Use this attribute to set the ssh-port number on which the NETCONF server listens for connections. The default port on which the netconf-ssh server listens is 830.
This command is supported when following feature are enabled NETCONF feature,Virtual routing and forwarding
Use this attribute to set the tls-port number on which the NETCONF server listens for connections. The default port on which the netconf-tls server listens is 6513.
This command is supported when following feature are enabled NETCONF feature,Virtual routing and forwarding
Selection of the specific encoding or RPC framework for telemetry messages to and from the network element. The encoding method controls specifically the wire format of the telemetry data, and also controls which RPC framework may be in use to exchange telemetry data
This command is supported when following feature are enabled Virtual routing and forwarding
If notification enabled, all the notifications having severity higher than or equal to this severity allowed.If notification disabled, all the notifications having severity lower than or equal to this severity not allowed
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
The textual name of the interface. The value of this object should be the name of the interface as assigned by the local device and should be suitable for use in commands entered at the device’s ‘console’. This might be a text name, such as ‘le0’ or a simple port number, such as ‘1’, depending on the interface naming syntax of the device. If several entries in the ifTable together represent a single interface as named by the device, then each will have the same value of name. Note that for an agent which responds to SNMP queries concerning an interface on some other (proxied) device, then the value of name for such an interface is the proxied device’s local name for it. If there is no local name, or this object is otherwise not applicable, then this object contains a zero-length string.
This attribute is used to set mtu value to interface.The size of the largest packet which can be sent/received on the interface, specified in octets. For interfaces that are used for transmitting network datagrams, this is the size of the largest network datagram that can be sent on the interface.
This attribute is used to configure the ethertype value for the interface in the format 0xhhhh. Currently supported values are 0x8100 (default) or 0x88a8 or 0x9100 or 0x9200.
Use this attribute to enable the selected interface. This leaf contains the configured, desired state of the interface. The testing(3) state indicates that no operational packets can be passed. When a managed system initializes, all interfaces start with ifAdminStatus in the down(2) state. As a result of either explicit management action or per configuration information retained by the managed system, ifAdminStatus is then changed to either the up(1) or testing(3) states (or remains in the down(2) state).
Use this attribute to set the duplex mode for the interface. Auto-negotiation if enabled, is turned off when duplex mode is set for the interface. When auto-negotiation is enabled, the interface should negotiate the duplex mode directly (typically full-duplex).
Use this attribute to set the mac address for an interface. If not specified, the corresponding operational state leaf is expected to show the system-assigned MAC address.
This attribute is used to set the link speed for the interface. To enable auto-negotiation for the interface, set this attribute to value auto. When auto-negotiation is enabled, it is expected that the interface will select the highest speed available based on negotiation. When auto-negotiation is not enabled, sets the link speed to a fixed value -- supported values are defined by IF_INTERFACE_SPEED_T enum. When limited auto-negotiation is required, select the speed after the auto option. With this only the specified speed will be advertised and interface will negotiate with peer with that speed only.
The textual name of the interface. The value of this object should be the name of the interface as assigned by the local device and should be suitable for use in commands entered at the device’s ‘console’. This might be a text name, such as ‘le0’ or a simple port number, such as ‘1’, depending on the interface naming syntax of the device. If several entries in the ifTable together represent a single interface as named by the device, then each will have the same value of name. Note that for an agent which responds to SNMP queries concerning an interface on some other (proxied) device, then the value of name for such an interface is the proxied device’s local name for it. If there is no local name, or this object is otherwise not applicable, then this object contains a zero-length string.
This command is supported when following feature are enabled L2 feature
Use this attribute to specify that an IP address and prefix length will be used by this interface. If the secondary parameter is not specified, this attribute overwrites the primary IP address. If the secondary parameter is specified, this attribute adds a new IP address to the interface. The secondary address cannot be configured in the absence of a primary IP address. The primary address cannot be removed when a secondary address is present.
Use this attribute to specify a secondary IP address that will be used by this interface. The secondary address cannot be configured in the absence of a primary IP address. The primary address cannot be removed when a secondary address is present.
ip address (A.B.C.D/M|A.B.C.D A.B.C.D) secondary anycast
Configure enable auto config
Use this attribute to enable autoconfiguration of IPv6 address in host interface. IPv6 address are formed using the Prefix learned from RA and suffix formed using EUI-64 method.
This command is supported when following feature are enabled IPV6 feature
Use this attribute to set the anycast flag for the IPv6 address of an interface. Anycast flag cannot be deleted for an IPv6 address once set. Please delete IPv6 address and reconfigure to remove anycast property.
This command is supported when following feature are enabled IPV6 feature
This object specifies whether the interface is enabled for link-flap error-disable or not. If this is ’0’, then interface is not enabled. Otherwise it is enabled.
This attribute specifies whether the interface is enabled for storm-control error-disable or not. If this is not set, then the interface is not enabled. Otherwise it is enabled.
This object specifies whether the interface is enabled for mac-move-limit error-disable or not. If this is ’0’, then interface is not enabled. Otherwise it is enabled.
This object is used to specify warning threshold for port speed monitor. Warning threshold must be greater than recovery threshold. Default value of warning-threshold is 90.
This object is to enable various error-disable reasons like lag-mismatch, stp-bpdu-guard, link-flap and loopback-detection. As the datatype is BITS, 0th bit corresponds to lag-mismatch, 1st bit corresponds to stp-bpdu-guard, 2nd bit corresponds to link-flap
errdisable storm-control discard-hit <1-100> time <1-1800>
Configure error-disable reason
This object is to enable various error-disable reasons like lag-mismatch, stp-bpdu-guard, link-flap and loopback-detection. As the datatype is BITS, 0th bit corresponds to lag-mismatch, 1st bit corresponds to stp-bpdu-guard, 2nd bit corresponds to link-flap
Use this command to set the network name for the device. OcNOS uses this name in system prompts and default configuration filenames. Setting a host name using this command also sets the host name in the kernel.After giving the hostname command, you must write to memory using the write command. If you do not write to memory, the change made by this command (the new host name) is not set after the device reboots.
no debug hsl (general|ifmgr|bridge|msg|fib|fdb|devdrv|pktdrv|platform|pbr|bfd|lacp|qos|helper|rbridge|nvo|ofl|mlag|srv6|ptp|extphy) {all|default|info|debug|warn|error|fatal|admin|counter|pkt}
no debug hsl (general|ifmgr|bridge|msg|fib|fdb|devdrv|pktdrv|platform|pbr|bfd|lacp|qos|helper|rbridge|nvo|ofl|mlag|srv6|ptp|extphy) {all|default|info|debug|warn|error|fatal|admin|counter|pkt}
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
Use this attribute to set the switching characteristics of the interface as hybrid, and classify both tagged and untagged frames. Received frames are classified based on the VLAN characteristics, then accepted or discarded based on the specified filtering criteria.
Use this attribute to specify the aging-out time for a learned MAC address. The learned MAC address persists until this specified time. Setting value to 0 would disable ageing of the bridge.
Use this attribute to specify the aging-out time for a learned MAC address. The learned MAC address persists until this specified time. Setting value to 0 would disable ageing of the bridge.
Use this attribute to enable/disable Cisco interoperability for MSTP (Multiple Spanning Tree Protocol). If Cisco interoperability is required, all devices in the switched LAN must be Cisco-interoperability enabled. When router interoperates with Cisco, the only criteria used to classify a region are the region name and revision level. VLAN-to-instance mapping is not used to classify regions when interoperating with Cisco.
Use this attribute to set the time (in seconds) after which (if this bridge is the root bridge) each port changes states to learning and forwarding. This value is used by all instances
Use this attribute to set the hello-time, the time in seconds after which (if this bridge is the root bridge) all the bridges in a bridged LAN exchange Bridge Protocol Data Units (BPDUs). A very low value of this parameter leads to excessive traffic on the network, while a higher value delays the detection of topology change.This value is used by all instances.Configure the bridge instance name beforeusing this attribute. The allowable range of values is 1-10 seconds. However, make sure that the value of hello time is always greater than the value of hold time (2 seconds by default)
Use this attribute to set the maximum age for a bridge. This value is used by all instances. Maximum age is the maximum time in seconds for which (if a bridge is the root bridge) a message is considered valid. This prevents the frames from looping indefinitely. The value of maximum age should be greater than twice the value of hello time plus 1, but less than twice the value of forward delay minus 1. The allowable range for max-age is 6-40 seconds. Configure this value sufficiently high, so that a frame generated by root can be propagated to the leaf nodes without exceeding the maximum age.
Use this attribute to specify the maximum allowed hops for a BPDU in an MST region. This parameter is used by all the instances of the MST. Specifying the maximum hops for a BPDU prevents the messages from looping indefinitely in the network. When a bridge receives an MST BPDU that has exceeded the allowed maximum hops, it discards the BPDU.
Use this attribute to set the bridge priority for the common instance. Using a lower priority indicates a greater likelihood of the bridge becoming root. The priority values can be set only in increments of 4096.
All ports that have their BPDU filter set to default take the same value of BPDU filter as that of the bridge. The Spanning Tree Protocol sends BPDUs from all ports. Enabling the BPDU Filter feature ensures that PortFast-enabled ports do not transmit or receive any BPDUs.
Use this attribute to enable the error-disable-timeout facility, which sets a timeout for ports that are disabled due to the BPDU guard feature. The BPDU guard feature shuts down the port on receiving a BPDU on a BPDU-guard enabled port. This attribute associates a timer with the feature such that the port gets enabled back without manual intervention after a set interval.
Use this attribute to set the version for the bridge. A version identifier of less than a value of 2 enforces the spanning tree protocol. Although the attribute supports an input range of 0-4, for RSTP, the valid range is 0-2. When the force-version is set for a bridge, all ports of the bridge have the same spanning tree version set.
Use this attribute to set a spanning-tree path cost method. If the short parameter is used, the switch uses a value for the default path cost a number in the range 1 through 65,535. If the long parameter is used, the switch uses a value for the default path cost a number in the range 1 through 200,000,000.
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
no bridge <1-32> (rapid-spanning-tree|multiple-spanning-tree|rapid-pervlan-spanning-tree) enable
Configure disable spanning tree
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
no bridge <1-32> (rapid-spanning-tree|multiple-spanning-tree|rapid-pervlan-spanning-tree) enable (bridge-blocked|bridge-forward)
Configure network-instances instance-name
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
no bridge <1-32> spanning-tree enable (bridge-blocked|bridge-forward)
Configure enable shutdown
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
Use this attribute to simultaneously add multiple VLANs for the corresponding instance of a bridge.The VLANs must be created before being associated with an MST instance (MSTI). If the VLAN range is not specified,the MSTI will not be created.
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
Network Instance Name. For VRF and MAC VRF, instance name can be up to 32 chars long. For VPWS and VPLS instances, instance name can be up to 128 chars long. For L2NI (bridge) instance, instance name has to be a number between (1-32). For Cross-Connect, instance name can be up to 30 chars long. For Bridge-domain, instance, instance name has to be a number between (1-2147483647).
Use this attribute to simultaneously add multiple VLANs for the corresponding instance of a bridge.The VLANs must be created before being associated with an MST instance (MSTI). If the VLAN range is not specified,the MSTI will not be created.
Use this attribute to simultaneously add multiple VLANs for the corresponding instance of a bridge.The VLANs must be created before being associated with an MST instance (MSTI). If the VLAN range is not specified,the MSTI will not be created.
Use this attribute to set a path cost for a multiple spanning tree instance. Before using this attribute, you must explicitly add an MST instance to a port using the bridge-group instance attribute.
Use this attribute to set a path cost for a multiple spanning tree instance. Before using this attribute, you must explicitly add an MST instance to a port using the bridge-group instance attribute.
Use this attribute to set the bridge instance priority.The Multiple Spanning Tree Protocol uses port priority as a tiebreaker to determine which port should forward frames for a particular instance on a LAN, or which port should be the root port for an instance. A lower value implies a better priority. In the case of the same priority, the interface index will serve as the tiebreaker, with the lower-numbered interface being preferred over others.
Use this attribute to set the bridge instance priority.The Multiple Spanning Tree Protocol uses port priority as a tiebreaker to determine which port should forward frames for a particular instance on a LAN, or which port should be the root port for an instance. A lower value implies a better priority. In the case of the same priority, the interface index will serve as the tiebreaker, with the lower-numbered interface being preferred over others.
Use this attribute to set the cost of a path. Before you can use this attribute to set a path-cost in a VLAN configuration, you must explicitly add an MST instance to a port using the bridge-group instance attribute..
Use this attribute to set the port priority for a bridge group. The Multiple Spanning Tree Protocol uses port priority as a tiebreaker to determine which port should forward frames for a particular instance on a LAN, or which port should be the root port for an instance. A lower value implies a better priority. In the case of the same priority, the interface index will serve as the tiebreaker, with the lower-numbered interface being preferred over others.
Use this attribute to set the hello-time, the time in seconds after which (if this bridge is the root bridge) all the default bridges in a bridged LAN exchange Bridge Protocol Data Units (BPDUs). A very low value of this parameter leads to excessive traffic on the network, while a higher value delays the detection of topology change. This value is used by all instances.
