics equipment manufacturing and software licensing. The parties
shall share the procedural costs of arbitration equally, and each party shall pay its own attorneys'
fees and other costs and expenses associated with the arbitration, unless the arbitrator decides
otherwise. The arbitrator's award shall be in writing and shall include a statement of reasons, but the
arbitrator shall not be permitted to award punitive or indirect damages. The arbitrator's decision and
award shall be final and binding and may be entered in any court having jurisdiction. The terms of
this section shall not prevent any party from seeking injunctive relief in any court of competent
jurisdiction in order to protect its proprietary and confidential information. If any term or provision
hereof is found to be void or unenforceable by a court of competent jurisdiction, the remaining
provisions of this License Agreement shall remain in full force and effect. This License Agreement
constitutes the entire agreement between the parties with respect to the use of the Software and
User Documentation and supersedes any and all prior oral or written agreements, discussions,
negotiations, commitments, or understandings. No amendment, modification, or waiver of any
provision of this License Agreement will be valid unless in writing and signed by the authorized
representative of the party against which such amendment, modification, or waiver is sought to be
enforced. The waiver by either party of any default or breach of this License Agreement shall not
constitute a waiver of any other or subsequent default or breach. This License Agreement shall be
binding upon the parties and their respective successors and permitted assigns.
Should you have any questions about this agreement, please contact:
Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, CA 94089
Attn: Contracts Administrator
Contents
viii
Contents
ix
ERX Edge Routers
x
Contents
Chapter 3
Configuring SNMP
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
SNMP Features Supported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
SNMP Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
SNMP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
SNMP MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Standard SNMP MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Juniper Networks ERX Enterprise MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Accessing Supported SNMP MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
SNMP Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Management Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Virtual Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Creating SNMP Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Communicating with the SNMP Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
SNMP Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
SNMP Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
SNMP PDU Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Before You Configure SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
SNMP Configuration Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
Enabling SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Configuring SNMP v1/v2c Community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Community Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Privilege Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
IP Access List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Configuring SNMPv3 Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Setting Server Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Configuring SNMP Packet Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15
Configuring Memory Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15
Configuring Encoding Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Managing Interface Sublayers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Compressing Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Controlling Interface Numbering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
Monitoring Interface Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
Configuring Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
IP Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Trap Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Trap Severities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21
Specifying an Egress Point for SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . 3-23
Collecting Bulk Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24
Configuring Collectors and Receivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
Monitoring Collection Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-29
Configuring Schemas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37
if-stats Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37
Monitoring Schema Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-40
xi
ERX Edge Routers
xii
Contents
xiii
ERX Edge Routers
xiv
Contents
Chapter 8
xv
ERX Edge Routers
Chapter 9
Chapter 10
Chapter 11
10-1
10-1
10-2
10-2
10-2
10-3
10-3
10-3
10-4
10-8
xvi
Contents
Appendix A
Appendix B
References
RFCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
Draft RFCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-8
Other Software Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-9
Hardware Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-10
Index 1
Your ERX system is shipped with the latest system software installed. If
you need to install a future release or reinstall the system software, refer to
the procedures in the ERX Installation and User Guide, Appendix E,
Installing ERX System Software.
xviii
About This Guide
Audience
This guide is intended for experienced system and network specialists who
will configure a Juniper Networks ERX system in an Internet access
environment.
Conventions
Table 1, Table 2, and Table 3 list all the conventions used in the ERX
documentation. Table 1 defines notice icons. Table 2 shows text
conventions used throughout the book, except for command syntax.
Table 3 provides command syntax conventions used primarily in the
ERX Command Reference Guide. For more information about
command syntax, see ERX System Basics Configuration Guide,
Chapter 2, Command Line Interface.
Table 1 Notice icons
Icon
Meaning
Description
Informational note
Caution
Indicates that you may risk losing data or damaging your hardware.
Warning
Description
Examples
Bold typeface
Command example:
Issue the clock source command.
Keyword example:
Specify the keyword exp-msg.
user input
Press <Enter>.
Press <Ctrl+B>.
Documentation
ERX Edge Routers
Description
Examples
host1#show ip ospf 2
Routing Process OSPF 2 with
Router ID 5.5.0.250
Router is an Area Border
Router (ABR)
Italics
Emphasize words.
Identify variables.
clusterId, ipAddress.
Description
Examples
Represent keywords.
terminal length
Words in italics
Represent variables.
mask, accessListName
diagnostic | line
[ internal | external ]
[ level1 | level2 | l1 ]*
Documentation
The ERX Installation Quick Start poster is shipped in the box with all
new systems. This poster provides the basic procedures to help you get the
system up and running quickly.
The document set contains the following books and online resources:
ERX Installation and User Guide Provides the necessary procedures
for getting your system operational, including information on
installing, cabling, powering up, configuring your system for
management access, and general troubleshooting.
ERX System Basics Configuration Guide Describes planning and
configuring your network, managing the system, passwords, and
security, and configuring the system clock and virtual routers.
xix
xx
About This Guide
From the Documentation folder on the CD, open the CDtips.pdf file
for information on using Adobe Acrobat Reader.
xxi
xxii
About This Guide
This chapter describes planning steps that will make it easier to configure
the physical interfaces, logical interfaces, and routing protocols for the
ERX system in:
A new network that you are creating and implementing
An existing network that you are expanding
Topic
Page
Applications Overview
1-2
Layered Approach
1-4
1-5
Interfaces
1-6
1-8
1-9
Configuring IPSec
1-10
1-10
1-20
1-28
Configuring VRRP
1-29
1-30
QoS
1-30
Policy Management
1-31
1-31
1-2
CHAPTER 1
Planning Your Network
Applications Overview
The system can be used for a number of edge aggregation applications.
Two of the most common are:
Private line aggregation
xDSL session termination
Private Line Aggregation
A major application for the ERX edge router is for private line
aggregationthe consolidation of multiple high-speed access lines into
one access point. See Figure 1-1.
In this application, the service provider can use a single system to offer
high-speed access (FT1/FE1 through T3/E3) to thousands of subscribers.
The individual subscriber lines can be multiplexed into T3 lines by the
service provider and fed into the system. (The system can also accept
unchannelized T3 or E3 connections from high-speed users and
channelized E1 connections directly into the unit.) Once the traffic is
received, the system then handles all IP packet processing, including the
assignment of QoS and routing policies. The packets are then routed into
the backbone network.
Business Users
Edge
FT1/fE1
ERX System
ADM
T1/E1
SONET
Ring
nxT1
T3/E3
Tier 2/3
ISP
Network
Core
Gig Eth
ADM
DACS
ADM
T3/E3/E1
ATM/FR/PPP
Internet
OC3/STM1
POS/ATM Backbone
OC12/STM4
POS/ATM
Telco
Network
Service
Provider
Network
Applications Overview
ERX Edge Routers
The system supports a number of access and uplink methods; the most
common pairings are listed in Table 1-1.
Table 1-1 Common access/uplink pairings
Access
Uplink
PPP
Frame Relay
ATM
CLEC
ERX System
IP/PPP/ATM
ATM/FR
DS3 FR/ATM
OC3/STM1 ATM
IP/PPP/FR
OC3/STM1
ISP
OC12/STM4
POS/ATM
GE
DSLAM
IP/PPPoE/ATM
VPN
DHCP RADIUS
IP/PPPoE/FR
Access
Network
Provider
Service
Network
Provider
Internet
1-3
1-4
CHAPTER 1
Planning Your Network
Layered Approach
The ERX Configuration Guides use a bottom-up approach to describe
the configuration process. Figure 1-3 shows the relationship of layers,
protocols, and interfaces to the configuration process. Software functions
are layered on top of physical (copper or optical) interfaces. The system
supports a number of access protocols (PPP/POS, Frame Relay, ATM)
that allow service providers to offer a number of access methods and line
speeds to their subscribers. The system is optimized to handle IP
connections regardless of the access protocol used. The system also
supports a number of protocols that are specific to the B-RAS
application. These are shown in Figure 1-3, and include IP/PPP/ATM
and IP/PPP/Ethernet/ATM.
Routing
Protocols
BGP4
Layer 4
Transport Protocol
OSPF
TCP
Layer 3
Network Layer
Layer 2
Data Link Layer
Layer 1
Physical Layer
IS-IS
RIP
UDP
IP
Frame
Relay
DSx/Ex
FDS1/FE1
DS1/E1
DS3/E3
PPP
PPPoE
ATM
Ethernet
100 Base-T
Gigabit Ethernet
Ethernet
SONET
OC3/STM1
OC12/STM4
Layer 2 (data link) defines how the data is packaged and sent to an IP
data connection point in layer 3 (IP interfaces). In layer 3, you define the
global attributes for IP services that serve as a platform from which you
add routing information.
1-5
1-6
CHAPTER 1
Planning Your Network
Interfaces
The term interfaces is used in a very specific way in this documentation.
Interfaces are both physical and logical channels on the system that
define how data is transmitted to and received from lower layers in the
protocol stack. Conceptually, you configure an interface as part of the
physical layer, layer 1.
You configure the physical and logical characteristics of T3 and T1 lines
coming directly from your customers premises or from a central office
switch and OC3 lines going out to the core of your network
infrastructure. These physical and logical characteristics define an
interface.
Interface layering must always be configured in order from the lowest
layer to the highest layer. For example, if you have already configured IP
to run over ATM and you want to reconfigure the interface to run IP
over PPP over ATM, you must first remove the IP interface, apply PPP,
and then reapply IP.
Subinterfaces
Interfaces
ERX Edge Routers
interface Command
To configure, see
atm
slot/port[.subinterface]
ethernet
slot/port.subinterface
hssi
slot/port
loopback
loopback number
mlframe-relay
bundle-name [.subinterface ]
mlppp
bundle-name
pos
slot/port
1-7
1-8
CHAPTER 1
Planning Your Network
To configure, see
serial
tunnel
tunnel-type:tunnel-name
null
For detailed information about interface types and specifiers and for
specific syntax for the interface command, see the ERX Command
Reference Guide.
Configure the data link layer protocols, such as Frame Relay, PPP,
and ATM, that run over these physical interfaces.
10 Configure IP tunnels.
11 Configure IPSec.
12 Configure the routing protocols that will run on the system, such as
IP/Ethernet interfaces.
14 Configure QoS and policy management.
15 Configure the system for remote access.
16 Use the appropriate show commands to display network activity on
each of the interfaces that you have configured. Do this to verify that
they are operating as you expect and to help improve the
management of your network.
1-9
1-10
CHAPTER 1
Planning Your Network
Configuring IPSec
IPSec provides security to IP flows through the use of authentication and
encryption.
Authentication verifies that data is not altered during transmission and
ensures that users are communicating with the individual or
organization that they believe they are communicating with.
Encryption makes data confidential by making it unreadable to
everyone except the sender and intended recipient.
IPSec comprises two encapsulating protocols:
Encapsulating Security Payload (ESP) provides confidentiality and
authentication functions to every data packet.
Authentication Header (AH) provides authentication to every data
packet.
For information about configuring IPSec, see ERX Routing Protocols
Configuration Guide, Vol. 1, Chapter 10, Configuring IPSec.
CT3
Business
and
Consumer
Users
FT1
T1
T3
fE1
E1
DS3/E3
E1
Core
Edge
Service Provider Network
Figure 1-4 ERX system support for fractional T1/E1 through T3/E3 interfaces
As shown in Figure 1-4, the system can support fractional, full, and
channelized interfaces.
Note: See ERX Installation and User Guide, Chapter 3, Installing ERX Modules,
for a discussion of slot groups and the combination of line modules allowed in the
ERX system.
1-11
1-12
CHAPTER 1
Planning Your Network
There are three T3 controllers available on each CT3 line module and 12
T3 controllers available on each CT3 12-FO line module. When you
configure these T3 controllers, you are actually configuring T3 (DS3)
lines. Each T3 controller has, by definition, 28 T1 controllers
representing T1 (DS1) lines.
Use the T3 and T1 commands described in ERX Physical and Link
Layers Configuration Guide, Chapter 1, Configuring Channelized T3
Interfaces, to:
Specify the line characteristics, such as framing format and clock
source, for T3s and associated T1s.
Assign full and fractional T1 channels (DS0) to a virtual channel.
Figure 1-5 shows sample parameters for a CT3 interface configuration.
HDLC controller
Fractional T1 channels
Layer 1
Physical Layer
T1 controllers
T3 controllers
CT3
data inversion: no
MTU size: 1600 bytes
MRU size: 1600 bytes
loopback: none
fractional T1 (DS0) timeslots: 1, 3-8, 1
channel/subchannel: 2/1
line speed: 64kbps
framing: esf
linecode: B8ZS
clock source: line
slot/port on the ERX system chassis:
framing: c-bit
cable length: 220 feet
clock source: line
loopback: none
1-13
1-14
CHAPTER 1
Planning Your Network
Layer 1
Physical Layer
HDLC controller
T3 controller
T3
CRC: 32 bit
data inversion: yes
MTU size: 1600 bytes
MRU size: 1600 bytes
loopback: none
slot/port on the ERX system chassis: 0/1
framing: m23
cable length: 300 feet
ds-3 scramble: enabled
clock source: line
loopback: none
Layer 1
Physical Layer
HDLC controller
T1 controller
T1
CRC: 32 bit
data inversion: yes
MTU size: 1600 bytes
MRU size: 1600 bytes
loopback: none
slot/port on the ERX system chassis: 0/1
fractional T1 (DS0) timeslots: 1, 3-8, 10
framing: sf
line coding: ami
cable length: 200 feet
ds-3 scramble: enabled
clock source: line
loopback: none
trap link status: enabled
The system supports IP/ATM and IP/PPP over SONET on the OC3
(dual-port) and OCx/STMx interfaces. This interface support allows
service providers to accept incoming optical connections or connect the
system to the backbone network through optical connections. The
systems SONET implementation supports termination, statistic
gathering, and alarm surveillance at the section, line, and path layers of a
SONET interface.
1-15
1-16
CHAPTER 1
Planning Your Network
ERX System
Business
and
Consumer
Users
FT1
Uplink to Core
OCx/STMx
T1
E3
OC12/STM4
OC3/STM1
Edge
Core
Service Provider
Network
HDLC controller
Fractional T1 channels
T1 controllers
T3 controllers
Layer 1
Physical Layer
SONET path
controllers
SONET line/section
controllers
CRC: 16 bit
data inversion: no
MRU size: 1600 bytes
fractional T1 (DS0) timeslots: 1, 3-8, 10-12
channel/subchannel: 3/0
clock source: line
slot/port on the ERX system chassis: 3/0
clock source: line
framing: c-bit
loopback: none
SNMP trap link-status processing:disabled
path number 12
SNMP trap link-status processing:disabled
SNMP trap link-status processing:enabled
cOCx/STMx
1-17
1-18
CHAPTER 1
Planning Your Network
Layer 1
Physical Layer
DTE
CRC: 32 bit
MTU size: 1600 bytes
SNMP trap link-status processing: enabled
HSSI
Figure 1-10 Parameters for HSSI configuration
Layer 1
Physical Layer
DCE
X.21/V.35
Figure 1-11 Parameters for X.21/V.35 configuration
1-19
1-20
CHAPTER 1
Planning Your Network
You can configure both dynamic tunnels associated with L2TP and L2F
and static IP tunnels on your ERX system; however, you must first install
a TSM. Dynamic tunnels, which are not associated with a particular
interface, are described in ERX Broadband Access Configuration Guide,
Chapter 3, Configuring L2TP. Static tunnels, in which the tunnel is
assigned to a particular interface and specified in slot/port format, are
described in ERX Routing Protocols Configuration Guide, Vol. 1,
Chapter 4, Configuring IP Tunnels.
For information about managing these types of tunnels on the system, see
ERX Physical and Link Layers Configuration Guide, Chapter 9,
Managing Tunnel Service and IPSec Service Interfaces.
The system supports IP over Frame Relay PVCs on the CT3, CT1, CE1,
T3, and E3 modules. The interface presented to the incoming traffic is an
IP/Frame Relay router. In addition, IP/PPP/Frame Relay is supported on
the T3 and E3 modules. With this interface, the service provider can:
Receive traffic from subscribers that have CPE equipment, such as
routers with Frame Relay interfaces
Take in traffic from other network devices that use Frame Relay, such
as DSLAMs and Frame Relay switches
Use Frame Relay as an uplink technology on an unchannelized T3 or
E3 link
Figure 1-12 shows the structure of the system Frame Relay interface.
Each system Frame Relay major interface sits on top of an HDLC
interface. The Frame Relay implementation is divided into two levels: a
major interface and one or more subinterfaces. This division allows a
single physical interface to support multiple logical interfaces. Multiple IP
interfaces can also be assigned to each Frame Relay major interface
through the subinterfaces.
IP interface
Frame Relay
subinterface 1
IP interface
OSI interface
Frame Relay
subinterface 2
IP interface
Frame Relay
subinterface N
Frame Relay
Major Interface
Frame Relay layer
HDLC
Figure 1-13 shows the structure of the Frame Relay protocols with the
physical layer as the foundation. For Frame Relay, the physical layer can
be CE1, E3, CT1, T3, or a fractional service, as supported by the
different line module ports. The HDLC layer is on top of the physical
layer and can support flexible assignment of physical resources.
For example, an HDLC channel can support one DS0, fractional T1s, or
an entire T1. The major Frame Relay interface sits on top of the HDLC
1-21
1-22
CHAPTER 1
Planning Your Network
resource, and the subinterfaces sit on top of the major interface. The
Frame Relay subinterfaces connect to the IP interface layer.
IP
Frame Relay
LMI
HDLC
Physical (DSx/Ex)
Layer 2
Data Link Layer
PVCs
Frame Relay
DLCI Number: 17
IP address of interface: 192.30.10.2
encapsulation: frame relay
dce or dte: dte
link management type: Annex D
MTU size: 8188 bytes
LMI counters and timers:
accept ERX system defaults
Figure 1-14 Serial interface configuration parameters for a Frame Relay connection
Configuring IP/ATM
ERX System
IP/ATM
IP/PPP/ATM
DSLAM
ATM
Uplink to core
ATM
IP/PPP/ATM
Service Provider Network
IP/PPPoE/ATM
Figure 1-16 shows the structure of the ATM interface. For ATM, this can
be SONET, DS3, or E3 as supported by the different line modules. The
major ATM interface sits on top of the SONET/DS3/E3 resource, and
the subinterfaces sit on top of the major interface. The ATM
subinterfaces connect to the IP interface layer.
1-23
1-24
CHAPTER 1
Planning Your Network
IP interface
IP interface
IP interface
ATM
subinterface 1
ATM
subinterface 2
ATM
subinterface N
ATM
Major Interface
ATM Layer
SONET
DS3/E3
Figure 1-17 shows the structure of the ATM protocols. The physical layer
(SONET and/or DSx/Ex) is the foundation and provider of layer 1
framing service. The ATM layer is on top and provides cell, circuit, and
OAM services. The AAL5 layer provides a frame-oriented interface to
the ATM layer. The integrated local management interface (ILMI)
provides local management across the UNI.
IP
PPP
RFC1483 Data Service
LLC
I
L
M
I
AAL5
ATM
SONET
DSx/Ex
Layer 2
Data Link Layer
PVCs
ATM
encapsulation: aal5snap
Configuring IP/PPP
The system supports IP/PPP on the CT3, E1, and T3/E3 interfaces and
IP/PPP/SONET on the OC3/STM1 and OC12/STM4 interfaces. This
support allows service providers to accept traffic from subscribers who
have CPE equipment, such as routers with PPP interfaces, and to
transmit traffic in PPP format to other network devices.
Business Users
ERX System
IP/PPP
Uplink to core
IPP/PPP/SONET
IP/PPP
Figure 1-19 The ERX system supports IP/PPP connections from the CPE
1-25
1-26
CHAPTER 1
Planning Your Network
Figure 1-19 shows that the system supports the incoming IP/PPP traffic
from the CPE. This traffic can then be routed to the uplink(s) attached to
the system or to other CPEs that are attached to the system.
As shown in Figure 1-20, the PPP protocol can exist directly on top of the
HDLC layer or on top of a layer 2 Frame Relay or ATM interface. In
either case, IP rides on top of PPP, providing support for IP/PPP/ATM,
IP/PPP/HDLC, and IP/PPP/Frame Relay. Both SONET and DSx/Ex
interfaces are supported at the physical layer.
IP
PPP
ATM
Frame
Relay
HDLC
SONET
DSx/Ex
Layer 2
Data Link Layer
PPP
Configuring IP/HDLC
The ERX system supports IP over Cisco HDLC on many types of serial
interfaces. Cisco HDLC monitors line status on a serial interface by
exchanging keepalive request messages with peer network devices. It also
allows routers to discover IP addresses of neighbors by exchanging Serial
Link Address Resolution Protocol (SLARP) address request and address
response messages with peer network devices.
The system Cisco HDLC is compatible with Cisco Systems Cisco-HDLC
protocol, the default protocol for all Cisco serial interfaces.
The system supports the following framing features:
HDLC for data-link framing
18,000-byte information field size
IP
Cisco
HDLC
HDLC
ATM
SONET
HDLC
DSx/Ex
As shown in Figure 1-22, the Cisco HDLC protocol can exist directly on
top of the HDLC layer or ATM or SONET interface. Both SONET and
DSx/Ex interfaces are supported at the physical layer.
Configuring IP over Ethernet
1-27
1-28
CHAPTER 1
Planning Your Network
IP interface
192.5.127.8
Gigabit
Ethernet
T3 controllers
interface
4/1
CT3
Figure 1-23 Example of IP over Ethernet stacking configuration steps
Configuring VRRP
ERX Edge Routers
established LSP.
See ERX Routing Protocols Configuration Guide, Vol. 2,
Chapter 2, Configuring MPLS, for information about configuring
MPLS.
In addition, if you want to make configuration adjustments to IP, see
ERX Routing Protocols Configuration Guide, Vol. 1, Chapter 2,
Configuring IP, for details.
Configuring VRRP
The Virtual Router Redundancy Protocol (VRRP) can prevent loss of
network connectivity to end hosts if the static default IP gateway fails. By
implementing VRRP, you can designate a number of routers as backup
routers in the event that the default master router fails. You can
configure VRRP on IP/Ethernet interfaces.
For information on configuring VRRP, see ERX Routing Protocols
Configuration Guide, Vol. 1, Chapter 9, Configuring VRRP.
1-29
1-30
CHAPTER 1
Planning Your Network
QoS
QoS is a suite of features that configure queuing and scheduling on the
forwarding path of your ERX system. QoS provides a level of
predictability and control beyond the current best-effort service. Your
ERX system provides best-effort data delivery by default. Packets not
assigned to a specific traffic class are carried in the best-effort traffic class.
Best-effort service provides packet transmission with no guarantee of
results.
The major QoS features that the ERX system provides are:
Multiple traffic classes
Configurable scheduling
Configurable buffer management
For information on configuring QoS, see ERX Policy Management and
QoS Configuration Guide, Chapter 2, Configuring Quality of Service.
Policy Management
ERX Edge Routers
Policy Management
Policy management allows network service providers to implement packet
forwarding and routing specifically tailored to their customers
requirements. Using policy management, customers can implement
policies that selectively cause packets to take different paths. Policy
management provides several types of services:
Policy routing Predefines packet flow to a destination port or IP
address
QoS classification and marking Marks packets of a packet flow.
Packet forwarding Allows forwarding of a packet flow.
Packet filtering Drops packets of a packet flow.
Packet logging Logs packets of a packet flow.
Rate limiting Enforces line rates below the physical line rate of the
port and sets limits on packet flows.
RADIUS policy support Allows you to attached a preconfigured
policy to an interface through RADIUS.
See ERX Policy Management and QoS Configuration Guide, Chapter 1,
Configuring Policy Management, for details about configuring policy
management.
1-31
1-32
CHAPTER 1
Planning Your Network
Command Line
Interface
Page
Overview
2-1
2-21
Using Help
2-22
2-26
2-29
Overview
Managing your system using the CLI gives you access to thousands of
commands. The systems CLI uses an industry de facto standard look and
feel, which may be familiar to you. If you are new to this CLI, it is helpful
to read this entire chapter, where you can learn about CLI shortcuts and
other helpful information.
Command Modes
Command modes set a context for the CLI. Each command in the CLI is
available from one or more command modes. From some command
modes you can only view router information; from others you can
perform configuration tasks. For example, you can access User Exec
mode to display information and then access Global Configuration mode
to set parameters or enable a particular feature. By recognizing the
command line prompt, you can identify where you are in the CLI at any
2-2
CHAPTER 2
Command Line Interface
given point. When you can easily identify where you are, it is easy to get
to where you want to be.
Start
(User-established connection)
View
User EXEC
Mode
Privileged
EXEC Mode
Controller
Configuration
Line
Configuration
Route Map
Configuration
Router
Configuration
Global
Configuration
VRF
Configuration
Policy
Configuration
Interface
Configuration
Subinterface
Configuration
Configuration Modes
Figure 2-1 Command mode architecture
Overview
ERX Edge Routers
Figure 2-1 illustrates the command mode architecture. Only some of the
many Global Configuration modes are shown.
Command modes are discussed in greater detail in the section Accessing
Command Modes. See the ERX Command Reference Guide to find a
commands related command mode.
Command Line Prompts
Within the CLI, the command line prompt identifies both the hostname
and the command mode. The hostname is the name of your system; the
command mode indicates your location within the CLI system.
For example:
hostname
command mode
RX-01-01-01(config-router)#
You can abbreviate keywords; however, you must enter enough initial
characters to unambiguously identify the command. For example, if the
keyword you want to specify is map-class and you enter only map-, an
2-3
2-4
CHAPTER 2
Command Line Interface
error appears. The error indicates that one or more possible keywords
begin with map-, thus making your entry ambiguous.
Parameters
ROUTER[:VRF]
charlie:1234
INTERFACE
3/2:20/15
WORD
windtunnel
<04294967295>
5600
A.B.C.D
192.56.32.2
command
keyword
parameter
host1(config)#hostn unispshere
When you enter this command, the new hostname appears in the
prompt.
unisphere(config)#
new command line prompt
Overview
ERX Edge Routers
Note: You can find detailed information about command syntax, with parameter
values defined, in the ERX Command Reference Guide.
Remember, you can abbreviate keywords to save time if you enter at least
enough leading characters to uniquely identify the desired keyword. For
example:
host1(config-if)#ip re
2-5
2-6
CHAPTER 2
Command Line Interface
The ? Key
Use the ? key at any time to see all the choices you can enter next. For
example:
host1(config)#router ?
bgpConfigure the Border-Gateway Protocol (BGP)
isisConfigure ISO IS-IS
ospfConfigure the Open Shortest Path First protocol (OSPF)
ripConfigure the Routing Information Protocol
host1(config)#router
When you enter the ? character, all available choices are displayed. The
system again displays the command you typed. You then only have to
type in the choice you want and press the <Enter> key.
A <cr> in the list of choices means that you can press the <Enter> key to
execute the command. For example:
host1(config-if)#isis metric 40 level-2 ?
<cr>
host1(config-if)#isis metric 40 level-2
Note: If the list of options extends beyond one screen, the last line on your screen
displays the --More-- prompt.
Note: If you want to use the ? character as part of a string, such as a hostname or
a regular expression, you must enter the following key sequence: <Ctrl+V+?>.
Otherwise, the CLI considers the ? to be a request for assistance in completing the
command.
<Backspace> or <Delete>
Use either key to delete the character immediately preceding the cursor.
<Enter>
Use this key to complete the current keyword. For example, if you entered
a portion of a lengthy command, such as
host1(config)#class
and press the <Tab> key, the full name of the command appears:
host1(config)#classifier-list
Overview
ERX Edge Routers
Arrow Keys
Some terminals have arrow (or cursor) keys on their keyboards. These
arrow keys are very useful; however, to use them you must have an
ANSI/VT100 emulating terminal.
The <Up Arrow> and <Down Arrow> keys display command history.
The <Up Arrow> key displays the previous command; you can also use
<Ctrl +P>. The <Down Arrow> key displays the next command; you can
also use <Ctrl+N>.
The <Left Arrow> and <Right Arrow> keys allow the user to move the
cursor back and forth in the command line.
The no Version
2-7
2-8
CHAPTER 2
Command Line Interface
You can run User Exec mode commands while in any Configuration
mode by preceding the command with the keyword run. For example:
host1(config)run show users
By using the run command in this way, you can obtain show command
information without leaving Configuration mode.
The only commands that cannot be preceded by run are the config
command and those commands that are already available in all modes,
such as sleep or exit.
Example 1
Overview
ERX Edge Routers
!
route-map adsf permit 10
router dvmrp
!
router igmp
!
snmp-server community private view everything rw
snmp-server contact Mary
snmp-server
!
! End of generated configuration script.
host 1(config)#int fa 0/0
Example 2
host1(config-if)#run dir
Please wait...
unshared
in
file
size
size
date (UTC)
use
------------------
---
--------
--------
-------------------
reboot.hty
31040
31040
10/30/2001 15:31:10
system.log
20481
20481
10/26/2001 17:24:16
8578
8578
soft_clear_in.mac
10/24/2001 14:39:02
erx_3-3-1.rel
71082105
71082105
10/25/2001 13:02:50
erx_3-3-1.rel
70502991
70502991
10/24/2001 19:58:08
autocfg.scr
355
355
09/28/2001 13:33:04
show Commands
You have access to a variety of show commands that display system and
protocol information. You can filter the output of a show command by
specifying | (the UNIX pipe symbol), one of the following keywords, and
either a case-sensitive text string or a regular expression.
begin displays output beginning with the first line that contains the
text string or regular expression
include displays output lines that contain the text string or regular
expression and excludes lines that do not contain the text string or
regular expression
exclude displays output lines that do not contain the text string or
regular expression and excludes lines that do contain the text string or
regular expression
2-9
2-10
CHAPTER 2
Command Line Interface
Example 1
In the following example, the output display starts with the first line that
contains the string inter. The system omits all the preceding lines of the
output from the display because none of them contains the string inter.
host1#show config include-defaults | begin inter
Please wait...log verbosity low internalNetwork
log verbosity low ipEngine
log verbosity low ipProfileMgr
log verbosity low ipProfileMgrEngineering
no log engineering
log fields timestamp instance no-calling-task
!
timing select primary
timing source primary internal
timing source secondary internal
timing source tertiary internal
!
no disable-autosync
no disable-switch-on-error
no redundancy lockout 0
!
virtual-router default
ip domain-lookup
ip name-server 10.2.0.3
ip domain-name 789df
!
host f 10.10.133.11 ftp anonymous null
interface null 0
interface ip 0/0
arp timeout 21600
!
interface ip 2/0
arp timeout 21600
!
interface ip s10
arp timeout 21600
!
interface atm 2/0
no shutdown
Overview
ERX Edge Routers
Example 2
In the following example, the output display consists only of lines that
contain the string ip. The system omits all other lines of the output from
the display because none of them contains the string ip.
host1#show config include-defaults | include ip
! Configuration script generated on WED JUN 06 2001 02:17:00
UTC
strip-domain disable
Please wait...log verbosity low ipEngine
2-11
2-12
CHAPTER 2
Command Line Interface
Overview
ERX Edge Routers
Example 3
In the following example, the output display consists only of lines that do
not contain the string !. The system omits all other lines of the output
from the display because each line contains the string !.
host1#show config include-defaults | exclude !
boot config running-configuration
boot system 3-3-1.rel
no boot backup
no boot subsystem
no boot backup subsystem
boot revert-tolerance 3 1800
no boot force-backup
no boot slot
aaa domain-map jacksonville
virtual-router miami
strip-domain disable
aaa domain-map jak
virtual-router default
strip-domain disable
aaa domain-map northeast
virtual-router default
strip-domain disable
aaa delimiter realmName "/"
hostname host1
no aaa new-model
no service ctrl-x-reboot
no service password-encryption
no baseline show-delta-counts
clock timezone UTC 0 0
no exception dump
exception protocol ftp anonymous null
controller sonet 2/0
sdh
loopback network
clock source line
no shutdown
path 0 overhead j1 msg hello
path 0 overhead j1 exp-msg
ftp-server enable
no login
log engineering
log verbosity low
no log severity
log verbosity low NameResolverLog
log verbosity low aaaAtm1483Cfg
log verbosity low atm1483
2-13
2-14
CHAPTER 2
Command Line Interface
Use
>
>>
Appends output to the end of the specified file, creating the file
if it does not exist.
&>
&>>
Appends output to the end of the specified file and displays the
output to the screen. The redirection is synchronized with the
screen display; for example, if a --More-- prompt appears, the
redirection halts until you take further action.
For example, you can redirect the output of the show config command
to a script file and later run that script:
host1#show config > showconfig.scr
Overview
ERX Edge Routers
You can use redirection with output filtering. The general syntax is:
show options [ { > | >> | &> | &>> } filename ]
[ | { begin | include | exclude } filterstring ]
The filtering is performed before redirection. In the following example,
the cnfgfltr.txt file will contain the output of show config
include-defaults beginning with the first occurrence of the string inter.
host1#show config include-defaults &> cnfgfltr.txt | begin inter
(minus)
displays all output lines that do not contain the text string
/ (forward slash)
Initial spaces are not ignored when you filter at the -More- prompt.
Example 1
In the following example, the output is displayed until the screen is filled
and the -More- prompt appears. By entering the filter /interf, the user
forces the system to filter out all output lines until the first occurrence of
the string interf. The system displays that line and all following lines of
the output.
host1#show config include-defaults
! Juniper Networks Edge Routing Switch ERX-700
! Version: 3.3.1 (Nov 16, 2001
12:07)
All rights
2-15
2-16
CHAPTER 2
Command Line Interface
Example 2
In the following example, the output is displayed until the screen is filled
and the -More- prompt appears. By entering the filter +ip, the user
forces the system to filter out all lines from the remainder of the output
Overview
ERX Edge Routers
that do not contain the string ip. The system displays only lines that
contain the string ip.
host1#show config include-defaults
! Juniper Networks Edge Routing Switch ERX-700
! Version: 3.3.1 (Nov 16, 2001
12:07)
All rights
!
! Configuration script generated on THU JUN 07 2001 04:43:26
UTC
boot config running-configuration
boot system 3-3.1.rel
no boot backup
no boot subsystem
no boot backup subsystem
boot revert-tolerance 3 1800
no boot force-backup
no boot slot
!
aaa domain-map jacksonville
virtual-router miami
strip-domain disable
!
aaa domain-map jak
virtual-router default
strip-domain disable
!
aaa domain-map northeast
virtual-router default
--More-+ip
(Displaying only lines that include 'ip', press ^C to
end...)
strip-domain disable
log verbosity low ipEngine
log verbosity low ipEngineering
log verbosity low ipGeneral
log verbosity low ipInterface
log verbosity low ipNhopTrackerEngineering
log verbosity low ipNhopTrackerGeneral
log verbosity low ipProfileMgr
log verbosity low ipProfileMgrEngineering
log verbosity low ipRoutePolicy
log verbosity low ipRoute
log verbosity low ipTraffic
log verbosity low ipTunnel
2-17
2-18
CHAPTER 2
Command Line Interface
Example 3
In the following example, the output is displayed until the screen is filled
and the -More- prompt appears. By entering the filter -!, the user forces
the system to filter out all comments from the remainder of the output;
that is, output lines that contain the string !. The system displays only
lines that do not contain the string !.
host1#show config include-defaults
! Juniper Networks Edge Routing Switch ERX-700
! Version: 3.3.1 (Nov 16, 2001
12:07)
All rights
!
! Configuration script generated on THU JUN 07 2001 04:46:00
UTC
boot config running-configuration
boot system 3-3.1.rel
no boot backup
no boot subsystem
no boot backup subsystem
boot revert-tolerance 3 1800
no boot force-backup
no boot slot
!
aaa domain-map jacksonville
virtual-router miami
strip-domain disable
!
aaa domain-map jak
virtual-router default
strip-domain disable
!
aaa domain-map northeast
virtual-router default
--More--
Overview
ERX Edge Routers
-!
(Displaying only lines that exclude '!'. press ^C to end...)
strip-domain disable
aaa delimiter realmName "/"
hostname host1
no aaa new-model
no service ctrl-x-reboot
no service password-encryption
no baseline show-delta-counts
clock timezone UTC 0 0
no exception dump
exception protocol ftp anonymous null
line vty 4
exec-timeout 0 0
exec-banner
motd-banner
timeout login response 30
data-character-bits 8
no login
log engineering
log verbosity low
no log severity
log verbosity low NameResolverLog
log verbosity low aaaAtm1483Cfg
log verbosity low aaaEngineGeneral
log verbosity low aaaServerGeneral
log verbosity low aaaUserAccess
log verbosity low addressServerGeneral
log verbosity low atm
log verbosity low atm1483
log verbosity low atmAal5
log verbosity low bgpConnections
log verbosity low bgpDampening
log verbosity low bgpEng1
--More--
Responding to Prompts
For some actions, the system prompts you for a response. The acceptable
default responses are the following:
You can press <y> or <Enter> to agree with the prompt and continue.
You can press any other key to disagree with the prompt and cancel
the action.
You can use the confirmations explicit command to require a more
explicit response to CLI prompts.
2-19
2-20
CHAPTER 2
Command Line Interface
confirmations explicit
To agree with the prompt and continue, you must type y and press <Enter>,
type ye and press <Enter>, or type yes and press <Enter>.
To disagree with the prompt and cancel the action, you must type n and
press <Enter> or type no and press <Enter>.
Use the no version to restore the default state, where pressing <y> or <Enter>
alone will respond in the affirmative, and any other entry is accepted as a
negative response.
Note: The systems CLI supports a powerful command line editor, enabling you to
easily correct, edit, and recall previously entered commands. See the section Using
Command Line Editing in this chapter.
Note: For a description of the commands that you use to get around the CLI, see
Chapter 4, Managing the System.
Levels of Access
User level allows you only to view a routers status. This level restricts you
to User Exec mode.
Privileged Level
To access the system via a local console, attach a terminal to the system
console port. To access the system via Telnet, Telnet client software must
be installed on your host system. To access the system via SSH, SSH
version 2.0 client software must be installed on your host system.
You can configure Telnet to validate login requests. See Vty Line
Authentication in Chapter 6, Passwords and Security, for more
information. Once Telnet is running on your host system, type in the
ERX systems name or its IP address and press <Enter>. To use a name,
your network must have a name server.
For example, for Microsoft Windows 95/Windows NT enter:
telnet 192.168.1.13
or
telnet westford2
You are connected to your ERX system when the following prompt
appears:
Logging in.
host1>
Note: At this point, you have access only to User Exec commands.
2-21
2-22
CHAPTER 2
Command Line Interface
Note: You will be prompted for a password only if your system has been
configured with one. Refer to the enable secret and enable password Global
Configuration commands described in Chapter 6, Passwords and Security.
You can tell that you have access to Privileged Exec mode when the
command prompt changes from a > character to a # character.
Exiting Modes
You can exit from any command mode at any time by entering the exit
command.
host1#exit
host1>
Using Help
The system CLI provides a variety of useful context-sensitive help
features. An important thing to remember about using the help features is
that the use of a space or the lack of a space before the ? gives different
results. Table 2-1 describes the help system.
Table 2-1 Help commands
Command
Description
help
partial-keyword?
partial-keyword<Tab>
command<Space>?
Commands listed in the left column of Table 2-1 are further described
with examples in the following sections.
Using Help
ERX Edge Routers
You can use the question mark (?) key whenever you need additional
information. When you enter ?, all available choices are displayed. The
CLI then redisplays the command you typed. The following examples
show different ways you can use the ?.
When you use ? on a line by itself or when it is preceded by one or more
spaces, a list of all next available choices is displayed.