Use this attribute to set the portfast BPDU (Bridge Protocol Data Unit) guard or filter for the bridge.When the BPDU guard feature is set for a bridge, all portfast-enabled ports of the bridge that have the BPDU guard set to default shut down the port on receiving a BPDU. In this case, the BPDU is not processed. You can configure the errdisable-timeout feature to enable the port after the specified time interval.
Use this attribute to set the portfast BPDU (Bridge Protocol Data Unit) guard or filter for the bridge.All ports that have their BPDU filter set to default take the same value of BPDU filter as that of the bridge. The Spanning Tree Protocol sends BPDUs from all ports. Enabling the BPDU Filter feature ensures that PortFast-enabled ports do not transmit or receive any BPDUs
Use this attribute to enable the root guard feature for the port. This feature disables reception of superior BPDUs.The root guard feature makes sure that the port on which it is enabled is a designated port. If the root guard enabled port receives a superior BPDU, it goes to a Listening state (for STP) or discarding state (for RSTP and MSTP).
Use this attribute to enable or disable point-to-point or shared link types. RSTP has a backward-compatible STP , spanning-tree link-type shared. An alternative is the spanning-tree force-version 0
Use this attribute to set the bridge priority for the common instance. Using a lower priority indicates a greater likelihood of the bridge becoming root. The priority values can be set only in increments of 4096.
This command is supported when following feature are enabled provider bridge feature
Use this attribute to set the maximum age for a bridge. This value is used by all instances. Maximum age is the maximum time in seconds for which (if a bridge is the root bridge) a message is considered valid. This prevents the frames from looping indefinitely. The value of maximum age should be greater than twice the value of hello time plus 1, but less than twice the value of forward delay minus 1. The allowable range for max-age is 6-40 seconds. Configure this value sufficiently high, so that a frame generated by root can be propagated to the leaf nodes without exceeding the maximum age.
This command is supported when following feature are enabled provider bridge feature
Use this attribute to set the hello-time, the time in seconds after which (if this bridge is the root bridge) all the bridges.in a bridged LAN exchange Bridge Protocol Data Units (BPDUs). A very low value of this parameter leads to excessive traffic on the network, while a higher value delays the detection of topology change.This value is used by all instances. Configure the bridge instance name before using this attribute. The allowable range of values is 1-10 seconds. However, make sure that the value of hello time is always greater than the value of hold time (2 seconds by default)
This command is supported when following feature are enabled provider bridge feature
Use this attribute to set the time (in seconds) after which (if this bridge is the root bridge) each port changes states to learning and forwarding. This value is used by all instances
This command is supported when following feature are enabled provider bridge feature
Use this command to add a port to a channel group specified by the channel group number (1-12). This command enables link aggregation on a port, so that it may be selected for aggregation by the local system.
Use this attribute to the system priority of this switch. This priority is used for determining the system that is responsible for resolving conflicts in the choice of aggregation groups. A lower numerical value has a higher priority.
Use this attribute to set the priority of a channel. Channels are selected for aggregation based on their priority with the higher priority (numerically lower) channels selected first
Use this attribute to set either a short or long timeout value on a port. The timeout value is the number of seconds before invalidating a received LACP data unit (DU). If the LACP_timeout bit (encoded in Actor_State and Partner_State fields) is set to 1, the short timeout takes effect; if set to 0, the long timeout takes effect.
Use this attribute to enable the port as force-up in a channel group. Setting this attribute makes the port logically operational even if link aggregation goes down.
set lldp management-address-tlv (mac-address|ip-address|ipv6-address)
Configure chassis id
This attribute specifies chassis ID subtype for the LLDP agent on a port. Can be configured as if-alias or ip-address or ipv6-address or mac-address or if-name or locally-assgined name
set lldp chassis-id-tlv (if-alias|ip-address|mac-address|if-name|locally-assigned|ipv6-address)
Configure port id
This attribute specifies sub type of the port id TLV. Can be configured as if-alias or mac-address or ip-address or ipv6-address or if-name or agent-circuit-id or locally assigned name
LLDP-MED type of interface. Class-0 is not defined, Class-1 is for generic endpoints and is applicable to all endpoints that require the base LLDP discovery services. Class-2 is for media endpoints and it includes endpoints that have IP media capabilities. Class-3 is for communication endpoints i.e., devices acting as end user communication applicances. Calss-4 is for Network Connectivity Device. Class 5-255 are Reserved
set lldp management-address-tlv (mac-address|ip-address|ipv6-address)
Configure agent-tlv chassis-id
This attribute specifies chassis ID subtype for the LLDP agent on a port. Can be configured as if-alias or ip-address or ipv6-address or mac-address or if-name or locally-assgined name
set lldp chassis-id-tlv (if-alias|ip-address|mac-address|if-name|locally-assigned|ipv6-address)
Configure agent-tlv port-id
This attribute specifies sub type of the port id TLV. Can be configured as if-alias or mac-address or ip-address or ipv6-address or if-name or agent-circuit-id or locally assigned name
Network policy information configured on the port for connected media endpoint. Following network policy will be supported VLAN ID, Priority Tagging, VLAN DSCP
Use this attribute to define a percentage of the maximum route limit which when crossed results in a warning message and Netconf notification being raised. Default is 80%.
Use this attribute to define a percentage of the maximum route limit which when crossed results in a warning message and Netconf notification being raised. Default is 80%.
This command is supported when following feature are enabled ipv6 feature
Use this attribute to create a default external route into an OSPF routing domain. The system acts like an Autonomous System Boundary Router (ASBR) when you use the default-information originate command to redistribute routes into an OSPF routing domain. An ASBR does not by default generate a default route into the OSPF routing domain
Use this attribute to turn on the LSA database-filter for a particular interface. OSPF floods new LSAs over all interfaces in an area, except the interface on which the LSA arrives. This redundancy ensures robust flooding. However, too much redundancy can waste bandwidth and might lead to excessive link and CPU usage in certain topologies, resulting in destabilizing the network. To avoid this, use this attribute to block flooding of LSAs over specified interfaces.
Use this attribute to set the interval during which the router waits to receive an OSPF hello packet from the neighbor before declaring the neighbor down.
area interface IFNAME retransmit-interval <1-3600>
Configure no summary
Use this attribute to set the OSPF area stub with no-summary, this will prevent an ABR from sending summary link state advertisements into the stub area.
Use this attribute to set the limit type. Soft limit: Warning message appears if the number of LSAs exceeds the specified value; Hard limit: Shutdown occurs if the number of LSAs exceeds the specified value. Default value is 2.
Use this attrobute to set the number of seconds the router waits before trying to exit the database overflow state. If this parameter is 0, the router exits the overflow state only after an explicit administrator command. Default value is 0.
This command is supported when following feature are enabled OSPF DataBase (DB) overflow
Use this attribute to set the LFA termination hold on interval. It represents the delay of primary route installation (to avoid micro loop) after a failover.
Use this attribute to set a default metric for OSPF. A default metric facilitates redistributing routes with incompatible metrics. If the metrics do not convert, the default metric provides an alternative. Use this attribute to use the same metric value for all redistributed routes. Use this attribute in conjunction with the redistribute command.
Use this attribute to turn on the LSA database-filter for a particular interface. OSPF floods new LSAs over all interfaces in an area, except the interface on which the LSA arrives. This redundancy ensures robust flooding. However, too much redundancy can waste bandwidth and might lead to excessive link and CPU usage in certain topologies, resulting in destabilizing the network. To avoid this, use this attribute to block flooding of LSAs over specified interfaces.
Use this attribute to turn on the LSA database-filter for a particular interface. OSPF floods new LSAs over all interfaces in an area, except the interface on which the LSA arrives. This redundancy ensures robust flooding. However, too much redundancy can waste bandwidth and might lead to excessive link and CPU usage in certain topologies, resulting in destabilizing the network. To avoid this, use this attribute to block flooding of LSAs over specified interfaces.
Use this attribute to set the interval during which the router waits to receive an OSPF hello packet from the neighbor before declaring the neighbor down.
Use this attribute to set the interval during which the router waits to receive an OSPF hello packet from the neighbor before declaring the neighbor down.
ip ospf A.B.C.D message-digest-key <1-255> (md5) WORD
Configure timers dead-interval
Use this attribute to set the interval during which the router waits to receive an OSPF hello packet from the neighbor before declaring the neighbor down.
Use this attribute to set the interval during which the router waits to receive an OSPF hello packet from the neighbor before declaring the neighbor down.
Use this attribute to turn on the LSA database-filter for a particular interface. OSPF floods new LSAs over all interfaces in an area, except the interface on which the LSA arrives. This redundancy ensures robust flooding. However, too much redundancy can waste bandwidth and might lead to excessive link and CPU usage in certain topologies, resulting in destabilizing the network. To avoid this, use this attribute to block flooding of LSAs over specified interfaces.
Use this attribute to turn on the LSA database-filter for a particular interface. OSPF floods new LSAs over all interfaces in an area, except the interface on which the LSA arrives. This redundancy ensures robust flooding. However, too much redundancy can waste bandwidth and might lead to excessive link and CPU usage in certain topologies, resulting in destabilizing the network. To avoid this, use this attribute to block flooding of LSAs over specified interfaces.
Use this attribute to create a default external route into an OSPF routing domain. The system acts like an Autonomous System Boundary Router (ASBR) when you use the default-information originate command to redistribute routes into an OSPF routing domain. An ASBR does not by default generate a default route into the OSPF routing domain
Use this attribute to set the cost for default summary route sent into a stub area. If an area is configured as a stub, the OSPFv3 router originates one type-3 inter-area-prefix-LSA into the stub area. This attribute changes the metric for this LSA.
Use this attribute to create a default external route into an OSPF routing domain. The system acts like an Autonomous System Boundary Router (ASBR) when you use the default-information originate command to redistribute routes into an OSPF routing domain. An ASBR does not by default generate a default route into the OSPF routing domain
Use this attribute to enable or disable link LSA (type 8) suppression. A type 8 LSA gives information about link-local addresses and a list of IPv6 addresses on the link. If enabled and the interface type is not broadcast or NBMA, the router does not send type 8 link LSAs. This implies that other routers on the link determine the router’s next-hop address using a mechanism other than the type 8 link LSA. This feature is implicitly disabled if the interface type is broadcast or NBMA.
Use this attribute to enable or disable link LSA (type 8) suppression. A type 8 LSA gives information about link-local addresses and a list of IPv6 addresses on the link. If enabled and the interface type is not broadcast or NBMA, the router does not send type 8 link LSAs. This implies that other routers on the link determine the router’s next-hop address using a mechanism other than the type 8 link LSA. This feature is implicitly disabled if the interface type is broadcast or NBMA.
Use this attribute to specify the link-cost described in LSAs.The cost (or metric) of an interface in OSPF indicates the overhead required to send packets across a certain interface. The value is taken to describe Link State information, and used for route calculation.
Use this attribute to set the router priority for determining the designated router (DR) for the network. A router with the higher router priority becomes the DR. If the priority is the same for two routers, the router with the higher router ID takes precedence. Only routers with a nonzero priority value are eligible to become the designated or backup designated router. Configure router priority for broadcast or NBMA networks only and not for point-to-point networks.
Use this attribute to set MTU size for OSPFv3 to construct packets based on this value. Whenever OSPFv3 constructs packets, it uses interface MTU size as Maximum IP packet size. this attribute forces OSPFv3 to use the specified value overriding the actual interface MTU size.
ipv6 ospf mtu <1280-65535> (instance-id (<0-31>|<64-95>)|)
Configure mtu ignore
Use this attribute to ignore the MTU size during DD (Database Description) exchange. By default, during the DD exchange process, OSPFv3 checks the MTU size described in DD packets received from its neighbor, and if the MTU size does not match the interface MTU, the neighbor adjacency is not established. Using this command makes OSPFv3 ignore this check and allows establishing of adjacency regardless of MTU size in the DD packet.
ipv6 ospf (instance-id (<0-31>|<64-95>)|) authentication cryptomap WORD
Configure area id
Use this attribute to enable OSPFv3 routing on an interface. Specify the process ID to configure multiple instances of OSPFv3. When running a single instance of OSPFv3, you do not need to specify a instance ID. When OSPFv3 receives a packet, it checks if the instance ID in the packet matches the instance ID of the receiving interface.
ipv6 router ospf area (A.B.C.D|<0-4294967295>) (instance-id (<0-31>|<64-95>)|)
Configure ospfv3 id
Use this attribute to enable OSPFv3 routing on an interface. Specify the process ID to configure multiple instances of OSPFv3. When running a single instance of OSPFv3, you do not need to specify a instance ID. When OSPFv3 receives a packet, it checks if the instance ID in the packet matches the instance ID of the receiving interface.
ipv6 router ospf area (instance-id (<0-31>|<64-95>)|)
Configure router area-id
Use this attribute to enable OSPFv3 routing on an interface. Specify the process ID to configure multiple instances of OSPFv3. When running a single instance of OSPFv3, you do not need to specify a instance ID. When OSPFv3 receives a packet, it checks if the instance ID in the packet matches the instance ID of the receiving interface.
ipv6 router ospf tag WORD area (instance-id (<0-31>|<64-95>)|)
Configure router ospfv3-id
Use this attribute to enable OSPFv3 routing on an interface. Specify the process ID to configure multiple instances of OSPFv3. When running a single instance of OSPFv3, you do not need to specify a instance ID. When OSPFv3 receives a packet, it checks if the instance ID in the packet matches the instance ID of the receiving interface.
ipv6 router ospf area tag WORD (instance-id (<0-31>|<64-95>)|)
Configure dead interval
Use this attribute to set the amount of time that the router waits to receive an OSPF hello packet from the neighbor before declaring the neighbor down
Use this attribute to set the dead neighbor polling interval in seconds. It is recommended to set this value much higher than the hello interval. The default is 120 seconds.
Use this attribute to configure a BGP router to send 4-octet ASN capabilities. If attempting to change the AS capability from 2 to 4 or 4 to 2, a prompt occurs to remove the VRF configuration (if it exists), and reconfiguration is required,because the route distinguisher (RD) configuration would have been created with the current (2 octet or 4 octet) capability, and must be reconfigured before attempting to change the capability. While loading from a saved configuration with AS4 capability and BGP VRF configuration, the capability will not be changed because of the above described reason.
Use this attribute to enable nexthop address tracking. Nexthop address tracking is an event-driven notification system that monitors the status of routes installed in the Routing Information Base (RIB) and reports nexthop changes that affect internal BGP (iBGP) or external BGP (eBGP) prefixes directly to the BGP process. This improves the overall BGP convergence time, by allowing BGP to respond rapidly to nexthop changes for routes installed in the RIB. If nexthop tracking is enabled after certain routes are learned, the registration of all nexthops for selected BGP routes is done after the nexthop tracking feature is enabled. If nexthop tracking is disabled, and if there are still some selected BGP routes, BGP de-registers the nexthops of all selected BGP routes from NSM.
Use this attribute to set the delay time for nexthop address tracking. This attribute configures the delayinterval between routing table walks for nexthop delay tracking, after which BGP does a routing table scan on receiving a nexthop change trigger from NSM. The time period determines how long BGP waits before it walks the full BGP table to determine which prefixes are affected by the nexthop changes, after it receives the trigger from NSM about one or more nexthop changes.
Use this attribute to set the origin path attribute to IGP when the origin is a protocol such as RIP, OSPF,or ISIS as specified in RFC 1771. Otherwise, the origin is always set to incomplete which is the industry standard.
Use the community-lists to specify BGP community attributes. The community attribute is used for implementing policy routing. It is an optional, transitive attribute and facilitates transfer of local policies through different autonomous systems. It includes community values that are 32 bits long. There are two kinds of community-lists: expanded and standard. The standard community-list defines the community attributes in a specified format without regular expressions. The expanded community-list defines the community attributes with regular expressions.Use this attribute to add a standard community-list entry. The standard community-list is compiled into binary format and is directly compared with the BGP communities attribute in the BGP updates. The comparison is faster than the expanded community-list. Any community value that does not match the standard community value is automatically treated as expanded.
ip community-list WORD (deny|permit) ((AA:NN|internet|local-AS|no-advertise|no-export))
Configure name
Use the community-lists to specify BGP community attributes. The community attribute is used for implementing policy routing. It is an optional, transitive attribute and facilitates transfer of local policies through different autonomous systems. It includes community values that are 32 bits long. There are two kinds of community-lists: expanded and standard. The standard community-list defines the community attributes in a specified format without regular expressions. The expanded community-list defines the community attributes with regular expressions.Use this attribute to add a standard community-list entry. The standard community-list is compiled into binary format and is directly compared with the BGP communities attribute in the BGP updates. The comparison is faster than the expanded community-list. Any community value that does not match the standard community value is automatically treated as expanded.
ip large-community-list (expanded) WORD (deny|permit) LINE
Configure access list name
Use this attribute to define a BGP Autonomous System (AS) path access list. A named community list is a filter based on regular expressions. If the regular expression matches the specified string representing the AS path of the route, then the permit or deny condition applies. Use this attribute to define the BGP access list globally.
Use this attribute to enable the MPLS (Multiprotocol Label Switching) VPN/BGP inbound route filter. This attribute is used to control the installation of routing information into the BGP table. When a router runs MPLS VPN/BGP PE, it exchanges routing information with a routing distinguisher. By default, routing information that does not match the configured routing distinguisher value is not installed. When the local box has two VRFs where each routing distinguisher value is 10:100 and 20:200, routing information with routing distinguisher 10:200 is not installed into BGP table.
Use this attribute to configure routers as route reflectors. Route reflectors are used when all Interior Border Gateway Protocol (iBGP) speakers are not fully meshed. If the clients are fully meshed the route reflector is not required
Use this attribute to specify two MED (Multi Exit Discriminator) attributes, confed and missing-as-worst. The confed attribute enables MED comparison along paths learned from confederation peers. The MEDs are compared only if there is no external Autonomous System (an AS not within the confederation) in the path. If there is an external autonomous system in the path, the MED comparison is not made. The missing-as-worst to consider a missing MED attribute in a path as having a value of infinity, making the path without a MED value the least desirable path. If missing-as-worst is disabled, the missing MED is assigned the value of 0,making the path with the missing MED attribute the best path.
Use this attribute to specify two MED (Multi Exit Discriminator) attributes, confed and missing-as-worst. The confed attribute enables MED comparison along paths learned from confederation peers. The MEDs are compared only if there is no external Autonomous System (an AS not within the confederation) in the path. If there is an external autonomous system in the path, the MED comparison is not made. The missing-as-worst to consider a missing MED attribute in a path as having a value of infinity, making the path without a MED value the least desirable path. If missing-as-worst is disabled, the missing MED is assigned the value of 0,making the path with the missing MED attribute the best path.
Use this attribute to manually configure a fixed router ID as a BGP router identifier. When this attribute is used to configure a fixed router ID, the current router identifier is overridden and the peers are reset.
Use this attribute to configure the cluster ID if the BGP cluster has more than one route reflector. A cluster includes route reflectors and its clients. Usually, each cluster is identified by the router ID of its single route reflector but to increase redundancy sometimes a cluster may have more than one route reflector. All router reflectors in such a cluster are then identified by a cluster ID. The clusterId attribute is used to configure the 4 byte cluster ID for clusters with more than one route reflectors in an IPv4 address format.
Use this attribute to change the default local preference value. Local preference indicates the preferred path when there are multiple paths to the same destination. The path having a higher preference is preferred. The preference is sent to all routers and access servers in the local autonomous system.
Use this attribute to enable the graceful shutdown capability at the router level and make available the graceful-shutdown related attributes at the router and BGP neighbor levels.
Use this attribute to gracefully shut down all BGP IPv4 sessions under this router. The BGP graceful shutdown feature reduces packet loss during maintenance activity.
Use this attribute to set the local preference of the router to use during graceful shutdown. The local preference value indicates the preferred path when there are multiple paths to the same destination in a single routing database. The path with a higher preference value is the preferred one. The preferred path is sent to all routers and access servers in the local autonomous system.
Use this attribute to enable logging of status change messages without turning on debug bgp attributes. Product has many logging services for neighbor status, including debug bgp fsm and debug bgp events. However, these attributes cause system performance degradation. If you need to log neighbor status changes only, IP Infusion Inc. recommends turning off all debug attributes and using the setLogNbrChanges attribute instead.
Use this attribute to configure scanning intervals of BGP routers. This interval is the period after which router checks the validity of the routes in its database. To disable BGP scanning, set the scan-time interval to 0 seconds.
Use this attribute to compare the Multi Exit Discriminator (MED) variable when choosing among routes advertised by different peers in the same autonomous system. MED is compared after BGP attributes weight, local preference, AS-path and origin have been compared and are equal. For a correct comparison result, enable this attribute on all routers in a local AS. After enabling this attribute, all paths for the same prefix are grouped together and arranged according to their MED value. Based on this comparison, the best path is then chosen. This attribute compares MED variable when choosing routes advertised by different peers in the same AS, to compare MED, when choosing routes from neighbors in different ASs use the compareMed attribute. When the deterministicMed attribute is set, routes from the same AS are grouped together, and the best routes of each group are compared.
Use this attribute to enforce the first AS for eBGP routes. This attribute specifies that any updates received from an external neighbor that do not have the neighbors configured Autonomous System (AS) at the beginning of the AS_PATH in the received update must be denied. Enabling this feature adds to the security of the BGP network by not allowing traffic from unauthorized systems.
Use this attribute to specify two MED (Multi Exit Discriminator) attributes, confed and missing-as-worst. The confed attribute enables MED comparison along paths learned from confederation peers. The MEDs are compared only if there is no external Autonomous System (an AS not within the confederation) in the path. If there is an external autonomous system in the path, the MED comparison is not made. The missing-as-worst to consider a missing MED attribute in a path as having a value of infinity, making the path without a MED value the least desirable path. If missing-as-worst is disabled, the missing MED is assigned the value of 0,making the path with the missing MED attribute the best path.
bgp bestpath med (confed|missing-as-worst|remove-recv-med|remove-send-med)
Configure multi path relax
Use this attribute to relax the same AS-Path requirement so any candidate eBGP AS-Path with the same AS-path length might be used for eBGP load-balancing. This feature does not load-balance between eBGP and iBGP paths. Normally eBGP load-balancing requires the candidate routes to be equal-cost paths with identical BGP attributes having the same weight, Local-Pref, AS-Path (both the AS numbers and the AS pathlength), origin, MED, and different next-hop.
Use this attribute to enable BGP graceful-restart capabilities. The restart-time parameter is used for setting the maximum time that a graceful-restart neighbor waits to come back up after a restart. This value is applied to all neighbors unless you explicitly override it by configuring the corresponding value on the neighbor. The stalepath-time parameter is used to set the maximum time to preserve stale paths from a gracefully restarted neighbor. All stalepaths, unless reinstated by the neighbor after a re-establishment, will be deleted at the expiration of this timer.
Use this attribute to enable BGP graceful-restart capabilities. The restart-time parameter is used for setting the maximum time that a graceful-restart neighbor waits to come back up after a restart. This value is applied to all neighbors unless you explicitly override it by configuring the corresponding value on the neighbor.
Use this attribute to enable BGP graceful-restart capabilities. The stalepath-time parameter is used to set the maximum time to preserve stale paths from a gracefully restarted neighbor. All stalepaths, unless reinstated by the neighbor after a re-establishment, will be deleted at the expiration of this timer.
Use this attribute to specify the update-delay value for a graceful-restart capable router. The update-delay value is the maximum time a graceful-restart capable router, which is restarting, will defer route-selection and advertisements to all its graceful-restart capable neighbors. This maximum time starts from the instance the first neighbor attains established state after restart. The restarting router prematurely terminates this timer when end-of-rib markers are received from all its graceful-restart capable neighbors.
Use this attribute to enable BGP graceful-restart capabilities. The restart-time parameter is used for setting the maximum time that a graceful-restart neighbor waits to come back up after a restart. This value is applied to all neighbors unless you explicitly override it by configuring the corresponding value on the neighbor.
Use this attribute to compare the Multi Exit Discriminator (MED) for paths from neighbors in different autonomous systems. Multi Exit Discriminator (MED) is used in best path selection by BGP. MED is compared after BGP attributes weight, local preference, AS-path and origin have been compared and are equal. MED comparison is done only among paths from the same autonomous system (AS). Use compareMed attribute to allow comparison of MEDs from different ASs. The MED parameter is used to select the best path. A path with lower MED is preferred.
Use this attribute to prevent the router from considering the autonomous system (AS) path length as a factor in the algorithm for choosing a best path route.
Use this attribute to allow comparing of the confederation AS path length. This attribute specifies that the AS confederation path length must be used when available in the BGP best path decision process. It is effective only when bestpathAspath attribute has not been used.
Use this attribute to compare router IDs for identical eBGP paths. When comparing similar routes from peers, the BGP router does not consider the router ID of the routes. By default, it selects the first received route. Use this attribute to include router ID in the selection process; similar routes are compared and the route with the lowest router ID is selected. The router IS is the highest IP address on the router, with preference given to loopback addresses. Router ID can be manually set by using the routerIpAddr attribute.
Use this attribute to configure routers as route reflectors. Route reflectors are used when all Interior Border Gateway Protocol (iBGP) speakers are not fully meshed. If the clients are fully meshed the route reflector is not required.
Use this attribute to enable sending summarized routes by a BGP speaker to its peers. Auto-summary is used by a BGP router to advertise summarized routes to its peers. Auto-summary can be enabled if certain routes have already been advertised: in this case, configuring auto-summary advertises the summarized routes first, then corresponding non-summarized routes are withdrawn. If certain routes have already been advertised, and auto-summary is disabled, non-summarized routes are first advertised, then the corresponding summarized routes are withdrawn from all the connected peers.