Example 1
host1(config)#?
aaa
access-list
arp
bandwidth
banner
baseline
boot
bulkstats
cbf
classifier-list
clns
clock
confirmations
controller
crypto
default
disable-autosync
disable-switch-on-error
enable
end
exception
exclude-subsystem
exit
ftp-server
help
host
hostname
interface
ip
Configure IP characteristics
l2f
l2tp
license
Configure licenses
2-23
2-24
CHAPTER 2
Command Line Interface
line
log
macro
map-list
memory
mpls
no
ntp
policy-list
pppoe
Configure PPPoE
profile
Specify a profile
radius
rate-limit-profile
redundancy
route-map
router
rtr
run
service
set
Configure
sleep
slot
snmp-server
sscc
telnet
timing
traffic-shape-profile
virtual-router
host1(config)#
Example 2
host1(config)#ip ?
address-pool
as-path
bgp-community
community-list
debounce-time
dhcp-local
dhcp-server
domain-lookup
domain-name
dvmrp
Using Help
ERX Edge Routers
dynamic-interface-prefix
explicit-path
extcommunity-list
ftp
http
interfaces
local
multicast-routing
name-server
pim
prefix-list
prefix-tree
route
router-id
rpf-route
source-route
ssh
ttl
tunnel
vpn-id
vrf
Specify a VRF
host1(config)#ip
Example 3
host1(config)#ip community-list ?
<1 - 99>
host1(config)#ip community-list
When you want to see a list of commands that begin with a particular set
of characters, type a question mark ? immediately after the last letter. Do
not use a space between the partial keyword and the ?. For example:
host1#sh?
show shutdown
host1#sh
Note: If you want to use the ? character as part of a string, such as a hostname or
a regular expression, you must enter the following key sequence: <Ctrl+V+?>.
Otherwise, the CLI considers the ? to be a request for assistance in completing the
command.
2-25
2-26
CHAPTER 2
Command Line Interface
help Command
Use the help command when you want to see a brief description of the
context-sensitive help system.
host1>help
Use the help options as follows:
?, or command<Space>? - Lists the set of all valid next keywords or arguments
partial-keyword?
partial-keyword<Tab>
string
host1>
Partial-keyword <Tab>
You can use several keys to edit the command line. Table 2-2 defines the
keys for editing the command line.
Table 2-2 Command line editing keys
Key(s)
Function
Delete or Backspace
Left
Arrowa
Right Arrowa
Ctrl+A
Ctrl+B
Ctrl+D
Ctrl+E
Ctrl+F
Ctrl+H
Ctrl+K
Ctrl+L
Ctrl+O
Ctrl+T
Ctrl+U
Ctrl+V
Ctrl+W
Ctrl+X
Ctrl+Y
Ctrl+Z
Esc+B
Esc+Backspace
Esc+D
2-27
2-28
CHAPTER 2
Command Line Interface
The CLI maintains two separate command histories. The first command
history maintains only User Exec and Privileged Exec mode commands.
The second history maintains all commands entered in any of the
configuration modes. The appropriate history will automatically be
restored as you transition between Global Configuration mode and
Privileged Exec mode.
Table 2-3 defines the keys related to command history.
Table 2-3 Command history keys
Key
Function
Up Arrowa or Ctrl+P
Down Arrowa or
Ctrl+N
Ctrl+R
Pagination Keys
If the system needs to display more text than you can fit on the screen, the
output pauses and the -More- prompt appears. Table 2-4 defines the
pagination keys that you can use when the -More- prompt appears. See
The - - More - - Prompt section earlier in this chapter for more
information.
Table 2-4 Pagination keys
Key
Function
Enter
Space bar
Displays all output lines that do not contain the text string
Displays all output lines starting at the first line that contains the
text string
Address Family
Configuration
Prompt:
Configure BGP
address family
parameters.
host1(config-router-af)#
Controller
Configuration
Configure physical
interfaces (for
example, T3).
Prompt:
host1(config-controll)#
DHCP Pool
Configuration
host1(config-dhcp-local)#
Domain Map
Configuration
Configure domain
maps.
Prompt:
host1(config-domain-map-tunnel)#
Prompt:
host1(config-domain-map)#
Domain Map
Tunnel
Configuration
Explicit Path
Configuration
Configure tunnel
parameters.
Configure MPLS
explicit path
parameters.
Prompt:
host1(config-expl-path)#
Global
Configuration
Enable a feature or
function.
Disable a feature or
function.
Prompt:
Configure a feature or
function.
host1(config)#
2-29
2-30
CHAPTER 2
Command Line Interface
Interface
Configuration
Create an interface.
Prompt:
IPSec Manual
Key
Configuration
host1(config-if)#
Prompt:
host1(config-manual-key)#
ISAKMP Policy
Configuration
Define an
ISAKMP/IKE policy.
Prompt:
host1(config-isakmp-policy)#
L2TP
Destination
Profile
Configuration
Prompt:
host1(config-l2tp-dest-profile)#
L2TP
Destination
Profile Host
Configuration
Prompt:
host1(config-l2tp-dest-profile-host)#
LDP
Configuration
Prompt:
host1(config-ldp)#
Line
Configuration
Modify a virtual
terminal line.
Prompt:
host1(config-line)#
Map Class
Configuration
Specify fragmentation
for a map class.
Prompt:
host1(config-map-class)#
Map List
Configuration
Prompt:
host1(config-maplist)#
Prompt:
host1(config-policy)#
host1#
Prompt:
host1(config-profile)#
Prompt:
host1(config-qos-profile)#
Prompt:
host1(config-queue)#
Prompt:
host1(config-radius)#
Prompt:
Policy
Configuration
Configure a policy.
Privileged Exec
Show system
information.
Set operating
parameters.
Prompt:
Profile
Configuration
QoS Profile
Configuration
Queue
Configuration
RADIUS
Configuration
Rate Limit
Profile
Configuration
Access Global
Configuration mode.
Configure profiles.
Configure QoS
profiles.
Configure queue
profiles.
Configure Broadband
Remote Access
Server (B-RAS)
parameters.
Configure rate limit
parameters.
host1(config-rate-limit-profile)#
2-31
2-32
CHAPTER 2
Command Line Interface
Remote
Neighbor
Configuration
Configure remote
neighbor parameters
for OSPF, PIM, or RIP.
Prompt:
Configure routing
From Global Configuration mode,
tables and source and
use the route-map command.
destination
Prompt:
information.
host1(config-route-map)#
Configure a routing
protocol.
host1(config-router-rn)#
Route Map
Configuration
Router
Configuration
Prompt:
host1(config-router)#
RSVP
Configuration
Configure an RSVP
profile.
Prompt:
host1(config-rtr)#
Prompt:
host1(config-rsvp)#
RTR
Configuration
Scheduler
Profile
Configuration
Configure RTR
parameters.
Configure shaping
parameters.
Configure scheduler
profile.
Prompt:
host1(config-scheduler-profile)#
Subinterface
Configuration
Configure multiple
virtual interfaces on a
single physical
interface.
Prompt:
host1(config-subif)#
Traffic Class
Configuration
Configure a traffic
class.
Prompt:
host1(config-traffic-class)#
Traffic Class
Group
Configuration
Prompt:
Configure a traffic
class group.
host1(config-traffic-class-group)
Tunnel Profile
Configuration
Configure tunnel
profile parameters.
Prompt:
host1(config-vrf)#
Prompt:
host1(config-tunnelprofile)#
VRF
Configuration
User Exec
Configure VRF
parameters for
BGP/MPLS VPNs.
Change terminal
settings on a
temporary basis.
Show system
information.
Access Privileged
Exec mode.
Prompt:
host1>
Note: Within any configuration mode, the commands that are available to the user
include the commands defined for that configuration mode and all commands
defined for Global Configuration mode. See Figure 2-1. For example, from Router
Configuration mode, you could use the interface Global Configuration mode
command without first explicitly going back to Global Configuration mode.
host1(router-config)# interface atm 4/0.3
host1(config-if)#
After you log in to the system, the CLI is in User Exec mode. The
commands you can execute from User Exec mode provide only user-level
access. The User Exec commands allow you to perform such functions as:
Change terminal settings on a temporary basis.
Perform ping and trace commands.
Display system information.
host1>?
baseline
clear
2-33
2-34
CHAPTER 2
Command Line Interface
default
dir
disable
enable
erase
exit
help
ip
log
macro
mpls
mtrace
no
ping
show
sleep
terminal
traceroute
host1>
clear
Clear a state
clock
configure
copy
Copy files
debug
default
delete
dir
disable
disconnect
enable
exit
halt
help
ip
log
logout
Logout Subscribers
macro
mpls
mtrace
no
ping
pppoe
redundancy
reload
rename
send
show
sleep
srp
synchronize
telnet
terminal
test
Test a feature
traceroute
undebug
virtual-router
write
host1#
Password Protection
2-35
2-36
CHAPTER 2
Command Line Interface
Note: The > character in the command line prompt changes to the # character.
From Privileged Exec mode, type configure and the filename you
want to execute, and press <Enter>.
host1#configure file
File name:/myFile.scr
Proceed with configure? [confirm]
Note: The filename must end with an .scr extension, and the file must contain a
series of valid CLI commands. The file can be a local file on the router or a remote
file on a host system.
Press <y> or <Enter> to confirm; pressing any other key aborts the
procedure.
host1#
From this mode, you can configure address family parameters for BGP
VPN services.
From Global Configuration mode, type the router bgp command to
enter Router Configuration mode. Type either the address-family ipv4
or address-family vpnv4 command, and then press <Enter>.
host1(config)#router bgp 100
host1(config-router)#address-family ?
ipv4
vpnv4
host1(config-router)#address-family
e3
Configure a E3 controller
sonet
t1
t3
Configure a T3 controller
host1(config)#controller
In this mode, you can configure DHCP local pools. For example, you can
specify a DNS or Net-Bios server.
From Global Configuration mode, type the command ip dhcp-local
pool and a poolName, and then press <Enter>.
host1(config)#ip dhcp-local pool charlie
host1(config-dhcp-local)#?
default
default-router
dns-server
domain-name
2-37
2-38
CHAPTER 2
Command Line Interface
exit
help
lease
link
log
macro
netbios-name-server
netbios-node-type
network
no
reserve
run
server-address
sleep
host1(config-dhcp-local)#
In this mode, you can map a user domain name to a virtual router and
loopback interface.
From Global Configuration mode, type the aaa domain-map command
and the domain name value as found in the clients login name. Then
press <Enter>.
host1(config)#aaa domain-map charlie76
host1(config-domain-map)#?
atm
default
exit
help
ip-hint
log
loopback
macro
override-user
sleep
strip-domain
tunnel
virtual-router
host1(config-domain-map)#
In this mode, you can configure tunnel parameters such as the tunnels
endpoint.
From Domain-Map Configuration mode, type tunnel and a
tunnelNumber, and press <Enter>.
host1(config-domain-map)#tunnel 17
host1(config-domain-map-tunnel)#?
address
exit
help
hostname
identification
log
macro
medium
no
password
preference
server-name
sleep
source-address
type
host1(config-domain-map-tunnel)#
From this mode, you can name and configure an explicit path within
MPLS.
From Global Configuration mode, type mpls explicit-path name and
the explicitPathName, and press <Enter>.
host1(config)#mpls explicit-path name xyz
host1(config-expl-path)#?
append-after
default
exit
help
index
list
log
macro
next-address
no
2-39
2-40
CHAPTER 2
Command Line Interface
sleep
host1(config-expl-path)#
ATM interface
fastEthernet
gigabitEthernet
hssi
ip
Ip shared interface
loopback
Loopback interface
mlframe-relay
mlppp
null
Null interface
pos
serial
Serial interface
sonet
SONET interface
tunnel
Tunnel interface
host1(config)#interface
In this mode, you can enter the manual key that a peer uses for
authentication during the tunnel establishment phase.
From the Global Configuration mode, type ipsec key manual
pre-share and the peerIPaddress, and press <Enter>.
host1(config)#ipsec key manual pre-share 10.10.1.1
host1(config-manual-key)#?
default
exit
help
key
log
macro
no
run
sleep
authentication
default
encryption
exit
group
hash
help
lifetime
log
macro
no
run
sleep
host1(config-isakmp-policy)#
2-41
2-42
CHAPTER 2
Command Line Interface
In this mode, you can create the destination profile that defines the
location of an L2TP Access Concentrator (LAC) and define the attributes
used when an L2TP Network Server (LNS) communicates with an LAC.
The destination is necessary to enable an LAC to connect to the LNS.
From Global Configuration mode, type l2tp destination profile, the
profileName, an ipAddress, and press <Enter>.
host1(config)#l2tp destination profile augusta ip address 123.45.76.16
host1(config-l2tp-dest-profile)#?
default
exit
help
log
macro
no
remote
sleep
host1(config-l2tp-dest-profile)#
In this mode, you can set and modify L2TP host profile attributes, such
as the proxy Link Control Protocol (LCP), the local hostname, the local
IP address, or the interface profile.
From Global Configuration mode, enter L2TP Destination Profile mode
(see above), and type remote host and a hostName, and press <Enter>.
host1(config-l2tp-dest-profile)#remote host george
host1(config-l2tp-dest-profile-host)#?
default
disable
enable
exit
help
local
log
macro
no
profile
sleep
tunnel
host1(config-l2tp-dest-profile-host)
In this mode, you can create and configure MPLS Label Distribution
Protocol (LDP) profile parameters.
From Global Configuation mode, type mpls ldp profile and the
profileName, and press <Enter>.
host1(config)#mpls ldp profile shell
host1(config-ldp)#?
cr-ldp
hello
help
log
macro
no
sleep
host1(config-ldp)#
In this mode, you can modify the operation of a virtual terminal (vty) line.
From Global Configuration mode, type the line vty command and
either the lineNumber or the rangeOfLineNumbers you want to
configure, and press <Enter>.
Note: The system defaults to 5 vty lines at factory default. You can increase the
number of vty lines available by typing the start number and end number of the vty
line range. Once you execute the line vty command, you will have access to line
numbers up to the ending line number.
host1(config)#line vty 0 19
host1(config-line)#?
data-character-bitsSet the number of bits per character used by the
display
default
dsr-detect
exec-banner
help
log
login
macro
motd-banner
no
2-43
2-44
CHAPTER 2
Command Line Interface
password
sleep
speed
timeout
host1(config-line)#
exit
frame-relay
help
log
macro
no
run
sleep
host1(config-map-class)#
In this mode, you can configure map list parameters. In Map List
Configuration mode, commands such as map-list and ip atm-vc are
used to configure ATM NBMA interfaces.
From Global Configuration mode, type map-list and a mapListName,
and press <Enter>.
host1(config)#map-list mjt3330
host1(config-map-list)#?
default
exit
help
ip
log
macro
no
sleep
host1(config-map-list)#
In this mode, you can configure a policy, or set of rules, that you can
attach to an interface. You can modify a policy and update it wherever
the policy is used on the configuration.
From Global Configuration mode, type policy-list and press <Enter>.
host1(config)#policy-list tswells923
host1(config-policy)#?
color
default
exit
filter
forward
help
log
macro
mark
next-hop
next-interface
no
rate-limit-profile
sleep
suspend
traffic-shape-profile
host1(config-policy)#
exit
help
2-45
2-46
CHAPTER 2
Command Line Interface
ip
Configure IP characteristics
log
macro
no
ppp
pppoe
sleep
host1(config-profile)#
In this mode, you can specify queue profiles and scheduler profiles in
combination with interface types.
From Global Configuration mode, type the qos-profile command
followed by a QosProfileName, and press <Enter>.
host1(config)#qos-profile testabc
host1(config-qos-profile)#?
atm
ATM interface
atm-vc
cbf
Cbf interface
default
ethernet
Ethernet interface
exit
fr-vc
help
ip
IP interface
ip-tunnel
IP tunnel interface
l2tp-tunnel
log
macro
no
run
serial
Serial interface
server-port
sleep
vlan
Ethernet subinterface
host1(config-qos-profile)#
In this mode, you can configure queue profiles and various queue profile
parameters, such as constraints on queue lengths or queue buffer weights.
From Global Configuration mode, type the queue-profile command
followed by a queueProfileName, and press <Enter>.
host1(config)#queue-profile testabcd1234
host1(config-queue)#?
buffer-weight
committed-length
conformed-fraction
conformed-length
queues
traffic
default
exceeded-fraction
exceeded-length
exit
help
log
traffic
macro
no
run
sleep
host1(config-queue)#
default
exit
help
key
log
macro
max-sessions
2-47
2-48
CHAPTER 2
Command Line Interface
no
retransmit
run
sleep
timeout
udp-port
host1(config-radius)#
In this mode, you can set parameters for a rate limit profile, which is a set
of bandwidth attributes and associated actions that become part of a
policy list. The policy list is then applied to the ingress or egress of an
interface.
From Global Configuration mode, type rate-limit-profile and a
profileName, and press <Enter>.
host1(config)#rate-limit-profile fm78930
host1(config-rate-limit-profile)#?
committed-action
committed-burst
committed-rate
conformed-action
default
exceeded-action
exit
help
log
macro
mask-val
no
peak-burst
peak-rate
sleep
host1(config-rate-limit-profile)#
In this mode, you can configure remote neighbor parameters for Routing
Information Protocol (RIP), Protocol Independent Multicast (PIM), and
Open Shortest Path First (OSPF).
From Global Configuration mode, type either router rip, router pim,
or router ospf and the processID. Press <Enter>. You are now in Router
Configuration mode.
From Router Configuration mode, type the remote-neighbor
command and the appropriate attributes, and press <Enter>.
host1(config-router)#remote-neighbor 10.13.5.61 area 34534
host1(config-router-rn)#?
authentication
authentication-key
authentication-none
cost
dead-interval
default
exit
hello-interval
help
log
macro
message-digest-key
no
retransmit-interval
run
sleep
transmit-delay
ttl
update-source
host1(config-router-rn)#
2-49
2-50
CHAPTER 2
Command Line Interface
exit
help
log
macro
match
match-set
no
set
sleep
host1(config-route-map)#
dvmrp
igmp
isis
ospf
pim
Configure PIM
rip
host1(config)#router
In this mode, you can create and configure MPLS Resource Reservation
Protocol (RSVP) parameters.
From Configuration mode, type mpls rsvp profile and the
profileName, and press <Enter>.
host1(config)#mpls rsvp profile sprint
host1(config-rsvp)#?
cleanup-timeout-factor
default
exit
help
log
macro
no
refresh-period
sleep
host1(config-rsvp)
exit
frequency
help
macro
max-response-failure
no
operations-per-hop
owner
request-data-size
2-51
2-52
CHAPTER 2
Command Line Interface
duration
tag
timeout
tos
type
host1(config-rtr)#
In this mode, you can configure a scheduler profile. You can then set the
shaping rate value, enable the strict-priority scheduling for the scheduler
node, or set the weighted-round-robin (WRR) value of the scheduler node
or queue.
From Global Configuration mode, type scheduler-profile and the
scheduleProfileName that you want to create or configure, and press
<Enter>.
host1(config)#scheduler-profile A990
host1(config-scheduler-profile)#?
default
exit
help
log
macro
no
run
shaping-rate
sleep
strict-priority
weight
host1(config-scheduler-profile)#
In this mode, you can configure one or more virtual interfaces called
subinterfaces on a single physical interface. The system supports this
feature with ATM and Frame Relay.
Both ATM and Frame Relay provides permanent virtual circuits (PVCs)
that can be grouped under separate subinterfaces configured on a single
physical interface. Subinterfaces allow multiple encapsulations for a
protocol on a single interface.
In this mode, you can create a traffic class and configure the level of
service to packets assigned to the traffic class.
From Configuration mode, type the traffic-class command followed by
a trafficClassName, and then press <Enter>.
host1(config)#traffic-class test123
host1(config-traffic-class)#?
default
Set a command to its default(s)
exit
Exit from the current command mode
fabric-strict-priority Allow packets in this class to be dequeued out of the
fabric ahead of other traffic classes
fabric-weight
Set the relative weight for fabric queue in this
traffic class
help
Describe the interactive help system
log
Configure logging settings
macro
Run a CLI macro
no
Negate a command or set its default(s)
run
Run an exec mode command
sleep
Make the Command Interface pause for a specified
duration
host1(config-traffic-class)#
In this mode, you can create and configure traffic class groups, which can
contain multiple traffic classes.
From Global Configuration mode, type traffic-class-group command
and a trafficClassGroupName, and press <Enter>.
host1(config)#traffic-class-group trafclasnameabcd
host1(config-traffic-class-group)#?
default
Set a command to its default(s)
exit
Exit from the current command mode
help
Describe the interactive help system
log
Configure logging settings
macro
Run a CLI macro
no
Negate a command or set its default(s)
run
Run an exec mode command
2-53
2-54
CHAPTER 2
Command Line Interface
sleep
traffic-class
host1(config-traffic-class-group)#
In this mode, you can create and configure MPLS tunnel profiles.
From Global Configuration mode, type mpls tunnels profile and the
profileName, and press <Enter>.
host1(config)#mpls tunnels profile storm
host1(config-tunnelprofile)#?
default
exit
help
log
macro
no
sleep
tunnel
host1(config-tunnelprofile)#
In this mode, you can create and configure VRF parameters for
BGP/MPLS VPNs.
From Global Configuration mode, type ip vrf and the vrfName, and
press <Enter>. Confirm the new VRF by pressing <Return>.
host1(config)#ip vrf yankee
Proceed with new vrf creation? [confirm]
host1(config-vrf)#?
default
Set a command to its default(s)
description
Configure VRF specific description
exit
Exit from the current command mode
export
Specify VRF export characteristics
help
Describe the interactive help system
import
Specify VRF import characteristics
log
Configure logging settings
macro
Run a CLI macro
no
Negate a command or set its default(s)
rd
Specify route distinguisher
route-target Specify VPN extended community Target
run
Run an exec mode command
sleep
Make the Command Interface pause for a specified duration
host1(config-vrf)#
Configuring SNMP
Page
Overview
3-1
References
3-11
3-11
3-12
Configuring Traps
3-19
3-24
3-41
3-42
Monitoring SNMP
3-43
Overview
SNMP is a protocol that manages network devices, such as your ERX
system. The goal of SNMP is to simplify network management in two
ways:
By defining a single management protocol that can be used to manage
any network device from any vendor.
This feature reduces the complexity of the network management
application because the application does not need to support a large
number of proprietary management protocols for the mix of vendors
devices in the network.
3-2
CHAPTER 3
Configuring SNMP
Meaning
agent
client
community
entity
event
managed object
group
MIB
Overview
ERX Edge Routers
Meaning
network element
notification
server
trap
user
view
SNMP Client
The SNMP client runs on a network host and communicates with one or
more SNMP servers on other network devices, such as routers, to
configure and monitor the operation of those network devices.
3-3
3-4
CHAPTER 3
Configuring SNMP
SNMP Server
A MIB specifies the format of managed data for a device function. The
goal of a MIB is to provide a common and consistent management
representation for that function across networking devices.
Your system supports both standard and enterprise SNMP MIBs.
Standard SNMP MIBs
Overview
ERX Edge Routers
SNMP Versions
As users transfer more sensitive information, such as billing details, via the
Internet, security becomes more critical for SNMP and other protocols.
SNMPv3 provides the user-based security model (USM) to address
authentication and data encryption.
Authentication provides the following benefits:
Only authorized parties can communicate with each other.
Consequently, a management station can interact with a device only if
the administrator configured the device to allow the interaction.
Messages are received promptly; users cannot save messages and
replay them to alter content. This feature prevents users from
sabotaging SNMP configurations and operations. For example, users
can change configurations of network devices only if authorized to do
so.
SNMPv3 authenticates users via the HMAC-MD5-96 or
HMAC-SHA-96 protocols; CBC-DES is the encryption or privacy
3-5
3-6
CHAPTER 3
Configuring SNMP
Overview
ERX Edge Routers
Group Name
Write View
Notification/
Trap View
admin
authentication
and privacy
everything
everything
everything
public
none
user
nothing
nothing
private
authentication
only
user
user
user
Virtual Routers
3-7
3-8
CHAPTER 3
Configuring SNMP
Description
14
6 11
12 15
Request protocol data units (PDUs) for the SNMP engine must contain
the corresponding contextEngineID and contextName for the SNMP
engine. When the system receives a PDU, it examines the
contextEngineID and contextName, and forwards the request to the
corresponding virtual router.
The contextEngineID is the same as the SnmpEngineID.
The contextName is an internally derived ASCII string associated with
the router. It has the format routerN, where N is a number (with no
Overview
ERX Edge Routers
The following table shows examples of the ERX system SNMP engine
objects that are associated with the default virtual router.
.
Object
Value
SnmpEngineID
0x80:00:13:0a:05:00:90:1a:00:04:6c:80:00:00:01
contextEngineID
0x80:00:13:0a:05:00:90:1a:00:04:6c:80:00:00:01
contextName
router1
SNMP Attributes
SNMPv1/v2C Value
SNMPv3 Value
Community
admin
admin
View
everything
Privilege
rw
rw
Community
public
public
View
user
Privilege
ro
ro
Community
private
private
View
Privilege
user
rw
rw
3-9
3-10
CHAPTER 3
Configuring SNMP
SNMP Operations
Definition
Get
GetNext
Allows the client to retrieve the next object instance from a table or
list within a server.
GetBulk
Set
Allows the client to set values for the objects managed by the
server.
Notification
Get Next
Request
Get Request
Get Response
Set Request
Notification
References
ERX Edge Routers
References
For more information about SNMP, consult the following resources:
RFC 1157 A Simple Network Management Protocol (SNMP)
(May 1990)
RFC 1901 Introduction to Community-based SNMPv2
(January 1996)
RFC 1905 Protocol Operations for Version 2 of the Simple Network
Management Protocol (SNMPv2) (January 1996)
RFC 2570 Introduction to Version 3 of the Internet-standard
Network Management Framework (April 1999)
RFC 2571 An Architecture for Describing SNMP Management
Frameworks (April 1999)
RFC 2572 Message Processing and Dispatching for the Simple
Network Management Protocol (SNMP) (April 1999)
RFC 2573 SNMPv3 Applications (April 1999)
RFC 2574 User-based Security Model (USM) for version 3 of the
Simple Network Management Protocol (SNMPv3) (April 1999)
RFC 2575 View-based Access Control Model (VACM) for the
Simple Network Management Protocol (SNMP) (April 1999)
3-11
3-12
CHAPTER 3
Configuring SNMP
You can also set up SNMP traps and set up the system to collect bulk
statistics. See Configuring Traps and Collecting Bulk Statistics later in
this chapter.
Enabling SNMP
Example
host1(config)#snmp-server
3-13
3-14
CHAPTER 3
Configuring SNMP
Privilege Levels
Example
host1(config)#snmp-server community boston view everything
rw
Use the no version to delete a community from the SNMP community table.
Example
host1(config)#snmp-server user fred auth sha fred-password
priv des password group user
snmp-server contact
snmp-server location
Use these commands to configure the SNMP servers contact person and the
servers location.
Example
host1(config)#snmp-server contact Bob Smith
host1(config)#snmp-server location 3rdfloor
Use the no version of these commands to clear the contact or location identifier
from the SNMP configuration.
The SNMP server must support a PDU with an upper limit of 484 bytes
or greater. There is no need to coordinate the maximum packet size
across the entire network. Many requests and responses tend to be smaller
than the maximum value.
snmp-server packetsize
Example
host1(config)#snmp-server packetsize 1000
Use the no version to set the SNMP packet size to the default maximum size,
1500 bytes.
You can set up the system to send memory warning messages when
memory utilization reaches a specified value.
memory
Example
host1(config)#memory warning 80 70
Use the no version to return to the default values, 85 for high utilization and 75
for abated memory utilization.
3-15
3-16
CHAPTER 3
Configuring SNMP
You can control how the system encodes the ifDescr and ifName objects
in the SNMP agents interface table and in the bulkstats application.
There are two choices of encoding schemes: an ERX system proprietary
method and a conventional industry method.
The proprietary method identifies each interface sublayer with its
type.
The industry method bases the type information for each interface
sublayer on the lowest layer 1 or layer 2 interface type.
For example a PPP interface configured on top of an ATM interfaces is:
PPP3/0.1 proprietary method
ATM3/0.1 industry method
snmp-server interfaces description-format common
Use to set the encoding scheme of the ifDescr and ifName objects to the
conventional industry method.
This command provides compatibility with software that uses the industry
encoding scheme.
Example
host1(config)#snmp interfaces description-format common
You can set up the SNMP agent to compress the number of interface
instances in the standard interface and stack tables. You can also control
the interface numbering method used in the interface tables.
Compressing Interfaces
Atm1483
AtmAal5
.
.
.
SonetVT
VlanMajor
VlanSub
Use to remove interface sublayers from the ifTable and the ifStackTable.
Example
host1(config)#snmp-server interfaces compress atmAal5
Use the no version to add interface sublayers to the ifTable and the
ifStackTable.
3-17
3-18
CHAPTER 3
Configuring SNMP
Use to exclude interfaces from the ifTable and the ifStackTable if the
administrative status of the interface is down.
Example
host1(config)#snmp-server interface compress-restriction
ifadminstatusdown
Use the no version to remove the restriction and allow interfaces with an
administrative status of down in the ifTable and the ifStackTable.
Use to set up the interface numbering method in the IfTable to use contiguous
integers, which provides compatibility with versions of SNMP that are based on
RFC 1213.
The maxIfIndex option sets the maximum value of the ifIndex field that the
system will allocate.
The maxIfNumber option sets the maximum number of interfaces allowed in the
interface tables.
Caution: Reducing the value of the maxIfIndex and/or maxIfNumber causes the
system to automatically reboot to factory default settings.
When the IfIndex and IfNumber maximums are reached, the system logs the
event and ignores the creation of additional interfaces, which means that new
interfaces are not visible in the interface table.
Configuring Traps
ERX Edge Routers
Example
host1(config)#snmp interfaces rfc1213 55000 100000
WARNING: Execution of this command will cause all
configuration settings to revert to factory defaults upon
the next system reboot.
Proceed with 'snmp interfaces rfc1213'? [confirm]
Use to display a list of interface types that are compressed in the interface
tables and the interface numbering method configured on the system.
Field descriptions
maxIfIndex maximum value that the system will allocate to the ifIndex field
maxIfNumber maximum number of interfaces allowed in the ifTable
Interface Description Setting method used to encode the ifDescr and
ifName objects: industry-common, proprietary
host1#show snmp interfaces
Compressed(Removed) Interface Types:
HDLC, FT1, ATM, ATM1483
Armed Interface Numbering Mode:
RFC1213, maxIfIndex=65535, maxIfNumber=65535
Interface Description Setting: proprietary
Configuring Traps
This section provides information for:
Enabling trap generation
Setting up filtering of traps by severity
Configuring trap destinations
Setting a source address for traps
Enabling link status traps
Specifying an egress point for traps
3-19
3-20
CHAPTER 3
Configuring SNMP
Configuring Traps
ERX Edge Routers
System Response
Emergency
System unusable
Alert
Critical
Error
Warning
Notice
Informational
Informational messages
Debug
Debug messages
You can set up a global filter to filter all traps and/or set up a filter for
each host. Trap filters work as follows:
1
If the trap does not meet these criteria, the system discards the
trap.
If the trap does meet these criteria, the trap is handed to the trap
host processor.
3-21
3-22
CHAPTER 3
Configuring SNMP
The trap host processor checks whether the trap category is enabled
on the host and whether the trap meets the minimum severity level
set for the host.
a
If the trap does not meet these criteria, the system discards the
trap.
If the trap does meet these criteria, the trap is sent to the trap
recipient.
You can enable the traps listed in Trap Categories earlier in this chapter.
You can filter traps according to the trap severity levels described in Table 3-7.
If you do not specify a trap option, all options are enabled or disabled for the
trap type.
Example
host1(config)#snmp-server enable traps atmPing trapfilters
critical
Use to configure an SNMP trap host to refine the type and severity to traps that
the host receives.
You can enable the traps listed in Trap Categories earlier in this chapter.
You can filter traps according to the trap severity levels described in Table 3-7.
Example
snmp-server host
Use the no version to remove the specified host from the list of recipients.
Configuring Traps
ERX Edge Routers
snmp-server trap-source
Use to specify the interface whose IP address is used as the source address
for all SNMP traps.
Note: When there are multiple IP addresses configured on the IP interface that is
chosen as the SNMP trap source, the SNMP agent automatically uses the primary
IP address of the interface as the SNMP source address on SNMP traps.
Example
host1(config)#snmp-server trap-source fastethernet 0/0
Use the no version to remove the interface from the trap configuration.
Example
A link-up trap recognizes that a previously inactive link in the network has come
up.
Example
You can now enable SNMP trap proxy, which allows you to specify a
single SNMP agent as the egress point for SNMP traps from virtual
routers. This feature removes the need to configure a network path from
each virtual router to a single trap collector.
You can enable SNMP trap proxy from either SNMP or the CLI. Only
one SNMP trap proxy can exist for a system.
The SNMP trap proxy does not forward global traps that it receives from
other virtual routers. The corresponding SNMP agent handles global
traps locally and does not forward them to the SNMP trap proxy.
3-23
3-24
CHAPTER 3
Configuring SNMP
snmp-server trap-proxy
Example
host1(config)#snmp-server trap-proxy enable
Add names to the FTP host table for the primary and secondary
(optional) receivers.
See Using the copy Command in Chapter 4, Managing the System,
for information about adding names to the host table.
(Optional) Specify the time for which the system transfers data.
host1(config)#bulkstats collector 2 interval 1000
objects.
host1(config)#bulkstats interfaces description-format common
3-25
3-26
CHAPTER 3
Configuring SNMP
bulkstats collector
Example
host1(config)#bulkstats collector 2
Example
host1(config)#bulkstats collector 2 collect-mode auto
Use the no version to specify that either the user or the system will initiate
transfers manually.
Example
host1(config)#bulkstats collector 2 description customer xyz
Use the no version to remove descriptive text from the bulk statistics file.
Use to specify the time interval in seconds for which the collector transfers data
to the receivers.
Example
host1(config)#bulkstats collector 2 interval 1000
Use the no version to set this time to the default, 360 seconds (6 minutes).
Example
host1(config)#bulkstats collector 2 max-size 20480
Use the no version to set the size of the bulk statistics file to the default,
3670016 bytes.
Use to assign the primary receiver to which the system transfers data.
The index for the receiver must match the index that you specified with the
bulkstats receiver remote-name command.
Example
host1(config)#bulkstats collector 2 primary-receiver 7
Use the no version to clear the primary receiver and disable the collector.
Use to assign the secondary (that is, the backup) receiver to which the system
transfers data.
The index for the receiver must match the index you specified with the
bulkstats receiver remote-name command.
Example
host1(config)#bulkstats collector 2 secondary-receiver 5
Use to set the system to retrieve bulk statistics once only, rather than
periodically.
Example
host1(config)#bulkstats collector 2 single-interval
Use the no version to set the system to retrieve bulk statistics periodically, the
default situation.
Use to set the encoding scheme of the ifDescr object that the bulkstats
application reports to the conventional industry method.
This command provides compatibility with software that uses the industry
encoding scheme.
For more information, see Configuring Encoding Method earlier in this chapter.
Example
host1(config)#bulkstats interfaces description-format common
Use to configure the interface type on which you want to collect statistics.
bulkstats interface-type
ATM
ATM 1483
Ethernet
3-27
3-28
CHAPTER 3
Configuring SNMP
Frame Relay
Frame Relay subinterface
Cisco HDLC
IP
PPP
Example
host1(config)#bulkstats interface-type ppp collector 2
If you define more than one collector, you must specify a unique collector index,
in the range 165535.
You can collect statistics on interfaces for the FE-2 module and the Gigabit
Ethernet module. You cannot collect statistics on the SRP Ethernet interface.
Example
host1(config)#bulkstats interface-type ethernet collector 2
Use the no version to delete the interface type from bulk statistics collection.
Deletion of a particular interface type takes effect at the next collection interval.
The FTP file transfer supports only anonymous transfers to remote servers.
Other user names and passwords are not supported.
The receivers must appear in the FTP host table (see Using the copy
Command in Chapter 4, Managing the System). The name of the host must
match the name you specify with this command. The hostname is relative to
the virtual routers context when you issue this command.
When specifying the remote filename for bulk statistics, you must precede the
filename with the hostname followed by the :/ characters.
Example
host1(config)#bulkstats receiver 1 remote-name
js:/ftptest/bulk%s%s.sts sysName sysUpTime
Note: The % variables in the remote name are replaced at run time with the
sysName and sysUpTime parameters to produce variable filenames on the remote
host.
You must configure SNMP correctly and specify a valid trap source. Otherwise,
the system will not send SNMP traps.
Example
bulkstats traps
To view the parameters the system uses to collect statistics, use the
following show bulkstats commands.
To include or exclude lines of output based on a text string that you
specify, use the output filtering feature for show commands. For details,
see Chapter 2, Command Line Interface.
show bulkstats
Field descriptions
File Format end of the line format in bulkstats files, carriage return and line
feed (CR+LF) or LF
Current Time current system time used to compare against the collection
stop/start time
Intervals number of times the bulk statistics collector has cycled through a
collection
State
inProg collector is properly configured and currently active
notInSvc collector has been decommissioned by a management client
3-29
3-30
CHAPTER 3
Configuring SNMP
Last Transfer Failure last time that the collector attempted to retrieve
statistics and was unsuccessful
Receiver Information:
Index index number of the receiver
RemoteFileName hostname, path, and filename of the remote FTP server
Index index number of the receiver
State
active receiver is properly configured and currently active
notInSvc receiver has been decommissioned by a management client
notReady receiver does not have enough configuration information to
go active
error configuration/operational error
Status
Success
Copy source does not exist or is unreachable
Copy failed
File in use
Example
host1#show bulkstats
AdminStatus:
enabled
OperStatus:
enabled
CurrSize
MaxSize
Intrvl
Mode
-----
--------
--------
------
--------- --------
-------
490
3670016
600
periodic
manual
inProg
3670016
360
periodic
manual
notReady
Index
Primary-Receiver
Second-Receiver
-----
----------------
---------------
--------------------
not defined
not defined
not defined
XferMode
State
TUE AUG 15 2000 15:52:33 UTC TUE AUG 15 2000 16:02:33 UTC
Not started
N/A
Schema Information:
Index
Subtree
-----
------------ --------------
CollectorIndex
State
--------
ifStats
active
ifStack
active
3-31
3-32
CHAPTER 3
Configuring SNMP
Index
Subtree List
-----
-------------------------------------------------------
N/A
Interface Types:
Index
CollectorIndex
State
-----
----------------------
Type
--------------
--------
Ppp
active
Ethernet
active
11
Atm1483
active
Receiver Information:
Index
RemoteFileName
-----
-------------------------------------------------------
host:/upload/bulkStas.sts
Index
State
Status
-----
--------
---------------------------------------------
notReady
Field descriptions
Example
host1#show bulkstats collector description
Index
FileDescription
-----
-----------------------
Field descriptions
Example
host1#show bulkstats collector interval
Index
Interval
-----
--------
360
Field descriptions
Example
host1#show bulkstats collector max-size
Index
MaxSize
-----
------------
2097152
Field descriptions
Example
host1#show bulkstats collector transfer-mode
Index
Transfer-Mode
Primary-Receiver
-----
-------------
----------------
auto-xfer
Secondary-Receiver
-----------------2
Field descriptions
Interface Types:
Index index number of the interface type entry
Type interface type for which bulk statistics collection is configured
CollectorIndex index of the collector to which the interface type applies
State
active interface type is properly configured and currently active
notInSvc interface type has been decommissioned by a management
client
3-33
3-34
CHAPTER 3
Configuring SNMP
Example
host1#show bulkstats interface-type
Interface Types:
Index
Collector
State
-----
----------------------
Type
---------
--------
ppp
active
Field descriptions
Status
Success
Copy source does not exist or is unreachable
Copy failed
File in use
Example
RemoteFileName
-----
----------------------------------------------
f:/upload/bulkStas.sts
Index
State
Status
-----
--------
---------------------------------------------
notReady
Field descriptions
Intervals number of times the bulk statistics collector has cycled through a
collection
3-35
3-36
CHAPTER 3
Configuring SNMP
Interval Start Time start of current interval or bulk collections. The collector
began collecting bulk statistics at this time.