Use this attribute to enable IGP synchronization of Internal BGP (iBGP) learned routes with the Internal Gateway Protocol (IGP) system. Synchronization is used when a BGP router should not advertise routes learned from iBGP neighbors, unless those routes are also present in an IGP (for example, OSPF). Synchronization may be enabled when all the routers in an autonomous system do not speak BGP, and the autonomous system is a transit for other autonomous systems.
Aggregates are used to minimize the size of routing tables. Aggregation combines the characteristics of several different routes and advertises a single route.The aggregate-address attribute creates an aggregate entry in the BGP routing table if any more-specific BGP routes are available in the specified range.
The aggregate-type attribute creates an aggregate entry advertising the path for this route, consisting of all elements contained in all paths being summarized. Use this parameter to reduce the size of path information by listing the AS number only once, even if it was included in multiple paths that were aggregated.
The aggregate-type attribute creates an aggregate entry advertising the path for this route, consisting of all elements contained in all paths being summarized. Use this parameter to reduce the size of path information by listing the AS number only once, even if it was included in multiple paths that were aggregated.
The aggregate-type attribute creates an aggregate entry advertising the path for this route, consisting of all elements contained in all paths being summarized. Use this parameter to reduce the size of path information by listing the AS number only once, even if it was included in multiple paths that were aggregated.
The aggregate-type attribute creates an aggregate entry advertising the path for this route, consisting of all elements contained in all paths being summarized. Use this parameter to reduce the size of path information by listing the AS number only once, even if it was included in multiple paths that were aggregated.
Use this attribute to define an administrative distance for local routes. Local routes are routes that is redistributed from another process.A distance is a rating of trustworthiness of a router. The higher the distance the lower the trust rating. If the administrative distance is changed, it could create inconsistency in the routing table and obstruct routing.
Use this attribute to set the number of equal-cost multi-path (ECMP) routes for eBGP. You can install multiple BGP paths to the same destination to balance the load on the forwarding path
Use this attribute to set the number of equal-cost multi-path (ECMP) routes for eBGP. You can install multiple BGP paths to the same destination to balance the load on the forwarding path
Use this attribute to set the number of equal-cost multi-path (ECMP) routes for iBGP. You can install multiple BGP paths to the same destination to balance the load on the forwarding path.
Use this attribute to set the number of equal-cost multi-path (ECMP) routes for iBGP. You can install multiple BGP paths to the same destination to balance the load on the forwarding path.
Use this attribute to set the number of equal-cost multi-path (ECMP) routes for eiBGP. You can install multiple BGP paths to the same destination to balance the load on the forwarding path
Use this attribute to enable or disable suppression/modification of incoming BGP updates to IP RIB/FIB table installation. In a dedicated route reflector, all the routes it receives may not be required to be stored or only few selected routes need to be stored, because it may not lie in the data path. Table maps are particularly useful to attain this restriction. When map-name attribute is set, the route map referenced in the map-name attribute shall be used to set certain properties (such as the traffic index) of the routes for installation into the RIB. The route is always downloaded, regardless of whether it is permitted or denied by the route map.
This command is supported when following feature are enabled bgp table map feature enabled
When tableMapFilter attribute is given in the table map attribute, the route map referenced is used to control whether a BGP route is to be downloaded to the IP RIB (hence the filter). A BGP route is not downloaded to the RIB if it is denied by the route map.
This command is supported when following feature are enabled bgp table map feature enabled
Use this attribute to configure reachability half-life time for the penalty in minutes for the bgp route dampening. The time for the penalty to decrease to one-half of its current value.
Use this attribute to configure reachability half-life time for the penalty in minutes for the bgp route dampening. The time for the penalty to decrease to one-half of its current value.
Use this attribute to configure the value to start suppressing a route for BGP route dampening. When the penalty for a route exceeds the suppress value, the route is suppressed
Use this attribute to configure the value to start suppressing a route for BGP route dampening. When the penalty for a route exceeds the suppress value, the route is suppressed
Use this attribute to configure un-reachability half-life time for the penalty in minutes for bgp route dampening. The dampening information is purged from the router once the penalty becomes less than half of the reuse limit.
Use this attribute to configure un-reachability half-life time for the penalty in minutes for bgp route dampening. The dampening information is purged from the router once the penalty becomes less than half of the reuse limit.
Use this attribute to inject routes from one routing process into another. Redistribution is used by routing protocols to advertise routes that are learned by some other means, such as by another routing protocol or by static routes. Since all internal routes are dumped into BGP, careful filtering is applied to make sure that only routes to be advertised reach the internet, not everything. This attribute allows redistribution by injecting prefixes from one routing protocol into another routing protocol.
clear ip bgp (A.B.C.D|X:X::X:X|WORD) (description LINE|)
IPI-BGP-PEER-GROUP
Configure peer group tag
Creates a peer-group group. Neighbors with the same update policies are grouped into peer-group groups. This facilitates the updates of various policies, such as distribute and filter lists. The peer-group group is then configured easily with any of the neighbor attributes. Any changes made to the peer-group group affect all members.
Creates a peer-group group. Neighbors with the same update policies are grouped into peer-group groups. This facilitates the updates of various policies, such as distribute and filter lists. The peer-group group is then configured easily with any of the neighbor attributes. Any changes made to the peer-group group affect all members.
Creates a peer-group group. Neighbors with the same update policies are grouped into peer-group groups. This facilitates the updates of various policies, such as distribute and filter lists. The peer-group group is then configured easily with any of the neighbor attributes. Any changes made to the peer-group group affect all members.
Autonomous system number of a neighbor. If the specified ASN matches the ASN number specified in the router bgp global configuration, the neighbor is identified as internal. If the ASN does no match, it is identified as external to the local AS.
Use this attribute to start a graceful shutdown for the BGP session of the specified BGP neighbor. The BGP session for this neighbor is shut down after the graceful shutdown timer expires. If there is no alternate path available for traffic to flow prior the actual shutdown of the BGP session, this path is made available for 60 seconds or for configured time after which the path is no longer available and traffic is dropped.
Sets a different restart-time other than the global restart-time. This attribute takes precedence over the restart-time value specified using the grstSet attribute. The restart-time value is the maximum time that a graceful-restart neighbor waits to come back up after a restart. The default value is 120 seconds.
Associates a description with a neighbor. This helps in identifying a neighbor quickly. It is useful for an ISP that has multiple neighbor relationships.
This attribute sets the timers for a specific BGP neighbor. Keepalive messages are sent by a router to inform another router that the BGP connection between the two is still active. The keepalive interval is the period of time between each keepalive message sent by the router. The holdtime interval is the time the router waits to receive a keepalive message and if it does not receive a message for this period it declares the neighbor dead.
Sets a minimum route advertisement interval between the sending of BGP routing updates. To reduce the flapping of routes to internet, a minimum advertisement interval is set, so that the BGP routing updates are sent only per interval seconds.
Use this attribute to enable the dynamic capability for a specific peer-group. This attribute allows a BGP speaker to advertise or withdraw an address family capability to a peer-group in a non-disruptive manner.
Allows internal BGP sessions to use any operational interface for TCP connections. This attribute can be used in conjunction with any specified interface on the router. The loopback interface is the interface that is most commonly used with this attribute. The use of loopback interface eliminates a dependency and BGP does not have to rely on the availability of a particular interface for making TCP connections.
Disallow configuration of infinite hold-time. A hold-time of 0 seconds from the peer-group (during exchange of open messages) or the user (during configuration) will be rejected.
Disable the capability negotiation. It allows compatibility with older BGP versions that have no capability parameters used in open messages between peer-groups.
Configure router to accept only a particular BGP version. By default, the system uses BGP version 4 and on request dynamically negotiates down to version 2. Disables the routers version-negotiation capability and forces the router to use only a specified version with the neighbor.
Use this attribute to accept and attempt BGP connections to external peers on indirectly connected networks. Multihop is not established if the only route to the multihop peer is a default route. This avoids loop formation.
Use this attribute to accept and attempt BGP connections to external peers on indirectly connected networks. Multihop is not established if the only route to the multihop peer is a default route. This avoids loop formation.
This attribute configures route map to be used for a BGP local router to send the default route 0.0.0.0 to a neighbor for use as a default route for specified address-family. This attribute can be used with standard or extended access lists.
This attribute specifies a weight value, for specified address-family, to all routes learned from a neighbor for specified address-family. The route with the highest weight gets preference when the same prefix is learned from more than one peer. Unlike the local-preference attribute, the weight attribute is relevant only to the local router. When the weight is set for a peer group, all members of the peer group get the same weight. This attribute can also be used to assign a different weight to an individual peer-group member. When an individually-configured weight of a peer-group member is removed, its weight is reset to its peer groups weight.
This attribute configure the router as the next hop for a BGP-speaking neighbor or peer-group group. This attribute allows a BGP router to change the nexthop information that is sent to the iBGP peer-group. The nexthop information is set to the IP address of the interface used to communicate with the neighbor.
This attribute configures the router as a BGP route reflector and configure the specified neighbor as its client for specified address-family. Route reflectors are a solution for the explosion of iBGP peering within an autonomous system. By route reflection the number of iBGP peers within an AS is reduced. Use this attribute to configure the local router as the route reflector and specify neighbors as its client. An AS can have more than one route reflector. One route reflector treats the other route reflector as another iBGP speaker.
This attribute configures the router as a BGP route reflector and configure the specified neighbor as its client for specified address-family. Route reflectors are a solution for the explosion of iBGP peering within an autonomous system. By route reflection the number of iBGP peers within an AS is reduced. Use this attribute to configure the local router as the route reflector and specify neighbors as its client. An AS can have more than one route reflector. One route reflector treats the other route reflector as another iBGP speaker.
This attribute removes the private Autonomous System (AS) number from outbound updates. Private AS numbers are not advertised to the Internet. This attribute is used with external BGP peers only. The router removes the AS numbers only if the update includes private AS numbers. If the update includes both private and public AS numbers, the system treats it as an error.
This attribute specifies if a community attribute should be sent to a BGP neighbor for specified address-family. The community attribute groups destinations in a certain community and applies routing decisions according to those communities. By default, both standard and extended community attributes are sent to a neighbor
neighbor WORD attribute-unchanged {as-path|next-hop|med}
Configure orf prefix capability
This attribute enables Outbound Router Filtering (ORF), and advertise the ORF capability to its neighbors. The ORFs send and receive capabilities to lessen the number of updates exchanged between neighbors. By filtering updates, this option minimizes generating and processing of updates. The two routers exchange updates to maintain the ORF for each router.
neighbor WORD capability orf prefix-list (both|receive|send)
Configure peer allow ebgp vpn
This attribute allows an eBGP neighbor to be a VPN peer. By default, BGP VPN functionality is allowed only for iBGP peers. Using the peer-allow-ebgp-vpn attribute allows the VPN connection to be established to an eBGP peer.
This attribute advertises prefixes (routes) even when the source of the prefixes is from the same Autonomous System (AS) number for specified address-family. Use this attribute in a scenario where two routers at different locations use the same Autonomous System number and are connected via an ISP. Once prefixes arrive from one branch at the ISP, they are tagged with the customers AS number. By default, when the ISP passes the prefixes to the other router, the prefixes are dropped if the other router uses the same AS number. Use this attribute to advertise the prefixes at the other side. Control the number of times an AS number is advertised by specifying a number. In a hub and spoke configuration in a VPN, a PE (Provider Edge) router advertises all prefixes containing duplicate AS numbers. Use this attribute to configure two VRFs on each PE router to receive and advertise prefixes. One of the VRFs receives prefixes with AS numbers from all PE routers and then advertises them to neighboring PE routers. The other VRF receives prefixes with AS numbers from the CE (Customer Edge) router and advertises them to all PE routers in the hub and spoke configuration.
This attribute advertises prefixes (routes) even when the source of the prefixes is from the same Autonomous System (AS) number for specified address-family. Use this attribute in a scenario where two routers at different locations use the same Autonomous System number and are connected via an ISP. Once prefixes arrive from one branch at the ISP, they are tagged with the customers AS number. By default, when the ISP passes the prefixes to the other router, the prefixes are dropped if the other router uses the same AS number. Use this attribute to advertise the prefixes at the other side. Control the number of times an AS number is advertised by specifying a number. In a hub and spoke configuration in a VPN, a PE (Provider Edge) router advertises all prefixes containing duplicate AS numbers. Use this attribute to configure two VRFs on each PE router to receive and advertise prefixes. One of the VRFs receives prefixes with AS numbers from all PE routers and then advertises them to neighboring PE routers. The other VRF receives prefixes with AS numbers from the CE (Customer Edge) router and advertises them to all PE routers in the hub and spoke configuration.
This attribute configures the router to advertise the Graceful Restart Capability to the neighbors. This configuration indicates that the BGP speaker has the ability to preserve its forwarding state for the address family when BGP restarts. Use this attribute to advertise to the neighbor routers the capability of graceful restart.
This attribute configures the router to advertise the Graceful Restart Capability to the neighbors. This configuration indicates that the BGP speaker has the ability to preserve its forwarding state for the address family when BGP restarts. Use this attribute to advertise to the neighbor routers the capability of graceful restart.