Example
enabled
OperStatus:
enabled
HdwDetects:
HdwCollectorCreates:
CollectorCreateReqs:
CollectorStopReqs:
CollectorDeleteReqs:
CollectorStarts:
25
CollectorIncompleteCfgs:
CollectorStopFailures:
DriverErrors:
FileSizeFulls:
CollectorFileNearlyFullTraps: 0
CollectorFileFullTraps:
SecondaryFails
18
--------------
CurrSize
CreateErrs
-----
--------
----------
----------------------------
331
MON JAN 24 2001 19:09:33 UTC MON JAN 24 2001 19:15:33 UTC
Not started
N/A
Field descriptions
Trap Type
nearly-full trap will be posted to the SNMP entity on this system when
the threshold is reached
file-full trap will be posted to the SNMP entity on this system when the
trap reaches 100%
Traps Sent number of times this event was posted to the SNMP entity on
this system
Example
host1#show bulkstats traps
Trap Type
State
-----------
-------
Threshold
----------
Traps Sent
----------
file-full
enabled
N/A
nearly-full
enabled
Configuring Schemas
You can also set a management schema for bulk statistics. A schema is a
group of attributes or counters that provide an efficient way to retrieve
specific types of information about the system. The bulk statistics
application supports four schema configurations: if-stack, if-stats, policy,
and system. Table 3-8 shows the type of data each schema retrieves.
Table 3-8 Data retrieved according to schema
Schema
Retrieves . . .
if-stack
if-stats
Usage data on sets of interface types. The interface usage data is the
ifTable/ifXTable counters. Note that the ifXTable supports 64-bit
counters and the data written into the bulk statistics file supports the
64-bit counters.
policy
system
if-stats Objects
Table 3-9 presents if-stats objects you can configure using the bulkstats
schema subtree command.
3-37
3-38
CHAPTER 3
Configuring SNMP
Definition
usdAcctngifInBroadcastPkts
usdAcctngIfInOctets
usdAcctngIfInUcastPkts
usdAcctngIfInDiscards
usdAcctngIfInErrors
usdAcctngifInMulticastPkts
usdAcctngIfInUnknownProtos
usdAcctngifOutBroadcastPkts
usdAcctngIfOutOctets
usdAcctngIfOutUcastPkts
usdAcctngIfOutDiscards
usdAcctngIfOutErrors
usdAcctngifOutMulticastPkts
usdAcctngIfCorrelator
Customer correlation:
FR = DLCI
IP = RouterName
usdAcctngIfInPolicedOctets
usdAcctngIfInPolicedPkts
usdAcctngIfInSpoofedPkts
usdAcctngIfOutPolicedOctets
usdAcctngIfOutSpoofedPkts
usdAcctngIfOutSchedulerDropPks
usdAcctngIfOutSchedulerOctets
usdAcctngIfLowerInterface
Note: All the schema if-stats objects in Table 3-9 apply to both layer 2 and layer 3
interfaces, except usdAcctngSpoofedPkts, which is specific to layer 3.
You can get more accurate rate statistics by using the time-offset
parameter. To use this parameter you must navigate to the if-stats
subtreelist. The time-offset parameter is included in each bulk statistics
interface record and is the offset from the master interval at which the
record was collected.
bulkstats schema
Example
host1(config)#bulkstats schema 4
You create policies using the policy-list command. See ERX Policy and QoS
Configuration Guide, Chapter 1, Configuring Policy Management.
Example
host1(config)#bulkstats schema 4 policy-name XMYpolicy
Use keywords to collect data on input policies, local input policies, or output
policies. You can also collect data based on type of packet.
Example
host1(config)#bulkstats schema 4 policy-type input
Use to set the schema for collecting data. Specify one of the following
keywords:
Example
host1(config)#bulkstats schema 4 subtree policy subtreelist
green-packets upper-green-packets
3-39
3-40
CHAPTER 3
Configuring SNMP
You are able to display your configuration and monitor the data
generated by schemas.
show bulkstats schema
Field descriptions
Schema Information:
Index index number of the schema
Subtree type of bulk statistics schema configured on the collector: if-stack,
if-stats, policy, or system
State
active schema is properly configured and currently active
notInService schema has been decommissioned by a management
client
notReady schema does not have enough configuration information to
go active
error configuration/operational error
Example 1
host1#show bulkstats schema
Schema Information:
Index
Subtree
CollectorIndex
State
-----
-----------------
--------------
--------
ifStack
active
system
active
Index
Subtree List
-----
-------------------------------------------------
N/A
N/A
Example 2
host1#show bulkstats schema
Schema Information:
Index
Subtree
CollectorIndex
State
-----
-----------------
--------------
--------
ifStats
active
system
active
Index
Subtree List
-----
--------------------------------------------------
N/A
Guidelines
3-41
3-42
CHAPTER 3
Configuring SNMP
By default, the bulkstats file contains a CR and LF at the end of each line.
You can you can set up the system to remove the CR and leave only an
LF at the end of each line.
bulkstats file-format endOfLine-Lf
Use to strip the CR from the end of each line in the bulkstats file.
Example
host1(config)#bulkstats file-format endOfLine-LF
Monitoring SNMP
ERX Edge Routers
Monitoring SNMP
To monitor the status of SNMP operations on your network, enter
Privileged Exec mode. You can then establish a baseline and use the
show commands to view statistics.
Establishing a Baseline
SNMP statistics are stored in system counters. The only way to reset the
system counters is to reboot the system. You can, however, establish a
baseline for SNMP statistics by setting a group of reference counters to
zero.
baseline snmp
The system implements the baseline by reading and storing the statistics at the
time the baseline is set and then subtracting this baseline whenever
baseline-relative statistics are retrieved.
To display statistics relative to the current baseline, use the delta keyword with
SNMP show commands.
SNMP operations (such as Get and Set) continue to use and report statistics
from the system counters.
See Viewing SNMP Status later in this chapter for a sample display when you
enter the show snmp command. If you establish a baseline and then enter
show snmp, the statistics now have zero or low values.
Example
host1#baseline snmp
host1#show snmp
Contact: Joe Administrator
Location: Network Lab, Bldg 3 Floor 1
2 SNMP packets input
0 Bad SNMP version errors
0 Unknown community name
0 Illegal operation for community name supplied
0 Encoding errors
0 Number of requested variables
0 Number of altered variables
1 Get-request PDUs
1 Get-next PDUs
0 Set-request PDUs
0 Unknown security models
0 Unavailable contexts
2 SNMP packets out
0 Too big errors (Maximum packet size 1500)
1 No such name errors
0 Bad values errors
3-43
3-44
CHAPTER 3
Configuring SNMP
0 General errors
2 Get-response PDUs
0 SNMP trap PDUs
0 Invalid Message Report PDUs
0 Unknown PDU Handler Report PDUs
0 Unknown Context Report PDUs
0 Unsupported Security Level Report PDUs
0 Not in time Window Report PDUs
0 Unknown Username Report PDUs
0 Unknown Engine ID Report PDUs
0 Wrong Digest Report PDUs
0 Decryption Error Report PDUs
There is no no version.
To display statistics relative to the current baseline, use the delta keyword.
Field descriptions
Monitoring SNMP
ERX Edge Routers
SNMP packets out total number of SNMP packets sent by the router
Too big errors number of processed PDUs that resulted in SNMP PDUs
too large to encode
No such name errors number of requests that resulted in noSuchName
errors. If interfaces configured on modules that do not support 64-bit
counters are accessed, the system returns a noSuchName message.
Bad values errors number of requests that resulted in badValues errors
General errors number of general errors
Get-response PDUs number of requests that resulted in getResponse
PDUs
SNMP trap PDUs number of SNMP trap PDUs generated by this agent
Invalid Message Report PDUs number of packets received by the
SNMP engine that were dropped because there were invalid or
inconsistent components in the SNMP message
Unknown PDU Handler Report PDUs number of packets received by
the SNMP engine that were dropped because the PDU in the packet
could not be passed to an application responsible for handling the
pduType; for example, no SNMP application had registered for the proper
combination of the contextEngineID and pduType
Unknown Context Report PDUs number of packets received by the
SNMP engine that were dropped because the context contained in the
message was unknown
Unsupported Security Level Report PDUs number of packets received
by the SNMP engine that were dropped because they requested a
security level that was unknown to the SNMP engine or otherwise
unavailable
Not in time Window Report PDUs number of packets received by the
SNMP engine that were dropped because they appeared outside of the
authoritative SNMP engine window
Unknown Username Report PDUs number of packets received by the
SNMP engine that were dropped because they referenced a user that
was not known to the SNMP engine
Unknown Engine ID Report PDUs number of packets received by the
SNMP engine that were dropped because they referenced an
snmpEngineID that was not known to the SNMP engine
Wrong Digest Report PDUs number of packets received by the SNMP
engine that were dropped because they did not contain the expected
digest value
Decryption Error Report PDUs number of packets received by the
SNMP engine that were dropped because they could not be decrypted
Example
host1#show snmp
Contact: Joe Administrator
Location: Network Lab, Bldg 3 Floor 1
538 SNMP packets input
0 Bad SNMP version errors
0 Unknown community name
3-45
3-46
CHAPTER 3
Configuring SNMP
Field descriptions
Monitoring SNMP
ERX Edge Routers
Example
Model
Level
Read
Write
Notify
------------------- -----
-----
----------
----------
---------
admin
usm
priv
everything
everything
everything
public
usm
none
user
none
none
private
usm
auth
user
user
user
Field descriptions
Example
host1#show snmp community
Community
Priv
AccList
------------------------------------------
View
----
-------
admin@default
everything
rw
private@default
user
rw
public@default
user
ro
Field descriptions
3-47
3-48
CHAPTER 3
Configuring SNMP
Example
Security String
Ver
Port
--------------
------------------------------
---
----- ----------------
10.5.0.200
private
v2c
Trap Categories
162
SnmpLinkInvEnvBstFxfBgpLogcliPingOspfTraceDvmrpDvmrpUniAdrPatmPing
Address
TrapSeverityFilter
TrapPDUsSent
TrapPDUsFiltered
---------------
------------------
------------
----------------
10.5.0.200
5 - notice
Field descriptions
Monitoring SNMP
ERX Edge Routers
Example
host1#show snmp user
User
Auth
Priv
Group
------------------------ ----
----
-------------------
josie
md5
des
admin
nightfly
md5
no
private
steelydan
no
no
public
Field descriptions
Example
host1#show snmp view
View Name
View Type
Oid Tree
--------------
---------
---------------------------
everything
included
1.3.6.1.
user
included
1.3.6.1.
user
excluded
1.3.6.1.4.1.2773.2.16.
user
excluded
1.3.6.1.4.1.4874.2.2.16.
user
excluded
1.3.6.1.6.3.11.
user
excluded
1.3.6.1.6.3.12.
user
excluded
1.3.6.1.6.3.13.
user
excluded
1.3.6.1.6.3.14.
user
excluded
1.3.6.1.6.3.15.
user
excluded
1.3.6.1.6.3.16.
user
excluded
1.3.6.1.6.3.18.
nothing
excluded
1.3.6.1.
Output Filtering
You can use the output filtering feature of the show commands to include
or exclude lines of output based on a text string you specify. See
Chapter 2, Command Line Interface, for details.
3-49
3-50
CHAPTER 3
Configuring SNMP
This chapter describes general tasks associated with managing the ERX
system.
Topic
Page
Overview
4-2
4-2
Configuring Timing
4-3
4-5
4-7
4-10
4-10
4-13
Sending Messages
4-20
Managing Files
4-22
Transferring Files
4-27
4-39
Configuring DNS
4-39
Troubleshooting
4-43
4-48
4-2
CHAPTER 4
Managing the System
Overview
Managing the ERX system involves a variety of tasks. This chapter covers
those tasks associated with the system in general rather than specific
networking protocols. Each section in the chapter covers a different topic;
where appropriate, a section contains an overview of the topic,
configuration tasks, and information about monitoring the associated
settings.
For additional management information, CLI commands, and
procedures, refer to the following table.
Task
Reference
Manage line modules and SRP modules. Chapter 5, Managing Line Modules
and SRP Modules
The assigned name is displayed in the command line interface (CLI) prompts.
Example
host1(config)#hostname host1
host1(config)#
There is no no version.
Configuring Timing
ERX Edge Routers
Configuring Timing
You can use the timing source command to configure three timing
sources for the system. These sources are known as the primary,
secondary, and tertiary sources. The system periodically polls the status
of the current timing source. If the system discovers that the current
source has become unavailable, it polls the timing source you specified as
next in line. If this source is available, it switches to this source; if not, it
then polls the next source in line. If the lowest source is unavailable, the
system maintains the SRP clock as the source.
If you enable auto-upgrade, in the event of a source failure, the
systemafter switching to a lower sourcepolls all higher configured
sources and automatically switches back to the highest timing source
when that source becomes available.
The timing select command enables you to specify which source
(primary, secondary, or tertiary) the system is to use by default. The
system will never attempt to upgrade to a source higher than the selected
source.
timing disable-auto-upgrade
The system starts out by setting the operational timing selector to the
administratively configured selector. See the timing select command.
Example
host1(config)#timing disable-auto-upgrade
If you enable the auto-upgrade feature, the system does not try to upgrade
beyond the administratively configured selector.
Example
timing select
There is no no version.
4-3
4-4
CHAPTER 4
Managing the System
timing source
Use to specify how the SRP module exchanges timing signals with an
interface.
You can specify one external source received on an I/O module other than the
SRP I/O module.
You can specify two or more internal sources or external sources received via
the SRP I/O module external timing ports.
Example
host1#timing source secondary sonet 3/0
There is no no version.
Monitoring Timing
Use the show timing command to view the timing settings for the
system.
show timing
Use to display the timing settings and the operational status of the system
timing.
If a timing source fails, the system uses the next time source in the hierarchy,
and a message appears in the system log at the warning level. If auto-upgrade
is enabled, the system upgrades to a higher-priority timing source when one
becomes available, and a message appears in the system log at the notice
level.
Example
host1#show timing
timing: tertiary (failover from primary)
primary: external SC E1 (A) (ERROR)
secondary: ds3 3/0 (ERROR)
tertiary: internal SC oscillator (ok)
auto-upgrade enabled
Example 1
host1#configure
Configuring from terminal or file [terminal]?
Enter configuration commands, one per line. End with CNTL/Z.
host1(config)#
Example 2
host1#configure
Configuring from terminal or file [terminal]? file
File name: system1.scr
Proceed with configure? [confirm]
host1(config)#
There is no no version.
Use to exit Privileged Exec mode and return to User Exec mode.
Example
disable
host1#disable
host1>
There is no no version.
4-5
4-6
CHAPTER 4
Managing the System
enable
Privileged Exec mode allows you to access all other user interface modes.
From here you can configure, monitor, and manage all aspects of the system.
Set a password for this mode by using either the enable password or the
enable secret command in Global Configuration mode. This protects the
system from any unauthorized use.
Once a password is set, anyone trying to use Privileged Exec mode will be
asked to provide the password.
Example
host1>enable
password:*******
host1#
There is no no version.
Use to exit Global Configuration mode or any of the other Configuration modes.
You may also use <Ctrl+Z> to exit these modes.
Example
end
host1(config)#end
host1#
There is no no version.
Example
exit
host1#exit
host1>
There is no no version.
help
Example
host1#help
Use the help options as follows:
?, or command<Space>? - Lists the set of all valid next keywords or
arguments
partial-keyword?
partial-keyword<Tab>
There is no no version.
Use to issue a User Exec mode from command from another CLI mode.
Example
run
There is no no version.
Use to make the CLI pause for a specified period of time (in seconds).
Example
sleep
host1#sleep 60
There is no no version.
By default five vty lines (04) are open. You can open additional lines
using the line vty command. Once lines are open, login is enabled by
default. Before users can access the lines, you must configure a password,
disable login using the no login command, or configure AAA
authentication on the lines.
4-7
4-8
CHAPTER 4
Managing the System
line vty
You can specify a single line or a range of lines. The range is 019.
Example
host1(config)#line vty 6 10
host1(config-line)#
Use the no version to remove a vty line or a range of lines from the
configuration. Lines that you remove will no longer be available for use by
Telnet, FTP, or SSH. When you remove a vty line, the system removes all lines
above that line. For example, no line vty 6 causes the system to remove lines
6 through 19. You cannot remove lines 0 through 4.
If you enable login but do not configure a password, the system will not allow
you to access virtual terminals.
password
Example 2 (secret)
host1(config-line)#password 5 y13_x
For more information about configuring security for vty lines, see
Chapter 6, Passwords and Security.
Clearing vty Lines
Use the clear line command to clear a vty line. Using this command
terminates any service, such as an FTP session, on this line and closes any
open files.
clear line
Use to remove any services on a vty line and close any files opened as a result
of services on that line.
Example
host1#clear line 2
There is no no version.
Field descriptions
exec-timeout time interval that the terminal waits for expected user input
Never indicates that there is no time limit
exec-banner status for the exec banner: enabled or disabled. This banner
is displayed by the CLI after user authentication (if any) and before the first
prompt of a CLI session.
login-timeout time interval during which the user must log in.
Never indicates that there is no time limit
Example
host1#show line vty 0
no access-class in
data-character-bits 8
exec-timeout 3w 3d 7h 20m 0s
exec-banner enabled
motd-banner enabled
login-timeout 30 seconds
4-9
4-10
CHAPTER 4
Managing the System
If you want to restore a previously saved configuration, use the boot config
filename command.
Example
host1#copy running-configuration system2.cnf
There is no no version.
Example
host1#copy running-configuration startup-configuration
There is no no version.
copy startup-configuration
Example
host1#copy startup-configuration system1.cnf
There is no no version.
Issuing this command places the system into Manual Commit mode. This mode
has no effect on the CLI prompt.
Issuing this command causes an immediate save of configuration data not yet
committed to NVS.
Example
service manual-commit
host1(config)#service manual-commit
Use the no version to revert to Automatic Commit mode; the no version has no
effect if the system is already in Automatic Commit mode.
4-11
4-12
CHAPTER 4
Managing the System
show configuration
You can create a configuration script from the output by saving it as a file with
the .scr extension.
You can use the output filtering feature of the show command to include or
exclude lines of output based on a text string you specify. See Chapter 2,
Command Line Interface, for details.
Example
host1#show configuration
! Configuration script being generated on TUE JAN 29 200X
00:31:12 UTC! Juniper Networks Edge Routing Switch ERX-700
! Version: x.y.z (January 18, 200X 15:01)
! Copyright (c) 1999-200X Juniper Networks, Inc.
reserved.
All rights
.
.
.
!
virtual-router vrA
aaa authentication ppp default radius
aaa accounting ppp default radius
!
ip address-pool local
interface null 0
ip bgp-community new-format
no ip source-route
!
snmp-server
!
! End of generated configuration script.
write memory
Example
host1#write memory
There is no no version.
show running-configuration
Example
host1#show running-configuration
4-13
4-14
CHAPTER 4
Managing the System
You can specify the console speed for only the current console session or
for the current console session and all subsequent console sessions.
speed
Use to set the speed for the current and all subsequent console sessions
immediately.
Example
host1(config)#line console 0
host1(config-line)#speed 14400
Example
terminal speed
There is no no version.
You can specify the number of lines that appear on a terminal screen and
the number of characters that appear on a line.
terminal length
If a command generates more lines than the number configured, the output
pauses after each screen.
Example
host1#terminal length 25
There is no no version.
Example
terminal width
host1#terminal width 80
There is no no version.
You can specify the number of data bits per character for the current vty
session and for all subsequent sessions on the specified vty lines. This
feature allows you to display international characters on the terminals
screen.
data-character-bits
Use to set the number of bits per character on the terminals screen for all
future sessions on the specified lines.
Use the default setting, 8, to view the full set of 8-bit international characters.
Be sure that the software on other devices in the network also supports
international characters.
Set the number of bits to 7 to view only characters in the standard ASCII set.
Example
host1(config)#line vty 1 3
host1(config-line)#data-character-bits 7
There is no no version.
terminal data-character-bits
Use to set the number of bits per character on the terminals screen for the
current session.
Use the default setting, 8, to view the full set of 8-bit international characters.
Be sure that software on other devices in the network also supports
international characters.
Set the number of bits to 7 to view only characters in the standard ASCII set.
Example
host1#terminal data-character-bits 7
There is no no version.
You can issue the dsr-detect command to configure the system so that a
data set ready (DSR) signal is required to log in to the console. If a session
is in progress and the DSR signal is lost, the user is logged out
automatically.
host1(config)#line console 0
host1(config-line)#dsr-detect
4-15
4-16
CHAPTER 4
Managing the System
dsr-detect
Use to require that a DSR signal be detected on the line for a user to log in to
the console.
Example
host1(config-line)#dsr-detect
You can specify a time interval that the CLI waits for a user to provide a
password when logging in to the console or a vty line. To do so:
1
Access the line configuration mode using either the console or vty
keyword.
Specify the time during which the user must enter the password. For
example:
host1(config)#line console 0
host1(config-line)#login
host1(config-line)#boston
host1(config-line)#timeout login response 15
Use to set the time interval that the console or vty lines wait for the user to log
in.
If the interval passes and the user has not responded, the system closes the
session or lines.
Specify an interval in the range 0300 seconds. A value of 0 means that there
is no time limit during which the user must respond.
Example
host1(config-line)#timeout login response 15
You can specify a time interval that the CLI waits for user input on the
console or vty lines. To do so:
1
Access the line configuration mode using either the console or vty
keyword.
Specify the time during which the user must enter information. For
example:
host1(config)#line vty 0
host1(config-line)#exec-timeout 4192 13
exec-timeout
Use to set the time interval that the console or vty lines wait for expected user
input.
If the interval passes and the user has not responded, the system closes the
session or lines.
Specify a time limit in the range 035791 minutes, and optionally specify the
number of seconds.
Example
host1(config-line)#exec-timeout 4192 13
You can configure text banners for the CLI to display to users at different
times in the connection process.
banner
exec displays the banner after user authentication (if any) and before the
first prompt of a CLI session
If you do not specify an option, the default behavior is to display the banner as
an MOTD.
The first character in the banner string must be repeated at the end of the
string; these characters delimit the banner. The CLI prompts you if you fail to
repeat the opening delimiter. All text following the second occurrence of the
delimiter is ignored without warning. The delimiter is case sensitive.
Banner text can span multiple lines. It is truncated after 1,024 characters.
Insert \n where you want the banner text to split and start a new line.
Alternatively, you can press <Enter> on the CLI when you want the text to
break. In the second case, you will be prompted for the remainder of the text
after you press <Enter>. To display a backslash as part of the message, it must
be immediately preceded by another backslash, like this: \\. Do not use a
backslash as a delimiter or end a line with a backslash.
4-17
4-18
CHAPTER 4
Managing the System
To insert a ? character inside the text of a banner, you must enter <Ctrl+V>
before entering the ? character. Failure to do so may produce undesired
results.
Examples
host1(config)#banner motd x This is an MOTD banner x
host1(config)#banner Y This is also an MOTD banner Y
host1(config)#banner "Quotes make good delimiters"
host1(config)#banner Xno space is required between the
delimiter and the real banner textX
host1(config)#banner b bad choice for a delimiter;
everything after that second b was ignored b
host1(config)#banner "This is one way\nto specify a
multiple line banner"
host1(config)#banner "This is another way to specify a
Enter remainder of text message.
'"'.
You can configure MOTD or exec banners, but not login banners, for the
CLI to display on a per-line basis.
exec-banner
Use to display an exec banner on a particular line after user authentication (if
any) and before the first prompt of a CLI session.
Banners on the lines are enabled by default; the no version does not reenable
banners on the lines.
Example
host1(config-line)#exec-banner
Use the no version to disable the exec banner on the line. If both the exec and
MOTD banners are enabled on a line, issuing the no exec-banner command
disables both the exec banner and the MOTD banner. The no motd-banner
command behaves differently from the no exec-banner command.
Banners on the lines are enabled by default; the no version does not reenable
banners on the lines.
Example
motd-banner
host1(config-line)#motd-banner
Use the no version to disable the MOTD banner on the line. If both MOTD and
exec banners are enabled on a line, issuing the no motd-banner command
disables the MOTD banner and leaves the exec banner enabled. The no
motd-banner command behaves differently from the no exec-banner
command.
Use to view the parameters configured for all future console sessions and the
current console session.
Example
host1#show line console 0
dsr-detect disabled
configured speed 9600, current speed 9600
exec-timeout never
show terminal
Field descriptions
exec-timeout time interval that the terminal waits for expected user input
Never indicates that there is no time limit
exec-banner status for the exec banner: enabled or disabled. This banner
is displayed by the CLI after user authentication (if any) and before the first
prompt of a CLI session.
login-timeout time interval during which the user must log in.
Never indicates that there is no time limit
4-19
4-20
CHAPTER 4
Managing the System
Example
host1#show terminal
Length: 25 lines, Width: 80 columns
data-character-bits: 8 bits per character
Speed: 9600 bits per second
dsr-detect disabled
exec-timeout never
exec-banner enabled
motd-banner enabled
login-timeout 30 seconds
Sending Messages
You can send a message to one or more terminals with the send
command. You can specify a line number, a console number, or a vty
number. You can also send the message to all terminals.
The following command sends the message hello console to line 0:
host1#send 0 hello console
If you begin the message on the same line as the send command, the first
character of the message is considered to be a delimiter. You must use the
same character to terminate the message. In both examples above, the
delimiter was a double quotation mark (). If you press <Enter> without
typing the second delimiter, the CLI prompts you for more message text
and reminds you to complete the message with the delimiter, as shown in
the following example:
host1#send vty4 XYou can start a message on the same line
Enter remainder of text message.
'X'.
Sending Messages
ERX Edge Routers
If you do not begin the message on the same line as the send command,
the CLI prompts you for the message text after you press <Enter>. The
CLI does not recognize delimiters for these messages; you must enter
<Ctrl+Z>, as shown in the following example:
host1#send 0
Enter remainder of text message.
Use to send a message to one or more terminals. You can specify a line
number, a console number, or a vty number. You can use the * keyword to send
the message to all terminals.
If you begin the message on the same line as the send command, the first
character of the message is considered to be a delimiter. You must use the
same character to terminate the message.
The CLI prompts you for message text if you do not begin or complete the
message on the same line as the send command. The CLI reminds you to
signal the end of the message either with the delimiter or <Ctrl+Z>.
Example
host1#send 0 hello console
There is no no version.
4-21
4-22
CHAPTER 4
Managing the System
Managing Files
You are responsible for file management. Table 4-1 shows the types of
system files and their corresponding extensions.
Table 4-1 Types of system files and corresponding extensions
Type of File
Extension
Description
Configuration
*.cnf
Core dump
*.dmp
History
*.hty
(reboot.hty)
Log
*.log
Macro
*.mac
A macro program
Release
*.rel
Script
*.scr
*.pub
Statistics
*.sts
Text
*.txt
Text file
Managing Files
ERX Edge Routers
Users can transfer files via FTP to the user space from a network host and
vice versa. However, users cannot access the system space via FTP. To
install a file from the user space to the system space, use the copy
command. For detailed information on transferring files between
locations, see Transferring Files later in this chapter.
In order to conserve NVS and minimize the installation time, files are not
stored in both the system space and the user space. When you issue the
copy command to install a file from user space to system space, the ERX
system establishes a link to the file, but does not make a physical copy.
Managing the User Space from a Network Host
If you enable the systems FTP server (see Configuring the FTP Server
later in this chapter), you can manage files on the user space from an FTP
client on a network host. Table 4-2 lists the FTP protocol commands that
the ERX system supports. Whether you can perform these functions on
the user space depends on the features that the FTP client offers.
Table 4-2 FTP protocol commands that the system supports
FTP Protocol
Command
Function
HELP
USER
PASS
QUIT
LIST
NLST
RETR
Retrieve a file.
STOR
Store a file.
CWD
CDUP
TYPE
PORT
PWD, XPWD
STRU
MODE
PASV
NOOP
Do nothing.
DELE
Delete a file.
MKD, XMKD
Make directory.
4-23
4-24
CHAPTER 4
Managing the System
Table 4-2 FTP protocol commands that the system supports (continued)
FTP Protocol
Command
Function
RMD, XRMD
Remove directory.
RNFR
RNTO
To rename files, use the rename command. Table 4-3 shows the types of
files you can rename in different locations.
rename
You can change the base name but not the extension of a file.
Example
host1#rename boston1.cnf boston2.cnf
There is no no version.
System Space
User Space
(linked files and
unlinked files)
System
*.cnf
*.cnf
*.dmp
*.dmp
*.hty
*.hty
*.log
*.log
*.mac
*.mac
*.rel
*.scr
*.scr
*.txt
*.txt
Nonsystem files
*.sts
None
Managing Files
ERX Edge Routers
Source
User Space
(linked files and
unlinked files)
User Space
*.cnf
*.cnf
*.hty (excluding
reboot.hty)
*.dmp
*.log (excluding
system.log)
*.log
*.mac
None
None
*.hty
*.mac
*.pub
*.scr
*.rel
*.txt
*.scr
*.sts
*.txt
Nonsystem files
None
None
None
None
None
None
None
Deleting Files
Use the delete command to delete files in NVS. Table 4-4 shows the
types of files you can delete in different locations.
delete
To delete a file in user space, specify the incoming or outgoing directory on the FTP
server.
You can specify the name of a subdirectory in the incoming or outgoing directory.
Examples:
host1#delete test.scr
host1#delete /outgoing/test.scr
There is no no version.
4-25
4-26
CHAPTER 4
Managing the System
User Space
(linked files and
unlinked files)
*.cnf
*.cnf
*.dmp
*.dmp
*.hty
*.hty
*.log
*.log
*.mac
*.mac
*.rel
*.pub
*.scr
*.rel
(deletes *.rel file only
and not associated
files)
*.sts
*.txt
Standby SRP
Module
None
None
*.scr
*.sts
*.txt
Nonsystem files
Monitoring Files
Field descriptions
Transferring Files
ERX Edge Routers
Examples
host1#dir
unshared
file
in
size
size
date (UTC)
use
-------------
--------
--------
-------------------
---
/incoming <DIR>
38023824
/outgoing <DIR>
3584
reboot.hty
5632
5632
12/20/2000 10:01:40
38797998
38797998
12/20/2000 23:40:46
1204
1204
12/18/2000 03:01:04
3-0-0a3-7.rel
test.scr
12/19/2000 07:13:00
12/19/2000 07:13:00
!
in
file
size
size
-------------
--------
--------
3-0-0a3-7.rel
256
12/19/2000 07:14:01
srp.exe
date (UTC)
-------------------
30012312
12/19/2000 07:14:12
srpIc.exe
1801208
12/19/2000 07:20:32
srpDiag.exe
6984222
12/19/2000 07:22:08
use
---
size
size
-------------
in
date (UTC)
--------
--------
-------------------
test.scr
1204
12/18/2000 03:01:04
foo.scr
1278
1278
12/20/2000 04:02:12
use
---
There is no no version.
Transferring Files
You may need to transfer files between the following locations:
System space
User space
Network host
Standby SRP module
4-27
4-28
CHAPTER 4
Managing the System
There are two ways of transferring files: using the copy command and
using the systems FTP server. Table 4-5 shows the types of files that you
can transfer between the locations using the copy command, which
activates a hidden FTP client on the ERX system.
The systems FTP server allows the transfer of files between a network
host and the user space. When a firewall separates the ERX system from
the network host, you must use the FTP server to transfer files to the user
space. You can then install the files from the user space to the system
space using the copy command. However, if there is no firewall between
the ERX system and the network host, you can use the copy command or
the FTP server to transfer files.
For example, you can transfer a file from a network host to an ERX
system via FTP, and then transfer the file via the copy command from
the ERX system to other ERX systems. See Figure 4-1.
ERX system
Transfer system
file via copy command
ERX system
ERX system
Transfer system
file via copy command
Transfer system
file via FTP
Firewall
Network
host
Figure 4-1 Transferring system files to the ERX system
Table 4-5 shows the types of files that you can transfer between the
locations by using the copy command.
Transferring Files
ERX Edge Routers
Table 4-5 File types you can transfer using the copy command
Destination
Source
System
User Space
(linked files and
unlinked files)
System
None
*.cnf
*.cnf
*.cnf
*.hty (excluding
reboot.hty)
*.hty
*.dmp
*.log
*.hty
*.log (excluding
system.log)
*.mac
*.log
*.pub
*.mac
*.scr
*.pub
*.txt
*.scr
*.mac
*.scr
*.txt
*.sts
*.txt
User Space
*.cnf
*.cnf
*.mac
*.hty
None
None
*.rel
*.log
*.scr
*.mac
*.txt
*.pub
None
None
None
system.log
system.log
None
reboot.hty
reboot.hty
*.dmp
*.dmp
*.rel
( *.rel file only, not
files associated with
the *.rel file)
*.scr
*.txt
Nonsystem files
Network Host Within
a Firewall
*.cnf
*.mac
*.rel
*.scr
*.txt
To transfer files via the copy command between the system space and a
network host:
1
Check whether there is a route to the network host, and create one if
necessary. See ERX Routing Protocols Configuration Guide, Vol. 1,
Chapter 2, Configuring IP.
4-29
4-30
CHAPTER 4
Managing the System
Note: This command takes place in the context of the current virtual router (VR)
rather than the default VR. You must configure the FTP server so that any traffic
destined for the VR can reach the VR; typically, you configure the FTP server to
reach the default address of the ERX system, which will always be able to reach
the VR.
Add the FTP server to the static host table, so that the ERX system
can access the network host.
copy
See Table 4-1 for the types of files you can copy.
Specify the incoming or outgoing directory to copy to or from the user space.
You cannot create or copy over files generated by the system; however, you
can copy such files to an unreserved filename.
Examples
host1#copy host1:westford.cnf boston.cnf
host1#copy /incoming/releases/2-8-0a3-7.rel 2-8-0a3-7.rel
There is no no version.
Specify the number 8 before the user name and before the password to encrypt
these values. By default, the user name and password are not encrypted.
Example
host
Transferring Files
ERX Edge Routers
ip ftp source-address
This command overrides a setting you configured previously with the ip ftp
source-interface command.
If you issue this command, the output of the show configuration command
includes an entry of the following format:
ip ftp source-address ipAddress
Example
host1(config)#ip ftp source-address 10.10.5.21
Use the no version to restore the default, in which the source address in the
FTP packets is that of the interface where the FTP connection is made.
This command overrides a setting you configured previously with the ip ftp
source-address command.
If you issue this command and the interface is valid, the output of the show
configuration command includes an entry of the following format:
ip ftp source-interface
If you delete the interface or change its IP address, the output of the show
configuration command appears as if you had entered the ip ftp
source-address command:
ip ftp source-address ipAddress
Example
host1(config)#ip ftp source-interface loopback1
Use the no version to restore the default, in which the source address in the
FTP packets is that of the interface where the FTP connection is made.
4-31
4-32
CHAPTER 4
Managing the System
To transfer files via the systems FTP server, you must configure the FTP
server and ensure that FTP client software is installed on the network
host.
Although you can transfer any type of file via FTP to the ERX system,
the principal aim of this feature is to allow the transfer of system files to
NVS. You can transfer files via FTP to the user space. You can then
install files from the user space onto the system using the copy command.
It is not possible to access the system files directly via FTP operations.
FTP sessions on the ERX system use the vty lines. The ERX system
divides its vty resources between Telnet, SSH, and FTP services. Each
FTP session requires one vty line. The FTP service uses the
authentication method configured for the vty lines.
Features
Transferring Files
ERX Edge Routers
Configuring Authentication
Configure the vty lines to use the host access lists and user
authentication methods.
FTP is disabled by default. You must enable the FTP server with the
ftp-server enable command before the system allows FTP clients to
connect.
ftp-server enable
Use to enable the FTP server and to monitor the FTP port for attempts to
connect to the FTP server.
You can enable the FTP server on the default virtual router only.
Example
host1(config)#ftp-server enable
Use the no version to terminate current FTP sessions and to disable the FTP
server.
Configuration Example
4-33
4-34
CHAPTER 4
Managing the System
ERX system
(FTP server)
RADIUS
server
Authentication via
password if RADIUS
server not available
Authentication via
RADIUS server only
Data center
subnet
POP subnet
In this example, two FTP lines are required for administrators on the
data center subnet, and two more lines are required for users on the POP
subnet. The system verifies passwords of administrators on the data
center subnet via either a RADIUS server or via simple line
authentication if the RADIUS server is unreachable. However, the
system verifies passwords of users on the POP subnet only via the
RADIUS server.
The following example shows all steps for configuring this scenario, from
specifying a RADIUS server to enabling the FTP line:
1
Transferring Files
ERX Edge Routers
Use the dir command to monitor files on the FTP server. Use the show
ftp-server and show users commands to monitor settings of the FTP
server.
show ftp-server
Field descriptions
Statistics since last system reload data about the connection attempts
since you last booted the system
attempts number of attempts to connect
failed hosts number of connection attempts that failed because of
disallowed host addresses
failed users number of connection attempts that failed because users
were not authenticated
4-35
4-36
CHAPTER 4
Managing the System
Example
host1#show ftp-server
FTP Server state: enabled, 0 open connections
Statistics since server was last started:
attempts: 32
failed hosts: 5
failed users: 7
Statistics since last system reload:
attempts: 35
failed hosts: 5
failed users: 8
show users
Field descriptions
Example
host1#show users
line
number
connected
line name
------
--------------
0*
console 0
vty 3 (ftp)
vty 4 (telnet)
user
----fred
from
connected since
----------
----------------
console
02/12/2001 19:57
10.10.0.64
02/12/2001 20:04
10.10.0.64
02/12/2001 20:04
You can shorten the time it takes to copy a release from a server and
reduce the amount of storage needed for a release. At the default setting,
all subsystems are included when you copy a release from a server. Use
the exclude-subsystem command to specify subsystems that you do not
want to copy from the server. Use the show subsystems command to
verify which files are included and excluded when you copy a release
from a server. Follow this example:
1
Transferring Files
ERX Edge Routers
Exclude any subsystems in the release that you do not need for the
configuration.
host1#(config)#exclude-subsystem ct1
host1#(config)#exclude-subsystem coc12
host1#(config)#exclude-subsystem oc12s
exclude-subsystem
Use to exclude any subsystems that are in a release that you do not need for
the system configuration.
Example
host1(config)#exclude-subsystem ct1
The subsystems that you indicate are added to the exclude list. All
subsequent release copies will exclude the images for these subsystems from
the release copy.
Example
host1(config)#no exclude-subsystem ct1
Use the no version of this command with the subsystem name to remove a
subsystem from the exclude list. Use the no version of this command without a
subsystem name to remove all subsystems from the exclude list.
4-37
4-38
CHAPTER 4
Managing the System
show subsystems
Specify either a local filename or remote path and filename to view the
subsystems that are included in a software release file other than the current
software release on the system.
Field descriptions
Required number of bytes of data for the required portion of the release
Included Subsystems number of bytes of data for the included subsystems
listed. All included subsystems in the release are listed.
Use the command before you copy a release to verify which subsystems are
present in the release.
Example
host1#show subsystems file m:/x/images/x-y-z.rel
oc3
ct3
ut3f
ut3a
ct1
dpfe
oc12p
oc12a
ge
fe8
coc12
oc12s
Use the command after copying a release to verify which subsystems are
included and excluded.
Example
host1#show subsystems file x8.rel
Required: 1423005
bytes
Included Subsystems:
ct3
ut3f
ut3a
dpfe
oc12p
oc12a
ge
fe8
coc12
oc12s
27882192
bytes
Excluded Subsystems:
6840211
bytes
oc3
ct1
You can specify a VRF context in which the request takes place.
Depending on how the remote system accepts Telnet requests, you can specify
a port number or port name through which the system will connect to the
remote host. In the Transmission Control Protocol (TCP), ports define the ends
of logical connections that carry communications. In most cases, you can
accept the default, port number 23, the Telnet port. For more information on
port numbers and associated processes, see www.iana.org.
You can force Telnet to use the IP address of an interface that you specify as its
source address.
Example
host1#telnet 192.168.35.13 fastEthernet 0
There is no no version.
Example
telnet listen
host1(config)#virtual-router 3
host1:3(config)#telnet listen port 3223
Configuring DNS
You can configure virtual routers to act as name resolvers for Domain
Name Service (DNS). DNS is a client/server mechanism that maps IP
addresses to hostnames.
The name resolver is the client side of DNS and receives
address-to-hostname requests from its own clients when they want to
contact hosts on other networks. By polling name servers, the name
4-39
4-40
CHAPTER 4
Managing the System
resolver learns name-to-address translations for the hosts its clients want
to contact.
A name server may provide the translation from its cache or may poll
servers lower in the DNS hierarchy to obtain a translation. Typically,
name servers at the top of the hierarchy recognize top level domain
names and know which servers to contact for information about more
detailed domain names. See Figure 4-3.
Clients for name
resolver Boston
DNS messages from a name resolver to a name server must include the
domain name for the resolvers clients. Consequently, you must specify a
default domain name for the clients. The default domain name is
appended to unqualified hostnames (those without domain names).
The name resolver must be able to access at least one name server.
Accordingly, you must configure a static route to a gateway that provides
access to the name server and assign the name server to the name
resolver. See Assigning Name Servers, later in this chapter.
Each virtual router can have its own name resolver and domain name.
However, if two virtual routers use the same name servers and belong to
the same local domain, you do not need to configure name resolvers on
both virtual routers. See Using One Name Resolver for Multiple Virtual
Routers, later in this chapter.
Configuring DNS
ERX Edge Routers
References
For more information about the DNS, consult the following resources:
RFC 1035 Domain Names Implementation and Specification
(November 1987)
RFC 2308 Negative Caching of DNS Queries (DNS NCACHE)
(March 1998)
Assigning Name Servers
Define static routes to the gateways that provide access to the name
servers.
Example
host1(config)#virtual-router boston
host1:boston(config)#ip route 0.0.0.0 0.0.0.0
gatewayIpAddress
host1:boston(config)#ip domain-lookup
host1:boston(config)#ip domain-name urlofinterest.com
host1:boston(config)#ip name-server 10.2.0.3
host1:boston(config)#ip name-server 10.2.5.5
ip domain-lookup
Use to enable the system to query the configured DNS name servers when it
needs an IP-hostname-to-IP-address translation.
Example
host1(config)#ip domain-lookup
4-41
4-42
CHAPTER 4
Managing the System
ip domain-name
Use to define a default domain name for the clients that a name resolver
serves.
You must define a default domain name for each name resolver. Multiple name
resolvers can use the same default domain name.
Example
host1(config)#ip domain-name bigcompany.com
Use the no version to delete the domain name; that is, the domain name will no
longer be appended to hostnames in the static host table.
Use to specify a DNS name server that the system can query for
hostname-to-IP-address resolution.
Example
ip name-server
You can use one name resolver for multiple virtual routers if those virtual
routers use the same name servers and belong to the same local domain.
To do so, complete the following steps:
Example
Specify that the second virtual router should use the name resolver
you configured for the first virtual router.
Repeat steps 2 and 3 for other virtual routers that you want to point
to this name resolver.
To configure the virtual router boston to use the same name servers as the
default router, enter the following commands.
host1(config)#virtual router boston
host1:boston(config)#ip domain-lookup transit-virtual-router
default
Troubleshooting
ERX Edge Routers
ip domain-lookup transit-virtual-router
Use to configure a virtual router to use the name servers you configured for
another virtual router.
Example
host1:boston(config)#ip domain-lookup transit-virtual-router
default
Use the no version to stop a virtual router from using the same name servers
you configured for another virtual router.
Monitoring DNS
After you configure DNS, you can use the show ip domain-lookup
command to view information about the name servers.
show ip domain-lookup
Use to display the name servers that you have specified on the system with the
ip name-server command.
Field descriptions
Example
In this example, the virtual router boston uses the name resolver on the
default virtual router.
host1#show ip domain-lookup
Bind to client: (boston)default
Using following Domain Name Servers:
10.2.0.3
11.1.1.1
10.1.1.1
Using following Local Domain Names :
urlofinterest.com
concord
Use the no version to disassociate this NFS server from the current virtual
router.
Troubleshooting
You can use log commands to discover and isolate problems with the
system. For information on using the log commands, see Chapter 11,
Logging System Events. You can also use dump files to troubleshoot line
module failures.
4-43
4-44
CHAPTER 4
Managing the System
You can enable the system to create a core dump file if a module fails.
You can choose to send the core dump file to an FTP server or save the
file in a compressed form to NVS. Juniper Networks Customer Service
can then access the core dump file and analyze it to determine what went
wrong. The core dump is disabled by default. You can enable the core
dump from Boot mode or Global Configuration mode.
Caution: Create a core dump file only under the direction of Juniper Networks
Customer Service. Network function can be disrupted if you create a core dump file
while the system is running in a network.
Boot Mode
Access Boot mode by reloading the SRP module; then press the
<mb> key sequence (case insensitive) during the countdown.
Specify where the system should transfer the core dump file.
Set the IP address and mask of the system interface over which you
want to send the core dump file.
Specify the gateway through which the system sends the core dump
file to the FTP server.
(Optional) Set a username and password for FTP access to the server
where you transferred the core dump file.
Example
Specify where the system should transfer the core dump file.
Set the IP address and mask of the system interface over which you
want to send the core dump file.
Troubleshooting
ERX Edge Routers
Specify the gateway through which the system sends the core dump
file to the FTP server.
(Optional) Set a username and password for FTP access to the server
where you want to transfer the core dump file.
Example
exception dump
Use to specify where the system should transfer the core dump file.
To send the file to an FTP server, enter the IP address of the FTP server and
the name of the directory on the server to which the system will transfer the
file.
To send the core dump file to NVS memory, use the local keyword.
Example
host1(config)#exception dump 192.168.56.7 CORE_DUMPS
Use to specify the gateway through which the system sends the core dump file
to the FTP server.
Example
exception gateway
Use the no version to restore the IP address to the null default value.
Use to set a user name and password for FTP access to the server where you
transferred a core dump file. The default settings are the username anonymous
and no password.
Specify the number 8 before the user name and before the password to encrypt
these values. By default, the user name and password are not encrypted.
Example
4-45
4-46
CHAPTER 4
Managing the System
exception source
Use to set the IP address and mask of the system interface over which you
want to send the core dump file to the FTP server.
Example
host1(config)#exception source 192.168.1.33 255.255.255.0
Use the no version to restore the IP address and mask to the default null
values.
Reloads the system software (.rel) file and the configuration (.cnf) file on the
router.
Example
reload
host1#reload
There is no no version.
Use to display the parameters associated with the core dump operation.
Field descriptions
Dump host IP address address of the host where the system is configured
to transfer the dump file
Dump protocol protocol used to send the core dump file; currently only
FTP is supported
User name name configured for access to the core dump file on the FTP
server
Password password configured for access to the core dump file on the
FTP server
Example
host1#show exception dump
Dump host IP address: 192.168.56.7
Dump directory:CORE_DUMPS/
Dump protocol: FTP
User name: user_name
Troubleshooting
ERX Edge Routers
Password: user_password
Interface IP address:
Interface netmask:
Gateway IP address:
If a module fails and saves a core dump file to NVS memory (which can
take several minutes), you must transfer the file to a network host to
examine it. You can transfer the core dump file when the module is back
online or has assumed a redundant status. For information about the
status of modules, see ERX Installation and User Guide, Chapter 8,
Troubleshooting. To transfer the core dump file to a network host, use the
copy command.
In a system with two SRP modules, the following behavior applies if you
have configured the SRP modules to save core dump files to an FTP
server:
If the primary SRP module fails, it saves the core dump file to the FTP
server before the standby SRP module assumes control.
If the standby SRP module fails, it must save the core dump file to
NVS because it has no access to any configured network host.
The show version command output indicates the failed SRP module
state as not responding during the save process. Consequently, when
the failed SRP module recovers and assumes the role of redundant
module, the show version command output indicates the SRP module
state as standby. You can now transfer the core dump file to a network
host for examination. For example, to transfer the file
SRP_1_SC_05_24_2000_02_20.dmp from NVS of the failed SRP
module to the host server1, enter the following command:
host1#copy SRP_1_SC_05_24_2000_02_20.dmp
host:/public/server1/SRP-5G_1_SC_05_24_2000_02_20.dmp
copy
You cannot create or copy over files generated by the system; however, you
can copy such files to an unreserved filename.
Example
host1#copy fault.dmp host:/public/server1/fault.dmp
There is no no version.
4-47
4-48
CHAPTER 4
Managing the System
The dump file indicates which module has failed by referencing that
modules hardware slot number. The hardware slot number is the slot
number designation on the systemss backplane. This slot number is
different from the chassis slot number that appears on the front of the
chassis and in screen displays (for example, in the display resulting if you
issue the show version command). Table 4-6 shows how the chassis slot
numbers relate to the hardware slot numbers.
Table 4-6 Chassis slot numbers vs. hardware slot numbers
ERX-700 series
Hardware Slot
Number
Slot Number
on Chassis
ERX-1400 series
Hardware Slot
Number
10
11
10
12
11
13
12
14
13
15
baseline show-delta-counts
Use to configure the system to always display statistics relative to the most
recent appropriate baseline.
The system collects many statistics during its operation. Various show
commands are available to display these statistics. Baselining allows the user
to identify a point in time relative to which such statistics can be reported.
Typically, the optional delta keyword is used with show commands to specify
that baselined statistics are to be shown. This command applies the delta
function implicitly.
Example
host1#baseline show-delta-counts
You can create a configuration script from the output by saving it as a file with
the .scr extension.
You can use the output filtering feature of the show command to include or
exclude lines of output based on a text string you specify. See Chapter 2,
Command Line Interface, for details.
Optionally, specify the all keyword to view both the system environment
information and the detailed temperature status table, or specify the table
keyword to view only the temperature status table.
Field descriptions
show configuration
show environment
4-49
4-50
CHAPTER 4
Managing the System
Example
host1#show environment all
chassis: 14 slot (id 0x3, rev. 0x0)
fabric: 5 Gbps (rev. 1)
fans: ok
nvs: ok (81MB flash disk, 54% full)
power: A ok, B not present
srp redundancy: none
*** slots: cards missing or offline
online: 6 9
standby: 8
offline: 2
empty: 0 1 3 4 5 7 10 11 12 13
line redundancy: 1 redundancy group(s)
width 6, spare 8, primary 9
temperature: ok
timing: primary
primary: internal SC oscillator (ok)
secondary: internal SC oscillator (ok)
tertiary: internal SC oscillator (ok)
auto-upgrade enabled
*** system operational: no
processor
processor
IOA
IOA
temperature
temperature
temperature
temperature
slot
(10C - 70C)
status
(10C - 70C)
status
----
-----------
-----------
-----------
-----------
31
normal
30
normal
31
normal
30
normal
31
normal
30
normal
31
normal
30
normal
4-51
4-52
CHAPTER 4
Managing the System
show hosts
Field Descriptions
Example
host1#show hosts
Static Host Table
----------------name
ip address
type
----
-----------
----
host1
10.2.0.124
ftp
show processes
Use no keywords or use the cpu keyword to display the CPU utilization.
5 second utilization (%) CPU utilization by process for the last 5 seconds
1 minute utilization (%) CPU utilization by process for the last minute
5 minute utilization CPU utilization by process for the last 5 minutes
Examples
bytes
blocks
blocks
allocated
free
---------------------
---------
--------
---------
------
--------
system
110430808
84680416
5284
256
84530744
207600
303776
621
145
7216
10120
252008
252008
file system
Crldp.osHeap 1
IpTemplateMgr General
allocated
free
free
block
104
2097032
2096992
134872
127256
21
127216
32752
32752
637536
411000
14
364832
radius-rx*
39984
39984
radius-tx*
39984
39984
rip *
32752
32752
router buffer
524272
ssscHeap
2097136
Lsm.osHeap
Rsvp.networkBuffers 1
Rsvp.osHeap 1
.
.
.
per
task name
invoked
-------
-----------
aaaServer
agent1
ar1EthHelp
percent
time
--------------------aaaAtm1483Config
running
second
running
(msec)
time
--------
-------
0%
52
260
0%
399
3600
0%
362856
590
0%
.
.
.
templateMgr
48
540
0%
timerd
2346566
32
0%
~GONE~
405202
184700
0%
~IDLE~
360
0%
8840490
121
51050
0%
~INTERRUPT~
524272
2097136
4-53
4-54
CHAPTER 4
Managing the System
average
time
per
second
minute
minute
invocation
utilization
utilization
utilization
task name
(usec)
(%)
---------------------
----------
-----------
aaaAtm1483Config
(%)
(%)
-----------
----------0
aaaServer
5000
agent1
9022
ar1EthHelp
.
.
.
templateMgr
11250
timerd
~GONE~
455
~IDLE~
---
~INTERRUPT~
show reboot-history
You can display the current reboot.hty file or a saved reboot history file.
Field descriptions
Entry number of entry in reboot history; numbers range from lowest (most
recent reset) to highest (oldest reset)
Example
host1#show reboot-history
*** Entry
1 ***
2 ***
3 ***
show version
Use to display the configuration of the system hardware and the software
version.
Field descriptions
Model identification
Copyright copyright details for the system software
System Release filename, version, and date of the system software
currently running on the system
System running for time elapsed since the last boot of the system, date
and time of last boot
4-55
4-56
CHAPTER 4
Managing the System
type kind of module; an e at the end of an SRP module type (for example,
SRP-5Ge) indicates that the module includes error checking code (ECC)
slot uptime length of time for which the module has been operational; a
value of --- indicates that the module is not available.
Example
host1#show version
Juniper Networks Edge Routing Switch ERX-700
Copyright (c) 1999-200X Juniper Networks, Inc.
type
admin
spare
release
slot uptime
---
mc_341.rel 0d00h:12m:52s
---
---
---
---
---
---
---
---
---
---
---
---
3
4
5
6
online CT3
---
---
online GE
---
---
enabled
--enabled
---
---------
mc_341.rel 0d00h:12m:33s
--mc_341.rel
---
-------
Managing Line
Modules and SRP
Modules
This chapter describes how to manage line modules and SRP modules in
the ERX system.
Topic
Page
Overview
5-1
5-2
5-2
5-4
5-5
Software Compatibility
5-5
5-6
5-14
5-19
5-24
5-31
Monitoring Modules
5-33
Overview
When managing line modules and SRP modules, you need to consider
both software and hardware procedures. For example, before you remove
an SRP module, you must enter the halt command to prevent damage to
nonvolatile storage (NVS).
This chapter describes the software issues associated with managing
modules. Each section in the chapter covers a different topic; where
5-2
CHAPTER 5
Managing Line Modules and SRP Modules
Use to disable the line module or SRP module in the specified slot.
You can use this command to disable a module so that you can run diagnostic
tests on the module.
Example
host1(config)#slot disable 3
There is no no version.
Use to enable the line module or SRP module in the specified slot.
Allows you to restart the module that was installed in the slot.
Example
slot enable
host1(config)#slot enable 3
There is no no version.
Caution: If you do not use the halt command before removing or powering down
an SRP module, the systems NVS may become corrupted.
Use to stop the systems operation before you remove or power down an SRP
module.
Specify neither the primary nor the secondary keyword to stop operation on
both SRP modules.
Specify the keyword primary to stop operation on the primary SRP module
only. This action causes the redundant SRP module to assume the primary
role.
If you specify the force keyword, the procedure will fail if the SRP modules are
in certain states, such as during a synchronization. In these cases, the system
will display a message that indicates that the procedure cannot currently be
performed and the reason why. However, if the SRP modules are in other
states that could lead to a loss of configuration data or NVS corruption, the
system displays a message that explains the state of the SRP modules and
asks you to confirm (enter yes or no) whether you want to proceed.
If you do not specify the force keyword, the procedure will fail if the SRP
modules are in any state that could lead to loss of configuration data or NVS
corruption, and the system will display a message that explains why the
command failed.
When you issue this command, the system prompts you for a confirmation
before the procedure starts.
Remove or power down the SRP module within 2 minutes of executing the halt
command. Otherwise, the SRP module will automatically reboot.
Examples
host1#halt
host1#halt primary
host1#halt standby force
There is no no version.
5-3
5-4
CHAPTER 5
Managing Line Modules and SRP Modules
Use to delete the configuration of the line module in the selected slot after you
install a different type of line module.
This command allows you to create a fresh configuration for the module
installed in the slot.
You can also use this command to accept an empty slot that was previously
occupied.
Depending on the slots previous configuration, this system may take a few
moments to execute this command.
The following is a sample Log message resulting from putting an OC3 line
module in a slot that was previously configured for a CT3 line module:
ERROR 04/05/1999 07:50:32 system (slot 4): boardid mismatch:
read 0x5 (OC3 single port), configured 0x7 (Channelized
T3)
To resolve the problem, issue the slot accept command for slot 4.
Example
host1(config)#slot accept 4
There is no no version.
Use to delete the configuration of the line module in the selected slot before
you install a different type of line module.
This command allows you to create a fresh configuration for the module
installed in the slot.
Example
slot erase
host1(config)#slot erase 3
There is no no version.
Software Compatibility
An ERX software release supports a specific set of line modules and I/O
modules. Before you install a new line module or I/O module, you should
install a software release that supports the new module.
Line Modules
If the system uses a software version that does not support a line module
that you install, you see the message unrecognized board type, and the
system disables the module. When you issue a show version command,
the state of the line module is disabled (admin).
If you subsequently boot the system with software that supports the line
module, the line module becomes available and its state is enabled.
5-5
5-6
CHAPTER 5
Managing Line Modules and SRP Modules
I/O Modules
If the system uses a software version that does not support an I/O module
that you install, the I/O module will be unavailable, and you will not be
able to upgrade the software on the system. To upgrade the software:
1
Reboot the line module that corresponds to this I/O module. See
ERX System Basics Configuration Guide, Chapter 8, Booting the
System.
When the line module has rebooted, install the I/O module.
Upgrade the software on the system. See ERX Installation and User
Guide, Appendix E, Installing ERX System Software.
For line rate performance, the total bandwidth required by the line
modules in the slot group must not exceed the bandwidth available from
the SRP module. In this case, the combination of line modules that can
reside in a slot group depends on the following:
Restrictions on certain combinations of line modules
The number of slots per group
The bandwidth available from the SRP module
The bandwidth required by each line module
In the case of the SRP-5G+ and SRP-10G modules, the switches
(upper and lower) that the line module can use.
Restricted Line Module Combinations
5-7
5-8
CHAPTER 5
Managing Line Modules and SRP Modules
The SRP-5G module has one switch that supplies 100% of the bandwidth
for line modules. However, the SRP-5G+ and SRP-10G modules
comprise two switches; each switch provides 50% of the bandwidth. The
line modules in a slot group cannot operate at line rate if:
The sum of their bandwidths exceeds the bandwidth that the SRP
module can supply per slot group.
The sum of the bandwidths they require from one SRP switch exceeds
the bandwidth that the SRP switch can supply per slot group.
For example, the T3 line module requires 0.54 Gbps bandwidth and uses
only the top switch of the SRP-10G module. To operate three T3 line
modules in a slot group at line rate, you would need 1.62 Gbps bandwidth
from the top switch. The top switch of the ERX-1410 system offers 1.25
Gbps bandwidth per slot group. Three T3 line modules cannot operate at
line rate with an SRP-10G module.
Table 5-1 shows the bandwidth that each line module requires for line
rate performance and the switches that the line module can use on the
SRP-5G+ and SRP-10G modules.
Table 5-1 Bandwidth statistics for line modules
Line Module
Total Bandwidth
Required (Gbps)
CE1
0.20
cOCx/STMx
2.46
Both switchesa
COCX-F3
2.46
Both switchesa
CT1
0.20
CT3
0.54
CT3/T3 FO
2.46
Both switchesa
E3
0.54
Line Module
Total Bandwidth
Required (Gbps)
FE-2
0.52
Either switch
GE/FE
2.46
Both switchesa
HSSI
0.54
IPSec Service
2.46
Both switchesa
1.2
Either switch
OCx/STMx ATM
1.22
Both switchesa
OCx/STMx POS
2.46
Both switchesa
T3
0.54
TSM
2.46
Both switchesa
X.21/V.35
0.20
Table 5-2 shows a list of combinations of line modules that allow line rate
performance. However, if performance lower than line rate is acceptable,
you can use any combination of line modules (other than the restricted
combinations) in a slot group.
For example, the SRP-10G module offers a total bandwidth of 2.5 Gbps
for each slot group. The GE line module requires 2.46 Mbps bandwidth
for operation at line rate, and can use both switches in the SRP-10G
module. If you require line rate from a GE line module, install only one
GE line module in the slot group. However, if lower performance is
acceptable, you can install two or three GE line modules in a slot group
and enable bandwidth oversubscription.
When bandwidth oversubscription is enabled, all line modules, except the
OC3 (dual port) and FE-2 line modules, optimize use of the resources
available. For example, if two GE line modules are installed in a slot
group, each line module is allocated 50% of the available bandwidth.
However, if one line module is using less bandwidth than it is allocated,
the other line module can use more bandwidth than it is allocated and
can operate at a greater line rate. The OC3 (dual port) and FE-2 line
modules use a fixed portion of the available bandwidth; they cannot take
advantage of resources unused by other line modules.
To ensure the best performance, when you change line modules in a slot
group that contains FE-2 or OC3 (dual port) line modules, you should
optimize the bandwidth. See Optimizing Bandwidth, later in this chapter.
5-9
5-10
CHAPTER 5
Managing Line Modules and SRP Modules
One CE1, CT1, CT3, E3, FE-2, HSSI, OC3 (dual port), T3, or X.21/V.35 line module,
and one empty slot in slot group 1
Two CE1, CT1, CT3, E3, FE-2, HSSI, T3, or X.21/V.35 line modules in any
combination in slot group 1
One CE1, CT1, CT3, E3, FE-2, HSSI, OC3 (dual port), T3, or X.21/V.35 line module in
slot groups 2, 3, and 4
One CE1 and one E3 line module in slot group 1, one HSSi module in slot group 2, one
FE-2 module in slot group 3, and one OC3 (dual port) line module in slot group 4
SRP-10G in ERX-700
system
One of any supported line module and one empty slot in slot group 1
One OCx/STMx ATM line module and one CE1, CT1, CT3, E3, FE-2, HSSI, OC3 (dual
port), T3, or X.21/V.35 line module in slot group 1
Two CE1, CT1, CT3, E3, FE-2, HSSI, OC3 (dual port), T3, or X.21/V.35 line modules in
any combination in slot group 1
One CE1, cOCx/STMx, COCX-F3, CT1, CT3, CT3/T3 FO, OC3 (dual port), E3, FE-2,
GE/FE, HSSI, IPSec Service, OCx/STMx, T3, or X.21/V.35 line module or one TSM
line module in slot groups 2, 3 or 4
One CE1 and one E3 line module in slot group 1, one HSSi module in slot group 2, one
FE-2 module in slot group 3, and one OC3 (dual port) line module in slot group 4
A GE/FE line module and any other line module in slot group 1
Table 5-2 Combinations of line modules for line rate performance (continued)
SRP Module and
System
SRP-10G in ERX-1410
system
One of any supported line module and two empty slots in any slot group
One OC3 (dual port) line module and one or two CE1, CT1, CT3, E3, HSSI, T3, or
X.21/V.35 line modules in any combination in any slot group
One OC3 (dual port) line module and one FE-2 line module in any slot group
One OCx/STMx ATM line module and one or two CE1, CT1, FE-2, or X.21/V.35 line
modules in any combination in any slot group
One OCx/STMx ATM line module and one CT3, E3, HSSI, or T3 line module and one
empty slot in any slot group
Two OCx/STMx ATM line modules and one empty slot in any slot group
Two CE1, CT1, CT3, E3, FE-2, HSSI, OC3 (dual port), T3, or X.21/V.35 line modules in
any combination and one empty slot in any slot group
Two CT3, E3, HSSI, or T3 line modules and one CE1, CT1, FE-2, or X.21/V.35 line
module in any combination in any slot group
One CT3, E3, HSSI, or T3 line module and two CE1, CT1, FE-2, or X.21/V.35 line
modules in any combination in any slot group
Three CE1, CT1, FE-2, or X.21/V.35 line modules in any combination in any slot group
Two CE1 and one E3 line modules in slot group 1, two HSSI modules in slot group 2,
an OCx/STMx POS line module in slot group 3, and a GE/FE line module in slot
group 4
5-11
5-12
CHAPTER 5
Managing Line Modules and SRP Modules
Table 5-2 Combinations of line modules for line rate performance (continued)
SRP Module and
System
SRP-5G+ in ERX-705
system
One of any supported line module and one empty slot in slot group 1
One OCx/STMx ATM line module and one CE1, CT1, CT3, E3, FE-2, HSSI, OC3 (dual
port), T3, or X.21/V.35 line module in slot group 1
Two CE1, CT1, CT3, E3, FE-2, HSSI, OC3 (dual port), T3, or X.21/V.35 line modules in
any combination in slot group 1
One CE1, cOCx/STMx, COCX-F3, CT1, CT3, CT3/T3 FO, OC3 (dual port), E3, FE-2,
GE/FE, HSSI, IPSec Service, OCx/STMx, T3, or X.21/V.35 line module or one TSM in
slot groups 2, 3 or 4
Two OCx/STMx ATM line modules (total 2.44 Gbps) in slot group 1, a HSSI module
(0.54 Gbps) in slot group 2, a CT3 3 line module (0.54 Gbps) in slot group 3, and a T3
Frame (0.54 Gbps) line module in slot group 4
Two OCx/STMx ATM line modules (total 2.44 Gbps) in slot group 1, a GE/FE line
module (2.46 Gbps) in slot group 3, and an OCx/STMx POS line module (2.46 Gbps) in
slot 4 (violates chassis limitation)
Two OCx/STMx POS line modules (total 4.92 Gbps) in slot group 1 (violates slot group
limitation)
After you have installed a suitable combination of line modules, you must
specify the type of performance. To specify the type of performance:
1
If the setting is not the one you want, enable or disable bandwidth
oversubscription.
bandwidth oversubscription
Example
host1#bandwidth oversubscription
Example 2: This example shows the display that appears after you issue the no
bandwidth oversubscription command to disable bandwidth
oversubscription.
host1#no bandwidth oversubscription
host1#show bandwidth oversubscription
Bandwidth oversubscription is currently in effect.
Bandwidth oversubscription will not be in effect the next
time the system reboots.
Example 4: This example shows the display that appears after you issue the
bandwidth oversubscription command to enable bandwidth
oversubscription.
host1#bandwidth oversubscription
host1#show bandwidth oversubscription
Bandwidth oversubscription is currently not in effect.
Bandwidth oversubscription will be in effect the next time
the system reboots.
5-13
5-14
CHAPTER 5
Managing Line Modules and SRP Modules
Troubleshooting
size of the routing table, because the system must reload the interface
configuration and the routing table from the SRP module.
If the line module software is not compatible with the running SRP
module software release, a warning message appears on the console.
Automatic Switchover
Provided you have not issued the redundancy lockout command for the
primary line module, the system switches over to the spare line module
automatically if it detects any of the following failures on the primary line
module:
Power-on self-test (POST) failure
Software-detected unrecoverable error
Software watchdog timer expiration
Primary line module failure to respond to keepalive polling from the
SRP module
Removal, disabling, or reloading of the primary line module
Missing or disabled primary line modules when the system reboots
Resetting the primary line module via the concealed push button
Limitations of Automatic Switchover
5-15
5-16
CHAPTER 5
Managing Line Modules and SRP Modules
You can install only one spare line module in the group of slots covered
by the redundancy midplane. If the system is using the spare line module,
no redundancy is available. It is desirable to revert to the primary module
as soon as possible. By default, the system does not automatically revert to
the primary module after switchover; however, you can configure it to do
so. (See Configuring Line Module Redundancy, later in this chapter.)
Before reversion can take place, the primary line module must complete
the POST diagnostics.
Configuring Line Module Redundancy
Use to prevent the system from switching automatically to a spare line module
if the primary module in the specified slot fails.
Example
host1(config)#redundancy lockout 5
Use to enable the system to revert from all spare line modules to the
associated primary line modules automatically.
Reversion takes place when the primary line module is once again available
unless you specify a time of day. In that case, reversion takes place only when
the primary module is available and after the specified time.
Example
redundancy revertive
When the system is running and a redundancy group is installed, you can
manage the redundancy situation as follows:
Force switchover manually.
Force reversion manually.
redundancy force-failover
Use to force the system to switch from the primary line module in the specified
slot to the spare line module.
The command causes a single switchover. When you reboot, the system will
revert to the configured setting for this slot.
Example
host1#redundancy force-failover 5
There is no no version.
Use to force the system to revert to the primary line module in the specified
slot.
The system acts on this command immediately unless you specify a time or a
time and date that the action is to take place.
The command causes a single reversion. When you reboot, the system uses
the configured setting for this slot.
Example
redundancy revert
There is no no version.
You can use show commands to monitor the status of redundancy groups
and line modules.
show environment
Use to display detailed information about the line modules and SRP modules.
See Monitoring Modules, later in this chapter, for details and examples.
show hardware
5-17
5-18
CHAPTER 5
Managing Line Modules and SRP Modules
show redundancy
Field descriptions
backed up by slot slot that contains the line module that is a spare for this
primary line module
sparing for slot slot that contains the primary line module for which this line
module is a spare
Example
In the following example, the user issues a show redundancy command, then
a force failover command. Finally, the user issues another show redundancy
command. The two displays show how the states of the primary and spare line
modules change.
host1#show redundancy
automatic reverting is off
hardware
slot
role
----
--------
redundancy midplane
type
rev
-------------------
lockout
backed up
config
by slot
for slot
sparing
------
---------
--------
---
---
---
---
---
---
---
---
---
---
---
---
spare
---
---
---
primary
protected
---
---
host1#redundancy force-failover 9
host1#show redundancy
automatic reverting is off
hardware
slot
role
----
--------
redundancy midplane
ID
rev
-------------------
lockout
backed up
config
by slot
for slot
sparing
------
---------
--------
---
---
---
---
---
---
---
---
---
---
---
---
spare
---
---
primary
protected
---
show version
The redundant SRP module restarts and assumes the primary role
without reloading new code. (When upgrading software, you must
reload the software on the redundant SRP module. See ERX
Installation and User Guide, Appendix E, Installing ERX System
Software.)
5-19
5-20
CHAPTER 5
Managing Line Modules and SRP Modules
You can install a redundant SRP module into a running system, provided
that the redundant SRP module has a valid software release on its NVS
card. Access to a software release in NVS ensures that the redundant SRP
module can boot; the release need not be the same as that on the primary
SRP module. To install a redundant SRP module into a running system,
follow these steps:
Warning: Do not insert any metal object, such as a screwdriver, or place your hand
into an open slot or the backplane when the system is on. Remove jewelry
(including rings, necklaces, and watches) before working on equipment that is
connected to power lines. These actions prevent electric shock and serious burns.
Caution: When handling modules, use an antistatic wrist strap connected to the
systemss ESD grounding jack, and hold modules by their edges. Do not touch the
components, pins, leads, or solder connections. These actions help to protect
modules from damage by electrostatic discharge.
Install the redundant SRP module into the open SRP slot (slot 6 or 7
for the ERX-1400 series; slot 0 or 1 for the ERX-700 series).
For detailed information about installing the SRP module, see the
ERX Installation and User Guide.
Wait for the redundant SRP module to boot, initialize, and reach the
standby state.
When the module is in standby state, the REDUNDANT LED is on
and the ONLINE LED is off. If you issue the show version
command, the state field for the slot that contains the redundant
SRP module should be standby.
Example
reload slot
host1#reload slot 7
There is no no version.
Use to force the file system of the redundant SRP module to synchronize with
the NVS file system of the primary SRP module.
If you synchronize the redundant SRP module with the primary SRP module
and the redundant module is armed with a release different than the one it is
currently running, the redundant SRP module is automatically rebooted to load
the armed release.
Example
synchronize
host1#synchronize
There is no no version.
You can prevent the redundant SRP module from taking over when:
The primary SRP module experiences a software failure.
You push the reset button on the primary SRP module.
Note: If you do not configure this option, when troubleshooting an SRP module,
disconnect the other SRP module from the system. This action prevents the
redundant SRP module from taking over if you push the reset button on the
primary SRP module.
5-21
5-22
CHAPTER 5
Managing Line Modules and SRP Modules
Refer to the commands and guidelines in the previous section and below.
disable-switch-on-error
Use to prevent the redundant SRP module from taking over if the primary SRP
module experiences a software failure or if you push the reset button on the
primary SRP module.
Issue the sync command immediately before you issue this command.
If you issue the disable-switch-on-error command, and later issue the srp
switch command, the redundant SRP module waits about 30 seconds before it
takes over from the primary SRP module.
Example
host1(config)#disable-switch-on-error
Use the no version to revert to the default situation, in which the redundant
SRP module takes over if the primary SRP module experiences a software
failure.
Use to force the NVS file system of the redundant SRP module to synchronize
with the NVS file system of the primary SRP module.
If you synchronize the redundant SRP module with the primary SRP module
and the redundant module is armed with a release different than the one it is
currently running, the redundant SRP module is automatically rebooted to load
the armed release.
Example
synchronize
host1#synchronize
There is no no version.
srp switch
Use to switch from the primary SRP module to the redundant SRP module.
If you specify the force keyword, the procedure will fail if the SRP modules are
in certain states, such as during a synchronization. In these cases, the system
will display a message that indicates that the procedure cannot currently be
performed and the reason why. However, if the SRP modules are in other
states that could lead to a loss of configuration data or an NVS corruption, the
system displays a message that explains the state of the SRP modules, and
asks you to confirm (enter yes or no) whether you want to proceed.
If you do not specify the force keyword, the procedure will fail if the SRP
modules are in any state that could lead to a loss of configuration data or an
NVS corruption, and the system will display a message that explains why the
command failed.
When you issue this command, the system prompts you for a confirmation
before the command takes effect.
If you issue the disable-switch-on-error command, and later issue the srp
switch command, the redundant SRP module waits about 30 seconds before it
takes over from the primary SRP module.
If the system does not contain a redundant SRP module, this command has no
effect.
Example
host1#srp switch
host1#srp switch force
There is no no version.
You can determine the redundancy state of line modules and SRP
modules by examining their status LEDs. See Table 5-4 for a
description of the LEDs functions. In addition, if you issue the show
version command, the state field for the slot that contains the
redundant SRP module should be standby.
Table 5-4 Function of the online and redundant LEDs
ONLINE
LED
Off
Off
5-23
5-24
CHAPTER 5
Managing Line Modules and SRP Modules
On
Off
Off
On
On
On
The software contains a number of features that optimize the way the
system restores its configuration if it is shut down improperly:
The system tracks improper shutdowns.
If you shut down the system improperly, it will run an investigation of
the file allocation table (FAT) the next time it reboots.
The system creates backups of critical files.
When you install a new NVS card or restart the system after shutting it
down incorrectly, a utility scans the NVS card to detect corrupt
sectors. If the utility finds files or directories that contain corrupt
sectors, it removes the files and directories, because they can no longer
be used. The utility also fixes problems with unused sectors. If the
utility cannot correct a corrupt sector, it marks the sectors so that they
cannot be reused.
In a system that contains two SRP modules, if the scanning utility
detects corrupt sectors in NVS on the primary SRP module during
rebooting, the primary SRP module will reboot again. Both SRP
modules will now have standby status and will be rebooting. The first
SRP module to complete rebooting will assume the primary role.
For information about replacing NVS cards, see ERX Installation and
User Guide, Chapter 3, Installing ERX Modules.
Synchronizing NVS Cards
5-25
5-26
CHAPTER 5
Managing Line Modules and SRP Modules
Use to force the file system of the redundant SRP module to synchronize with
the NVS file system of the primary SRP module.
If you synchronize the redundant SRP module with the primary SRP module
and the redundant module is armed with a release different than the one it is
currently running, the redundant SRP module is automatically rebooted to load
the armed release.
Example
host1#synchronize
There is no no version.
If the capacity of the primary NVS card is equal to or smaller than that of
the redundant NVS card, the system copies all the files from the primary
NVS card to the redundant NVS card. However, if the capacity of the
primary NVS card exceeds that of the redundant NVS card, the system
creates an invisible synchronization reserve file on the primary NVS
card, provided that there is enough space for the file.
If autosync is enabled while you are copying very long scripts or installing
new software releases, it detects a disparity between the modules during
the middle of the process. This feature causes significant unnecessary
synchronization, resulting in prolonged copy times.
If you have installed a redundant SRP module, perform the following
steps before copying long scripts:
1
Refer to the commands and guidelines in the previous section and below.
disable-autosync
Use to turn off automatic synchronization between the primary and redundant
SRP modules.
Example
host1(config)#disable-autosync
5-27
5-28
CHAPTER 5
Managing Line Modules and SRP Modules
flash-disk initialize
Example
host1#halt primary
host1#reload
WARNING: Execution of this command will cause the system to
reboot.
Proceed with reload? [confirm]
Reload operation commencing, please wait...
[ Press mb]
:boot##flash-disk initialize
There is no no version.
You can copy the contents of NVS on the primary SRP module to a spare
NVS card. To do so:
1
flash-disk duplicate
Use to copy the contents of the primary NVS card to a spare NVS card.
The primary and spare NVS cards must be from the same manufacturer and
must have the same size.
Note: This command is available only in the Boot mode.
When you issue the flash-disk duplicate command, insert the original and
spare NVS cards when prompted. The system copies the NVS contents
incrementally, so you may need to exchange the NVS cards several times.
Example
host1#halt primary
host1#reload
WARNING: Execution of this command will cause the system to
reboot.
Proceed with reload? [confirm]
Reload operation commencing, please wait...
[ Press mb]
:boot##flash-disk duplicate
There is no no version.
You can scan NVS to find files with errors. You can also run a scan that
will remove files with errors and attempt to repair corrupted areas in
NVS. If the repair fails, the system will no longer use the corrupted areas.
flash-disk scan
If the system contains primary and redundant modules, NVS on the primary
SRP module will be scanned.
Example
In this example, the user scans NVS and finds one file with an error. The user
then issues the flash-disk scan with the repair keyword to remove the file.
Finally, the user scans NVS again, and finds no files with errors.
:boot##flash-disk scan
Proceed with Flash disk scan? [confirm]
Srp PCMCIA Card Scan...
Boot Block OK
File Allocation Table OK
Root Directory OK
5-29
5-30
CHAPTER 5
Managing Line Modules and SRP Modules
:boot##flash-disk scan
Proceed with Flash disk scan? [confirm]
Srp PCMCIA Card Scan...
Boot Block OK
File Allocation Table OK
Root Directory OK
Checking File Space
Please Wait...
Checking Free Space
Please Wait...
PCMCIA Card Scan successful!
There is no no version.