This attribute configures the router to advertise the Graceful Restart Capability to the neighbors. This configuration indicates that the BGP speaker has the ability to preserve its forwarding state for the address family when BGP restarts. Use this attribute to advertise to the neighbor routers the capability of graceful restart.
neighbor WORD maximum-prefix <1-4294967295> stop-update
Configure maximum prefix warning
This attribute when enabled only give warning message when limit is exceeded. When it is not set and extra prefixes are received, the router ends the peering.
neighbor WORD maximum-prefix <1-4294967295> warning-only
Configure threshold percentage
Threshold-value in percen. This attribute controls the number of prefixes that can be received from a neighbor. This attribute allows the configuration of a specified number of prefixes that a BGP router is allowed to receive from a neighbor. When the maximum-prefix-warning attribute is not set and extra prefixes are received, the router ends the peering.
Access-list number. This attribute sets a BGP filter. This attribute specifies an access list filter on updates based on the BGP autonomous system paths. Each filter is an access list based on regular expressions
Use this attribute to apply a route map to incoming or outgoing routes. This attribute filters updates and modifies attributes. A route map is applied to inbound or outbound updates. Only the routes that pass the route map are sent or accepted in updates.
Adds a neighbor to an existing peer group. Neighbors with the same update policies are grouped into peer groups. This facilitates the updates of various policies, such as distribute and filter lists. The peer group is then configured easily with any of the neighbor attributes. Any changes made to the peer group affect all members.
Adds a neighbor to an existing peer group. Neighbors with the same update policies are grouped into peer groups. This facilitates the updates of various policies, such as distribute and filter lists. The peer group is then configured easily with any of the neighbor attributes. Any changes made to the peer group affect all members.
Sets a minimum route advertisement interval between the sending of BGP routing updates. To reduce the flapping of routes to internet, a minimum advertisement interval is set, so that the BGP routing updates are sent only per interval seconds.
Associates a description with a neighbor. This helps in identifying a neighbor quickly. It is useful for an ISP that has multiple neighbor relationships.
Disallow configuration of infinite hold-time. A hold-time of 0 seconds from the peer (during exchange of open messages) or the user (during configuration) will be rejected.
Disable the capability negotiation. It allows compatibility with older BGP versions that have no capability parameters used in open messages between peers.
Use this attribute to start a graceful shutdown for the BGP session of the specified BGP neighbor. The BGP session for this neighbor is shut down after the graceful shutdown timer expires. If there is no alternate path available for traffic to flow prior the actual shutdown of the BGP session, this path is made available for 60 seconds or for configured time after which the path is no longer available and traffic is dropped.
Sets a different restart-time other than the global restart-time. This attribute takes precedence over the restart-time value specified using the grstSet attribute. The restart-time value is the maximum time that a graceful-restart neighbor waits to come back up after a restart. The default value is 120 seconds.
Disables a neighbor administratively. It will terminate any active session for a specified neighbor and clear all related routing information. In case a peer group is specified for shutdown, a large number of peering sessions could be terminated.
Allows internal BGP sessions to use any operational interface for TCP connections. This attribute can be used in conjunction with any specified interface on the router. The loopback interface is the interface that is most commonly used with this attribute. The use of loopback interface eliminates a dependency and BGP does not have to rely on the availability of a particular interface for making TCP connections.
Configure router to accept only a particular BGP version. By default, the system uses BGP version 4 and on request dynamically negotiates down to version 2. Disables the routers version-negotiation capability and forces the router to use only a specified version with the neighbor.
This attribute sets the timers for a specific BGP neighbor. Keepalive messages are sent by a router to inform another router that the BGP connection between the two is still active. The keepalive interval is the period of time between each keepalive message sent by the router. The holdtime interval is the time the router waits to receive a keepalive message and if it does not receive a message for this period it declares the neighbor dead.
Autonomous system number of a neighbor. If the specified ASN matches the ASN number specified in the router bgp global configuration, the neighbor is identified as internal. If the ASN does no match, it is identified as external to the local AS.
Autonomous system number of a neighbor. If the specified ASN matches the ASN number specified in the router bgp global configuration, the neighbor is identified as internal. If the ASN does no match, it is identified as external to the local AS.
Autonomous system number of a neighbor. If the specified ASN matches the ASN number specified in the router bgp global configuration, the neighbor is identified as internal. If the ASN does no match, it is identified as external to the local AS.
Autonomous system number of a neighbor. If the specified ASN matches the ASN number specified in the router bgp global configuration, the neighbor is identified as internal. If the ASN does no match, it is identified as external to the local AS.
Use this attribute to start a graceful shutdown for the BGP session of the specified BGP neighbor. The BGP session for this neighbor is shut down after the graceful shutdown timer expires. If there is no alternate path available for traffic to flow prior the actual shutdown of the BGP session, this path is made available for 60 seconds or for configured time after which the path is no longer available and traffic is dropped.
Sets a different restart-time other than the global restart-time. This attribute takes precedence over the restart-time value specified using the grstSet attribute. The restart-time value is the maximum time that a graceful-restart neighbor waits to come back up after a restart. The default value is 120 seconds.
Associates a description with a neighbor. This helps in identifying a neighbor quickly. It is useful for an ISP that has multiple neighbor relationships.
This attribute sets the timers for a specific BGP neighbor. Keepalive messages are sent by a router to inform another router that the BGP connection between the two is still active. The keepalive interval is the period of time between each keepalive message sent by the router. The holdtime interval is the time the router waits to receive a keepalive message and if it does not receive a message for this period it declares the neighbor dead.
Sets a minimum route advertisement interval between the sending of BGP routing updates. To reduce the flapping of routes to internet, a minimum advertisement interval is set, so that the BGP routing updates are sent only per interval seconds.
Use this attribute to enable the dynamic capability for a specific peer. This attribute allows a BGP speaker to advertise or withdraw an address family capability to a peer in a non-disruptive manner.
Allows internal BGP sessions to use any operational interface for TCP connections. This attribute can be used in conjunction with any specified interface on the router. The loopback interface is the interface that is most commonly used with this attribute. The use of loopback interface eliminates a dependency and BGP does not have to rely on the availability of a particular interface for making TCP connections.
Disallow configuration of infinite hold-time. A hold-time of 0 seconds from the peer (during exchange of open messages) or the user (during configuration) will be rejected.
Disable the capability negotiation. It allows compatibility with older BGP versions that have no capability parameters used in open messages between peers.
Configure router to accept only a particular BGP version. By default, the system uses BGP version 4 and on request dynamically negotiates down to version 2. Disables the routers version-negotiation capability and forces the router to use only a specified version with the neighbor.
Use this attribute to accept and attempt BGP connections to external peers on indirectly connected networks. Multihop is not established if the only route to the multihop peer is a default route. This avoids loop formation.
Use this attribute to accept and attempt BGP connections to external peers on indirectly connected networks. Multihop is not established if the only route to the multihop peer is a default route. This avoids loop formation.
Use this attribute to accept and attempt BGP connections to external peers on indirectly connected networks. Multihop is not established if the only route to the multihop peer is a default route. This avoids loop formation.
Use this attribute to accept and attempt BGP connections to external peers on indirectly connected networks. Multihop is not established if the only route to the multihop peer is a default route. This avoids loop formation.
This attribute configures route map to be used for a BGP local router to send the default route 0.0.0.0 to a neighbor for use as a default route for specified address-family. This attribute can be used with standard or extended access lists.
neighbor (A.B.C.D|X:X::X:X) default-originate route-map WORD
Configure weight
This attribute specifies a weight value, for specified address-family, to all routes learned from a neighbor for specified address-family. The route with the highest weight gets preference when the same prefix is learned from more than one peer. Unlike the local-preference attribute, the weight attribute is relevant only to the local router. When the weight is set for a peer group, all members of the peer group get the same weight. This attribute can also be used to assign a different weight to an individual peer-group member. When an individually-configured weight of a peer-group member is removed, its weight is reset to its peer groups weight.
This attribute specifies a weight value, for specified address-family, to all routes learned from a neighbor for specified address-family. The route with the highest weight gets preference when the same prefix is learned from more than one peer. Unlike the local-preference attribute, the weight attribute is relevant only to the local router. When the weight is set for a peer group, all members of the peer group get the same weight. This attribute can also be used to assign a different weight to an individual peer-group member. When an individually-configured weight of a peer-group member is removed, its weight is reset to its peer groups weight.
This attribute configure the router as the next hop for a BGP-speaking neighbor or peer group. This attribute allows a BGP router to change the nexthop information that is sent to the iBGP peer. The nexthop information is set to the IP address of the interface used to communicate with the neighbor.
This attribute configure the router as the next hop for a BGP-speaking neighbor or peer group. This attribute allows a BGP router to change the nexthop information that is sent to the iBGP peer. The nexthop information is set to the IP address of the interface used to communicate with the neighbor.
This attribute configures the router as a BGP route reflector and configure the specified neighbor as its client for specified address-family. Route reflectors are a solution for the explosion of iBGP peering within an autonomous system. By route reflection the number of iBGP peers within an AS is reduced. Use this attribute to configure the local router as the route reflector and specify neighbors as its client. An AS can have more than one route reflector. One route reflector treats the other route reflector as another iBGP speaker.
This attribute configures the router as a BGP route reflector and configure the specified neighbor as its client for specified address-family. Route reflectors are a solution for the explosion of iBGP peering within an autonomous system. By route reflection the number of iBGP peers within an AS is reduced. Use this attribute to configure the local router as the route reflector and specify neighbors as its client. An AS can have more than one route reflector. One route reflector treats the other route reflector as another iBGP speaker.
This attribute configures the router as a BGP route reflector and configure the specified neighbor as its client for specified address-family. Route reflectors are a solution for the explosion of iBGP peering within an autonomous system. By route reflection the number of iBGP peers within an AS is reduced. Use this attribute to configure the local router as the route reflector and specify neighbors as its client. An AS can have more than one route reflector. One route reflector treats the other route reflector as another iBGP speaker.
This attribute configures the router as a BGP route reflector and configure the specified neighbor as its client for specified address-family. Route reflectors are a solution for the explosion of iBGP peering within an autonomous system. By route reflection the number of iBGP peers within an AS is reduced. Use this attribute to configure the local router as the route reflector and specify neighbors as its client. An AS can have more than one route reflector. One route reflector treats the other route reflector as another iBGP speaker.
This attribute removes the private Autonomous System (AS) number from outbound updates. Private AS numbers are not advertised to the Internet. This attribute is used with external BGP peers only. The router removes the AS numbers only if the update includes private AS numbers. If the update includes both private and public AS numbers, the system treats it as an error.
This attribute removes the private Autonomous System (AS) number from outbound updates. Private AS numbers are not advertised to the Internet. This attribute is used with external BGP peers only. The router removes the AS numbers only if the update includes private AS numbers. If the update includes both private and public AS numbers, the system treats it as an error.
This attribute specifies if a community attribute should be sent to a BGP neighbor for specified address-family. The community attribute groups destinations in a certain community and applies routing decisions according to those communities. By default, both standard and extended community attributes are sent to a neighbor
neighbor WORD attribute-unchanged {as-path|next-hop|med}
Configure orf prefix capability
This attribute enables Outbound Router Filtering (ORF), and advertise the ORF capability to its neighbors. The ORFs send and receive capabilities to lessen the number of updates exchanged between neighbors. By filtering updates, this option minimizes generating and processing of updates. The two routers exchange updates to maintain the ORF for each router.
This attribute enables Outbound Router Filtering (ORF), and advertise the ORF capability to its neighbors. The ORFs send and receive capabilities to lessen the number of updates exchanged between neighbors. By filtering updates, this option minimizes generating and processing of updates. The two routers exchange updates to maintain the ORF for each router.
neighbor WORD capability orf prefix-list (both|receive|send)
Configure peer allow ebgp vpn
This attribute allows an eBGP neighbor to be a VPN peer. By default, BGP VPN functionality is allowed only for iBGP peers. Using the peer-allow-ebgp-vpn attribute allows the VPN connection to be established to an eBGP peer.
This attribute advertises prefixes (routes) even when the source of the prefixes is from the same Autonomous System (AS) number for specified address-family. Use this attribute in a scenario where two routers at different locations use the same Autonomous System number and are connected via an ISP. Once prefixes arrive from one branch at the ISP, they are tagged with the customers AS number. By default, when the ISP passes the prefixes to the other router, the prefixes are dropped if the other router uses the same AS number. Use this attribute to advertise the prefixes at the other side. Control the number of times an AS number is advertised by specifying a number. In a hub and spoke configuration in a VPN, a PE (Provider Edge) router advertises all prefixes containing duplicate AS numbers. Use this attribute to configure two VRFs on each PE router to receive and advertise prefixes. One of the VRFs receives prefixes with AS numbers from all PE routers and then advertises them to neighboring PE routers. The other VRF receives prefixes with AS numbers from the CE (Customer Edge) router and advertises them to all PE routers in the hub and spoke configuration.