Use the show nvs command to monitor information about NVS on the
primary SRP module.
show nvs
Field descriptions
total nvs file sizes sum of sizes of all files in NVS, in bytes
total nvs file errors number of read and write errors in all files in NVS
nvs flash in use NVS used, in bytes
available nvs flash NVS available, in bytes
total nvs file sizes =
228864
1265152
35435008
Example
host1-0-1-90(config)#interface fastEthernet 1/0
Monitoring Statistics
You can set a baseline and view statistics on the Fast Ethernet port of the
SRP I/O module in the same way that you would for other Ethernet
interfaces. See Chapter 6, Configuring Ethernet Interfaces.
5-31
5-32
CHAPTER 5
Managing Line Modules and SRP Modules
Slots 0 and 1 are reserved for SRP modules on the ERX-700 series; slots 6
and 7 are reserved for SRP modules on the ERX-1400 series. When you
configure the Fast Ethernet interface on an SRP module, the output of
the show config command always indicates that the interface is
configured in the lower of the two slots (slot 0 or slot 6). This is true if you
configure the interface on a redundant SRP module in the higher slot or
even if you have only one SRP module and it is installed in the higher slot,
as shown in the following example:
host1#show version
Juniper Networks Edge Switch Router ERX1400
Copyright (c) 1998-2001 Juniper Networks, Inc.
state
type
admin
spare
release
----
-------
------------
-------
-----
-------------
---
---
---
---
---
---
---
---
---
online
UT3a
enabled
---
x-y-z.rel
online
OC3dP2
enabled
---
x-y-z.rel
---
---
---
---
---
---
---
---
---
---
---
---
---
---
online
SRP-10G
enabled
---
x-y-z.rel
standby
OC3/OC12-ATM
enabled
spare
x-y-z.rel
---
---
---
---
---
---
---
10
online
OC3-4A
enabled
---
x-y-z.rel
11
online
OC3-4A
enabled
---
x-y-z.rel
12
online
OC3-4A
enabled
---
x-y-z.rel
13
---
---
---
---
---
host1#configure terminal
Enter configuration commands, one per line.
09:44)
Monitoring Modules
ERX Edge Routers
!
! Configuration script generated on TUE MAY 01 2001 20:33:20 UTC
boot config running-configuration
boot system x-y-z.rel
no boot backup
no boot subsystem
no boot backup subsystem
no boot force-backup
no boot slot
!
hostname "host1"
exception protocol ftp anonymous null
!
controller t3 2/0
[...]
!
interface fastEthernet 6/0
ip address 10.6.130.83 255.255.128.0
!
ip route 0.0.0.0 0.0.0.0 10.6.128.1
! Trap Source: <not configured>
! Note: SNMP server not running.
!
Monitoring Modules
Use the following commands to view information about line modules and
SRP modules.
show hardware
Use to display information about the SRP modules, line modules, and I/O
modules in the system.
Field descriptions
5-33
5-34
CHAPTER 5
Managing Line Modules and SRP Modules
Example
host1#show hardware
serial
assembly
assembly
slot
type
number
number
rev.
ram
(MB)
----
------
----------
----------
--------
----
SRP-5G
7199160022
3400002900
A03
128
---
---
---
---
---
---
---
---
---
---
OC3dP2
7199190218
3401002800
---
---
A02
64
---
---
---
CT3P2
7199160121
3401002501
A02
64
CT2
7199160311
3401002011
A03
64
number
of
serial
assembly
assembly
MAC
slot
type
number
number
rev.
addresses
----
----------
----------
----------
--------
---------
SRP-5G I/O
7199170147
3400003301
---
2
3
---
---
---
OC3dP2 I/O
7199030030
---
A01
16
---
---
---
---
---
---
3400003400
---
CT3P2 I/O
7199150162
3400003200
A03
CT1 I/O
7199460217
3400006401
A02
slot
----
-----------------
00-90-1a-00-09-a0
---
---
---
A01
---
---
3
4
---
5
6
show utilization
Field descriptions
Monitoring Modules
ERX Edge Routers
cpu
bw
(%)
(%)
exceed
----
---
------
slot
type
----
------------
DPFE
65
35
OC12Atm(P2)
59
44
OC3/OC12-ATM
67
53
3
4
---
---
---
---
---
---
---
---
OC3d
79
---
SRP-10G
27
---
---
---
---
---
---
---
---
---
---
---
---
---
45
25
---
---
---
---
---
---
---
10
CE1
11
12
13
UT3a
77
---
---
---
5-35
5-36
CHAPTER 5
Managing Line Modules and SRP Modules
Passwords and
Security
Passwords and security are of utmost importance for the security of your
system. This chapter provides the information you need to configure your
ERX system to be secure for all levels of users.
Topic
Page
Overview
6-1
6-2
6-5
6-11
6-16
6-16
6-27
Overview
One of your major management responsibilities is to secure your system.
To do this, assign passwords or secrets to the system. In Global
Configuration mode, you can set passwords or secrets to prevent
unauthorized users from accessing the system in Privileged Exec mode.
Passwords and secrets have the same degree of security on your system,
and they are used interchangeably. You can define either a password or a
secret for your system, but not both.
6-2
CHAPTER 6
Passwords and Security
encrypted
level
type
password/secret
-----
------------
--------------------
----------
7 (password)
dq]XG`,%N"SS7d}o)_?Y
configured
mode
0
1
2
3
4
5
6
7
8
9
10
You or users with high privilege levels can now use the encrypted
password, dq]XG`,%N"SS7d}o)_?Y, with the password command.
Creating Secrets
This example generates a secret for the password rocket, and creates a
secret for privilege level 15.
1
Enable and configure the secret. The 0 keyword specifies that you
are entering an unencrypted secret.
host1(config)#enable secret level 15 0 rocket
encrypted
level
type
password/secret
-----
----------
--------------------
----------
5 (secret)
bcA";+1aeJD8)/[1ZDP6
configured
mode
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
You or users with high privilege levels can now use the encrypted
password, bcA";+1aeJD8)/[1ZDP6, with the password command.
Encrypting Passwords in Configuration File
You can also direct the system software to encrypt passwords saved in the
configuration file by using the service password-encryption
command. This command is useful to keep unauthorized individuals
from viewing your password in your configuration file. It is important to
remember that this command uses a simple cipher and is not intended to
protect against serious analysis. You can tell if a string is encrypted if it is
preceded by an 8.
6-3
6-4
CHAPTER 6
Passwords and Security
Use the following commands and guidelines to set passwords or secrets for
the privilege levels.
enable password
Use to set a password, which controls access to Privileged Exec mode and
some configuration modes.
The first time you define a password, you must enter it in plain text. To view its
encrypted form, use the show config display. To redefine the password at a
later date, you can enter the password in its encrypted form.
Use to set a secret, which controls access to the Privileged Exec mode and
some configuration modes.
Enter the secret in plain text (its unencrypted form) or cipher text (its encrypted
form). In either case, the system stores the secret as encrypted.
The first time you define a secret, you must enter it in plain text. To view its
encrypted form, use the show config display. To redefine the secret at a later
date, you can enter the secret in its encrypted form.
erase secrets
service password-encryption
Use to encrypt passwords that are saved in the systems configuration file. The
command converts plain text to cipher text. The default is no encryption.
Use of this command prevents casual observers from viewing passwords, for
example, in data obtained from show config displays. The command is not
intended to provide protection from serious analysis.
This command does NOT apply to passwords set with enable secret, enable
password, or password (Line Configuration mode).
This command does apply to authentication key passwords and BGP neighbor
passwords.
Example
host1(config)#service password-encryption
Commands Available
10
15
6-5
6-6
CHAPTER 6
Passwords and Security
If you forget an enable password or secret, you can erase all enable
passwords and secrets.
Two commands allow you to erase passwords and secrets: erase secrets
and service unattended-password-recovery. It is important to fully
understand the purpose of these commands and how they work with each
other.
The erase secrets command can be used to delete all existing passwords.
To use this command, you must be physically present at the router to
complete the operation. Once the command is executed, you have a finite
number of seconds to press the software reset button on the SRP module.
You can execute this command from the console or any vty.
The service unattended-password-recovery command provides you
with a way to delete existing passwords and secrets without physically
being present at the router. You must have the proper privilege level to
execute the command, and you can execute it from either the console or
any vty.
When you execute service unattended-password-recovery, you
change the behavior of erase secrets. You can now delete passwords and
secrets from the console by executing erase secrets without a time
restraint or having to be physically present at the router. When you use
the no version of service unattended-password-recovery, you revert
the functionality of erase secrets to the factory default setting.
Within the time limit that you specified for the erase secrets
command, press the recessed software reset button on the primary
SRP module (see Figure 6-1).
Note: If you do not press the software reset button within the time limit, the system
will not erase the password, and you will need to repeat the process.
erase secrets
After you issue this command, press the software reset button (see Figure 6-1)
within the time you specify for this command.
6-7
6-8
CHAPTER 6
Passwords and Security
Allows you to set the number of seconds (160) for this procedure to be
accomplished.
Allows you to set a new password when you have forgotten your password.
Example
host1>erase secrets 60
There is no no version.
Use to allow you to delete all passwords and secrets from the console without
being physically present at the router.
When executed, this command changes the behavior of the erase secrets
command, which will not take any parameters and will not be available through
a vty session.
Example
host1(config)#service unattended password-recovery
Make sure that you know the enable password for the system.
If you need to reset the enable password, see Privilege Levels earlier
in this chapter.
Specify a password.
host1(config-line)#password 7 dq]XG`,%N"SS7d}o)_?Y
line
Example
host1(config)#line vty 1 4
Use the no version to remove a vty line or a range of lines from your
configuration; users will not be able to run Telnet, SSH, or FTP to lines that you
remove. When you remove a vty line, the system removes all lines above that
line. For example, no line vty 6 causes the system to remove lines 6 through
19. You cannot remove lines 0 through 4.
Example
login
host1(config)#line vty 1 4
host1(config-line)#login
Use the no version to disable password checking and allow access without a
password.
If you enable password checking, but do not configure a password, the system
will not allow you to access virtual terminals.
Use the following keywords to specify the type of password you will enter:
password
Example 2 (secret)
host1(config-line)#password 5 bcA";+1aeJD8)/[1ZDP6
6-9
6-10
CHAPTER 6
Passwords and Security
If you forget the console password, you can erase the existing value and
configure a new one. This action deletes all authentication for the console
line. To erase existing passwords:
1
If you remember the password at this point, you can override this
action by entering:
:boot##no disable console authentication
When the operating system reloads, you can access the console without a
password.
Note: You will be able to log in to the console without a password until you set a
new password.
Monitoring Passwords
You can use the show secrets command to view all current passwords
and secrets.
show secrets
In the mode column, inherited indicates whether a secret was inherited from a
lower password level. The show config command displays only secrets
configured by the user; it does not display inherited secrets.
Example
host1#show secrets
Current Password Settings
------------------------encryption
encrypted
level
type
password/secret
-----
------------
0
1
2
--------------------
mode
----------
3
4
5
7 (password)
zRFj_6>^]1OkZR@e!|S$
configured
7 (password)
zRFj_6>^]1OkZR@e!|S$
inherited
7 (password)
zRFj_6>^]1OkZR@e!|S$
inherited
7 (password)
zRFj_6>^]1OkZR@e!|S$
inherited
7 (password)
zRFj_6>^]1OkZR@e!|S$
inherited
10
7 (password)
zRFj_6>^]1OkZR@e!|S$
inherited
11
7 (password)
zRFj_6>^]1OkZR@e!|S$
inherited
12
7 (password)
zRFj_6>^]1OkZR@e!|S$
inherited
13
7 (password)
zRFj_6>^]1OkZR@e!|S$
inherited
14
7 (password)
zRFj_6>^]1OkZR@e!|S$
inherited
15
7 (password)
zRFj_6>^]1OkZR@e!|S$
inherited
Specify a vty line or a range of vty lines on which you want to enable
the password.
host1(config)#line vty 8 13
host1(config-line)#
6-11
6-12
CHAPTER 6
Passwords and Security
data-character-bits 8
exec-timeout never
exec-banner enabled
motd-banner enabled
login-timeout 30 seconds
line
Use to specify the vty line(s) on which you want to enable the password.
You can set a single line or a range of lines. The range is 019.
Example
host1(config)#line vty 8 13
Use the no version to remove a vty line or a range of lines from your
configuration; users will not be able to run Telnet, SSH, or FTP to lines that you
remove. When you remove a vty line, the system removes all lines above that
line. For example, no line vty 6 causes the system to remove lines 6 through
19. You cannot remove lines 0 through 4.
Example
login
host1(config-line)#login
Use the no version to disable password checking and allow access without a
password.
If you enable password checking but do not configure a password, the system
will not allow you to access virtual terminals.
Use the following keywords to specify the type of password you will enter:
password
Example 2 (secret)
host1(config-line)#password 5 bcA";+1aeJD8)/[1ZDP6
Field descriptions
exec-timeout time interval that the terminal waits for expected user input
Never indicates that there is no time limit
exec-banner status for the exec banner: enabled or disabled. This banner
is displayed by the CLI after user authentication (if any) and before the first
prompt of a CLI session.
login-timeout time interval during which the user must log in.
Never indicates that there is no time limit
Example
host1#show line vty 0
no access-class in
data-character-bits 8
exec-timeout 3w 3d 7h 20m 0s
exec-banner enabled
motd-banner enabled
login-timeout 30 seconds
6-13
6-14
CHAPTER 6
Passwords and Security
Once you specify AAA new model as the authentication method for vty lines, an
authentication list called default is automatically assigned to the vty lines. To
allow users to access the vty lines, you must create an authentication list and
either:
If a specific method is unavailable, the system continues to traverse the list. For
example, if radius is the first authentication type element on the list and the
RADIUS server is unreachable, the system attempts to authenticate with the
next authentication type on the list.
The system assumes an implicit denial of service if it reaches the end of the
authentication list without finding an available method.
Example
host1(config)#aaa authentication login my_auth_list radius
line none
Use the no version to remove the authentication list from your configuration.
Use to specify AAA new model as the authentication method for the vty lines on
your system.
If you specify AAA new model and you do not create an authentication list,
users will not be able to access the system through a vty line.
Example
aaa new-model
host1(config)#aaa new-model
line
You can set a single line or a range of lines. The range is 019.
Example
host1(config)#line vty 6 10
Use the no version to remove a vty line or a range of lines from your
configuration; users will not be able to run Telnet, SSH, or FTP to lines that you
remove. When you remove a vty line, the system removes all lines above that
line. For example, no line vty 6 causes the system to remove lines 6 through
19. You cannot remove lines 0 through 4.
Use to apply an authentication list to the vty lines you specified on your system.
Example
login authentication
Use the no version to specify that the system should use the default
authentication list.
Use to specify a password on a line or a range of lines if you specified the line
option with the aaa authentication login command.
If you enable password checking but do not configure a password, the system
will not allow you to access virtual terminals.
Use the following keywords to specify the type of password you will enter:
password
Example 2 (secret)
host1(config-line)#password 5 bcA";+1aeJD8)/[1ZDP6
6-15
6-16
CHAPTER 6
Passwords and Security
access-class in
Example this example sets the virtual terminal lines to which you want to
restrict access and specifies an access class to grant access to incoming
requests.
host1(config)#line vty 12 15
host1(config-line)#access-class boston in
Example
access-list
6-17
6-18
CHAPTER 6
Passwords and Security
accept or reject this new, unknown key depending on how you have
configured the client. See Host Key Management later in this chapter.
When the client authenticates the servers host key, it begins the transport
key exchange process by sending the key data required by the negotiated
set of algorithms. The server responds by sending its own key data set. If
both sides agree that the keys are consistent and authentic, the keys are
applied so that all subsequent messages between client and server are
encrypted, authenticated, and compressed according to the negotiated
algorithms.
User Authentication
User authentication begins after the transport keys are applied. The client
typically asks the server which authentication methods it supports. The
server responds with a list of supported methods with no preference.
The client specifies a user authentication method. If the chosen method is
supported by the server, the client then challenges the userthat is, the
client prompts the user for a password or public-key pass phrase. The
client sends the challenge response from the user and the username to the
server. The server authenticates the user based on this response.
The system software currently supports only RADIUS password
authentication, which is enabled by default. The RADIUS server
validates the username and password from its database. If user
authentication is disabled, then all SSH clients that pass protocol
negotiation are accepted.
Connection
The SSH connection layer creates the user session when the user is
authenticated. The server waits for a connection request. The system
currently supports only shell requests, which the server interprets as a
request for a hook into a CLI session. The server ignores any other
requests, such as X11 or TCP/IP tunneling.
Key Management
You create a host key for the SSH server with the crypto key generate
dss command. If a host key already exists, this command replaces it with
a new key and terminates all ongoing SSH sessions. Any SSH clients that
previously accepted the old host key reject the new key the next time the
client and server connect. The client then typically instructs the end user
to delete the locally cached host key and to try to connect again.
Caution: Use caution issuing the crypto key generate dss command from an
SSH client. Issuing this command will terminate that SSH session; it will be the last
command you send from that session.
The public half of the host key is sent from the server to the client as part
of the transport layer negotiation. The client attempts to find a match for
this key with one stored locally and assigned to the server. If the client
does not find a match, it can accept or reject the key sent from the server.
Refer to your client documentation for detailed information. You
typically configure the client to do one of the following:
Never accept an unknown key.
Always accept an unknown key.
Query the administrator before accepting an unknown key.
If you do not want the client ever to trust the server when it sends an
unknown key, you must manually copyusing the copy commandthe
host key from each server to each intended client. This is the only way to
be certain that each client has a local copy of the necessary keys for
matching during negotiation.
If you configure the client to accept unknown keyseither automatically
or with administrator approvalthis acceptance policy applies only to the
first time the client receives a key from a particular server. When the SSH
client accepts a host key, it stores the key locally and uses it for all future
comparisons with keys received from that host. If the client subsequently
receives a different keya new unknownfrom that server, it is rejected.
You cannot configure an SSH client to accept a new key after it has
accepted a key from an SSH server. You must delete the old key before a
new key can be accepted.
Performance
6-19
6-20
CHAPTER 6
Passwords and Security
There are two areas where you might be concerned about security with
the current support of SSH:
Only RADIUS user authentication is supported. If you disable user
authentication, all users are accepted if the client and server
successfully complete negotiation.
Because the load on the system CPU increases with use of SSH, you
might be concerned about denial-of-service attacks. However, the
forwarding engine takes care of this issue, because it limits the rate at
which it sends packets to the system controller. A flood of packets from
a packet generator does not cause problems regardless of whether SSH
is enabled.
Before You Configure SSH
You must obtain and install a commercial SSH client on the host from
which you want to administer the system. Versions earlier than 2.0.12 of
the SSH client are not supported.
Determine your Telnet policy before you configure SSH on your system.
Effective use of SSH implies that you should severely limit Telnet access
to the system. To limit Telnet access, create access control lists that
prevent almost all Telnet usage, permitting only trusted administrators to
access the system via Telnet. For example, you might limit access to
administrators who need to Telnet to the system from a remote host that
does not have the SSH client installed.
You must install and configure a RADIUS server on a host machine
before you configure SSH on your system. Refer to your RADIUS server
documentation for information on choosing a host machine and installing
the server software. You must also configure the RADIUS client on your
system. See ERX Broadband Access Configuration Guide, Chapter 1,
Configuring Remote Access to the ERX System for more information.
You configure SSH on individual virtual routers, rather than the global
system. To configure SSH:
1
Configure encryption.
Enable SSH.
Configuring Encryption
The embedded SSH server and external SSH client maintain separate
lists of the encryption algorithms that each supports. Lists are kept for
inbound and outbound algorithms. For the server:
Inbound means the algorithms that the server supports for
information coming in from a client.
Outbound means the algorithms that the server supports for
information it sends out to a client.
You must configure each list separately. Refer to your SSH client
documentation for details on configuring encryption on your client. The
system supports the following SSH algorithms for encryption:
3des-cbc A triple DES block cipher with 8-byte blocks and 24 bytes
of key data. The first 8 bytes of the key data are used for the first
encryption, the next 8 bytes for the decryption, and the following 8
bytes for the final encryption.
blowfish-cbc A block cipher with 8-byte blocks and 128-bit keys that
provides strong encryption and is faster than DES.
twofish-cbc A block cipher with 16-byte blocks and 256-bit keys that
is stronger and faster than Blowfish encryption.
Although it is not recommended, you can also specify none. In this case,
the system does not perform encryption.
6-21
6-22
CHAPTER 6
Passwords and Security
ip ssh crypto
Use to add an encryption algorithm to the specified support list for the SSH
server.
Example 1 this example adds the blowfish-cbc algorithm to the list of
supported inbound algorithms.
host1(config)#ip ssh crypto client-to-server blowfish-cbc
Example 2 this example removes the 3des-cbc algorithm from the list of
supported outbound algorithms.
host1(config)#ip ssh crypto server-to-client no 3des-cbc
The default version restores the specified list to the factory default, which
includes all supported algorithms (3des-cbc, twofish-cbc, and blowfish-cbc).
The default list does not include the none option.
Example
host1(config)#ip ssh crypto server-to-client default
3des-cbc
Use the no version to remove or exclude an algorithm from the specified list.
ip ssh authentication-retries
Use to set the number of times that a user can retry a failed authentication,
such as trying to correct a wrong password. The SSH server terminates the
connection when the limit is exceeded.
Example
host1(config)#ip ssh authentication-retries 3
ip ssh disable-user-authentication
Example
host1(config)#ip ssh disable-user-authentication
Use to set a sleep period in seconds for users that have exceeded the
authentication retry limit. Connection attempts from the user at the same host
are denied until this period expires.
Example
ip ssh sleep
Use to set a timeout period in seconds. The SSH server terminates the
connection if protocol negotiationincluding user authenticationis not
completed within this timeout.
Example
ip ssh timeout
The SSH server and SSH client maintain separate lists of the message
authentication algorithms that each supports. Lists are kept for inbound
and outbound algorithms. For the server, inbound means the algorithms
that the server supports for information coming in from a client. For the
server, outbound means the algorithms that the server supports for
6-23
6-24
CHAPTER 6
Passwords and Security
Use to add a message authentication algorithm to the specified support list for
the SSH server.
Example
host1(config)#ip ssh mac server-to-client hmac-md5
This example adds the hmac-md5 algorithm to the list of supported outbound
algorithms.
The default version restores the specified list to the factory default, which
includes all supported algorithms (hmac-md5, hmac-sha1, and hmac-sha1-96).
The default list does not include the none option.
Example
host1(config)#ip ssh mac client-to-server default hmac-sha1
This example restores the hmac-sha1 algorithm to the list of supported inbound
algorithms.
Use the no version to remove or exclude an algorithm from the specified list.
Example
host1(config)#ip ssh mac client-to-server no hmac-sha1
This example removes the hmac-sha1 algorithm from the list of supported
inbound algorithms.
The SSH server daemon starts only if the server host key exists when the
system boots. The host key resides in NVS and is persistent across system
reboots. Once started, the daemon listens for traffic on TCP port 22. The
server daemon is disabled by default.
Use the generate keyword to create the SSH server host key and enable the
daemon.
Example
host1(config)#crypto key generate dss
Use the zeroize keyword to remove the SSH server host key and stop the SSH
daemon if it is running. Issuing this command terminates any active client
sessions. The next time the system boots after this command is issued, the
SSH server daemon is not started.
The command is not displayed by the show config command.
Note: SSH can be enabled or disabled regardless of the state of the Telnet daemon.
If SSH is enabled, use access control lists to limit access via Telnet. See Virtual
Terminal Access Lists in this chapter for information on using access control lists.
Example
host1(config)#crypto key zeroize dss
There is no no version.
You can monitor the current state of the SSH server with the show ip
ssh command.
show ip ssh
Use the detail keyword to display the encryption and MAC algorithm lists for
the client and server. For each active session, detail shows the version of SSH
running on the client and the algorithms in use for encryption and message
authentication.
Example
host1#show ip ssh
Field descriptions
daemon status indicates whether the SSH server is enabled; if so, how
long it has been up
connections since last system reset number of connections made via SSH
since the last time the system was reset
6-25
CHAPTER 6
Passwords and Security
6-26
Example
4 out of 4 attempts
active sessions: 1
id
3
username
mcarr
host
uptime
(d:h:m:s)
client version
10.0.0.145
0:00:00:19
ciphers
inbound/outbound
3des-cbc/3des-cbc
MAC
inbound/outbound
hmac-md5/hmac-md5
Use the show ip ssh command to determine the session identifier for the
session to terminate.
Example
host1(config)#disconnect ssh 12
Note: You can also use the clear line vty terminal command to terminate SSH
sessions. In that case, use the show users command to determine the virtual
terminal number to specify with the clear line vty terminal command.
There is no no version.
10
15
6-27
6-28
CHAPTER 6
Passwords and Security
If you are using the RADIUS service-type attribute to assign access levels,
the system sets the initial-auth-level as follows:
If the service-type attribute is set to administrative, then the
initial-auth-level is set to 10.
If the service-type attribute is set to nas prompt or login, the
initial-auth-level is set to 1.
Per-User Enable Authentication
VSA
Description
Type
Length
Subtype
Subtype Length
Juniper-Initial-CLIAccess-Level
26
len
18
sublen
Single attribute;
enter only: 0, 1,
5, 10, or 15
Juniper-Alt-CLIAccess-Level
26
len
20
sublen
Single attribute;
enter only: 0, 1,
5, 10, or 15
Value
Note: All levels to which a user can have access must explicitly be specified in the
Admin-Auth-Set VSA.
The user is not prompted for a password, since the system knows whether
or not the user should have access to the requested level. If the user is not
authenticated through RADIUS, the system uses the system-wide enable
passwords instead.
Restricting Access to Virtual Routers
You can use RADIUS authentication to specify whether users can access
all virtual routers (VRs), one specific VR, or a set of specific VRs.
Note: This classification is independent of the command access levels
configurable via the Juniper-Initial-CLI-Access-Level VSA.
VSA
Description
Type
Length
Subtype
Subtype Length Value
Juniper-Allow-All-VRAccess
26
len
19
sublen
Integer:
0 disable,
1 enable
Juniper-Virtual-Router
26
len
sublen
String:
virtual-routername
26
len
21
sublen
String:
virtual-routername
Consider a system on which five VRs have been configured. The VRs are
called Boston, Chicago, Detroit, Los Angeles, and San Francisco. The
following examples illustrate how to use the VSAs to control a users
access to these VRs.
Example 1
In this example, you want the user to have access to all VRs and to log in
to the default VR. Accept the default setting or set the following VSA:
Juniper-Allow-All-VR-Access 1
Example 2
In this example, you want the user to have access to all VRs and to log in
to the VR Boston. Set the VSAs as follows:
Juniper-Allow-All-VR-Access 1
Juniper-Virtual-Router Boston
Example 3
In this example, you want the user to have access only to the VR Boston.
Set the VSAs as follows:
Juniper-Allow-All-VR-Access 0
Juniper-Virtual-Router Boston
6-29
6-30
CHAPTER 6
Passwords and Security
Example 4
In this example, you want the user to log in to VR Boston, and to have
access to VRs Chicago, Los Angeles, and San Francisco. Set the VSAs as
follows:
Juniper-Allow-All-VR-Access 0
Juniper-Virtual-Router Boston
Juniper-Alt-CLI-Virtual-Router-Name Chicago
Juniper-Alt-CLI-Virtual-Router-Name Los Angeles
Juniper-Alt-CLI-Virtual-Router-Name San Francisco
Commands Available to Users
reload
show redundancy
clock set
reload slot
show secrets
copy
rename
show subsystems
copy running-configuration
redundancy force-failover
show timing
delete
redundancy revert
show users
dir
show boot
show utilization
disconnect ssh
show config
srp switch
configure
synchronize
erase secrets
show ip ssh
halt
show line
6-31
6-32
CHAPTER 6
Passwords and Security
The ERX system has an embedded macro language that enables you to
define and run macros that will generate and execute CLI commands.
Macro filesidentified by the .mac extensioncan be used to store more
than one macro. Depending on your needs, you might want to store all of
your macros in one file, group macros by function, or store only one
macro per file.
Topic
Page
Writing Macros
7-1
Running Macros
7-16
Practical Examples
7-19
Writing Macros
You must write macros on your computer, not on the ERX system. The
macros can contain loops, variables, string and numeric values, and
conditional statements. Macros can invoke other macros (as long as they
are contained within the same macro file), including themselves, but
infinite recursion is not permitted. Macros are case-insensitive.
Macros consist of control expressions and noncontrol expressions.
Control expressions are enclosed by control brackets, which are
angle-bracket and number sign pairs, like this: <# controlExpression #>.
Examples of control expressions include the macro name and macro end
statements, and while loops. A control expression can include multiple
operation statements if you separate the statements with semicolons (;).
For example:
<# i:=0; while i++ < 3 #>
7-2
CHAPTER 7
Writing CLI Macros
All macros must have names consisting only of letters, numbers, and the
underline character (_). The first character of a macro name cannot be a
number. If you include more than one macro within a macro file, each
macro must have a unique name. The first line of a macro defines the
macros name:
<# macroName #>
You can add comments to your control expressions to clarify the code by
prefacing the comment with forward slashes (//) inside the control
brackets:
<# endtmpl //A comment in the macro end expression #>
Text after the // is ignored when the macro is run and is not displayed by
the CLI.
You can also add comments outside the control expressions by prefacing
the comment with an exclamation point (!). The CLI displays these
comments if you use the test or verbose keywords with the macro
command; the CLI never regards these comments as commands.
!This is a comment outside any control expression
The following is a simple macro that you can use to configure the IP
interface on the Fast Ethernet port of the SRP module after you have
restored the factory defaults:
<# ipInit #>
<# ipAddress := env.getline (IP Address of System?) #>
ena
conf t
int f0/0
ip addr <# ipAddress; \n #>
ip route 10.0.0.0 255.0.0.0 192.168.1.1
host pk 10.10.0.166 ftp
<# endtmpl #>
Writing Macros
ERX Edge Routers
Environment Commands
Description
env.delay(int delay)
env.getLine
env.getLine(string prompt-string)
env.getLineMasked
env.getLineMasked(string
prompt-string)
env.argc
env.argv(n)
env.argv(0)
env.atoi(string)
env.atoi(env.argv(n))
Variables
A local variable enables you to store a value used by the macro while it
executes. The macro can modify the value during execution. Local
variables can be integers, real numbers, or strings. The initial value of
local variables is zero.
Like macros, local variables must have a name consisting only of letters,
numbers, or the underline character (_). The variable name must not
begin with a number. You must not use a reserved keyword as a variable
name.
7-3
7-4
CHAPTER 7
Writing CLI Macros
Literals
Examples
tab
\t
carriage return
\r
new line
\n
string end
\0
backslash
\\
42
98.6
string literal
count
\t this string starts with a tab and ends with a tab \t
Operators
Operators
Extraction
substr()
String
Multiplicative
rand()
round()
truncate()
Arithmetic
++
Relational
<
>
<=
>=
!=
Logical
||
&&
Assignment
:=
Miscellaneous
[]
()
<#
#>
Writing Macros
ERX Edge Routers
Operator
Action
Arithmetic
(binary)
Arithmetic
(binary)
Assignment
:=
Combine
Less than
<
Greater than
>
Less than or
equal to
<=
Greater than or
equal to
>=
Equal to
Not equal to
(logical NOT)
!=
Logical OR
||
Logical AND
&&
Miscellaneous
[]
Miscellaneous
Miscellaneous
()
7-5
7-6
CHAPTER 7
Writing CLI Macros
Operator
Action
Miscellaneous
Miscellaneous
Miscellaneous
<# #>
Multiplication
Division
Modulo
Postincrement
++
Postdecrement
Preincrement
++
Predecrement
Negation
Arithmetic
(unary)
Arithmetic
(unary)
Substring
substr()
Randomize
rand()
Round
round()
Truncate
truncate()
Assignment
Use the assignment operator (:=) to set the value of a local variable. The
expression to the right of the operator is evaluated, and then the result is
assigned to the local variable to the left of the operator. The expression to
Writing Macros
ERX Edge Routers
the right of the operator can include the local variable if you want to
modify its current value.
Example
<# i := i + 1 #>
<# count := count - 2 #>
You can use the increment operator (++) to increase the value of a local
variable by one. You specify when the value is incremented by the
placement of the operator. Incrementing occurs after the expression is
evaluated if you place the operator to the right of the operand.
Incrementing occurs before the expression is evaluated if you place the
operator to the left of the operand.
Example 1
<# i := 0; j := 10 #>
<# j := j - i++ #>
In Example 1, the result is that i equals 1 and j equals 10, because the
expression is evaluated (10 0 = 10) before i is incremented.
Example 2
<# i := 0; j := 10 #>
<# j := j - ++i #>
In Example 2, the result is still that i equals 1, but now j equals 9, because
i is incremented to 1 before the expression is evaluated (10 1 = 9).
Similarly, you can use the decrement operator ( ) to decrement local
variables. Placement of the operator has the same effect as for the
increment operator.
When a local variable with a string value is used with the increment or
decrement operators, the value is permanently converted to an integer
equal to the length in characters of the string value.
String Operations
The combine operator ($) concatenates two strings into one longer string.
Numeric expressions are converted to strings before the operation
proceeds. The variable local evaluates to want a big:
<# local := want a $ big #>
Extraction Operations
7-7
7-8
CHAPTER 7
Writing CLI Macros
You can use the substring operator (substr) to extract a shorter string from
a longer string. To use the substring operator, you must specify the source
string, an offset value, and a count value. You can specify the string
directly, or you can specify a local variable that contains the string. The
offset value indicates the place of the first character of the substring to be
extracted; 0 indicates the first character in the source string. The count
value indicates the length of the substring. If the source string has fewer
characters than the sum of the offset and count values, then the resulting
substring has fewer characters than indicated by the count value.
Example
The round operator rounds off the number to the nearest integer:
<# decimal:= 4.7 #>
<# round(decimal) #>The result is decimal is now 5
Arithmetic Operations
The arithmetic operations are multiply (*), divide (/), modulo (%), add (+),
and subtract (-). Multiply, divide, and modulo are equal in precedence,
but each has a higher precedence relative to add and subtract. Add and
subtract are equal in precedence.
Example
Writing Macros
ERX Edge Routers
Relational Operations
The relational operations compare the value of the expression to the left
of the operator with the value of the expression to the right. The result of
the comparison is 1 if the comparison is true and 0 if the comparison is
false.
If the expressions on both sides of the operator are strings, they are
compared alphabetically. If only one expression is a string, the numeric
value is used for comparison. Arithmetic operators have a higher
precedence.
Example
Logical Operations
You can use the logical operators AND (&&), OR (||), and NOT (!) to
evaluate expressions. The result of the operation is a 1 if the operation is
true and 0 if the operation is false.
For the logical AND, the result of the operation is true (1) if the values of
the expressions to the left and right of the operator are both nonzero. The
result of the operation is false (0) if either value is zero. The evaluation
halts when an expression is evaluated as zero.
For the logical OR, the result of the operation is true (1) if the values of
the expression on either the left or right of the operator is nonzero. The
result of the operation is false (0) if both values are zero. The evaluation
halts when an expression is evaluated as nonzero.
The NOT operator must precede the operand. The operation inverts the
value of the operand; that is, a nonzero expression becomes 0, and a zero
expression becomes 1. For the logical NOT, the result of the operation is
true (1) if it evaluates to zero, or false if it evaluates to nonzero.
Example
7-9
7-10
CHAPTER 7
Writing CLI Macros
Miscellaneous Operations
The positive (+) and negative (-) operations must precede the operand.
The result of a positive operation is the absolute value of the operand.
The result of a negative operation is the negative value of the operand;
that is, a +(-5) becomes 5 and a -(-2) becomes 2. These operators have the
same precedence as the increment and decrement operators. If there is an
operand on both sides of these operators, they are interpreted as the add
and subtract operators.
Example
Results of control expressions are written to the output stream when the
expression consists of the following:
A single local variable
A single literal element
An operation whose result is not used by one of the following
operations:
Example
assignment
predecrement
postdecrement
if
preincrement
postincrement
while
Writing Macros
ERX Edge Routers
Conditional Execution
If the result is false (zero), then the first elseif expression, if present, is
evaluated. If the result is true (nonzero), the associated expression
group is executed.
If the result of evaluating the first elseif expression is false (zero), the
next elseif expression is evaluated, if present. If the result is true
(nonzero), the associated expression group is executed.
If all elseif expressions evaluate to false (zero) or if no elseif
expressions are present, then the else expression groupif
presentis executed.
7-11
7-12
CHAPTER 7
Writing CLI Macros
if_examples
#>
Thats nice.
Thats nice.
Writing Macros
ERX Edge Routers
While Constructs
7-13
7-14
CHAPTER 7
Writing CLI Macros
<#
while_examples
#>
";i*i;"\n"#>
#>
Macros can invoke other macros within the same macro file; a macro can
also invoke a macro from another macro file if the invocation takes place
in literal text, that is, not within a control expression. A macro can invoke
itself directly or indirectly (an invoked macro can invoke the macro that
invoked it); the number of nested invocations is limited to 10 to prevent
infinite recursion.
Within each macro, you can specify parameters that must be passed to
the macro when it is invoked by another. You must specify named
variables enclosed in parentheses after the macro name in the first line of
the macro, as shown in this example:
<# macroName (count, total) #>
Writing Macros
ERX Edge Routers
7-15
invoking_examples
#>
7-16
CHAPTER 7
Writing CLI Macros
Example 2
The invoked macro cannot invoke a third macro from another file. Only
a single level of invocation is supported.
Running Macros
Although you must write macros on a computer, you can copy them to
the system. Issue the macro command from the CLI to execute both
local macros and macros stored remotely.
You can display the commands that are generated by the macro file
without executing the commands by using the test keyword. It is good
practice to confirm that the test display matches your expectations before
you execute the macro to run the commands.
You can terminate a macro while it is running by entering <Ctrl+C>. You
can close Telnet and SSH windows while a macro is running, but the
macro does not terminate until it completes the current command.
macro
This command invokes a hidden FTP client and takes place in the context of
the current virtual router (VR) rather than the default VR. You must configure
Running Macros
ERX Edge Routers
the FTP server so that any traffic destined for the VR can reach the VR;
typically, you configure the FTP server to reach the default address of the
system, which will always be able to reach the VR.
You can specify both a macro filename and a macro contained within that file.
For example, the following command looks for the file confatm.mac and runs
the macro named atm0verDs3 contained within the file:
host1(config)#macro confatm.mac atm0verDs3
You can specify only a macro filename. The command searches in the
specified file for a macro named start. The command fails if the start macro
does not exist. For example, the following command looks for the file
confatm.mac and runs the macro named start contained within the file:
host1(config)#macro confatm.mac
You can specify only the macro name, using the name keyword, if the macro
file is stored locally in NVS and has the same name as the included macro you
wish to invoke. For example, the following command looks for the file
confatm.mac and runs the macro named confatm contained within the file:
host1(config)#macro name confatm
You must specify a macro filename for remotely stored macro files, as in the
following example:
host1(config)#macro pc:/macros.mac atm0verDs3
Example
You can pass arguments to the macro; if the argument contains a space or
other special character, you must enclose the argument within double quotation
marks.
Use the test keyword to specify that the macro generate, but not execute, the
commands. You can check the output to verify that it is what you want. The test
mode is verbose and displays comments.
Use the verbose keyword to echo commands to the display and display
comments as the macro executes. By default the command executes in
nonverbose mode.
There is no no version.
7-17
7-18
CHAPTER 7
Writing CLI Macros
!
interface atm 9/1.1
encap pppoe
!
<# i:=1; while i < 100 #>
interface atm 9/1.1.<#i;'\n'#>
encap ppp
no ppp shut
no ppp keep
atm pvc <# i #> 1 <# i #> aal5mux ip
ip addr 10.1.<#i#>.1 255.255.255.0
!
<# i++ #>
<# endwhile #>
!
<# endtmpl #>
If you stored this macro remotely in the macro file, pc:/macros.mac, you
issue the following commands to execute the macro:
host1>enable
host1#conf t
host1(config)#macro pc:/macros.mac atm0verDs3
Practical Examples
ERX Edge Routers
host1(config)#ds3-scramble
host1(config)#interface atm 9/2
host1(config)#atm vc-per-vp 256
host1(config)#controller t3 9/3
host1(config)#no shut
host1(config)#clock source internal module
host1(config)#framing cbitadm
host1(config)#ds3-scramble
host1(config)#interface atm 9/3
host1(config)#atm vc-per-vp 256
host1(config)#interface atm 9/1.1
host1(config)#encap pppoe
host1(config)#interface atm 9/1.1.1
host1(config)#encap ppp
host1(config)#no ppp shut
host1(config)#no ppp keep
host1(config)#atm pvc 1 1 1 aal5mux ip
host1(config)#ip addr 10.1.1.1 255.255.255.0
[display omitted]
host1(config)#interface atm 9/1.1.99
host1(config)#encap ppp
host1(config)#no ppp shut
host1(config)#no ppp keep
host1(config)#atm pvc 99 1 99 aal5mux ip
host1(config)#ip addr 10.1.99.1 255.255.255.0
host1(config)#!Macro 'atmOverDs3' in the file
'atmOverDs3.mac' ending execution
Practical Examples
You can use the macros in this section for configuring your system or as
examples of useful macros you can build yourself.
Configuring Frame Relay
You can organize your macros in many different ways to suit your needs.
The first sample macro in this section, ds1mac.mac, shows a typical
method of organization. It consists of a number of related macros for
configuring interfaces on CT1 and CE1 modules, as described in
Table 7-4.
Some of the macros provide a single configuration function, like
configuring the controller. These are invoked by other macros that are
7-19
7-20
CHAPTER 7
Writing CLI Macros
Description
Help
controllerDs1
ds1Encap
ds1FrCir
configCx1
cntrDs1
cx1Encap
cx1FrCir
Table 7-5 lists the complete set of macros contained in ds1mac.mac. You
can run the Help macro to list the other executable macros contained in
ds1mac.mac. To configure Frame Relay on your system with
ds1mac.mac, you can do one of the following:
Run the controllerDS1, ds1Encap, and ds1FrCir macros in that order
Run the configCx1 macro
In either case, to run the macros you must provide the required values
described in the macros.
Table 7-5 ds1mac.mac
<# Help #>
! This file contains the following executable macros:
!
controllerDs1
ds1Encap
ds1FrCir
configCx1
Practical Examples
ERX Edge Routers
7-21
7-22
CHAPTER 7
Writing CLI Macros
Practical Examples
ERX Edge Routers
7-23
7-24
CHAPTER 7
Writing CLI Macros
Practical Examples
ERX Edge Routers
7-25
7-26
CHAPTER 7
Writing CLI Macros
Practical Examples
ERX Edge Routers
The sample macro in Table 7-6 configures ATM interfaces based on the
inputs you provide when prompted by the macro.
Table 7-6 Sample macro to configure ATM interfaces
<# atmIf #>
<# slotPort:=env.getline("slot/port?") #>
<# while (vcType != 1 && vcType != 2);
vcTypeStr :=env.getline("VC type (1 = AAL5MUX IP, 2 = AAL5SNAP)?");
vcType := env.atoi(vcTypeStr);
endwhile #>
<# if vcType = 1; vcTypeStr := "aal5mux ip"; else; vcTypeStr := "aal5snap"; endif
#>
<# encapRouted:=1; encapBridged:=2; encapPPP:=3 #>
<# while (encapType < encapRouted || encapType > encapPPP );
encapTypeStr
ppp)?");
encapType := env.atoi(encapTypeStr);
endwhile #>
<# if encapType = encapPPP #>
<# authNone:=1; authPap:=2; authChap:=3; authPapChap:=4; authChapPap:=5 #>
<# while (authType < authNone || authType > authChapPap );
authTypeStr :=env.getline("authentication (1 = None, 2 = PAP, 3 = CHAP, 4 =
PAP/CHAP; 5 = CHAP/PAP)?");
authType
:= env.atoi(authTypeStr);
endwhile #>
<# endif #>
<# vpStartStr := env.getline("Starting VP number?");
vpStart:=env.atoi(vpStartStr)#>
<# vpEndStr
:= env.getline("Ending
:=env.atoi(vpEndStr)#>
VP number?"); vpEnd
VC number?"); vcEnd
7-27
7-28
CHAPTER 7
Writing CLI Macros
Practical Examples
ERX Edge Routers
:= env.atoi(authTypeStr);
endwhile #>
<# endif #>
<# vpStartStr := env.getline(Starting VP number?);
vpStart:=env.atoi(vpStartStr)#>
<# vpEndStr
:= env.getline(Ending
:=env.atoi(vpEndStr)#>
VP number?); vpEnd
VC number?); vcEnd
7-29
7-30
CHAPTER 7
Writing CLI Macros
Topic
Page
8-1
8-5
8-8
8-9
8-2
CHAPTER 8
Booting the System
Use to set the release version and the configuration to be used when the boot
logic chooses backup mode.
This command does not reboot the system; it configures the system for
rebooting.
You can require the system to reboot from an existing configuration file, from an
existing local script file, or with the factory default configuration.
Example
host1(config)#boot backup rel_1_1_0.rel newfile.cnf
boot config
Caution: All versions of this command except those using the
running-configuration or startup-configuration keywords erase the current
system running configuration. Before issuing one of those versions, you might want
to save the running configuration to a .cnf file by issuing the copy
running-configuration command.
To specify an existing system configuration (.cnf) file that the system uses only
on the next rebooton subsequent reboots, the system will use the running
configuration current at the time of that reboot:
host1(config)#boot config newconffile.cnf once
You can require the system to reboot from an existing local script (.scr) file that
the system uses only on the next rebooton subsequent reboots, the system
will use the running configuration current at the time of that reboot:
host1(config)#boot config scriptfile.scr
If you specify a .cnf file, upon the next reboot the system resets to the factory
defaults; it then opens the .cnf file and begins applying it immediately. If you
specify a .scr file, upon the next reboot the system resets to the factory
defaults; it then waits for a 600-second countdown timer to expire before
applying the script. This period gives the line modules an opportunity to fully
initialize before configuration begins. Upon timer expiration or system
initialization (whichever occurs first), the script executes regardless of the state
of the line modules. You can escape from the countdown by pressing <Ctrl+C>;
the system prompts you to execute the script immediately or return to the
system console.
You can require the system to reboot from the configuration running on the
system at the time of the reboot.
If the system is in Automatic Commit mode:
host1(config)#boot config running-configuration
See Saving the Current Configuration in Chapter 4, Managing the System, for
information on Automatic and Manual Commit modes.
You can require the system to reboot from the factory default configuration. On
subsequent reboots, the system will use the running configuration current at the
time of that reboot:
host1(config)#boot config factory-defaults
Use to force the system to use the backup release/configuration on the next
boot.
Example
boot force-backup
Note: Even if you request the normal release/configuration, the boot logic still
checks the reboot history file. It may force the backup mode regardless of your
request. To guarantee that the boot logic does not override your request to use the
normal release/configuration, do either of the following:
Delete the reboot history file after issuing the no boot force-backup command.
Do not configure a backup release or configuration file.
8-3
8-4
CHAPTER 8
Booting the System
boot revert-tolerance
Use to set the reversion tolerances that the boot logic uses to determine
whether to use normal or backup settings.
Example
host1(config)#boot revert-tolerance 2 60
Use to set the boot logic to never revert to the backup image/configuration.
Example
host1(config)#boot revert-tolerance never
There is no no version.
Use to configure the software release the module in the selected slot will use
the next time it reboots.
Example 1
boot slot
The boot backup slot version of this command enables you to configure a
backup slot for booting.
Example 2
host1(config)#boot backup slot 7 rel_1_0_1.rel
Use the no version to clear the override for the specified slot or all slots.
Use to configure the software release the selected subsystem will use the next
time it reboots.
Example 1
boot subsystem
Example 2
host1(config)#boot backup subsystem ct3 rel_1_0_1.rel
boot system
Warning: This command attempts to reprogram the SRP boot PROMs, if
necessary. The SRP has a primary and, typically, a backup boot PROM. If the boot
system command is executed on an SRP with no backup boot PROM, the following
message is displayed: Write to Backup Boot ROM failed. In this instance, this
message is correct, and you can ignore it.
Use to specify the software release (.rel) file that your system will use when
rebooting.
Example
host1(config)#boot system release1.rel
There is no no version.
Reloads the system software (.rel) file and the configuration (.cnf) file on the
system.
When you issue this command, the system prompts you for a confirmation
before the procedure starts.
If you specify the force keyword, the procedure will fail if the system is updating
the boot prom. In this case, the system will display a message that indicates
that the procedure cannot currently be performed and the cause. However, if
the system is in a state that could lead to a loss of configuration data or an NVS
8-5
8-6
CHAPTER 8
Booting the System
If you do not specify the force keyword, the procedure will fail if the system is in
a state that could lead to a loss of configuration data or an NVS corruption, and
the system will display a message that explains why the procedure failed.
When you issue this command, the system prompts you for a confirmation
before the procedure starts.
Example
host1#reload
host1#reload force
There is no no version.
Reloads the system software (.rel) file and the configuration (.cnf) file on the
system.If the system is in a state that could lead to a loss of configuration data
or an NVS corruption, it will delay the procedure for one minute. Each time the
system delays the procedure, it adds a message to the os log that explains why
the procedure was delayed. If the system cannot reload on its sixth attempt, the
reboot procedure will fail, and the system will add an explanation to the os log.
Example
reload at
There is no no version.
Reloads the system software (.rel) file and the configuration (.cnf) file on the
system.
Example
reload in
host1#reload in 00:10
There is no no version.
reload slot
Reloads the system software (.rel) file and the configuration (.cnf) file on the
module in the selected slot.
When you issue this command, the system prompts you for a confirmation
before the procedure starts.
If you specify the force keyword and the slot number of the primary SRP
module, the procedure will fail if the system is updating the boot prom. In this
case, the system will display a message that indicates that the procedure
cannot currently be performed and the cause. However, if the system is in a
state that could lead to a loss of configuration data or an NVS corruption, such
as using the synchronization of SRP modules, it displays a message that
describes the state, and asks you to confirm (enter yes or no) whether you want
to proceed.
If you do not specify the force keyword, the procedure will fail if the system is in
a state that could lead to a loss of configuration data or an NVS corruption, and
the system will display a message that explains why the procedure failed.
Example
host1#reload slot 3
There is no no version.
Enables the <Ctrl+X> key combination to reset the system from any location.
Issuing the <Ctrl+X> command has no effect if you are accessing the system
via Telnet.
Loading the factory default configuration does not override this feature.
Example
host1(config)#service ctrl-x-reboot
8-7
8-8
CHAPTER 8
Booting the System
Configuration Caching
If you do not press the <M+B> key sequence before the countdown
timer expires, the reloading process continues and returns the CLI to
the normal User Exec mode.
Example
host1#show boot
System Release:
release.rel
System Configuration:
running-configuration
show hardware
Field descriptions
Example
host1#show hardware
serial
assembly
assembly
slot
type
number
number
rev.
(MB)
ram
----
------
----------
----------
--------
----
SRP-5G
7199160022
3400002900
A03
128
---
---
---
---
---
---
---
---
---
---
OC3dP2
7199190218
---
3401002800
---
A02
64
---
---
---
CT3P2
7199160121
3401002501
A02
64
CT2
7199160311
3401002011
A03
64
8-9
8-10
CHAPTER 8
Booting the System
number
of
serial
assembly
assembly
slot
type
number
number
rev.
----
-----
------
--------
--------
SRP-5G I/O
7199170147
3400003301
0
1
---
2
3
---
---
---
OC3dP2 I/O
7199030030
---
----3400003400
---
MAC
addresses
------
A01
16
---
---
---
---
A01
---
CT3P2 I/O
7199150162
3400003200
A03
---
CT1 I/O
7199460217
3400006401
A02
slot
----
-----------------
00-90-1a-00-09-a0
---
---
---
3
4
---
5
6
show last-reset
Displays the reason for the systems last user-directed reload or error-caused
reset.
Example
host1#show last-reset
last reset: power cycle
show reload
Example
host1#show reload
reload scheduled for TUE OCT 2 2001 10:10:00 UTC
show version
Use to display the configuration of the system hardware and the software
version.
Example
host1#show version
Juniper Networks Edge Routing Switch ERX-700
Copyright (c) 1999-2002 Juniper Networks, Inc.
(July 9, 2002
13:17)
type
admin
spare
running release
slot uptime
---
erx_4-1-0b0-13.rel 18d06h:12m:13s
---
---
---
---
---
---
---
---
---
---
---
---
---
erx_4-1-0b0-13.rel 18d06h:11m:44s
online DPFE
enabled
---
erx_4-1-0b0-13.rel 18d06h:11m:45s
online CT3
enabled
---
erx_4-1-0b0-13.rel 18d06h:11m:44s
online CT1
enabled
---
erx_4-1-0b0-13.rel 18d06h:11m:44s
Output Filtering
8-11
8-12
CHAPTER 8
Booting the System
Page
Overview
9-1
References
9-5
9-5
9-7
9-8
Monitoring NTP
9-12
Overview
You can use the clock commands to set the time and date on your system
manually. These commands allow you to specify settings such as the
source of the time, the time zone, and dates for seasonal time changes.
You can configure your system to update its clock automatically by
configuring it as a Network Time Protocol (NTP) client. NTP provides a
method of synchronizing the system clocks of hosts on the Internet to
Universal Coordinated Time (UTC). Using NTP allows the system to
record accurate times of events. You can view the log file of events to
monitor the status of the network.
Since there is only one system clock, you can configure an NTP client on
one virtual router only. Other virtual routers obtain clock parameters
from the system clock. However, multiple virtual routers can act as NTP
servers.
9-2
CHAPTER 9
Configuring the System Clock
NTP
stratum 2
server
ERX system as
NTP client
stratum 1
server
stratum 2
server
atomic
clock
stratum 1
server
stratum 3
server
local
clients
local
servers
stratum 2
server
stratum 1
server
stratum 2
server
stratum 1
server
atomic
clock
atomic
clock
atomic
clock
Overview
ERX Edge Routers
The system obtains several readings of time data from NTP servers.
The system analyzes time data in the messages and compares the
readings from different servers. Using this information, the system
identifies the initial best time source (the best server).
The system calculates the difference between its own clock and the
best servers clock (the offset) and proceeds as follows:
If the offset is greater than 15 minutes, the system disables NTP
and displays a message advising you to check the time zone and
clock settings.
If the offset is less than 15 minutes, the system sets its clock to that
of the best server.
9-3
9-4
CHAPTER 9
Configuring the System Clock
Provided the system has not disabled NTP, it proceeds to the next
stage:
If a frequency calibration is available, the system starts
progressive synchronization.
If the system has never performed a frequency calibration or the
calibration has been deleted, the system starts a frequency
calibration.
The system evaluates which server is currently the best time source
(the master) by analyzing time data in the messages and comparing
the data from different servers.
References
ERX Edge Routers
References
This implementation of NTP meets the following specification:
RFC 1305 Network Time Protocol (version 3) Specification,
Implementation and Analysis (March 1992)
You can set the system clock at any time. This process involves the
following steps:
1
9-5
9-6
CHAPTER 9
Configuring the System Clock
clock set
Use the following syntax for setting the time: HH:MM:SS. This is the current
time in 24-hour format hours:minutes:seconds.
There are two acceptable date forms for this command. Both produce the same
display when you run the show clock command.
Day:month:year
Month:day:year
Examples
host1#clock set 08:12:42 12 March 2000
host1#clock set 11:12:55 March 10 2000
There is no no version.
Use to set the clock to switch automatically to summer time (daylight savings
time).
Example
Use to set the clock to summer time at the same time each year.
Example
host1(config)#clock summer-time PDT recurring first Sunday
April 2:00 last Sunday October 2:00
Example
clock timezone
Use the no version to set the time zone to UTC, the default setting.
show clock
Example
host1#show clock detail
FRI DEC 17 1999 15:39:42 EST
time source: manually entered by user
timezone: EST (-300 minutes from UTC)
DST start: 04/02/2000 02:00 EST
DST stop:
Check that the system clock reads the correct time to within 15
minutes, and that the time zone and summer time settings are
correct.
Reset the system clock manually if the time, time zone, or summer
time settings are incorrect.
9-7
9-8
CHAPTER 9
Configuring the System Clock
(Optional) Access the virtual router with which you want to associate
NTP services.
ntp enable
This command associates NTP services and the NTP client with the current
virtual router.
Example
host1:boston(config)#ntp enable
Use the no version to disable NTP polling and clock correction and to remove
the association between NTP services and the virtual router.
Ping the selected NTP servers to ensure that the system can reach
them.
ntp broadcast-client
Example
host1(config-if)#ntp broadcast-client
Use the no version to prevent the system from receiving NTP broadcasts.
Example
ntp broadcast-delay
Use the no version to set the estimated round-trip delay to the default, 3000
microseconds.
Example
ntp disable
host1(config-if)#ntp disable
Use to assign an NTP server to the system and to customize the way the
server communicates with the system.
Specify the source option to direct responses from the NTP server to a specific
interface on the system and override the ntp source command.
Example
ntp server
9-9
9-10
CHAPTER 9
Configuring the System Clock
ping
Example
host1(config)#ping 192.35.42.1
There is no no version.
Use to direct responses from all NTP servers to a specific interface. Using the
source option with the ntp server command overrides the ntp source
command.
Example
host1(config)#ntp source atm 3/1
Use the no version to direct all servers to reply to the interface from which the
NTP request was sent (the default setting).
You can prevent the system from receiving certain types of broadcasts
and specify the servers from which the system will accept NTP
broadcasts. To do so:
1
Example
access-list
ntp access-group
Note: The system can accept, but does not use, NTP control queries.
Use to specify the types of broadcasts that the system will accept and respond
to, and to specify an access list of servers from which the system will accept
broadcasts.You can enable the system to:
Receive time requests, receive NTP control queries, and synchronize itself
to the servers specified on the access-list
Only receive time requests and NTP control queries from specified servers
Only receive time requests from specified servers
Only receive NTP control queries from specified servers
Example
host1(config-line)#ntp access-group peer europe
Use the no version to enable the system to receive all NTP broadcasts on
interfaces configured to receive broadcasts.
Caution: Be sure that you do not override a valid time source if you specify the
stratum of the NTP server. Issuing the ntp master command on multiple systems
in the network may lead to unreliable timestamps if those systems do not agree on
the time.
ntp master
Use to specify the stratum number of a virtual router you configured as an NTP
server.
By default, the stratum number is set to the stratum number of the master plus
one.
Note: Although you can specify a stratum number of 1, the system does not support
stratum 1 service. The system can synchronize only with an NTP server, and not
directly with an atomic clock or radio clock.
Specify a stratum number for the system in the range 1 to 15. A stratum n
server is n hops from an accurate time source.
Example
host1:boston(config)#ntp master
9-11
9-12
CHAPTER 9
Configuring the System Clock
Example:
host1:boston(config)#ntp server enable
Use the no version to prevent a virtual router from acting as an NTP server.
Configuration Examples
Example 2
Monitoring NTP
After you configure the system as an NTP client, you can use show
commands to view information about the NTP servers you assigned and
the status of NTP on the interface.
Note: For about 30 minutes after you configure the system as an NTP client, the
data varies rapidly, and then starts to stabilize. Wait at least 1 hour before using the
data to make decisions about NTP servers.
Many of the fields in the display of these show commands take their
values from the NTP messages. The NTP client uses this data to compare
the performance of its NTP servers and to choose a master.
Monitoring NTP
ERX Edge Routers
Use to view the information about the NTP servers you assigned.
Field descriptions
+ (Selected) system will consider this server when it chooses the master
- (Candidate) system may consider this server when it chooses the master
x (Unusable) server does not meet the initial criteria for master
p (Preferred) server that you specified as the preferred server
~ (Configured) server is a configured server; no tilde indicates a broadcast
server
Stratum number of hops between the server and the accurate time source
Poll time between NTP requests from system to server
Reachable 8-bit number that shows whether or not the NTP server
responded to the last eight requests from the system; one indicates a
response, zero indicates no response. For example, 11111111 indicates that
the NTP server responded to the last eight requests. If the system reaches
one server less often than it does other servers, that server is not a good
choice for the master.
Offset difference, with the lowest dispersion in the sample buffer, between
the systems clock and the servers clock
Disp. lowest measure, in the sample buffer, of the error associated with the
peer offset, based on the peer delay
Example
Stratum
Poll
Reachable
Precision
Delay
Offset
Disp.
- 10.6.129.58
512s
01111111
0.000000s
0.000s
0.052s
0.010s
+~152.2.21.1
256s
11111111
0.000015s
0.070s
0.039s
0.020s
+~128.182.58.100
256s
11011111
0.000004s
0.030s
0.019s
0.074s
*p128.118.25.3
256s
10111111
0.000015s
0.020s
0.038s
0.073s
9-13
9-14
CHAPTER 9
Configuring the System Clock
Use to view the information about the NTP servers you assigned.
Field descriptions
Monitoring NTP
ERX Edge Routers
Last request sent last time at which the system sent an NTP request to
the server
Response/Broadcast was sent last time at which the server sent an
NTP reply or broadcast to the system
Response/Broadcast received last time at which the system received an
NTP reply or broadcast from this server
Example
at:
Broadcast received:
(sec):
0.000
0.000
0.000
0.000
0.000
0.000
0.000
Offset
(sec):
0.049
0.050
0.050
0.050
0.050
0.050
0.051
0.000
0.051
Dispersion (sec):
0.015
0.015
0.014
0.013
0.012
0.011
0.010
0.009
Field descriptions
Status state of NTP on the system and the stratum number of the server
Offset Error time difference between the system and the master
Frequency Error error in the frequency of the systems clock
Last Update last time received from the master
Root Dispersion measure of all the errors associated with the network
hops and servers between the system and its stratum 1 server
9-15
9-16
CHAPTER 9
Configuring the System Clock
Example
Offset Error
Frequency Error
Last Update
Root Dispersion
: 0.001605 sec
Configuration:
Admin. State
: NTP Enabled
: default
Broadcast Delay
: 3000 microseconds
Client Mode
: True
Master Mode
: True
Stratum No.
: 5
Summer Time
: False
Timezone Name
: UTC
Timezone Offset
: 00:0
Access List
'Source' Interface
hours:minutes
Interface Configuration:
Address
NTP Enable
BroadcastClient
Name
Configuring Virtual
Routers
10
The ERX system allows you to create multiple logical or virtual routers in
a single system. Each virtual router has its own separate set of IP
interfaces, forwarding table, and instances of routing protocols.
Topic
Page
Overview
10-1
References
10-3
10-4
10-8
Overview
Multiple distinct routers are supported within a single system, which
allows service providers to configure multiple, separate, secure routers
within a single chassis. These routers are identified as virtual routers
(VRs). Applications for this function include the creation of individual
routers dedicated to wholesale customers, corporate virtual private
network (VPN) users, or a specific traffic type.
Default Virtual Router
When you first boot your system, it creates a default virtual router. The
only difference between the default VR and any other router is that you
cannot create or delete the default VR. Just like any other router, the
default VR gets its IP addresses when you add interfaces to it.
10-2
CHAPTER 10
Configuring Virtual Routers
ATM Subinterface
/ PVC
Virtual Router 2
ATM Subinterface
/ PVC
Virtual Router 3
ATM Subinterface
/ PVC
ATM Subinterface
/ PVC
Your system supports VPNs and VRFs. For information on VPNs and
VRFs, see Configuring BGP VPN Services and Monitoring BGP/MPLS
VPNs in ERX Routing Protocols Configuration Guide, Vol. 2,
Chapter 3, Configuring BGP/MPLS VPNs.
References
ERX Edge Routers
VPNs
A VRF is a virtual routing and forwarding instance that exists within the
context of a VR. The VRF provides forwarding information to your
system. The system looks up a packets destination in the VRF associated
with the interface on which the packet is received. In general, any
application that can be enabled in a VR can be enabled in a VRF. VRFs
are generally associated with the VPN behavior described in RFC 2547.
When a VRF receives an update message, it needs to know whether it
should add the route to its routing table. Similarly, when a VRF sends
update messages, it needs to identify the VPNs that it wants to receive the
updates. See ERX Routing Protocols Configuration Guide, Vol. 2,
Chapter 3, Configuring BGP/MPLS VPNs.
References
For more information about virtual routers, VPNs, or VRFs, consult the
following resources:
ERX Release Notes, Appendix A, System Maximums refer to the
Release Notes corresponding to your software release for information
on maximum values.
ERX Routing Protocols Configuration Guide, Vol. 2, Chapter 3,
Configuring BGP/MPLS VPNs
RFC 2547 BGP/MPLS VPNs (March 1999)
RFC 2917 A Core MPLS IP Architecture (September 2000)
10-3
10-4
CHAPTER 10
Configuring Virtual Routers
access-list
arp
bandwidth
banner
baseline
boot
bulkstats
cbf
classifier-list
clns
clock
controller
crypto
disable-autosync
disable-switch-on-error
enable
exception
exclude-subsystem
exit
ftp-server
help
host
hostname
interface
ip
Configure IP characteristics
l2f
l2tp
license
Configure licenses
line
log
macro
map-list
memory
mpls
no
ntp
policy-list
pppoe
Configure PPPoE
profile
Specify a profile
radius
rate-limit-profile
redundancy
route-map
router
rtr
service
set
Configure
sleep
slot
snmp-server
sscc
telnet
timing
10-5
10-6
CHAPTER 10
Configuring Virtual Routers
traffic-shape-profile
virtual-router
host1:western:eastern(config)#
export
help
import
log
macro
no
rd
route-target
sleep
host1:western(config-vrf)#
host1(config)#virtual-router miami
Example 2
VR with an
EGP
host1(config)#virtual-router western
host1:miami(config)#router ospf 5
host1:miami(config-router)#
Configure a Telnet daemon to listen in VRs other than the default VR.
host1(config)#virtual-router boston
host1(config)#telnet listen port 23
aaa domain-map
Examples
host1-0-1-90(config)#aaa domain-map juniper.net vrouter_1
host1-0-1-90(config)#aaa domain-map none vrouter__all_purpose
host1-0-1-90(config)#aaa domain-map DEFAULT vrouter_all_purpose
You must specify a route distinguisher after you create a VRF. Otherwise, the
VRF will not operate.
Example
Example
ip vrf
telnet listen
host1(config)#virtual-router 3
host1(config)#telnet listen port 3223
From Global Configuration mode, use this command to create a virtual router or
access the context of a previously created virtual router or a VRF.
From Domain Map Configuration mode, use this command to map the VR to a
user domain name. Use the no version in this mode to delete the VR parameter
and assign the default VR.
Once you are in the context of a particular VR or VRF (indicated by the change
in the prompt), all subsequent commands you enter apply to that context until
you exit the context.
virtual-router
10-7
10-8
CHAPTER 10
Configuring Virtual Routers
Use the no version of the command only to delete the VR and return the
system to the default VR. Issuing the command no virtual-router
vrName.vrfName has no effect.
Use to display the mapping between user domains and virtual routers.
none all client requests with no user domain name are associated with the
virtual router mapped to the none entry
default all client requests with a domain present that has no map are
associated with the virtual router mapped to the default entry
Example
host1#show aaa domain-map
Domain: boston; virtual-router: default
Tunnel Tunnel Tunnel Tunnel Tunnel
Tag
Peer
Source
Type
Tunnel
Medium Password
Tunnel
Id
Tunnel
Hostname
------ --------
31
<null> <null>
Tunnel
Server
Tunnel
Name
Preference
------
------
----------
31
<null>
2000
Tag
ipv4
<null>
You can create a configuration script from the output by saving it as a file with
the .scr extension.
You can use the output filtering feature of the show command to include or
exclude lines of output based on a text string you specify. See Chapter 2,
Command Line Interface, for details.
Example
host1#show configuration virtual-router default
virtual-router default
ip domain-lookup
ip name-server 10.2.0.3
ip domain-name "junipercom.com"
!
host f 10.10.0.129 ftp anonymous null
interface null 0
!
interface fastEthernet 0/0
ip address 192.168.1.155 255.255.255.0
!
ip route 0.0.0.0 0.0.0.0 192.168.1.1
no ip multicast-routing
!
mpls rsvp profile default
mpls ldp profile default
cr-ldp
!
rtr 1
type echo protocol ipIcmpEcho 10.5.0.200 source
fastEthernet0/0
frequency 1
samples-of-history-kept 5
timeout 10000
!
Use to display the memory used by each VR configured on a line module and
free memory available on the line module.
Field descriptions
10-9
10-10
CHAPTER 10
Configuring Virtual Routers
Example
host1#show ip forwarding-table slot 9
Free Memory = 14,328KB
Virtual Router
Memory
Load Errors
Status
(KB)
----------------
---------
-------------
--------
vr1
4128
Valid
vr2
3136
Valid
vr3
2256
Valid
vr4
1512
Valid
default
1024
Valid
-----------------------------------------------------------
show virtual-router
The display shows the name of the virtual router and the status of the
supported protocols.
You can use the output filtering feature of the show command to include or
exclude lines of output based on a text string you specify. See Chapter 2,
Command Line Interface, for details.
Example
host1-0-6-60#show virtual-router
Virtual Router : default
Ip:
Present
Bgp:
Present
Isis:
Present
Ospf:
Not Present
Rip:
Present
Present
Bgp:
Not Present
Isis:
Not Present
Ospf:
Not Present
Rip:
Present
Present
Bgp:
Not Present
Isis:
Not Present
Ospf:
Not Present
Rip:
Present
11
The ERX system allows you to log system events to discover and isolate
problems with your system. This chapter shows how to use the CLI to
monitor your systems log configuration and stay abreast of all system
events that you want to track.
Topic
Page
Overview
11-1
11-3
11-12
11-16
Overview
System events are classified into event categories. Using the CLI, you can
determine which event categories to log. To take the most advantage of
the logging facility, it is important to understand the terms log severity
and log verbosity.
Log Severity
11-2
CHAPTER 11
Logging System Events
Note: Not every event category supports every severity level. For a list of event
categories and the severity levels that each category supports, see List of Event
Categories later in this chapter.
Table 11-1 Log severity descriptions
Severity Number Severity Name
System Response
Emergency
Alert
Critical
Error
Warning
Notice
Info
Debug
Log Verbosity
Persistent Logs
Log messages can survive a system reboot. After a reboot, the system
rebuilds the list of log messages. However, if the system detects any
problems or has gone through a power cycle, the buffer is reset, and the
log messages from the previous session are lost.
Log messages are not synchronized between primary and redundant SRP
modules. During a switchover from a primary to a redundant SRP
module, existing log messages are not transferred to the redundant SRP
module.
The next sections show how to configure individual and systemwide logs,
how to format timestamps for log messages, and how to configure log
filters.
baseline log
Use to set a baseline for logging events. Only log messages timestamped after
the baseline will appear when you enter the show log data delta command.
utc enter this keyword to indicate that the time entered is in universal
coordinated time (UTC), rather than local time.
11-3
11-4
CHAPTER 11
Logging System Events
last-reset causes the system to display log messages generated since the
last time the system was reset
Examples
host1#baseline log 11:12:55 April 30 2002
host1#baseline log last-reset
There is no no version.
log destination
Note: You can display traffic logssuch as ipTraffic, icmpTraffic, tcpTraffic, and
udpTrafficonly via the show log data command or from the SRP module console.
You cannot redirect traffic logs elsewhere, such as to a system log or nonvolatile
storage file, or to a Telnet session.
Use the severity keyword to limit the messages logged based on priority level.
You can have multiple system log servers, but must configure logging to
each one separately.
If you log messages to a system log server, you can also specify:
facility specifies a facility ID on the system log destination host. The
range is 07, representing the logging facilities local0local7.
include logs only the listed categories to system log; no other
categories are logged unless specifically included by issuing this
command again.
exclude logs all categories to system log except the listed categories;
all other categories are logged unless specifically excluded by issuing this
command again.
In this example, the first command causes only the osfpGeneral, mplsGeneral,
and os event categories to be logged to system log at 10.10.9.5. The second
command reverses this inclusion and restores the logging of all event
categories.
host1(config)#log destination syslog 10.10.9.5 include
ospfGeneral mplsGeneral os
host1(config)#no log destination syslog 10.10.9.5
In this example, the first command again causes only the osfpGeneral,
mplsGeneral, and os event categories to be logged to system log at 10.10.9.5.
The second command reverses the inclusion of ospfGeneral and os. The
mplsGeneral category is still included and is thus the only category logged.
host1(config)#log destination syslog 10.10.9.5 include
ospfGeneral mplsGeneral os
host1(config)#no log destination syslog 10.10.9.5 include
ospfGeneral os
In this example, the first command causes the isisGeneral, ipRoutePolicy, and
ipTraffic event categories to be excluded from logging to system log at 10.1.2.3.
The second command reverses this exclusion and restores the logging of all
event categories.
host1(config)#log destination syslog 10.1.2.3 exclude
isisGeneral ipRoutePolicy ipTraffic
host1(config)#no log destination syslog 10.1.2.3 exclude
In this example, the first command causes the isisGeneral event category to be
excluded from logging to system log at 10.1.2.3. The second command causes
ospfGeneral to also be excluded from logging.
host1(config)#log destination syslog 10.1.2.3 exclude
isisGeneral
host1(config)#log destination syslog 10.1.2.3 exclude
ospfGeneral
In this example, the first command causes the isisGeneral event category to be
excluded from logging to system log at 10.1.2.3; all other events are logged.
The second command overrides the first and causes the exclusion of all events
except ospfGeneral.
host1(config)#log destination syslog 10.1.2.3 exclude
isisGeneral
host1(config)#log destination syslog 10.1.2.3 include
ospfGeneral
Use the no version to reverse the effects of previous commands or restore the
default, which is to log all event categories.
11-5
11-6
CHAPTER 11
Logging System Events
Use to specify a source interface type and location for events logged to system
log at the specified IP address.
Overrides the actual source interface type and location. The IP address
associated with the specified source interface will be used as the source
address for subsequent system log messages.
Example
host1(config)#log destination syslog 10.1.2.3 source atm 0/1
Use the no version to restore the actual source interface type and location.
This command can provide you with troubleshooting information that will assist
you when contacting Juniper Networks Customer Service.
Example
log engineering
host1(config)#log engineering
Use to select fields to be added to all logs. These fields include a timestamp for
the message, an instance identifier, and the name of the internal software
application that created the message.
Example
log fields
By default, the local console automatically receives all log messages if console
is a destination. The exception is the cliCommand log. These log events do not
appear on the console.
Example
log here
host1#log here
Use the no version to disable logs destined for a console from being displayed
on this console.
log severity
Use to set the severity level for a selected category or for systemwide logs. For
a list of severity values, see Table 11-1.
If you do not specify a category, then the severity value is set for all categories,
except individual logs for which you previously set a specific value. See the
next section, Configuring Log Severity for Individual and Systemwide Logs.
Each event category has its own default severity value. For most categories,
the default is error.
Example
host1(config)#log severity warning
Use the no version to return to the default severity value (error) for the selected
category. To return all logs to their default severity setting, include an *
(asterisk) with the no version. For example:
host1(config)#no log severity *
log unlimit
Use to remove the limit on the number of outstanding buffers for an event
category. You would remove the limit in cases where the system is dropping
logs of a particular category.
Example
host1(config)#log unlimit qos
Use to set the verbosity level for a selected category or for all categories.
If you do not specify a category, then the verbosity level is set for all categories.
Example
log verbosity
Use the no version to return to the default verbosity (low) for the selected
category.
Each event category has its own default severity setting that is based on
the type of log messages for that category. You can change the severity
setting for individual logs and the systemwide value:
To change the log severity of an individual log, set the individual log
category to an explicit value. The new value overrides any systemwide
value, and subsequent commands that set the systemwide severity
value do not override the value you set for the individual log. To return
an individual log severity to its default value, which also allows the
11-7
11-8
CHAPTER 11
Logging System Events
The following example sets all logs to log at severity info, except for the
bgpEvents and bgpRoutes categories.
host1(config)#log severity warning bgpEvents
host1(config)#log severity notice bgpRoutes
host1(config)#log severity info
The following command returns all logs to their default severity level.
host1(config)#no log severity *
The default verbosity setting for all logs is low. To change the logging
verbosity of an individual log, specify a category when you enter the log
verbosity command. To change the log verbosity of every log, do not
specify an event category when you enter the log verbosity command.
However, once you enter the log verbosity command without specifying
a particular event category, all logs are set to the new verbosity. No log
verbosity overrides are saved.
Example
The following example sets all log categories to verbosity medium, and
then it sets the verbosity level for ds3 events to high.
host1(config)#log verbosity medium
host1(config)#log verbosity high ds3
You can use the service timestamps command to format timestamps for
log messages. By default, log messages display universal coordinated time
(UTC) without the time zone.
The following examples illustrate how you can change the timestamp on
log messages.
Set the time zone to EDT, 5 hours behind UTC, and display the local
time on the log messages.
host1(config)#clock timezone EDT -5
host1(config)#service timestamps log datetime show-timezone
localtime
host1#exit
host1#show log data category cliCommand severity info
***********************************************************
NOTICE 05/14/2001 13:22:48 EDT cliCommand: "clock timezone
EDT -5", console
NOTICE 05/14/2001 13:23:03 EDT cliCommand: "service
timestamps log datetime show-timezone localtime ", console
***********************************************************
11-9
11-10
CHAPTER 11
Logging System Events
service timestamps
For information about setting local times and time zones, see Chapter 9,
Configuring the System Clock
The show log data command displays the log data with the current timestamp
format.
The show log data nv-file command displays the log data with the timestamp
format in effect at the time the log record was written.
Many event categories contain filters that let you further refine the type
of information that the system logs. For example, when logging BGP
connections, you can limit the information logged to a specific access
class, peer, route map, or virtual router.
You define filters when you set the log severity for an event category. The
online Help shows the options you can set for each filter. The following
example creates a filter that logs BGP connection information at the
debug severity level on traffic that matches access list ListOne, and is
incoming traffic to virtual router default.
host1(config)#log severity debug bgpevents ?
access-class
in
out
peer
route-map
router
<cr>
host1(config)#log severity debug bgpevents access-class ?
WORD
out
route-map
<cr>
host1(config)#log severity debug bgpevents access-class
ListOne route-map ?
WORD
out
<cr>
host1(config)#log severity debug bgpevents access-class
ListOne route-map default in
The next example limits the logging of PPP debug events to traffic to or
from the POS interface in slot 2/0.
host1(config)#log severity debug ppp ?
atm
fastEthernet
gigabitEthernet
mlppp
pos
serial
<cr>
host1(config)#log severity debug ppp pos 2/0
List of Event Categories, later in this chapter, includes the filters available
in each event category.
Turning Off Filters
There are three ways to turn off filters. The first turns off all filters, the
second lets you turn off all filters for an event category, and the third lets
you turn off a specific filter.
11-11
11-12
CHAPTER 11
Logging System Events
To turn off all filters for an event category, use the no version of the log
severity command along with the category name. For example:
host1(config)#no log severity bgpEvents filters
To turn off a specific filter, use the no version of the log severity
command that you used to add the filter. For example:
host1(config)#no log severity bgpEvents peer 10.0.0.2
10.0.0.1
no log filters
To turn off all filters for an event category, specify the category name.
To turn off a specific filter, use the no version of the log severity command that
you used to add the filter.