This attribute advertises prefixes (routes) even when the source of the prefixes is from the same Autonomous System (AS) number for specified address-family. Use this attribute in a scenario where two routers at different locations use the same Autonomous System number and are connected via an ISP. Once prefixes arrive from one branch at the ISP, they are tagged with the customers AS number. By default, when the ISP passes the prefixes to the other router, the prefixes are dropped if the other router uses the same AS number. Use this attribute to advertise the prefixes at the other side. Control the number of times an AS number is advertised by specifying a number. In a hub and spoke configuration in a VPN, a PE (Provider Edge) router advertises all prefixes containing duplicate AS numbers. Use this attribute to configure two VRFs on each PE router to receive and advertise prefixes. One of the VRFs receives prefixes with AS numbers from all PE routers and then advertises them to neighboring PE routers. The other VRF receives prefixes with AS numbers from the CE (Customer Edge) router and advertises them to all PE routers in the hub and spoke configuration.
This attribute advertises prefixes (routes) even when the source of the prefixes is from the same Autonomous System (AS) number for specified address-family. Use this attribute in a scenario where two routers at different locations use the same Autonomous System number and are connected via an ISP. Once prefixes arrive from one branch at the ISP, they are tagged with the customers AS number. By default, when the ISP passes the prefixes to the other router, the prefixes are dropped if the other router uses the same AS number. Use this attribute to advertise the prefixes at the other side. Control the number of times an AS number is advertised by specifying a number. In a hub and spoke configuration in a VPN, a PE (Provider Edge) router advertises all prefixes containing duplicate AS numbers. Use this attribute to configure two VRFs on each PE router to receive and advertise prefixes. One of the VRFs receives prefixes with AS numbers from all PE routers and then advertises them to neighboring PE routers. The other VRF receives prefixes with AS numbers from the CE (Customer Edge) router and advertises them to all PE routers in the hub and spoke configuration.
This attribute advertises prefixes (routes) even when the source of the prefixes is from the same Autonomous System (AS) number for specified address-family. Use this attribute in a scenario where two routers at different locations use the same Autonomous System number and are connected via an ISP. Once prefixes arrive from one branch at the ISP, they are tagged with the customers AS number. By default, when the ISP passes the prefixes to the other router, the prefixes are dropped if the other router uses the same AS number. Use this attribute to advertise the prefixes at the other side. Control the number of times an AS number is advertised by specifying a number. In a hub and spoke configuration in a VPN, a PE (Provider Edge) router advertises all prefixes containing duplicate AS numbers. Use this attribute to configure two VRFs on each PE router to receive and advertise prefixes. One of the VRFs receives prefixes with AS numbers from all PE routers and then advertises them to neighboring PE routers. The other VRF receives prefixes with AS numbers from the CE (Customer Edge) router and advertises them to all PE routers in the hub and spoke configuration.
This attribute configures the router to advertise the Graceful Restart Capability to the neighbors. This configuration indicates that the BGP speaker has the ability to preserve its forwarding state for the address family when BGP restarts. Use this attribute to advertise to the neighbor routers the capability of graceful restart.
This attribute configures the router to advertise the Graceful Restart Capability to the neighbors. This configuration indicates that the BGP speaker has the ability to preserve its forwarding state for the address family when BGP restarts. Use this attribute to advertise to the neighbor routers the capability of graceful restart.
This attribute configures the router to advertise the Graceful Restart Capability to the neighbors. This configuration indicates that the BGP speaker has the ability to preserve its forwarding state for the address family when BGP restarts. Use this attribute to advertise to the neighbor routers the capability of graceful restart.
A BGP speaker that wishes to advertise an IPv6 next hop for IPv4 NLRI for VPN-IPv4 NLRI to a BGP peer as per this specification MUST use the Capability Advertisement procedures defined with the Extended Next Hop Encoding capability to determine whether its peer supports this for the NLRI AFI/SAFI pair(s) of interest.
This attribute configures the router to advertise the Graceful Restart Capability to the neighbors. This configuration indicates that the BGP speaker has the ability to preserve its forwarding state for the address family when BGP restarts. Use this attribute to advertise to the neighbor routers the capability of graceful restart.
neighbor WORD maximum-prefix <1-4294967295> stop-update
Configure maximum prefix warning
This attribute when enabled only give warning message when limit is exceeded. When it is not set and extra prefixes are received, the router ends the peering.
This attribute when enabled only give warning message when limit is exceeded. When it is not set and extra prefixes are received, the router ends the peering.
neighbor WORD maximum-prefix <1-4294967295> warning-only
Configure threshold percentage
Threshold-value in percen. This attribute controls the number of prefixes that can be received from a neighbor. This attribute allows the configuration of a specified number of prefixes that a BGP router is allowed to receive from a neighbor. When the maximum-prefix-warning attribute is not set and extra prefixes are received, the router ends the peering.
Threshold-value in percen. This attribute controls the number of prefixes that can be received from a neighbor. This attribute allows the configuration of a specified number of prefixes that a BGP router is allowed to receive from a neighbor. When the maximum-prefix-warning attribute is not set and extra prefixes are received, the router ends the peering.
Access-list number. This attribute sets a BGP filter. This attribute specifies an access list filter on updates based on the BGP autonomous system paths. Each filter is an access list based on regular expressions
neighbor (A.B.C.D|X:X::X:X) filter-list WORD (in|out)
Configure as list direction
Access-list number. This attribute sets a BGP filter. This attribute specifies an access list filter on updates based on the BGP autonomous system paths. Each filter is an access list based on regular expressions
This attribute specify a prefix list for filtering BGP advertisements for specified address-family. Filtering by prefix list matches the prefixes of routes with those listed in the prefix list. If there is a match, the route is used. An empty prefix list permits all prefixes. If a given prefix does not match any entries of a prefix list, the route is denied access. When multiple entries of a prefix list match a prefix, the entry with the smallest sequence number is considered to be a real match. The router begins the search at the top of the prefix list, with the sequence number 1. Once a match or deny occurs, the router does not need to go through the rest of the prefix list. For efficiency the most common matches or denies are listed at the top.
neighbor (A.B.C.D|X:X::X:X) prefix-list WORD (in|out)
Configure prefix filter direction
This attribute specify a prefix list for filtering BGP advertisements for specified address-family. Filtering by prefix list matches the prefixes of routes with those listed in the prefix list. If there is a match, the route is used. An empty prefix list permits all prefixes. If a given prefix does not match any entries of a prefix list, the route is denied access. When multiple entries of a prefix list match a prefix, the entry with the smallest sequence number is considered to be a real match. The router begins the search at the top of the prefix list, with the sequence number 1. Once a match or deny occurs, the router does not need to go through the rest of the prefix list. For efficiency the most common matches or denies are listed at the top.
Use this attribute to apply a route map to incoming or outgoing routes. This attribute filters updates and modifies attributes. A route map is applied to inbound or outbound updates. Only the routes that pass the route map are sent or accepted in updates.
neighbor (A.B.C.D|X:X::X:X) route-map WORD (in|out)
Configure route map direction
Use this attribute to apply a route map to incoming or outgoing routes. This attribute filters updates and modifies attributes. A route map is applied to inbound or outbound updates. Only the routes that pass the route map are sent or accepted in updates.
Use this attribute to enable sending summarized routes by a BGP speaker to its peers. Auto-summary is used by a BGP router to advertise summarized routes to its peers. Auto-summary can be enabled if certain routes have already been advertised: in this case, configuring auto-summary advertises the summarized routes first, then corresponding non-summarized routes are withdrawn. If certain routes have already been advertised, and auto-summary is disabled, non-summarized routes are first advertised, then the corresponding summarized routes are withdrawn from all the connected peers.
Use this attribute to enable IGP synchronization of Internal BGP (iBGP) learned routes with the Internal Gateway Protocol (IGP) system. Synchronization is used when a BGP router should not advertise routes learned from iBGP neighbors, unless those routes are also present in an IGP (for example, OSPF). Synchronization may be enabled when all the routers in an autonomous system do not speak BGP, and the autonomous system is a transit for other autonomous systems.
Gracefully shut down all sessions of the AFI/SAFI beloging to the vrf under this router. The BGP graceful shutdown feature reduces packet loss during maintenance activity.
This attribute sets the local preference of the router to use during graceful shutdown. The local preference value indicates the preferred path when there are multiple paths to the same destination in a single routing database. The path with a higher preference value is the preferred one. The preferred path is sent to all routers and access servers in the local autonomous system.
Aggregates are used to minimize the size of routing tables. Aggregation combines the characteristics of several different routes and advertises a single route.The aggregate-address attribute creates an aggregate entry in the BGP routing table if any more-specific BGP routes are available in the specified range.
The aggregate-type attribute creates an aggregate entry advertising the path for this route, consisting of all elements contained in all paths being summarized. Use this parameter to reduce the size of path information by listing the AS number only once, even if it was included in multiple paths that were aggregated.
The aggregate-type attribute creates an aggregate entry advertising the path for this route, consisting of all elements contained in all paths being summarized. Use this parameter to reduce the size of path information by listing the AS number only once, even if it was included in multiple paths that were aggregated.
The aggregate-type attribute creates an aggregate entry advertising the path for this route, consisting of all elements contained in all paths being summarized. Use this parameter to reduce the size of path information by listing the AS number only once, even if it was included in multiple paths that were aggregated.
The aggregate-type attribute creates an aggregate entry advertising the path for this route, consisting of all elements contained in all paths being summarized. Use this parameter to reduce the size of path information by listing the AS number only once, even if it was included in multiple paths that were aggregated.
Use this attribute to set the number of equal-cost multi-path (ECMP) routes for eBGP. You can install multiple BGP paths to the same destination to balance the load on the forwarding path
Use this attribute to set the number of equal-cost multi-path (ECMP) routes for eBGP. You can install multiple BGP paths to the same destination to balance the load on the forwarding path
Use this attribute to set the number of equal-cost multi-path (ECMP) routes for iBGP. You can install multiple BGP paths to the same destination to balance the load on the forwarding path.
Use this attribute to enable or disable suppression/modification of incoming BGP updates to IP RIB/FIB table installation. In a dedicated route reflector, all the routes it receives may not be required to be stored or only few selected routes need to be stored, because it may not lie in the data path. Table maps are particularly useful to attain this restriction. When map-name attribute is set, the route map referenced in the map-name attribute shall be used to set certain properties (such as the traffic index) of the routes for installation into the RIB. The route is always downloaded, regardless of whether it is permitted or denied by the route map.
This command is supported when following feature are enabled bgp table map feature enabled
When tableMapFilter attribute is given in the table map attribute, the route map referenced is used to control whether a BGP route is to be downloaded to the IP RIB (hence the filter). A BGP route is not downloaded to the RIB if it is denied by the route map.
This command is supported when following feature are enabled bgp table map feature enabled
Use this attribute to configure reachability half-life time for the penalty in minutes for the bgp route dampening. The time for the penalty to decrease to one-half of its current value.
Use this attribute to configure the value to start suppressing a route for BGP route dampening. When the penalty for a route exceeds the suppress value, the route is suppressed
Use this attribute to configure un-reachability half-life time for the penalty in minutes for bgp route dampening. The dampening information is purged from the router once the penalty becomes less than half of the reuse limit.
Use this attribute to inject routes from one routing process into another. Redistribution is used by routing protocols to advertise routes that are learned by some other means, such as by another routing protocol or by static routes. Since all internal routes are dumped into BGP, careful filtering is applied to make sure that only routes to be advertised reach the internet, not everything. This attribute allows redistribution by injecting prefixes from one routing protocol into another routing protocol.
Use this attribute to inject routes from one routing process into another. Redistribution is used by routing protocols to advertise routes that are learned by some other means, such as by another routing protocol or by static routes. Since all internal routes are dumped into BGP, careful filtering is applied to make sure that only routes to be advertised reach the internet, not everything. This attribute allows redistribution by injecting prefixes from one routing protocol into another routing protocol.
This attribute specifies a neighbors autonomous system number. If the specified ASN matches the ASN number specified in the router bgp global configuration, the neighbor is identified as internal. If the ASN does not match, it is identified as external to the local AS.
This attribute allows internal BGP sessions to use any operational interface for TCP connections. Use this attribute in conjunction with any specified interface on the router. The loopback interface is the interface that is most commonly used with this attribute. The use of loopback interface eliminates a dependency and BGP does not have to rely on the availability of a particular interface for making TCP connections.
BGP Version. This attribute configures router to accept only a particular BGP version. By default, the system uses BGP version 4 and on request dynamically negotiates down to version 2. Using this attribute disables the routers version-negotiation capability and forces the router to use only a specified version with the neighbor.
Connect timer value. This attribute sets the timers for a specific BGP neighbor. Keepalive messages are sent by a router to inform another router that the BGP connection between the two is still active. The keepalive interval is the period of time between each keepalive message sent by the router. The holdtime interval is the time the router waits to receive a keepalive message and if it does not receive a message for this period it declares the neighbor dead.
This attribute disables a neighbor administratively. Use this attribute to terminate any active session for a specified neighbor and clear all related routing information. In case a peer group is specified for shutdown, a large number of peering sessions could be terminated.
Use this attribute to disable capability negotiation. The capability negotiation is performed by default. This attribute is used to allow compatibility with older BGP versions that have no capability parameters used in open messages between peers.
Use this attribute to enable the dynamic capability for a specific peer. This attribute allows a BGP speaker to advertise or withdraw an address family capability to a peer in a non-disruptive manner.
Minimum route advertisement interval. Sets minimum interval between the sending of BGP routing updates. To reduce the flapping of routes to internet, a minimum advertisement interval is set, so that the BGP routing updates are sent only per interval seconds. BGP dampening can also be used to control the effects of flapping routes.
Time interval. This attribute adjust the interval of sending AS origination routing updates. This attribute is used to change the minimum interval between the sending of AS-origination routing updates.
Use this attribute to configure a PE router to override the Autonomous System Number (ASN) of a site with the ASN of a provider. BGP normally ignores the routes from the same AS. However, this attribute is used to override the customers ASN in BGP, so that the customer CE accepts and installs routes from the same AS. Typically, this attribute is used when Customer Edge (CE) routers have the same ASN in some or all sites. As per BGP requirement, a BGP speaker rejects a route that has the same ASN as itself, in the AS_PATH attribute. Thus the CE routers having the same ASN do not accept routes from each other. Set neighborAsOverrideAf attribute on the PE router removes the CE neighbors ASN from the AS_PATH attribute allowing CE routers with the same ASN to accept routes from each other.
Use this attribute to associate a description with a neighbor. This attribute helps in identifying a neighbor quickly. It is useful for an ISP that has multiple neighbor relationships.
This attribute sets a different restart-time other than the global restart-time. This attribute takes precedence over the restart-time value specified using the graceful-restart-set attribute. The restart-time value is the maximum time that a graceful-restart neighbor waits to come back up after a restart. The default value is 120 seconds.
Use this attribute to enable the site-of-origin (SOO) feature. If the customer AS is multi-homed to the ISP, this attribute ensures that the PE does not advertise the routes back to the same AS.
Use this attribute to start a graceful shutdown for the BGP session of the specified BGP neighbor. The BGP session for this neighbor is shut down after the graceful shutdown timer expires. If there is no alternate path available for traffic to flow prior the actual shutdown of the BGP session, this path is made available for 60 seconds or for configured time after which the path is no longer available and traffic is dropped.
Use this attribute to configure the value of the graceful shutdown timer. After the timer expires, the BGP session initiated for graceful shutdown is shut down.
This attribute configures route map to be used for a BGP local router to send the default route 0.0.0.0 to a neighbor for use as a default route for specified address-family. This attribute can be used with standard or extended access lists.
This attribute specifies a weight value, for specified address-family, to all routes learned from a neighbor for specified address-family. The route with the highest weight gets preference when the same prefix is learned from more than one peer. Unlike the local-preference attribute, the weight attribute is relevant only to the local router. When the weight is set for a peer group, all members of the peer group get the same weight. This attribute can also be used to assign a different weight to an individual peer-group member. When an individually-configured weight of a peer-group member is removed, its weight is reset to its peer groups weight.
This attribute specifies a weight value, for specified address-family, to all routes learned from a neighbor for specified address-family. The route with the highest weight gets preference when the same prefix is learned from more than one peer. Unlike the local-preference attribute, the weight attribute is relevant only to the local router. When the weight is set for a peer group, all members of the peer group get the same weight. This attribute can also be used to assign a different weight to an individual peer-group member. When an individually-configured weight of a peer-group member is removed, its weight is reset to its peer groups weight.
This attribute configures the router as a BGP route reflector and configure the specified neighbor as its client for specified address-family. Route reflectors are a solution for the explosion of iBGP peering within an autonomous system. By route reflection the number of iBGP peers within an AS is reduced. Use this attribute to configure the local router as the route reflector and specify neighbors as its client. An AS can have more than one route reflector. One route reflector treats the other route reflector as another iBGP speaker.
This attribute removes the private Autonomous System (AS) number from outbound updates. Private AS numbers are not advertised to the Internet. This attribute is used with external BGP peers only. The router removes the AS numbers only if the update includes private AS numbers. If the update includes both private and public AS numbers, the system treats it as an error.
This attribute specifies if a community attribute should be sent to a BGP neighbor for specified address-family. The community attribute groups destinations in a certain community and applies routing decisions according to those communities. By default, both standard and extended community attributes are sent to a neighbor
This attribute enables Outbound Router Filtering (ORF), and advertise the ORF capability to its neighbors. The ORFs send and receive capabilities to lessen the number of updates exchanged between neighbors. By filtering updates, this option minimizes generating and processing of updates. The two routers exchange updates to maintain the ORF for each router.
This attribute allows an eBGP neighbor to be a VPN peer. By default, BGP VPN functionality is allowed only for iBGP peers. Using the peer-allow-ebgp-vpn attribute allows the VPN connection to be established to an eBGP peer.
This attribute advertises prefixes (routes) even when the source of the prefixes is from the same Autonomous System (AS) number for specified address-family. Use this attribute in a scenario where two routers at different locations use the same Autonomous System number and are connected via an ISP. Once prefixes arrive from one branch at the ISP, they are tagged with the customers AS number. By default, when the ISP passes the prefixes to the other router, the prefixes are dropped if the other router uses the same AS number. Use this attribute to advertise the prefixes at the other side. Control the number of times an AS number is advertised by specifying a number. In a hub and spoke configuration in a VPN, a PE (Provider Edge) router advertises all prefixes containing duplicate AS numbers. Use this attribute to configure two VRFs on each PE router to receive and advertise prefixes. One of the VRFs receives prefixes with AS numbers from all PE routers and then advertises them to neighboring PE routers. The other VRF receives prefixes with AS numbers from the CE (Customer Edge) router and advertises them to all PE routers in the hub and spoke configuration.
This attribute configures the router to advertise the Graceful Restart Capability to the neighbors. This configuration indicates that the BGP speaker has the ability to preserve its forwarding state for the address family when BGP restarts. Use this attribute to advertise to the neighbor routers the capability of graceful restart.
BGP peer group name. Adds a neighbor to an existing peer group. Neighbors with the same update policies are grouped into peer groups. This facilitates the updates of various policies, such as distribute and filter lists. The peer group is then configured easily with any of the neighbor attributes. Any changes made to the peer group affect all members.
Use this attribute to accept and attempt BGP connections to external peers on indirectly connected networks. Multihop is not established if the only route to the multihop peer is a default route. This avoids loop formation.
Use this attribute to accept and attempt BGP connections to external peers on indirectly connected networks. Multihop is not established if the only route to the multihop peer is a default route. This avoids loop formation.
This attribute specifies number of prefixes that a BGP router is allowed to receive from a neighbor. When the maximum-prefix-warning attribute is not set and extra prefixes are received, the router ends the peering.
This attribute when enabled only give warning message when limit is exceeded. When it is not set and extra prefixes are received, the router ends the peering.
Threshold-value in percen. This attribute controls the number of prefixes that can be received from a neighbor. This attribute allows the configuration of a specified number of prefixes that a BGP router is allowed to receive from a neighbor. When the maximum-prefix-warning attribute is not set and extra prefixes are received, the router ends the peering.
Access-list number. This attribute sets a BGP filter. This attribute specifies an access list filter on updates based on the BGP autonomous system paths. Each filter is an access list based on regular expressions
This attribute specify a prefix list for filtering BGP advertisements for specified address-family. Filtering by prefix list matches the prefixes of routes with those listed in the prefix list. If there is a match, the route is used. An empty prefix list permits all prefixes. If a given prefix does not match any entries of a prefix list, the route is denied access. When multiple entries of a prefix list match a prefix, the entry with the smallest sequence number is considered to be a real match.The router begins the search at the top of the prefix list, with the sequence number 1. Once a match or deny occurs, the router does not need to go through the rest of the prefix list. For efficiency the most common matches or denies are listed at the top.
Use this attribute to apply a route map to incoming or outgoing routes. This attribute filters updates and modifies attributes. A route map is applied to inbound or outbound updates. Only the routes that pass the route map are sent or accepted in updates.
Creates a peer group. Neighbors with the same update policies are grouped into peer groups. This facilitates the updates of various policies, such as distribute and filter lists. The peer group is then configured easily with any of the neighbor attributes. Any changes made to the peer group affect all members.
This attribute specifies a neighbors autonomous system number. If the specified ASN matches the ASN number specified in the router bgp global configuration, the neighbor is identified as internal. If the ASN does not match, it is identified as external to the local AS.
This attribute allows internal BGP sessions to use any operational interface for TCP connections. Use this attribute in conjunction with any specified interface on the router. The loopback interface is the interface that is most commonly used with this attribute. The use of loopback interface eliminates a dependency and BGP does not have to rely on the availability of a particular interface for making TCP connections.
BGP Version. This attribute configures router to accept only a particular BGP version. By default, the system uses BGP version 4 and on request dynamically negotiates down to version 2. Using this attribute disables the routers version-negotiation capability and forces the router to use only a specified version with the neighbor.
Connect timer value. This attribute sets the timers for a specific BGP neighbor. Keepalive messages are sent by a router to inform another router that the BGP connection between the two is still active. The keepalive interval is the period of time between each keepalive message sent by the router. The holdtime interval is the time the router waits to receive a keepalive message and if it does not receive a message for this period it declares the neighbor dead.
This attribute disables a neighbor administratively. Use this attribute to terminate any active session for a specified neighbor and clear all related routing information. In case a peer group is specified for shutdown, a large number of peering sessions could be terminated.
Use this attribute to disable capability negotiation. The capability negotiation is performed by default. This attribute is used to allow compatibility with older BGP versions that have no capability parameters used in open messages between peers.
Use this attribute to enable the dynamic capability for a specific peer. This attribute allows a BGP speaker to advertise or withdraw an address family capability to a peer in a non-disruptive manner.
Minimum route advertisement interval. Sets minimum interval between the sending of BGP routing updates. To reduce the flapping of routes to internet, a minimum advertisement interval is set, so that the BGP routing updates are sent only per interval seconds. BGP dampening can also be used to control the effects of flapping routes.
Time interval. This attribute adjust the interval of sending AS origination routing updates. This attribute is used to change the minimum interval between the sending of AS-origination routing updates.
Use this attribute to configure a PE router to override the Autonomous System Number (ASN) of a site with the ASN of a provider. BGP normally ignores the routes from the same AS. However, this attribute is used to override the customers ASN in BGP, so that the customer CE accepts and installs routes from the same AS. Typically, this attribute is used when Customer Edge (CE) routers have the same ASN in some or all sites. As per BGP requirement, a BGP speaker rejects a route that has the same ASN as itself, in the AS_PATH attribute. Thus the CE routers having the same ASN do not accept routes from each other. Set neighborAsOverrideAf attribute on the PE router removes the CE neighbors ASN from the AS_PATH attribute allowing CE routers with the same ASN to accept routes from each other.
Use this attribute to associate a description with a neighbor. This attribute helps in identifying a neighbor quickly. It is useful for an ISP that has multiple neighbor relationships.
This attribute sets a different restart-time other than the global restart-time. This attribute takes precedence over the restart-time value specified using the graceful-restart-set attribute. The restart-time value is the maximum time that a graceful-restart neighbor waits to come back up after a restart. The default value is 120 seconds.
Use this attribute to enable the site-of-origin (SOO) feature. If the customer AS is multi-homed to the ISP, this attribute ensures that the PE does not advertise the routes back to the same AS.
Use this attribute to start a graceful shutdown for the BGP session of the specified BGP neighbor. The BGP session for this neighbor is shut down after the graceful shutdown timer expires. If there is no alternate path available for traffic to flow prior the actual shutdown of the BGP session, this path is made available for 60 seconds or for configured time after which the path is no longer available and traffic is dropped.
Use this attribute to configure the value of the graceful shutdown timer. After the timer expires, the BGP session initiated for graceful shutdown is shut down.
This attribute configures route map to be used for a BGP local router to send the default route 0.0.0.0 to a neighbor for use as a default route for specified address-family. This attribute can be used with standard or extended access lists.
This attribute specifies a weight value, for specified address-family, to all routes learned from a neighbor for specified address-family. The route with the highest weight gets preference when the same prefix is learned from more than one peer. Unlike the local-preference attribute, the weight attribute is relevant only to the local router. When the weight is set for a peer group, all members of the peer group get the same weight. This attribute can also be used to assign a different weight to an individual peer-group member. When an individually-configured weight of a peer-group member is removed, its weight is reset to its peer groups weight.
This attribute specifies a weight value, for specified address-family, to all routes learned from a neighbor for specified address-family. The route with the highest weight gets preference when the same prefix is learned from more than one peer. Unlike the local-preference attribute, the weight attribute is relevant only to the local router. When the weight is set for a peer group, all members of the peer group get the same weight. This attribute can also be used to assign a different weight to an individual peer-group member. When an individually-configured weight of a peer-group member is removed, its weight is reset to its peer groups weight.