Example
host1(config)#no log filters
severity
verbosity
filters
-------------------------
--------
---------
-------
NameResolverLog
ERROR
low
aaaAtm1483Cfg
ERROR
low
aaaEngineGeneral
ERROR
low
aaaServerGeneral
ERROR
low
addressServerGeneral
ERROR
low
atm
ERROR
low
atm1483
ERROR
low
atmAal5
ERROR
low
bgpConnections
ERROR
low
cliCommand
NOTICE
low
controlNetworkSlave
ERROR
low
cops
ERROR
low
ERROR
low
...
...
udpTraffic
severity
verbosity
filters
-------------------------
--------
---------
-------
NameResolverLog
ERROR
low
aaaAtm1483Cfg
ERROR
low
aaaEngineGeneral
ERROR
low
aaaServerGeneral
ERROR
low
addressServerGeneral
ERROR
low
atm
ERROR
low
atm1483
ERROR
low
atmAal5
ERROR
low
bgpConnections
ERROR
low
cliCommand
NOTICE
low
controlNetworkSlave
ERROR
low
cops
ERROR
low
WARNING*
low
...
...
udpTraffic
11-13
11-14
CHAPTER 11
Logging System Events
severity
verbosity
filters
-------------------------
--------
---------
-------
NameResolverLog
ALERT#
low
aaaAtm1483Cfg
ALERT#
low
aaaEngineGeneral
ALERT#
low
aaaServerGeneral
ALERT#
low
addressServerGeneral
ALERT#
low
atm
ALERT#
low
atm1483
ALERT#
low
atmAal5
ALERT#
low
bgpConnections
ALERT#
low
...
cliCommand
ALERT#
low
controlNetworkSlave
ALERT#
low
cops
ALERT#
low
ALERT#
low
...
udpTraffic
severity
verbosity
filters
-------------------------
--------
---------
NameResolverLog
ALERT#
low
aaaAtm1483Cfg
ALERT#
low
aaaEngineGeneral
ALERT#
low
aaaServerGeneral
ALERT#
low
addressServerGeneral
ALERT#
low
atm
WARNING*
low
-------
atm1483
ALERT#
atmAal5
ALERT#
low
low
bgpConnections
ALERT#
low
cliCommand
ALERT#
low
controlNetworkSlave
ALERT#
low
cops
ALERT#
low
ALERT#
low
...
...
udpTraffic
Use to display system events. The following keywords allow you to be selective
about which events are displayed.
category limits the display to a single log event category. Refer to the CLI
online Help for available categories.
Example
host1#show log data category os
delta limits the display to events that occurred after the time set with the log
baseline command.
Example
host1#show log data nv-file
logFile.temp: The system cannot find the file specified.
ALERT 09/12/2000 21:29:17 os: ASSERTION FAILED: file mplsNvs2.cc, line 789
ALERT 09/20/2000 02:18:06 os: ASSERTION FAILED: file osPool.cc, line 819
ALERT 09/20/2000 02:26:35 os: ASSERTION FAILED: file osPool.cc, line 819
ALERT 09/20/2000 02:44:33 os: ASSERTION FAILED: file osPool.cc, line 819
ALERT 09/20/2000 04:56:35 os: ASSERTION FAILED: file osPool.cc, line 819
ALERT 09/27/2000 03:10:25 os: ASSERTION FAILED: file
/sw0/sc/nvs/include/../nvMapBackend.h, line 235
ALERT 10/02/2000 04:05:42 os: ASSERTION FAILED: file osHeap.cc, line 439
ALERT 10/02/2000 04:08:04 os: ASSERTION FAILED: file osMessageQueue.cc,
line
42, rip1
ALERT 10/12/2000 03:43:38 os: PANIC: file osSemaphore.cc, line 54
ALERT 11/01/2000 02:03:49 os: ASSERTION FAILED: file cliCommand.cc, line
195
11-15
11-16
CHAPTER 11
Logging System Events
Example
host1#show log data severity notice
NOTICE 01/10/2001 00:59:50 os: config -- using running
NOTICE 01/10/2001 00:59:52 os: srp application, build date: 0x3a437424 (FRI
DEC 22 2000 15:32:52 UTC)
NOTICE 01/10/2001 00:59:52 os: last reset: user reboot, reason: not
specified
NOTICE 01/10/2001 00:59:52 os: OsIsrRegistrar: 0xb
NOTICE 01/10/2001 00:59:52 os: OsIsrRegistrar: 0xa
NOTICE 01/10/2001 00:59:52 os: OsIsrRegistrar: 0x2
By combining keywords, you can further limit the information displayed. See
the CLI online Help for information on the keywords available at each level.
host1#show log data nv-file severity alert
aaaAtm1483Cfg
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
None
Info:
None
Debug:
Filter:
None
aaaEngineGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
Debug:
Filter:
None
aaaServerGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
None
Debug:
Filter:
None
11-17
11-18
CHAPTER 11
Logging System Events
aaaUserAccess
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Debug:
None
Filter:
None
addressServerGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
None
Info:
None
Debug:
None
Filter:
None
ar1AaaServerGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
atm
Description:
ATM interface
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
Debug:
None
Filter:
None
atm1483
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Error applying static map entry for a newly created circuit of an NBMA
interface; unable to configure interfaces on ATM interface; unable to
determine interface location for ATM AAL5 interface; unable to determine
maximum interface configuration count for interface; unable to configure
interface on ATM interface
Warning:
Notice:
11-19
11-20
CHAPTER 11
Logging System Events
Info:
Debug:
None
Filter:
None
atmAal5
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
Debug:
None
Filter:
None
AuditIpsec
Description:
IKE SA negotiations
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
Debug:
None
Filter:
None
bgpConnections
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
None
Debug:
Filter 1:
Filter 2:
peer see description of the bgpRoutes peer filter for information on this
filter
Filter 3:
Filter 4:
Filter 5:
Filter 6:
bgpDampening
Description:
BGP dampening
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
Debug:
None
11-21
11-22
CHAPTER 11
Logging System Events
Filter 1:
Filter 2:
peer see description of the bgpRoutes peer filter for information on this
filter
Filter 3:
Filter 4:
Filter 5:
Filter 6:
bgpEvents
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
Info:
None
Debug:
None
Filter 1:
Filter 2:
peer see description of the bgpRoutes peer filter for information on this
filter
Filter 3:
Filter 4:
Filter 5:
Filter 6:
bgpGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
None
Filter 1:
Filter 2:
peer see description of the bgpRoutes peer filter for information on this
filter
Filter 3:
Filter 4:
Filter 5:
Filter 6:
bgpKeepAlives
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
None
Debug:
None
Filter 1:
Filter 2:
peer see description of the bgpRoutes peer filter for information on this
filter
Filter 3:
Filter 4:
11-23
11-24
CHAPTER 11
Logging System Events
Filter 5:
Filter 6:
bgpMessages
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
None
Debug:
Filter 1:
Filter 2:
peer see description of the bgpRoutes peer filter for information on this
filter
Filter 3:
Filter 4:
Filter 5:
Filter 6:
bgpNeighborChanges
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
A peer has entered into or left the established state; reason for a session
going idle
Info:
None
Debug:
None
Filter 1:
Filter 2:
peer see description of the bgpRoutes peer filter for information on this
filter
Filter 3:
Filter 4:
Filter 5:
Filter 6:
bgpRoutes
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
BGP route added to, removed from, or modified in the IP forwarding table;
aggregate route added to, removed from, or modified in Loc-RIB; network
route added to, removed from, or modified in Loc-RIB; best route for
internal peers for a given prefix became available; best route for internal
peers for a given prefix is no longer available, has changed, or has
become available; best route for external peers for a given prefix is no
longer available, has changed, or has become available; MPLS base
tunnel used to reach an indirect next-hop came up or went down; MPLS
stacked tunnel for label came up; indirect next-hop became reachable or
unreachable; direct next-hop for an indirect next-hop changed
Info:
None
11-25
11-26
CHAPTER 11
Logging System Events
Debug:
Filter 1:
Filter 2:
Filter 3:
Filter 4:
route-map log events for traffic that matches a specific route map
routeMapName name of route map for which you want to log events
filtering-router log events only if the route map is defined on a
specific virtual router
filteringRouterName virtual router where the route map is defined
filteringRouterOptions in | out
in matches on traffic coming into the route map or virtual router
out matches on traffic sent out of the route map or virtual router
Filter 5:
Filter 6:
11-27
11-28
CHAPTER 11
Logging System Events
bgpVpn
Description:
BGP VPN
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
None
Filter 1:
Filter 2:
Filter 3:
Filter 4:
Filter 5:
Filter 6:
bridgedEthernet
Description:
Emergency:
None
Alert:
None
Critical:
Out of resources
Error:
Warning:
None
Notice:
Info:
Debug:
None
Filter:
None
bulkStats
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
File full or file nearly full conditions, preparing to send an SNMP trap
Info:
Debug:
Filter:
None
cacGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
None
Info:
None
Debug:
Filter:
None
cacIntf
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
None
Info:
None
Debug:
Filter:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
11-29
11-30
CHAPTER 11
Logging System Events
cbf
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
Debug:
Filter:
None
cliCommand
Description:
CLI commands
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
Debug:
None
Filter:
None
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
cops
Info:
None
Debug:
Filter:
None
crldpGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
Debug:
None
Filter:
11-31
11-32
CHAPTER 11
Logging System Events
ctreeLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
dcm
dcmEngineGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Giving notify credits to line module; receipt of request buffer from line
module; starting line module communication session; Ack/Nack dynamic
interface creation request
Filter:
None
dhcpGeneral
Description:
DHCP general
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
dhcpLocalServerGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Invalid configuration; DHCP packet drops due to invalid local server state
or resource exhaustion; address limit violations; SDX communication
problems; invalid DHCP packets
Notice:
Authentication denial
11-33
11-34
CHAPTER 11
Logging System Events
Info:
None
Debug:
dhcpNvGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
Debug:
NVS cache creation; entries added to or removed from the cache; cache
synchronized to NVS
Filter:
None
dhcpRelayGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
dhcpProxyGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
diagMboxCtrl
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
None
Info:
None
Debug:
Filter:
None
dnsGeneralLog
Description:
DNS general
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Failure to post a message to DNS about the query response from DNS
server
Notice:
None
Info:
None
Debug:
Dump DNS response packet; trace DNS query submission; trace DNS
response parsing and processing; trace dropped queries if router is
shutting down or DNS disabled in virtual router; trace DNS cache cleanup
Filter:
None
11-35
11-36
CHAPTER 11
Logging System Events
ds1
Description:
DS1 layer
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
Debug:
None
Filter:
None
Description:
DS3 layer
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
Debug:
None
Filter:
None
ds3
dvmrpGeneral
Description:
DVMRP general
Emergency:
None
Alert:
None
Critical:
None
Error:
Notice:
Info:
Debug:
Filter 1:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
Filter 2:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
dvmrpMcastTable
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Creating MulticastEntry
Info:
rePruning; delOif; add OIF; not adding OIF for some reason; creating
sgoiflist; pruneDelayCallback; prune; deleting MulticastEntry
11-37
11-38
CHAPTER 11
Logging System Events
Debug:
None
Filter 1:
Filter 2:
dvmrpProbeRcv
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
Debug:
Filter 1:
Filter 2:
dvmrpProbeSent
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Send probe
Filter 1:
Filter 2:
dvmrpRtTable
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Route error; router report error; error replacing route after applying accept
filter; internal errors
Warning:
Notice:
Info:
Debug:
Filter 1:
Filter 2:
ethernet
Description:
Ethernet layer
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
Debug:
Filter:
None
fileSystem
Description:
File system
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
11-39
11-40
CHAPTER 11
Logging System Events
Notice:
None
Info:
None
Debug:
Filter:
None
frameRelay
Description:
Emergency:
None
Alert:
None
Critical:
Error:
Warning:
None
Notice:
Lack of pool space for SNMP traps (it is permissible for SNMP traps to be
unreliable); failure to obtain line module configuration on line module
insertion
Info:
Debug:
Filter:
None
fsAgent
Description:
Emergency:
None
Alert:
None
Critical:
Error:
Warning:
Notice:
None
Info:
Debug:
Filter:
None
ft1
Description:
FT1 layer
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
Debug:
None
Filter:
None
ftpClient
Description:
FTP client
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
Info:
Debug:
None
Filter:
None
ftpServer
Description:
FTP server
Emergency:
None
Alert:
None
Critical:
None
Error:
Error listening for new client connection; error creating daemon task
Warning:
Error creating new server task; socket write error; error adjusting socket
window size
11-41
11-42
CHAPTER 11
Logging System Events
Notice:
Daemon task created; waiting for new client connection; accept client
from host a.b.c.d; maximum client sessions exceeded; FTP daemon
shutdown complete
Info:
Debug:
gplaan
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Out of resources
Warning:
None
Notice:
Info:
None
Debug:
Filter:
None
httpServer
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
None
Info:
Debug:
Filter:
None
icmpTraffic
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter 1:
Filter 2:
11-43
11-44
CHAPTER 11
Logging System Events
igmpGeneral
Description:
IGMP general
Emergency:
None
Alert:
None
Critical:
None
Error:
Nonrecoverable errors
Warning:
NVS errors
Notice:
Info:
None
Debug:
Filter 1:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
Filter 2:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
ikepki
Description:
IKE SA negotiation
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
Debug:
Filter:
Filter
ipAccessList
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Debug:
None
Filter 1:
accessList
Filter 2:
accessList logs a match on any access-list entry for all access lists
ipEngine
Description:
IP chassis manager
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
11-45
11-46
CHAPTER 11
Logging System Events
Notice:
Info:
Debug:
ipGeneral
Description:
IP general
Emergency:
None
Alert:
None
Critical:
Error:
Warning:
Notice:
None
Info:
None
Debug:
(ARP) NextHopPool is out of memory and trying to expire old entries; ARP
data events
(IP) Interface stacking management errors
Filter 1:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
Filter 2:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
ipInterface
Description:
IP interface
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
None
Info:
None
Debug:
Filter 1:
Filter 2:
router see description of the ipGeneral router filter for information on this
filter
ipNhopTrackerGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
None
Debug:
None
Filter:
None
ipProfileMgr
Description:
IP Profile Manager
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
11-47
11-48
CHAPTER 11
Logging System Events
Notice:
None
Info:
None
Debug:
Filter:
None
ipRoutePolicy
Description:
IP route policy
Emergency:
None
Alert:
None
Critical:
None
Error:
Failure to clean up NVS while a routing policy was being deleted; failure to
store the routing policy to NVS while a new routing policy was being
created; failure to find an expected routing policy created previously
Warning:
Notice:
None
Info:
Debug:
Filter:
router virtualRouterName
ipRouteTable
Description:
IP routing table
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
None
Info:
Debug:
Filter 1:
Filter 2:
ipTraffic
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
None
Debug:
Filter 1:
Filter 2:
router see description of the ipGeneral router filter for information on this
filter
ipTunnel
Description:
IP tunnel
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
None
Debug:
Function trace
Filter:
None
isisAdjChange
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
11-49
11-50
CHAPTER 11
Logging System Events
Debug:
None
Filter 1:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
Filter 2:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
isisAdjPackets
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
Authentication failed
Debug:
Filter 1:
Filter 2:
isisChecksumErr
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
None
Info:
None
Debug:
None
Filter 1:
Filter 2:
isisGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
None
Debug:
Redistributed routes
Filter 1:
Filter 2:
isisLocalUpdate
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
Debug:
None
11-51
11-52
CHAPTER 11
Logging System Events
Filter 1:
Filter 2:
isisMplsTeAdvertisements
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
isisMplsTeEvents
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Debug:
Filter:
None
isisProtocolErr
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
None
Info:
None
Debug:
None
Filter:
router virtualRouterName
isisSnpPackets
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
Debug:
LSP entries
Filter 1:
Filter 2:
isisSpfEvents
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
11-53
11-54
CHAPTER 11
Logging System Events
Debug:
Add route
Filter:
router virtualRouterName
isisSpfStatistics
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
Debug:
None
Filter:
router virtualRouterName
isisSpfTriggers
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
Debug:
None
Filter:
router virtualRouterName
isisUpdatePackets
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Info:
Debug:
Filter 1:
Filter 2:
Description:
Emergency:
None
Alert:
None
Critical:
Nonrecoverable error
Error:
Configuration error
Warning:
Notice:
Info:
Debug:
Filter:
None
l2f
l2fIpLowerBinding
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Recoverable error
Warning:
Notice:
None
Info:
None
11-55
11-56
CHAPTER 11
Logging System Events
Debug:
Function trace
Filter:
None
l2fStateMachine
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
None
Info:
Debug:
Filter:
None
Description:
Emergency:
None
Alert:
None
Critical:
Nonrecoverable error
Error:
Configuration error
Warning:
Notice:
Info:
Debug:
Filter:
None
l2tp
l2tpIpLowerBinding
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Recoverable error
Warning:
Notice:
None
Info:
None
Debug:
None
Filter:
None
l2tpStateMachine
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
localAddressServerGeneral
Description:
LAS general
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
None
Info:
None
Debug:
Filter:
None
localLinePassword
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
11-57
11-58
CHAPTER 11
Logging System Events
Warning:
Notice:
None
Info:
None
Debug:
Filter:
None
mgtmGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
Debug:
Filter 1:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
Filter 2:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
mmcd
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
mplsAppService
Description:
Emergency:
None
Alert:
None
Critical:
Error:
Warning:
None
Notice:
None
Info:
Debug:
Filter:
None
mplsGeneral
Description:
Emergency:
None
Alert:
None
Critical:
Error:
Warning:
Notice:
None
Info:
NVS operations
Debug:
11-59
11-60
CHAPTER 11
Logging System Events
Filter:
router virtualRouterName
mplsMajorInterface
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
mplsMinorInterface
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
None
Debug:
Filter 1:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
Filter 2:
router virtualRouterName
mtraceLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
Info:
None
Debug:
Filter:
None
mtracercvdLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
11-61
11-62
CHAPTER 11
Logging System Events
Debug:
Filter:
None
mtraceSentLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Debug:
Filter:
None
multicastTraffic
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter 1:
Filter 2:
nameResolverLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Debug:
Filter:
None
noneAaaAddrServer
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
noneAaaServer
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
11-63
11-64
CHAPTER 11
Logging System Events
Info:
None
Debug:
Filter:
None
ntpGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
Debug:
None
Filter:
router ID
onlineDiag
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
Debug:
Filter:
None
os
Description:
Emergency:
None
Alert:
Critical:
Error:
Warning:
OsTask client failed to initialize; file system capacity low (15%); heap
utilization high (85%); crash dump save failure; unknown reset type;
image loader failures (will retry); boot ROM programming failure;
hardware upgrade necessary notification; NVS config file read or write
errors; release file invalid
Notice:
Info:
Image loader request; image loader success; SC-srpIc mailbox client up;
POST test passed; NVS config cache enable, disable, flush, or
termination; release path notification
Debug:
Filter:
None
ospfElectDr
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
DR election events
Info:
None
Debug:
None
11-65
11-66
CHAPTER 11
Logging System Events
Filter 1:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
Filter 2:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
ospfGeneral
Description:
OSPF general
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
State change errors (for example, OSPF could not be enabled); errors
creating or destroying an area, an OSPF range, or a virtual link
Notice:
Info:
None
Debug:
None
Filter 1:
Filter 2:
ospfInterface
Description:
OSPF interface
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
None
Debug:
None
Filter 1:
Filter 2:
ospfLsa
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
LSA add, update, or delete events; LSA purge, refresh, and max-age
events; LSA send and receive events (Ack, delayed Ack, retransmit)
Info:
None
Debug:
None
Filter 1:
neighbor neighborIpAddress
11-67
11-68
CHAPTER 11
Logging System Events
Filter 2:
ospfNeighbor
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Flooding event errors; neighbor transition from Full state to Down state;
invalid neighbor LSA requests; neighbor MTU negotiation mismatches
Notice:
Info:
None
Debug:
None
Filter 1:
Filter 2:
router see description of the ospfLsa router filter for information on this
filter
ospfPktsRcvd
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Number of LSAs packed in different packet types (LSA Ack, LSA update);
packets received over Down interface
Info:
None
Debug:
Filter 1:
Filter 2:
ospfPktsSent
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
Number of LSAs packed in different packet types (LSA Ack, LSA update)
Info:
None
Debug:
Filter 1:
Filter 2:
ospfRoute
Description:
OSPF route
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
OSPF route added to, replaced, or deleted from the routing table; route
imported into OSPF
Debug:
None
Filter 1:
Filter 2:
11-69
11-70
CHAPTER 11
Logging System Events
ospfSpfExt
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
SPF (Dijkstra Shortest Path First algorithm) chunking events (for example,
number of LSAs processed in an SPF chunk)
Info:
SPF results
Debug:
Filter 1:
Filter 2:
ospfSpfInter
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
Info:
SPF results
Debug:
Filter 1:
Filter 2:
ospfSpfIntra
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
Info:
SPF results
Debug:
Filter 1:
Filter 2:
ospfTeDatabase
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
Debug:
None
Filter:
11-71
11-72
CHAPTER 11
Logging System Events
ospfTeSPF
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
Debug:
None
Filter:
pimAutoRPRcvdLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Debug:
Filter 1:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
Filter 2:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
pimAutoRPSentLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Debug:
Filter 1:
Filter 2:
pimHelloRcvdLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
11-73
11-74
CHAPTER 11
Logging System Events
Notice:
None
Info:
Debug:
Filter 1:
Filter 2:
pimHelloSentLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Debug:
Filter 1:
Filter 2:
pimPktsRcvdLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Debug:
Filter 1:
Filter 2:
pimPktsSentLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Debug:
Filter 1:
Filter 2:
policyMgrAttachment
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
Debug:
None
Filter:
None
11-75
11-76
CHAPTER 11
Logging System Events
policyMgrGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Error storing or restoring policy manager data to and from NVS; resource
exhaustion errors
Warning:
None
Notice:
None
Info:
None
Debug:
None
Filter:
None
policyMgrPacketLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Packet trace
Debug:
None
Filter:
None
Description:
Emergency:
None
Alert:
None
Critical:
Nonrecoverable error
Error:
Recoverable error
Warning:
Notice:
Authentication actions
Info:
None
Debug:
ppp
Filter:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
pppoe
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
Debug:
None
Filter:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
pppoeControlPacket
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
11-77
11-78
CHAPTER 11
Logging System Events
Filter:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
pppPacket
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Packet trace
Filter:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
pppStateMachine
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
profileMgr
Description:
Profile manager
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
None
Info:
None
Debug:
Initialize profiles from NVS at startup; dump list of profiles after startup
initialization; read or save profile numbering seed to and from NVS; profile
manager process creation succeeded; NVS updated; profile lookup
succeeded; validating or executing removal of profile
Filter:
None
Description:
QoS events
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
Debug:
Filter:
None
qos
11-79
11-80
CHAPTER 11
Logging System Events
radiusAttributes
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
radiusClient
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Internal allocation error of base RADIUS server table; invalid virtual router
for users context
Warning:
Notice:
Info:
None
Debug:
Filter:
None
remOps
Description:
Remote operations
Emergency:
None
Alert:
None
Critical:
None
Error:
Internal error
Warning:
Maximum table size reached; ICMP failure; same target probed by more
than one entry
Notice:
Debug:
Filter:
None
ripGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
None
Debug:
Filter 1:
Filter 2:
router virtualRouterName
ripRoute
Description:
RIP route
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
11-81
11-82
CHAPTER 11
Logging System Events
Debug:
Routes sent or received by RIP; if a route is rejected or not sent, gives the
reason
Filter 1:
Filter 2:
router virtualRouterName
ripRtTable
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
None
Info:
None
Debug:
Filter:
None
routerLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
Debug:
None
Filter:
router virtualRouterName
security
Description:
Emergency:
None
Alert:
None
Critical:
Error:
None
Warning:
Notice:
Info:
None
Debug:
None
Filter:
None
Description:
Emergency:
None
Alert:
None
Critical:
Error:
Warning:
Notice:
None
Info:
Debug:
None
Filter:
serial interfaceSpecifier
slep
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
snmp
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
11-83
11-84
CHAPTER 11
Logging System Events
Warning:
Notice:
None
Info:
Debug:
Filter:
None
snmpPduAudit
Description:
SNMP PDUs
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Identifies the following fields in all SNMP PDUs sent to the ERX system
and all trap PDUs that leave the system: source and destination IP
address, PDU type, snmpVersion, requested, errorStatus, errorIndex,
variable count, variable object identifier and data
Debug:
None
Filter:
None
snmpSetPduAudit
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
Identifies the following fields in SNMP set PDUs: source and destination
IP address, PDU type, snmpVersion, requested, errorStatus, errorIndex,
variable count, variable object identifier and data
Debug:
None
Filter:
None
sonet
Description:
SONET
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
NV interface removal after failed init from NV; errors during interface
add/update or during hwPresent notification; path capability notification;
failed pool expansion
Notice:
Pool expansion
Info:
Debug:
None
Filter:
None
sonetPath
Description:
SONET Path
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
Pool expansion
Info:
Debug:
Path update
Filter:
None
sonetVT
Description:
Emergency:
None
Alert:
None
Critical:
None
11-85
11-86
CHAPTER 11
Logging System Events
Error:
None
Warning:
Init from NV failures; errors during remove interface; failed pool expansion
Notice:
Info:
Debug:
None
Filter:
None
ssccDetailPm
Description:
SDX client (formerly SSCC) detail for policy manager (PM) interaction
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
ssccDetailSsc
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
ssccGeneral
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
Debug:
Filter:
None
stTunnel
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
Debug:
Filter:
None
system
Description:
Emergency:
None
Alert:
None
Critical:
Error:
11-87
11-88
CHAPTER 11
Logging System Events
Notice:
Info:
Debug:
Filter:
slot slotNumber
tcpGeneral
Description:
TCP system
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
Debug:
TCP state changes (detail); TCP packet transmission; minor TCP errors
Filter:
router virtualRouterName
tcpTraffic
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
Info:
None
Debug:
Filter 1:
Filter 2:
telnet
Description:
Telnet daemon
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
None
Notice:
None
Info:
None
Debug:
Filter:
None
11-89
11-90
CHAPTER 11
Logging System Events
testExec
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
Warning:
Notice:
Info:
Debug:
Very verbose messages for debugging errors; FPGA image info; register
accesses
Filter:
None
Description:
Emergency:
None
Alert:
None
Critical:
Error:
Warning:
Notice:
Info:
Debug:
Filter:
None
tsm
udpTraffic
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
None
Notice:
None
Info:
None
Debug:
Filter 1:
Filter 2:
vrfVpnMgrGeneralLog
Description:
Emergency:
None
Alert:
None
Critical:
None
Error:
None
Warning:
Notice:
None
Info:
None
Debug:
Filter:
None
Description:
Emergency:
None
Alert:
None
Critical:
Error:
Warning:
vrrp
11-91
11-92
CHAPTER 11
Logging System Events
Notice:
Info:
Debug:
Filter:
Note: For information on interface types and specifiers, see ERX Command
Reference Guide, About This Guide.
Abbreviations and
Acronyms
Abbreviation
or Acronym
Term
A
AAA
AAAA
AAL
ABR
AC
ACCM
ACFC
ADSL
AESA
AF
assured forwarding
AFI
AH
Authentication Header
AIS
AIS-L
AIS-P
ANSI
API
APS
ARP
AS
ASBR
A-2
APPENDIX A
Abbreviations and Acronyms
Abbreviation
or Acronym
Term
ASCII
ASIC
ASN
ASP
ATM
AVP
B
BDR
BECN
BER
BERT
BGP
BIP
BITS
BMA
broadcast multiaccess
BOOTP
BOOTstrap Protocol
B-RAS
BS
base station
BSS
BW
bandwidth
C
CA
certificate authority
CAC
CAR
CARS
CBC
CBF
connection-based forwarding
CBQ
class-based queuing
CBR
CC
continuity check
CCITT
CDVT
CE
CHAP
A-3
ERX Edge Routers
Abbreviation
or Acronym
Term
CIDR
CISPR
CLACL
CLEC
CLI
CLNP
CLNS
CLP
CM
cable modem
CMTS
CNM
CO
central office
cOC
COPS
CORBA
CoS
class of service
CPE
CPU
CRC
CR-LDP
CR-LSP
CSNP
CSU
CT1, CT3
channelized T1, T3
CTI
CTS
clear to send
CTT
CUL
CV
coding violation
D
DA/SA
DC
direct current
DCC
DCD
A-4
APPENDIX A
Abbreviations and Acronyms
Abbreviation
or Acronym
Term
DCE
DE
discard eligibility
DES; 3DES
DF
DHCP
DIS
DLCI
DLCMI
DNS
DOCSIS
DR
designated router
DS
DSL
DSLAM
DSP
domain-specific part
DSR
DSS
DST
DSU
DTE
DTR
DU
downstream unsolicited
DVMRP
DXI
E
EBGP
ECC
ECMP
equal-cost multipath
EEPROM
EF
expedited forwarding
EGP
EMS
EN
European Norm
EPD
ES
end system
A-5
ERX Edge Routers
Abbreviation
or Acronym
Term
ESD
electrostatic discharge
ESF
extended superframe
ESI
ESP
ESSM
EXP
F
FAT
FCC
FCS
FDL
FE
Fast Ethernet
FE-2
FEC
FECN
FERF
FIB
FIFO
FPGA
FQDN
FR
Frame Relay
FRU
FSM
FT1
fractional T1
FTE
FTP
FTTC
FTTH
FTTS
G
Gbps
GE
Gigabit Ethernet
GRE
GRxx
GUI
A-6
APPENDIX A
Abbreviations and Acronyms
Abbreviation
or Acronym
Term
H
HDLC
HDSL
HMAC
HO-DSP
HRR
HSSI
I
I/O
input/output
IANA
IBGP
IC CS
ICD
ICMP
ICRQ
incoming-call request
ID
I-DAS
IDI
IDP
IDSL
IEC
IEEE
IETF
IGMP
IGP
IIF
incoming interface
IKE
ILEC
ILMI
InARP
IP
Internet Protocol
IPCP
IPoA
IPSec
IRDP
A-7
ERX Edge Routers
Abbreviation
or Acronym
Term
ISAKMP
ISDN
IS-IS
ISM
ISO
ISP
IS Voice
ITU-T
J
JATE
JCBC
K
KB
kilobyte(s)
Kbps
L
L2F
Layer 2 Forwarding
L2TP
LAC
LAN
LCP
LDAP
LDP
LED
light-emitting diode
LER
LIB
LIP
LIS
logical IP subnetwork
LLC
LM
line module
LMDS
LMI
LNS
LOF
loss of frame
LOP
loss of pointer
A-8
APPENDIX A
Abbreviations and Acronyms
Abbreviation
or Acronym
Term
LOS
loss of signal
LS
link state
LSA
LSDB
LSP
LSR
label-switching router
M
MAC
MAN
MAU
MB
megabyte(s)
MBGP
MBONE
multicast backbone
Mbps
MBS
MD5
Message Digest 5
MDL
MDU
MDx
MED
multiexit discriminator
MFA
MFR
MIB
MLP; MLPPP
MMDS
motd
MOTM
MP
MP-BGP
MPLS
MPPE
MRRU
MRU
MSO
multiservice operator
A-9
ERX Edge Routers
Abbreviation
or Acronym
Term
MSP
MTU
MUX
multiplexer
N
NAK
negative acknowledgment
NAS
NBMA
nonbroadcast multiaccess
NCP
NEBS
NET
NLRI
NLSP
NMC
NMS
NNI
Network-to-Network Interface
NRZ
nonreturn to zero
NRZI
NSAP
NSSA
NTP
NVRAM
NVS
nonvolatile storage
O
OAM
OC
optical carrier
ODBC
OID
object identifier
OIF
outgoing interface
ORF
OSI
OSINLCP
OSPF
OSS
A-10
APPENDIX A
Abbreviations and Acronyms
Abbreviation
or Acronym
Term
P
P
PADI
PADM
PADO
PADR
PADS
PADT
PAP
PBX
PCMCIA
PCR
PDM
PDU
PE
PFC
PFS
PHB
per-hops behavior
PIM
PIM DM
PIM S-DM
PIM SM
PKI
PKIX
PLCP
PM
policy manager
PNNI
POP
point of presence
POS
POST
power-on self-test
PPP
Point-to-Point Protocol
PPPoE
pps
PROM
PSNP
A-11
ERX Edge Routers
Abbreviation
or Acronym
Term
PVC
Q
QoS
quality of service
QSAAL
R
RADIUS
RADSL
RAS
RD
route distinguisher
RDBS
RDI
RED
REI
RESV
reservation
RFC
RIB
RIP
RISC
RMI
RP
RPF
RSA
RSVP
RSVP-TE
RT
routing table
RTR
RX
receive
S
SA
security association
SAR
SC
system controller
S-CBQ
SCCRQ
Start-Control-Connection-Request
SCR
A-12
APPENDIX A
Abbreviations and Acronyms
Abbreviation
or Acronym
Term
SCSI
SDH
SDRAM
SDSL
SDU
SDX
SEF
SES
SETS
SFP
SG
source group
SHA
SIP
SLA
SLARP
SMC
SMDS
SMF
single-mode fiber
SMI
SMM
SNAP
SNI
SNMP
SNPA
SNTP
SONET
SPF
SPI
SPQ
strict-priority queues
SPVC
SQL
SRP
SRT
source-rooted tree
SSC
A-13
ERX Edge Routers
Abbreviation
or Acronym
Term
SSH
SSN
STM
SVC
S-VLAN
T
TAC
TACACS
TC
transmission convergence
TCP
TE
traffic engineering
TIP
TLV
type-length-value
ToS
type of service
TPID
TSM
TTL
time-to-live
TU
tributary unit
TUG
TX
transmit
U
U
UBR
UDP
UI
user interface
UL
Underwriter Laboratories
UMC
UNI
UPC
URL
USM
UTC
V
VAC
A-14
APPENDIX A
Abbreviations and Acronyms
Abbreviation
or Acronym
Term
VBR
VBR-NRT
VBR-RT
VC
VCC
VCCI
VCD
VCI
VDC
VDSL
VLAN
VoIP
VP
virtual path
VPC
VPI
VPN
VR
virtual router
VRF
VRID
VRRP
VSA
VT
virtual tributary
VTS
vty
virtual terminal
W
WAN
WFQ
WINS
WLAN
WLL
WRED
WRR
X
xDSL
References
RFCs
Table B-1 ERX RFCs
Reference
Protocol or
Feature
RFC 3210 Applicability Statement for Extensions to RSVP for LSP-Tunnels (December 2001)
BGP/MPLS
VPNs
RFC 3209 RSVP-TE: Extensions to RSVP for LSP Tunnels (December 2001)
BGP/MPLS
VPNs
Policy
management
BGP/MPLS
VPNs
MPLS
Dynamic
interfaces,
RADIUS
MPLS
MPLS
RFC 3035 MPLS using LDP and ATM VC Switching (January 2001)
MPLS
MPLS
MPLS
SNMP
B-2
APPENDIX B
References
Reference
Protocol or
Feature
RFC 2998 A Framework for Integrated Services Operation over Diffserv Networks (November
2000)
QoS
RFC 2990 Next Steps for the IP QoS Architecture (November 2000)
QoS
IS-IS
RFC 2966 Domain-wide Prefix Distribution with Two-Level IS-IS (October 2000)
IS-IS
RFC 2934 Protocol Independent Multicast MIB for IPv4 (October 2000)
SNMP
SNMP
RFC 2925 Definitions of Managed Objects for Remote Ping, Traceroute, and Lookup
Operations (September 2000)
SNMP
BGP
MPLS
RADIUS
RFC 2868 RADIUS Attributes for Tunnel Protocol Support (June 2000)
RADIUS
RFC 2867 RADIUS Accounting Modifications for Tunnel Protocol Support (June 2000)
RADIUS
Dynamic
interfaces;
RADIUS
RFC 2865 Remote Authentication Dial In User Service (RADIUS) (June 2000)
Dynamic
interfaces;
RADIUS
Ethernet; SNMP
BGP
BGP
RFC 2796 BGP Route Reflection An Alternative to Full Mesh IBGP (April 2000)
BGP
RFC 2787 Definitions of Managed Objects for the Virtual Router Redundancy Protocol (March
2000)
VRRP
IP tunnels
RFC 2763 Dynamic Hostname Exchange Mechanism for IS-IS (February 2000)
IS-IS
MPLS
SNMP
RFC 2702 Requirements for Traffic Engineering over MPLS (September 1999)
MPLS
Policy
management;
QoS
Policy
management
MPLS
RFCs
ERX Edge Routers
Reference
Protocol or
Feature
RFC 2684 Multiprotocol Encapsulation over ATM Adaptation Layer 5 (September 1999)
ATM
RFC 2668 Definitions of Managed Objects for IEEE 802.3 Medium Attachment Units (MAUs)
(August 1999)
Ethernet; SNMP
SNMP;
IP tunnels
RFC 2665 Definitions of Managed Objects for the Ethernet-like Interface Types (August 1998)
Ethernet; SNMP
L2TP
HTTP
PoS
QoS
Policy
management;
QoS
SNMP
SNMP
SNMP
RFC 2576 Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard
Network Management Framework (March 2000)
SNMP
RFC 2575 View-based Access Control Model (VACM) for the Simple Network Management
Protocol (SNMP) (April 1999)
SNMP
RFC 2574 User-based Security Model (USM) for version 3 of the Simple Network Management SNMP
Protocol (SNMPv3) (April 1999)
RFC 2573 SNMPv3 Applications (April 1999)
SNMP
RFC 2572 Message Processing and Dispatching for the Simple Network Management Protocol
(SNMP) (April 1999)
SNMP
RFC 2571 An Architecture for Describing SNMP Management Frameworks (April 1999)
SNMP
SNMP
RFC 2558 Definitions of Managed Objects for the SONET/SDH Interface Type (March 1999)
SNMP;
cOCx/STMx and
OCx/STMx
interfaces
BGP/MPLS
VPNs
BGP
RFC 2516 Method for Transmitting PPP over Ethernet (PPPoE) (February 1998)
PPPoE
RFC 2515 Definitions of Managed Objects for ATM Management (February 1999)
ATM; SNMP
B-3
B-4
APPENDIX B
References
Reference
Protocol or
Feature
RFC 2514 Definitions of Textual Conventions and OBJECT-IDENTITIES for ATM Management
(February 1999)
SNMP
RFC 2513 Managed Objects for Controlling the Collection and Storage of Accounting
Information for Connection-Oriented Networks (February 1999)
SNMP
Policy,
Management;
QoS
RFC 2474 Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6
Headers (December 1998)
Policy
management;
QoS
RIP
BGP
Frame Relay
RFC 2410 The NULL Encryption Algorithm and Its Use With IPSec (November 1998)
IPSec
IPSec
RFC 2408 Internet Security Association and Key Management Protocol (ISAKMP)
(November 1998)
IPSec
RFC 2407 The Internet IP Security Domain of Interpretation for ISAKMP (November 1998)
IPSec
IPSec
RFC 2405 The ESP DES-CBC Cipher Algorithm With Explicit IV (November 1998)
IPSec
RFC 2404 The Use of HMAC-SHA-1-96 within ESP and AH (November 1998)
IPSec
RFC 2403 The Use of HMAC-MD5-96 within ESP and AH (November 1998)
IPSec
IPSec
RFC 2401 Security Architecture for the Internet Protocol (November 1998)
IPSec
ATM
RFC 2385 Protection of BGP Sessions via the TCP MD5 Signature Option (August 1998)
BGP
OSPF
E3 and T3
interfaces
IP multicasting;
SNMP
RFC 2341 Cisco Layer Two Forwarding (Protocol) L2F (May 1998)
L2F
VRRP
OSPF
RFC 2308 Negative Caching of DNS Queries (DNS NCACHE) (March 1998)
System
management
RFC 2270 Using a Dedicated AS for Sites Homed to a Single Provider (January 1998)
BGP
RFCs
ERX Edge Routers
Reference
Protocol or
Feature
IP multicasting
RFC 2211 Specification of the Controlled-Load Network Element Service (September 1997)
MPLS
RFC 2210 The Use of RSVP with IETF Integrated Services (September 1997)
MPLS
RFC 2209 Resource ReSerVation Protocol (RSVP) -- Version 1, Message Processing Rules
(September 1997)
MPLS
MPLS
PPP
DHCP
RFC 2115 Management Information Base for Frame Relay DTEs Using SMIv2 (September
1997)
Frame Relay;
SNMP
SNMP
RFC 2013 SNMPv2 Management Information Base for the User Datagram Protocol using
SMIv2 (November 1996)
SNMP
RFC 2012 SNMPv2 Management Information Base for the Transmission Control Protocol using SNMP
SMIv2 (November 1996)
RFC 2011 SNMPv2 Management Information Base for the Internet Protocol using SMIv2
(November 1996)
SNMP
IP tunnels
RFC 1998 An Application of the BGP Community Attribute in Multi-home Routing (August
1996)
BGP
BGP
RFC 1994 PPP Challenge Handshake Authentication Protocol (CHAP) (August 1996)
MLPPP; PPP
MLPPP
RFC 1966 BGP Route Reflection An alternative to full mesh IBGP (June 1996)
BGP
BGP
RFC 1930 Guidelines for creation, selection, and registration of an Autonomous System (AS)
(March 1996)
BGP
RFC 1907 Management Information Base for Version 2 of the Simple Network Management
Protocol (SNMPv2) (January 1996)
SNMP
RFC 1906 Transport Mappings for Version 2 of the Simple Network Management Protocol
(SNMPv2) (January 1996)
SNMP
RFC 1905 Protocol Operations for Version 2 of the Simple Network Management Protocol
(SNMPv2) (January 1996)
SNMP
SNMP
RFC 1877 PPP Internet Protocol Control Protocol Extensions for Name Server Addresses
(December 1995)
PPP
RFC 1863 A BGP/IDRP Route Server alternative to a full mesh routing (October 1995)
BGP
B-5
B-6
APPENDIX B
References
Reference
Protocol or
Feature
OSPF
IP
BGP
BGP
RFC 1772 Application of the Border Gateway Protocol in the Internet (March 1995)
BGP
BGP
BGP
RIP
RFC 1702 Generic Routing Encapsulation over IPv4 Networks (October 1994)
IP tunnels
IP tunnels
IP tunnels
PoS
PPP; MLPPP;
cOCx/STMx,
CE1, CT1, CT3,
E3, and T3
interfaces
RFC 1657 Definitions of Managed Objects for the Fourth Version of the Border Gateway
Protocol (BGP-4) using SMIv2 (July 1997)
BGP; SNMP
SNMP
RFC 1483 Multiprotocol Encapsulation over ATM Adaptation Layer 5 (July 1993)
ATM; E3 and T3
interfaces
RFC 1473 The Definitions of Managed Objects for the IP Network Control Protocol of the
Point-to-Point Protocol (June 1993)
SNMP
RFC 1472 The Definitions of Managed Objects for the Security Protocols of the Point-to-Point
Protocol (June 1993)
SNMP
RFC 1471 The Definitions of Managed Objects for the Link Control Protocol of the
Point-to-Point Protocol (June 1993)
SNMP
RFC 1407 Definitions of Managed Objects for the DS3/E3 Interface Types (January 1993)
SNMP;
cOCx/STMx,
CT3, E3, and T3
interfaces
RFC 1406 Definitions of Managed Objects for the DS1 and E1 Interface Types (January 1993)
SNMP; CE1,
CT1, and CT3
interfaces
RFC 1332 The PPP Internet Protocol Control Protocol (IPCP) (May 1992)
PPP
RFC 1305 Network Time Protocol (version 3) Specification, Implementation and Analysis
(March 1992)
NTP
RFC 1215 A Convention for Defining Traps for use with the SNMP (March 1991)
SNMP
RFCs
ERX Edge Routers
Reference
Protocol or
Feature
RFC 1213 Management Information Base for Network Management of TCP/IP-based Internets: SNMP
MIB-II (March 1991)
RFC 1212 Concise MIB Definitions (March 1991)
SNMP
RFC 1195 Use of OSI IS-IS for Routing in TCP/IP and Dual Environments (December, 1990)
IS-IS
SNMP
RFC 1155 Structure and Identification of Management Information for TCP/IP-based Internets
(May 1990)
SNMP
IP
Ethernet; IP
RIP
RFC 1042 A Standard for the Transmission of IP Datagrams over IEEE 802 Networks
(February 1988)
Ethernet
System
management
FTP; System
management
IP
RFC 922 Broadcasting Internet Datagrams in the Presence of Subnets (October 1984)
IP
IP
RFC 894 A Standard for the Transmission of IP Datagrams over Ethernet Networks (April 1984) Ethernet
RFC 854 Telnet Protocol Specification (May 1983)
IP
Ethernet
IP
IP
RFC 791 Internet Protocol DARPA Internet Program Protocol Specification (September 1981)
IP
IP
B-7
B-8
APPENDIX B
References
Draft RFCs
Note: IETF drafts are valid for only 6 months from the date of issuance. They must
be considered as works in progress. Please refer to the IETF Web site at
http://www.ietf.org for the latest drafts.
Table B-2 ERX draft RFCs
Reference
Protocol or
Feature
MPLS
IP multicasting
BGP
BGP
SONET APS
redundancy
IP multicasting
IS-IS
IP multicasting
IS-IS
IS-IS; SNMP
Protocol Independent Multicast MIB for IPv4 draft-ietf-idmr-pim-mib-10.txt (July 2000 expiration)
IP multicasting
IS-IS
Reference
Protocol or
Feature
MDL (T3
interfaces)
ANSI T1.403-1989 Standard for Telecommunications - Network and Customer Installation Interfaces
DS1 Metallic Interface Robbed-bit Signaling State Definitions (1989)
FDL (T1
interfaces)
Frame Relay
ATM Forum ATM User-Network Interface Specification, Version 3.0 (September 1993)
ATM
ATM Forum ATM User-Network Interface Specification, Version 3.1 (September 1994)
ATM
ATM Forum Integrated Local Management Interface (ILMI) Specifications, Versions 3.0, 3.1, and
4.0 (September 1996)
ATM
ATM
ATM
ATM
CCITT ITU-T Recommendation I.160 B-ISDN Operation and Maintenance Principles and Functions
(February 1999)
ATM
Frame Relay
Draft Standard P802.1Q/D9 IEEE Standards for Local and Metropolitan Area Networks: Virtual
Bridged Local Area Networks
Ethernet;
VLANs
ERX system Cisco HDLC is compatible with Cisco Systems HDLC protocol
Cisco HDLC
Frame Relay
Ethernet;
VLANs
Ethernet
Ethernet
Ethernet
ISO International Standard 8473-1:1993 Information technology Protocol for providing the
connectionless-mode network service
IS-IS
IS-IS
IS-IS
SDH MSP
redundancy
B-9
B-10
APPENDIX B
References
Reference
Protocol or
Feature
Multilink
Frame Relay
ITU-T V.35: Data transmission at 48 kbit/s using 60-108 kHz group band circuits (October 1984 - now
obsolete)
V.35
ITU-T X.21: Interface between Data Terminal Equipment and Data Circuit-terminating Equipment for
synchronous operation on public data networks (September 1992)
X.21
Telcordia document GR-253 Synchronous Optical Network (SONET) Transport Systems: Common
Generic Criteria, Revision 3 (September 2000).
SONET APS
redundancy
Hardware Standards
Table B-4 ERX hardware standards
Reference
Protocol or
Feature
ACA TS 016-1997
Telecom
Cables
Cables and
connectors
Cables and
connectors
Safety
EMC
Cables and
connectors
CAN/CSA C22.2, No. 60950-00, 3rd Edition, Safety of Information Technology Equipment
Safety
CTR13 Commission Decision of 9 July 1997 on a common technical regulation for attachment
requirements for terminal equipment interface for connection to 2048 kbit/s digital structured ONP
leased lines: 97/521/EC OJ No. L215 Vol. 40, August 1997
Telecom
Telecom
EMC
Telecom
EMC
EMC
EN60825-1, Safety of Laser Products - Part 1: Equipment Class, Requirements, and Users Guide
(2001)
Safety
Hardware Standards
ERX Edge Routers
Reference
Protocol or
Feature
Safety
EMC
EMC
FCC PART 68
EMC
GR-1089 (LSSGR, FD-15): Electromagnetic Compatibility and Electrical Safety - Generic Criteria
for Network Telecommunications Equipment, Issue 2, Revision 1, February 1999
NEBS
GR-63 (LSSGR, FD-15): Network Equipment Building System (NEBS) Requirements: Physical
Protection, Issue 1, October 1995
NEBS
EMC
Safety
IEC 60950-1(2001-10) Ed. 1.0 Information technology equipment - Safety - Part 1: General
requirements
Safety
Cables
Safety
PD7024 Essential requirements for terminal equipment intended for connection to unstructured
digital leased circuits of the public telecommunications network using a CCITT recommendation
G,703 interface at a rate of 2048 kbit/s with a 75 ohm unbalanced presentation, 1994
Telecom
Telecom
SR-3580 (FD-15): Network Equipment Building System (NEBS) Criteria Levels, Issue 1, November
1995
Safety
Safety
Safety
EMC
B-11
B-12
APPENDIX B
References
Index
Symbols
.cnf files 4-10, 4-22
.dmp files 4-22, 4-44
.hty files 4-22
.log files 4-22
.mac files 4-22
.pub files 4-22
.rel files 4-22
.scr files 4-22
.sts files 4-22
.txt files 4-22
? command 2-6, 2-23, 2-25
Numbers
3des-cbc encryption algorithm for SSH 6-21
A
AAA authentication, configuring 6-13
aaa commands
aaa authentication login 6-14
aaa domain-map 10-7
aaa domain-map command 2-38
aaa new-model 6-14
AAL5 layer (ATM) 1-24
abbreviating
keywords 2-4, 2-5, 2-26
access and uplink methods 1-3
access-class in command 6-16
access levels (CLI) 2-20
access-list command 6-16, 9-10
access lists for Telnet sessions 6-16
access lists 1-30
Address Family Configuration mode 2-29, 2-37
address-family ipv4 command 2-37
address-family vpnv4 command 2-37
agent, SNMP 3-2, 3-4
enabling 3-13
algorithm negotiation, SSH 6-17
arrow keys 2-7, 2-27, 2-28
assembly numbers (hardware), displaying 5-17
assembly numbers, displaying for hardware 8-9
assembly revisions (hardware), displaying 5-17
assembly revisions, displaying for hardware 8-9
assigning NTP servers 9-7
B
Backspace key 2-6, 2-27
backup router 1-29
bandwidth
associated error messages 5-14
line modules 5-8
optimizing 5-14
SRP modules 5-8
bandwidth oversubscription
configuring 5-13
monitoring 5-13
overview 5-6
bandwidth oversubscription command 5-13
banner command 4-17
baseline commands
baseline log 11-3
baseline show-delta-counts 4-49
baseline snmp 3-43
best NTP server 9-4, 9-13
BGP protocol 1-29
blowfish-cbc encryption algorithm for SSH 6-21
boot commands
boot backup 8-2
boot config 8-2
boot config factory-defaults 8-2
boot config once 8-2
boot config running-configuration 8-2
2
Index
C
caching, configuration 8-8
capitalization. See case sensitivity
case sensitivity 2-26
3
ERX Edge Routers
commands
abbreviating 2-26
editing on command line 2-26 to 2-28
issuing from other command modes 2-8, 4-7
listing available 2-23
pausing before executing 4-7
using 2-5
community, SNMP 3-2, 3-13, 3-14
community table, SNMP
community name 3-13
configuring 3-13
IP access list 3-14
privilege levels 3-14
configuration caching 8-8
configuration file 8-1
configuration tasks, general 1-8 to 1-9
configure command 2-34, 2-36, 4-5
configuring
bandwidth oversubscription 5-13
banners 4-17
CLI messages 4-17
data link layer interfaces 1-20
display terminal 4-14
DNS 4-39
line module redundancy 5-16
login conditions 4-15
NTP 9-8
performance rate of line modules 5-6
physical layer interfaces 1-10
policy management 1-31
routing policy 1-30
routing protocols 1-28
timing 4-3
virtual routers 1-9, 10-4 to 10-10
confirmations explicit command 2-19
console
monitoring settings 4-19
password 6-10
restricting login 4-15
setting speed 4-14
contact person for SNMP server 3-14
context-sensitive help 2-22 to 2-26, 4-7
controller command 2-37
controller commands 2-37
See also show controllers commands
Controller Configuration mode 2-29, 2-37
conventions defined
icons xx
syntax xx
text xx
copy commands
copy 4-30, 4-47
copy running-configuration 4-10
copy running-configuration
startup-configuration 4-11
copy startup-configuration 4-11
copying
files 4-30, 4-47
image on primary SRP module 5-28
long scripts 5-27
partial releases 4-36
core dump files for troubleshooting 4-22, 4-44
corrupted files
repairing 5-29
scanning 5-29
crypto key dss command 6-19, 6-25
CT1 interfaces
configuring 1-15, 1-16
line rates 1-10
CT3 interfaces
configuring 1-13
line rates 1-10
Ctrl-key combinations (CLI)
command history 2-28
command-line editing 2-27
customizing. See configuring
D
data-character-bits command 4-15
data set ready signal. See DSR
DCE 1-19
default command 2-7
default virtual router 10-1
delete command 4-25
Delete key 2-6, 2-27
deleting
files 4-25
line module configurations 5-4
passwords and secrets 6-6 to 6-7
destination, logging messages by 11-4
DHCP Pool Configuration mode 2-29, 2-37
Diffie-Hellman key exchange 6-17
digital subscriber line access multiplexers. See
DSLAMs
dir command 4-26
directing NTP replies 9-10
disable-autosync command 5-27
disable command 4-5
disable-switch-on-error command 5-22
4
Index
disabling
automatic synchronization 5-27
line modules 5-2
disconnect ssh command 6-26
displaying. See listing; show commands
distribution lists 1-30
.dmp files 4-22, 4-44
DNS (Domain Name Service) 4-39 to ??
documentation set, Juniper Networks xxi
CD xxii
CD, using the xxiii
comments on xxiii
Domain Map Configuration mode 2-29, 2-38
Domain Map Tunnel Configuration mode 2-29,
2-39
Domain Name Service. See DNS
Down Arrow key 2-7, 2-28
draft RFCs B-8
DS1 channels 1-13
DS3 channels 1-13
DSLAM aggregation 1-3 to 1-4
DSLAMs (digital subscriber line access
multiplexers) 1-3, 1-21, 1-23, 1-31
DSR (data set ready), restricting login with 4-15
dsr-detect command 4-16
DTE 1-19
dump files, core 4-44
E
E3 interfaces
configuring 1-14
line rates 1-10
edge aggregation applications 1-2
private line aggregation 1-2
xDSL session termination 1-3 to 1-4
editing on command line 2-26 to 2-28
enable commands
enable 2-35, 4-6, 6-28
enable password 6-4
enable privilege-level 6-6
enable secret 6-4
enable passwords
erasing 6-6
enabling
engineering logs 11-6
line modules 5-2
passwords 6-4
SNMP agent 3-13
SNMP traps 3-22
encryption
3des-cbc for SSH 6-21
blowfish-cbc for SSH 6-21
configuring SSH 6-21
twofish-cbc for SSH 6-21
encrypt passwords 6-5
end command 4-6
engineering logs 11-6
Enter key 2-6, 2-26, 2-28
Enterprise SNMP MIB 3-4
entity, SNMP 3-2
environment, system 4-49
erase secrets command 6-7
erasing
line module configurations 5-4
erasing. See deleting
ERX-1400 series xix
ERX-700 series xix
ERX models xix
ERX system, remote access. See B-RAS
applications
ERX system. See system
Esc-key combinations (CLI) 2-27
Ethernet, Telnet on 4-39
Ethernet port on SRP module 5-31
events, SNMP 3-2
exception commands
exception dump 4-45
exception gateway 4-45
exception protocol ftp 4-45
exception source 4-46
exclude-subsystem command 4-37
exec-banner command 4-18
exec-timeout command 4-17
executing macros 7-16
exit command 2-22, 4-6
exiting
current command mode 4-6
Global Configuration mode 4-6
Privileged Exec mode 4-5
exiting system 2-22
Explicit Path Configuration mode 2-29, 2-39
F
failover. See switchover
Fast Ethernet (FE) modules
specifying an interface 5-31
fields, adding to logs 11-6
5
ERX Edge Routers
files
deleting 4-25
macro 7-1
managing 4-22 to 4-24
monitoring 4-26
renaming 4-24
transferring 4-27 to 4-39
types of 4-22
file system configuration, saving current 4-10
filtering show command output 2-9
flash-disk commands
flash-disk duplicate 5-29
flash-disk initialize 5-28
flash-disk scan 5-29
Frame Relay
interfaces 1-21 to 1-22
FTP client 4-28
FTP server 4-28
authentication 4-33
configuring 4-32
monitoring 4-35
ftp-server enable command 4-33
G
GetBulk operation, SNMP 3-10
GetBulk PDU type, SNMP 3-10
GetNext operation, SNMP 3-10
GetNextRequest PDU type, SNMP 3-10
Get operation, SNMP 3-10
GetRequest PDU type, SNMP 3-10
GetResponse PDU type, SNMP 3-10
Global Configuration mode 2-1, 2-29, 2-36, 4-5
exiting 4-6
group, SNMP 3-2
H
halt command 5-3, 5-25
hardware
slot numbers 4-48
standards B-10
versions, displaying 5-33, 8-11
HDLC parameters 1-12
help 4-7
CLI system 2-22 to 2-26
help command 2-22, 2-26, 4-7
history command 2-28
hmac-md5 authentication for SSH 6-24
hmac-sha1-96 authentication for SSH 6-24
hmac-sha1 authentication for SSH 6-24
I
I/O modules
software compatibility 5-6
icons defined, notice xx
if constructs, macro 7-11
initializing line modules 2-20
initializing primary NVS card 5-28
installing NVS cards 5-25
installing software 5-27
installing the system software xix
interactive help system. See help
interface commands 1-7
interface 2-40, 2-53
interface fastEthernet 5-31
See also show interfaces commands
Interface Configuration mode 2-30, 2-40
interfaces 1-6 to 1-28
configuring 2-40
Fast Ethernet 5-31
physical. See physical interfaces
IP access list, SNMP 3-14
ip commands
ip atm-vc 2-44
ip dhcp-local pool 2-37
ip domain-lookup 4-41
ip domain-lookup transit-virtual-router 4-43
ip domain-name 4-42
ip ftp source-address 4-31
ip ftp source-interface 4-31
ip name-server 4-42
ip vrf 2-54, 10-7
IP multicast 1-28
IPSec
AH 1-10
ESP 1-10
ipsec commands
ipsec isakmp-policy-rule 2-41
ipsec key manual 2-41
IPSec Manual Key Configuration mode 2-30,
2-41
ip ssh commands
ip ssh authentication-retries 6-23
ip ssh crypto 6-22
ip ssh disable-user-authentication 6-23
6
Index
J
Juniper Networks documentation set xxi
CD xxii
CD, using the xxiii
comments on xxiii
Juniper Networks ERX Enterprise SNMP
MIB 3-4
K
keywords 2-3, 2-4
partial-keyword <Tab> 2-26
L
L2F protocol 1-32
l2tp destination profile command 2-42
L2TP Destination Profile Configuration
mode 2-30, 2-42
L2TP Destination Profile Host Configuration
mode 2-30, 2-42
L2TP protocol 1-32
Layer 2 Forwarding Protocol. See L2TF
Layer 2 Tunneling Protocol. See L2TP
layered approach to network configuration 1-4
LDP Configuration mode 2-30, 2-43
Left Arrow key 2-7, 2-27
levels of CLI access 6-27
line command 6-9, 6-12, 6-15
Line Configuration mode 2-30, 2-43
line module redundancy 5-14
configuring 5-16
managing 5-16
monitoring 5-17
line modules
bandwidth 5-8
combinations 5-6 to 5-12
disabling 5-2
enabling 5-2
erasing configurations 5-4
initialization sequence 2-20
line rates 1-10
performance rate 5-6
replacing 5-4
restricted combinations 5-7, 5-14
slot groups 5-6 to 5-12
software compatibility 5-5
switch usage 5-8
troubleshooting 4-44
line rates 1-10
lines on terminal screen, setting 4-14
line vty command 2-43, 4-8
link-up, link-down traps, SNMP 3-23
listing
commands available 2-23
files on system 4-26
See also show commands
LLC layer (ATM) 1-24
LMI (local management interface) 1-22
local management interface. See LMI and ILMI
location of SNMP server 3-14
log commands 4-43
baseline log 11-3
log destination 11-4
log engineering 11-6
log field 11-6
log here 11-6
log severity 11-7
log unlimit 11-7
log verbosity 11-7
no log filters 11-12
See also show log commands
log event categories 11-16
aaaAtm1483Cfg 11-16
aaaEngineGeneral 11-17
aaaServerGeneral 11-17
aaaUserAccess 11-18
addressServerGeneral 11-18
ar1AaaServerGeneral 11-18
atm 11-19
atm1483 11-19
atmAal5 11-20
AuditIpsec 11-20
bgpConnections 11-21
bgpDampening 11-21
bgpEvents 11-22
bgpGeneral 11-23
7
ERX Edge Routers
bgpKeepAlives 11-23
bgpMessages 11-24
bgpNeighborChanges 11-25
bgpRoutes 11-25
bgpVpn 11-28
bridgedEthernet 11-28
bulkStats 11-28
cacGeneral 11-29
cacIntf 11-29
cbf 11-30
cliCommand 11-30
cops 11-30
crldpGeneral 11-31
ctreeLog 11-32
dcm 11-32
dcmEngineGeneral 11-33
dhcpGeneral 11-33
dhcpLocalServerGeneral 11-33, 11-34
dhcpProxyGeneral 11-34
dhcpRelayGeneral 11-34
diagMboxCtrl 11-35
dnsGeneralLog 11-35
ds1 11-36
ds3 11-36
dvmrpGeneral 11-36
dvmrpMcastTable 11-37
dvmrpProbeRcv 11-38
dvmrpProbeSent 11-38
dvmrpRtTable 11-39
ethernet 11-39
fileSystem 11-39
frameRelay 11-40
fsAgent 11-40
ft1 11-41
ftpClient 11-41
ftpServer 11-41
gplaan 11-42
httpServer 11-42
icmpTraffic 11-43
igmpGeneral 11-44
ikepki 11-44
ipAccessList 11-45
ipEngine 11-45
ipGeneral 11-46
ipInterface 11-47
ipNhopTrackerGeneral 11-47
ipProfileMgr 11-47
ipRoutePolicy 11-48
ipRouteTable 11-48
ipTraffic 11-49
ipTunnel 11-49
isisAdjChange 11-49
isisAdjPackets 11-50
isisChecksumErr 11-50
isisGeneral 11-51
isisLocalUpdate 11-51
isisMplsTeAdvertisements 11-52
isisMplsTeEvents 11-52
isisProtocolErr 11-52
isisSnpPackets 11-53
isisSpfEvents 11-53
isisSpfStatistics 11-54
isisSpfTriggers 11-54
isisUpdatePackets 11-55
l2f 11-55
l2flpLowerBinding 11-55
l2fStateMachine 11-56
l2tp 11-56
l2tplpLowerBinding 11-56
l2tpStateMachine 11-57
localAddressServerGeneral 11-57
localLinePassword 11-57
mgmtGeneral 11-58
mmcd 11-58
mplsAppService 11-59
mplsGeneral 11-59
mplsMajorInterface 11-60
mplsMinorInterface 11-60
mtraceLog 11-61
mtracercvdLog 11-61
mtraceSentLog 11-62
multicastTraffic 11-62
nameResolverLog 11-63
noneAaaAddrServer 11-63
noneAaaServer 11-63
ntpGeneral 11-64
onlineDiag 11-64
os 11-65
ospfElectDr 11-65
ospfGeneral 11-66
ospfInterface 11-67
ospfLsa 11-67
ospfNeighbor 11-68
ospfPktsRcvd 11-68
ospfPktsSent 11-69
ospfRoute 11-69
ospfSpfExt 11-70
ospfspfInter 11-70
ospfSpfIntra 11-71
ospfTeDatabase 11-71
8
Index
ospfTeSPF 11-72
pimAutoRPRcvdLog 11-72
pimAutoRPSentLog 11-73
pimHelloRcvdLog 11-73
pimHelloSentLog 11-74
pimPktsRcvdLog 11-74
pimPktsSentLog 11-75
policyMgrAttachment 11-75
policyMgrGeneral 11-76
policyMgrPacketLog 11-76
ppp 11-76
pppoe 11-77
pppoeControlPacket 11-77
pppPacket 11-78
pppStateMachine 11-78
profileMgr 11-79
qos 11-79
radiusAttributes 11-80
radiusClient 11-80
remOps 11-80
ripGeneral 11-81
ripRoute 11-81
ripRtTable 11-82
routerLog 11-82
security 11-83
slep 11-83
snmp 11-83
snmpPduAudit 11-84
snmpSetPduAudit 11-84
sonet 11-85
sonetPath 11-85
sonetVt 11-85
ssccDetailPm 11-86
ssccDetailSsc 11-86
ssccGeneral 11-87
stTunnel 11-87
system 11-87
tcpGeneral 11-88
tcpTraffic 11-89
telnet 11-89
testExec 11-90
tsm 11-90
udpTraffic 11-90
vrfVpnMgrGeneralLog 11-91
vrrp 11-91
.log files 4-22
logging in to system 2-21
logging system events
individual logs 11-7, 11-8
severity 11-1
M
MAC, configuring for SSH 6-23
.mac files 4-22
macro (.mac) files 4-22, 7-1
macro command 7-16
macros
comments 7-2
conditional execution 7-11 to 7-13
control expressions 7-1
environment commands 7-3
if constructs 7-11
invoking 7-14 to 7-15
invoking from another macro file 7-14, 7-16
literals 7-4
naming 7-2
noncontrol expressions 7-1
operators 7-4
arithmetic 7-8
assignment 7-6
extraction 7-7
increment and decrement 7-7
logical 7-9
miscellaneous 7-10
relational 7-9
string 7-7
resetting system while running 8-8
running 7-16
variables 7-3
while constructs 7-13
writing 7-1 to 7-15
managed object, SNMP 3-2
Management Information Bases. See MIBs
managing
line module redundancy 5-16
NVS cards 5-24
SRP redundancy 5-22
managing files 4-22 to 4-24
managing system 4-1 to 4-2
passwords 6-1 to 6-30
security 6-1 to 6-30
Manual Commit mode 4-10
9
ERX Edge Routers
N
names
renaming local files 4-24
system name 4-2
10
Index
O
Open Shortest Path First. See OSPF
optimizing bandwidth 5-14
OSPF (Open Shortest Path First) 1-28
output filtering
from the --More-- prompt 2-15
show command 2-9
oversubscription, bandwidth
configuring 5-13
monitoring 5-13
overview 5-6
overview, NTP 9-1
P
packet size, SNMP 3-15
pagination keys 2-28
parameters 2-3, 2-4
password command 4-8, 6-9, 6-12, 6-15
passwords 2-26, 2-35, 6-1
encryption 6-2
erasing console passwords 6-10
erasing enable passwords 6-6
See also Privileged Exec mode
pausing before command execution 4-7
PDU (protocol data unit) 3-10
performance, line rates 1-10
performance rate, line modules 5-6
physical interfaces, configuring 2-37
physical slots
rebooting 5-21
rebooting selected 8-7
ping command 2-33, 9-10
planning your network 1-1
access lists 1-30
BGP 1-29
configurable HDLC parameters 1-12
configuration overview 1-2
CT3 module 1-13
data link layer interfaces 1-20
distribution lists 1-30
E3 modules 1-14
Ethernet modules 1-17
general configuration tasks 1-8
interfaces and subinterfaces 1-6
IP/ATM 1-23
IP/Frame Relay 1-21
IP/HDLC 1-27
IP/PPP 1-25
IP multicast 1-28
L2F 1-32
L2TP 1-32
layered approach 1-4
line module features 1-12
MPLS 1-29
non-PPP equal access 1-32
OSPF 1-28
physical layer interfaces 1-10
policy management 1-31
private line aggregation 1-2
RIP 1-29
route maps 1-30
routing policy 1-30
routing protocols 1-28
SONET 1-15
T3 modules 1-14
virtual routers 1-9
VRRP 1-29
xDSL session termination 1-3
Policy Configuration mode 2-31, 2-45
policy-list command 2-45
policy management 1-31
QoS classification and marking 1-31
rate limiting 1-31
types of services 1-31
polling NTP servers 9-3
POS interfaces 1-25 to 1-26
PPP protocol support 1-25 to 1-26
primary NTP servers 9-2
private line aggregation 1-2
Privileged Exec mode 2-31, 2-34
accessing 2-21, 2-35, 4-6
exiting 4-5
See also passwords
privileged-level access (CLI) 2-20, 2-21
See also Privileged Exec mode
privilege levels
password encryption 6-2
SNMP 3-14
profile command 2-45
Profile Configuration mode 2-31, 2-45
prompts, CLI system 2-19
protocol data unit. See PDU
protocols, xDSL, supported 1-4
proxy, SNMP 3-7, 3-42
.pub files 4-22
11
ERX Edge Routers
Q
QoS 1-30
qos-profile command 2-46
QoS Profile Configuration mode 2-31, 2-46
Queue Configuration mode 2-31, 2-47
queue-profile command 2-47
quitting. See exiting
R
RADIUS
authentication, restricting access 6-29
password authentication 6-18
per-user enable authentication 6-28
restricting access to commands 6-27, 6-30
user authentication 6-20
radius commands
radius accounting server 2-47
radius authentication server 2-47
RADIUS Configuration mode 2-31, 2-47
rate-limit-profile command 2-48
Rate Limit Profile Configuration mode 2-31, 2-48
reboot history (reboot.hty) file 4-22
reboot history, displaying 4-54
rebooting the system 8-1 to 8-11
redirect operators 2-14
redistribute routes 1-30
redundancy
line module. See line module redundancy
SRP module. See SRP module redundancy
redundancy commands
redundancy force-failover 5-17
redundancy lockout 5-16
redundancy revert 5-17
redundancy revertive 5-16
references
draft RFCs B-8
hardware standards B-10
non-RFC software standards B-9
RFCs B-1
reformatting primary NVS card 5-28
refusing NTP broadcasts 9-10
regular expressions 2-10
release. See versions
.rel files 4-22
specifying for reboot 8-5
reload commands
reload 4-46, 8-5
reload at 8-6
reload in 8-6
reload slot 5-21, 8-7
Remote Authentication Dial-In User Service. See
RADIUS
remote host command 2-42
remote-neighbor command 2-49
Remote Neighbor Configuration mode 2-32, 2-49
removing
NVS cards 5-25
See also deleting
SRP modules 5-2
rename command 4-24
renaming files 4-24
repairing corrupted files 5-29
replacing
line modules 5-4
NVS cards 5-25
SRP modules 5-5
replies, NTP 9-3, 9-10
requests, NTP 9-3
reset button, software 6-10
resetting while running scripts or macros 8-8
reversion, after switchover 5-16
revisions, displaying assembly 5-17, 8-9
RFCs B-1
draft B-8
Right Arrow key 2-7, 2-27
RIP protocol 1-29
route-map command 2-50
Route Map Configuration mode 2-32, 2-50
route maps 1-30
router bgp command 2-37
router command 2-49, 2-50
Router Configuration mode 2-32, 2-50
routers. See system
routing, IP
configuring other protocols 1-28
monitoring 10-9
Routing Information Protocol. See RIP
routing protocols 1-28
RSVP Configuration mode 2-32, 2-51
rtr command 2-51
RTR Configuration mode 2-32, 2-51
run command 2-8, 2-8 to 2-9, 4-7
running configuration file 4-10
running macros 7-16
12
Index
S
saving current configuration 4-10, 4-11, 4-13
saving startup configuration 4-11
scanning NVS cards 5-29
schedule-profile command 2-52
Scheduler Profile Configuration mode 2-32, 2-52
screen. See terminal
.scr files 4-22
script files 4-22
scripts, resetting system while running 8-8
secondary NTP servers 9-2
secrets, erasing 6-6
secure IP tunnels 1-20
Secure Shell Server protocol. See SSH
security
administration via SSH instead of Telnet 6-16
SSH issues 6-20
security features of SNMP 3-5
selecting NTP servers 9-7
send command 4-21
sending messages to terminals 4-20
serial numbers (hardware), displaying 5-17
serial numbers, displaying for hardware 8-9
series
ERX-1400 xix
ERX-700 xix
servers, NTP 9-3
service ctrl-x-reboot command 2-27, 8-7
service manual-commit command 4-11
service password-encryption command 6-3, 6-5
service timestamps command 11-10
service unattended password-recovery
command 6-8
Set operation, SNMP 3-10
SetRequest PDU type, SNMP 3-10
setting the system clock 9-5 to 9-7
shortcuts 2-20
show aaa commands
show aaa domain-map 10-8
show bandwidth oversubscription 5-13
show boot command 8-9
show bulkstats commands
show bulkstats 3-29
show bulkstats collector interface-type 3-33
show bulkstats collector interval 3-32
show bulkstats collector max-size 3-33
show bulkstats collector transfer-mode 3-33
show bulkstats receiver 3-34
show bulkstats statistics 3-35
show bulkstats traps 3-36
13
ERX Edge Routers
slot commands
slot accept 5-4
slot disable 5-2
slot enable 5-2
slot erase 5-4
slot groups and module arrangements 5-6 to 5-12
slot numbers
chassis 4-48
hardware 4-48
slots. See physical slots
SNMP (Simple Network Management
Protocol) 3-1 to 3-49
agent software 3-2, 3-4
enabling 3-13
attributes 3-9
bulk statistics collection 3-24 to 3-42
client software 3-2, 3-3
configuring access 3-13
communities 3-2, 3-13, 3-14
compressing interfaces 3-16
configuration tasks 3-12
encoding method 3-16
engine 3-8
entity 3-2
group 3-2
interface numbering 3-18
management features 3-6
managing interface sublayers 3-16
memory warning 3-15
monitoring interface tables 3-19
monitoring status 3-43, 3-44
multiple virtual routers 3-7, 3-42
operations 3-10
packet size, setting 3-15
PDU 3-10
proxy, creating 3-7
RFC 1213 compatibility 3-18
schema
configuring 3-37
monitoring 3-40
security features 3-5
server 3-3
server parameters, setting 3-14
traps 3-3, 3-19, 3-21, 3-23, 3-47
users, configuring 3-14
versions 3-5
view 3-3, 3-6
viewing status 3-44
virtual routers 3-7
snmp commands
bulkstats interfaces description-format
common 3-27
show snmp interfaces 3-19
snmp interfaces description-format
common 3-16
snmp-server 3-13
snmp-server community 3-14
snmp-server contact 3-15
snmp-server enable traps 3-22
snmp-server host 3-22
snmp-server interfaces compress 3-17
snmp-server interfaces
compress-restriction 3-18
snmp-server interfaces rfc1213 3-18
snmp-server location 3-15
snmp-server packetsize 3-15
snmp-server trap-proxy 3-24
snmp-server trap-source 3-23
snmp-server user 3-14
snmp trap ip link-status 3-23
snmp trap link-status 3-23
See also bulkstats, show bulkstats, and show
snmp commands
software
installing xix, 5-27
line rates 1-10
upgrading 5-23
software compatibility 5-5
software release file 4-22
specifying for reboot 8-5
software reset button 6-7, 6-10
software standards
draft RFCs B-8
non-RFC standards B-9
RFCs B-1
software versions, displaying 4-55, 8-11
SONET (synchronous optical network)
configuring 1-15
Space key 2-22, 2-28
speed command 4-14
SRP module
core dump file 4-47
reset button 6-10
SRP module redundancy 5-19
installing 5-20
managing 5-22
monitoring 5-17
14
Index
SRP modules
bandwidth 5-8
copying image 5-28
installing a redundant module 5-20
removing 5-2
replacing 5-5
synchronizing 5-25
srp switch command 5-23
SSH (Secure Shell Server protocol) 6-16 to 6-26
accessing the system 2-21
algorithm negotiation 6-17
client configuration 6-19
configuration prerequisites 6-20
configuring 6-21 to 6-24
connections 6-18
disabling 6-24
enabling 6-24
encryption, configuring 6-21
encryption algorithms
3des-cbc 6-21
blowfish-cbc 6-21
twofish-cbc 6-21
generating host keys 6-19
host key management 6-19
key exchange 6-17
message authentication
configuring 6-23
hmac-md5 6-24
hmac-sha1 6-24
hmac-sha1-96 6-24
monitoring 6-25 to 6-26
performance issues 6-19
security concerns 6-20
server public key files 4-22
terminating 6-26
user authentication 6-18
configuring 6-22
user key management 6-18
standards
draft RFCs B-8
hardware standards B-10
non-RFC software standards B-9
RFCs B-1
static host maps, adding 4-30
statistics, SNMP 3-24 to 3-42
statistics (.sts) files 4-22
status LEDs, monitoring 5-23
stratum 1 servers. See primary NTP servers
.sts files 4-22
Subinterface Configuration mode 2-32, 2-52
15
ERX Edge Routers
T
T1 lines, controllers for 1-13
T3 interfaces
configuring 1-14
line rates 1-10
T3 lines, controllers for 1-13
Tab key 2-6, 2-22, 2-26
Telnet
access lists 6-16
client, using 4-39
configuring to listen in nondefault virtual
router 4-39
logins 2-21
telnet commands
telnet 4-39
telnet listen 4-39
telnet listen command 10-7
terminal
displaying configuration 4-19
displaying international characters 4-15
sending messages to 4-20
setting length (in lines) 4-14
setting width (in characters) 4-14
terminal commands
terminal data-character-bits 4-15
terminal length 4-14
terminal speed 4-14
terminal width 4-14
See also show terminal command
text conventions defined xx
text files 4-22
thermal protection mode 4-49
time limits, setting
for user input 4-16
for user login 4-16
timeout login response command 4-16
time zone, specifying 9-6
timing, system. See also system clock
timing, system
configuring 4-3
monitoring 4-4
timing commands
timing disable-auto-upgrade 4-3
timing select 4-3
timing source 4-4
trace command 2-33
traffic-class command 2-53
Traffic Class Configuration mode 2-32, 2-53
traffic-class-group command 2-53
U
Universal Coordinated Time. See UTC
Up Arrow key 2-7, 2-28
updating the system software xix
upgrading software 5-23
uplink methods 1-3
user access, restricting 6-27 to 6-30
user authentication, configuring 6-22
See also authentication
User Exec mode 2-1, 2-33, 4-5
See also exiting Privileged Exec mode
user interface, customizing 4-13
user interface commands 4-5 to 4-14
user level access (CLI) 2-20, 2-33
UTC (Universal Coordinated Time) 9-6
V
vendor-specific attribute. See VSA
versions
displaying for hardware/software 8-11
displaying for software 4-55
SNMP 3-5
versions (hardware), displaying 5-33
view, SNMP 3-3, 3-6
viewing. See listing, show commands
virtual interfaces (subinterfaces) 1-6
virtual private network. See VPN
virtual-router command 3-7, 6-30
virtual router commands
ip vrf 10-7
virtual-router 10-7
16
Index
W
waiting before command execution 4-7
warmStart, SNMP trap 3-21
while constructs, macro 7-13
width of terminal screen, setting 4-14
write memory command 4-13
writing macros 7-1 to 7-15
X
xDSL
protocols 1-4
session termination 1-3 to 1-4