This attribute configures the router as a BGP route reflector and configure the specified neighbor as its client for specified address-family. Route reflectors are a solution for the explosion of iBGP peering within an autonomous system. By route reflection the number of iBGP peers within an AS is reduced. Use this attribute to configure the local router as the route reflector and specify neighbors as its client. An AS can have more than one route reflector. One route reflector treats the other route reflector as another iBGP speaker.
This attribute removes the private Autonomous System (AS) number from outbound updates. Private AS numbers are not advertised to the Internet. This attribute is used with external BGP peers only. The router removes the AS numbers only if the update includes private AS numbers. If the update includes both private and public AS numbers, the system treats it as an error.
This attribute specifies if a community attribute should be sent to a BGP neighbor for specified address-family. The community attribute groups destinations in a certain community and applies routing decisions according to those communities. By default, both standard and extended community attributes are sent to a neighbor
neighbor WORD attribute-unchanged {as-path|next-hop|med}
Configure peer-group orf-prefix-capability
This attribute enables Outbound Router Filtering (ORF), and advertise the ORF capability to its neighbors. The ORFs send and receive capabilities to lessen the number of updates exchanged between neighbors. By filtering updates, this option minimizes generating and processing of updates. The two routers exchange updates to maintain the ORF for each router.
neighbor WORD capability orf prefix-list (both|receive|send)
Configure peer-group peer-allow-ebgp-vpn
This attribute allows an eBGP neighbor to be a VPN peer. By default, BGP VPN functionality is allowed only for iBGP peers. Using the peer-allow-ebgp-vpn attribute allows the VPN connection to be established to an eBGP peer.
This attribute advertises prefixes (routes) even when the source of the prefixes is from the same Autonomous System (AS) number for specified address-family. Use this attribute in a scenario where two routers at different locations use the same Autonomous System number and are connected via an ISP. Once prefixes arrive from one branch at the ISP, they are tagged with the customers AS number. By default, when the ISP passes the prefixes to the other router, the prefixes are dropped if the other router uses the same AS number. Use this attribute to advertise the prefixes at the other side. Control the number of times an AS number is advertised by specifying a number. In a hub and spoke configuration in a VPN, a PE (Provider Edge) router advertises all prefixes containing duplicate AS numbers. Use this attribute to configure two VRFs on each PE router to receive and advertise prefixes. One of the VRFs receives prefixes with AS numbers from all PE routers and then advertises them to neighboring PE routers. The other VRF receives prefixes with AS numbers from the CE (Customer Edge) router and advertises them to all PE routers in the hub and spoke configuration.
This attribute configures the router to advertise the Graceful Restart Capability to the neighbors. This configuration indicates that the BGP speaker has the ability to preserve its forwarding state for the address family when BGP restarts. Use this attribute to advertise to the neighbor routers the capability of graceful restart.
neighbor WORD local-as <1-4294967295> (no-prepend|) (replace-as|)
Configure ebgp-multihop enabled
Use this attribute to accept and attempt BGP connections to external peers on indirectly connected networks. Multihop is not established if the only route to the multihop peer is a default route. This avoids loop formation.
Use this attribute to accept and attempt BGP connections to external peers on indirectly connected networks. Multihop is not established if the only route to the multihop peer is a default route. This avoids loop formation.
This attribute specifies number of prefixes that a BGP router is allowed to receive from a neighbor. When the maximum-prefix-warning attribute is not set and extra prefixes are received, the router ends the peering.
neighbor WORD maximum-prefix <1-4294967295> stop-update
Configure maximum-prefix maximum-prefix-warning
This attribute when enabled only give warning message when limit is exceeded. When it is not set and extra prefixes are received, the router ends the peering.
neighbor WORD maximum-prefix <1-4294967295> warning-only
Configure maximum-prefix threshold-percentage
Threshold-value in percen. This attribute controls the number of prefixes that can be received from a neighbor. This attribute allows the configuration of a specified number of prefixes that a BGP router is allowed to receive from a neighbor. When the maximum-prefix-warning attribute is not set and extra prefixes are received, the router ends the peering.
Access-list number. This attribute sets a BGP filter. This attribute specifies an access list filter on updates based on the BGP autonomous system paths. Each filter is an access list based on regular expressions
This attribute specify a prefix list for filtering BGP advertisements for specified address-family. Filtering by prefix list matches the prefixes of routes with those listed in the prefix list. If there is a match, the route is used. An empty prefix list permits all prefixes. If a given prefix does not match any entries of a prefix list, the route is denied access. When multiple entries of a prefix list match a prefix, the entry with the smallest sequence number is considered to be a real match.The router begins the search at the top of the prefix list, with the sequence number 1. Once a match or deny occurs, the router does not need to go through the rest of the prefix list. For efficiency the most common matches or denies are listed at the top.
Use this attribute to apply a route map to incoming or outgoing routes. This attribute filters updates and modifies attributes. A route map is applied to inbound or outbound updates. Only the routes that pass the route map are sent or accepted in updates.
clear ip bgp vrf WORD (A.B.C.D|X:X::X:X|WORD|WORD) (description LINE|)
IPI-BGP-VRF
Configure rd string
Use this attribute to assign a route distinguisher (RD) for the VRF. The route distinguisher value must be a unique value on the router.This attribute creates routing and forwarding tables and specifies the default RD for a VPN. The RD is added to the customers IPv4 prefixes, changing them into globally unique VPN-IPv4 prefixes.
This attribute assigns a route map to the VRF. This map is applied for routing information imported from another PE or VRF. Use this attribute when an application requires finer control over the routes imported into a VRF than provided by the import and export extended communities. You can filter routes that are eligible for import into a VRF through the use of a route map.The route map can deny access to selected routes from a community that is on the import list.
Use this attribute to add a list of import and export route-target extended communities to the VRF. This attribute creates lists of import and export route-target extended communities for the VRF. It specifies a target VPN extended community. All routes with the specific route-target extended community are imported into all VRFs with the same extended community as an import route-target.
The number of packets that must be missed to declare this session as down. The detection interval for the BFD session is calculated by multiplying the value of the negotiated transmission interval by this value.
This command is supported when following feature are enabled BFD-MONO feature enabled
The number of packets that must be missed to declare this session as down. The detection interval for the BFD session is calculated by multiplying the value of the negotiated transmission interval by this value.
This command is supported when following feature are enabled BFD-MONO feature enabled
The number of packets that must be missed to declare this session as down. The detection interval for the BFD session is calculated by multiplying the value of the negotiated transmission interval by this value.
This command is supported when following feature are enabled BFD-MONO feature enabled
The number of packets that must be missed to declare this session as down. The detection interval for the BFD session is calculated by multiplying the value of the negotiated transmission interval by this value.
This command is supported when following feature are enabled BFD-MONO feature enabled
Use this attribute to enable or disable Virtual MAC (VMAC). This affects all VRRP groups in a router. On a single network segment, multiple VRRP groups can be configured, each using a different VMAC. The use of VMAC addressing allows for faster switchover when a backup router assumes the master role. When this attribute is used to enable a VMAC, the virtual router forwards packets with a special-purpose multicast VMAC address (0:0:5e:0:01:VR_ID). Otherwise, it forwards with interface physical address.The VMAC address is assigned to a router interface at the time the VRRP group is enabled in the router.
Use this attribute to configure preempt mode. If set to true, the highest priority backup is always the master when the default master is unavailable. If set to false, a higher priority backup does not preempt a lower priority backup which is acting as master
Use this attribute to configure the VRRP router priority within the virtual router. Priority determines the role that each VRRP router plays and what happens if the master virtual router fails. If a VRRP router owns the IP address of the virtual router and the IP address of the physical interface, this router functions as the master virtual router
Use this attribute to set a switch-back delay timer for the master VRRP router. This feature prevents the original master VRRP router from transitioning back to the master state after coming back online until the configured delay timer has expired.
Use this attribute to configure the advertisement interval of a virtual router. This is the length of time, in seconds, between each advertisement sent from the master to its backup(s). The master virtual router sends VRRP advertisements to other VRRP routers in the same group. The advertisements communicate the priority and state of the master virtual router. The VRRP advertisements are encapsulated in IP packets and sent to the multicast address assigned to the VRRP group (224.0.0.18). Advertisements are sent every second by default.
Use this attribute to enable a VRRP session on the router (to make it participate in virtual routing). To make any changes to the VRRP configuration, first disable the router from participating in virtual routing using the disable command
Use this attribute to set the virtual IP address for the VRRP virtual router as VRRP Owner. This is the IP address used by end hosts to address their default gateway.
Use this attribute to configure preempt mode. If set to true, the highest priority backup is always the master when the default master is unavailable. If set to false, a higher priority backup does not preempt a lower priority backup which is acting as master
Use this attribute to configure the VRRP router priority within the virtual router. Priority determines the role that each VRRP router plays and what happens if the master virtual router fails. If a VRRP router owns the IP address of the virtual router and the IP address of the physical interface, this router functions as the master virtual router
Use this attribute to set a switch-back delay timer for the master VRRP router. This feature prevents the original master VRRP router from transitioning back to the master state after coming back online until the configured delay timer has expired.
Use this attribute to configure the advertisement interval of a virtual router. This is the length of time, in seconds, between each advertisement sent from the master to its backup(s). The master virtual router sends VRRP advertisements to other VRRP routers in the same group. The advertisements communicate the priority and state of the master virtual router. The VRRP advertisements are encapsulated in IP packets and sent to the multicast address assigned to the VRRP group (224.0.0.18). Advertisements are sent every second by default.
Use this attribute to enable a VRRP session on the router (to make it participate in virtual routing). To make any changes to the VRRP configuration, first disable the router from participating in virtual routing using the disable command
Use this attribute to set the virtual IP address for the VRRP virtual router as VRRP Owner. This is the IP address used by end hosts to address their default gateway.
This command is supported when following feature are enabled IPV6 feature
Either IP address mask and length of the prefix list mask or Take all packets of any length. This parameter is the same as using 0.0.0.0/0 le 32 for A.B.C.D/M.
Either IP address mask and length of the prefix list mask or Take all packets of any length. This parameter is the same as using 0.0.0.0/0 le 32 for A.B.C.D/M.
Use this attribute to configure the policy of adjacency based on the protocol related TLVs in the ISIS Hello packet. ISIS checks adjacency with protocol related TLVs including Protocols Supported TLV or IP Interface Address TLV by default. The command with no parameter disables this check.
Use this attribute to configure the policy of ASLA Link attributes usage in ASLA Sub-TLV (RFC-8919) for Flexible Algorithm. ISIS uses ASLA Link attributes by default, i.e. does not use legacy link attributes. The command with no keyword disables Flex-Algo ASLA usage, i.e. enables advertisement of legacy bit in ASLA. Command without no keyword enables ASLA Flex-Algo advertisement, i.e. disables legacy bit in ASLA sub-tlv.
Use this attribute to configure the policy of strict ASLA Link attributes usage for Flexible Algorithm path calculations. ISIS uses ASLA Link attributes by default, may also use legacy TE Link attributes. The command with no keyword disables this usage.
Use this attribute to configure the policy of ASLA Link attributes usage for all applications for path calculations. ISIS does not use ASLA Link attributes for all applications by default. The command with no keyword disables this usage.
Use this attribute to set the send-only option at the instance level.Use this command before configuring the authentication mode and authentication key-chain, so that the implementation of authentication goes smoothly. That is, the routers will have more time for the keys to be configured on each router if authentication is inserted only on the packets being sent, not checked on packets being received. After all routers that must communicate are configured with this command, enable the authentication mode and key chain on each router.
Use this attribute to set the send-only option at the instance level.Use this command before configuring the authentication mode and authentication key-chain, so that the implementation of authentication goes smoothly. That is, the routers will have more time for the keys to be configured on each router if authentication is inserted only on the packets being sent, not checked on packets being received. After all routers that must communicate are configured with this command, enable the authentication mode and key chain on each router.
Use this attribute to configure the hostname to be advertised for an ISIS instance using the dynamic hostname exchange mechanism (RFC 2763) and system-ID-to-hostname translation.This command configures a hostname to be used for the Dynamic Hostname Exchange Mechanism and System-ID tohostname translation. Use the routing area tag as the hostname, not the router.s global hostname
Use this attribute to ignore LSPs with checksum errors. By default, ISIS validates checksum for LSP whenever it receives LSPs and if the checksum has an error, the LSP will be dropped. Configuring this command to ignore the LSP checksum error and treat it as if checksum is passed.
Use this attribute to set the IS to the specified level of routing.Changing is-type brings down, then brings up a particular level of routing. There is a limitation: Only one ISIS instance can run Level-2 routing (either Level-2 only IS, or Level-1-2 IS)
Use this attribute to set the send-only option at the instance level.Use this command before configuring the authentication mode and authentication key-chain, so that the implementation of authentication goes smoothly. That is, the routers will have more time for the keys to be configured on each router if authentication is inserted only on the packets being sent, not checked on packets being received. After all routers that must communicate are configured with this command, enable the authentication mode and key chain on each router.
Use this attribute to enable the Bidirectional Forwarding Detection (BFD) feature on the interfaces enabled with this ISIS instance. This command sets BFD fall-over check for all the neighbors under specified process.
Use this attribute to set the maximum number of ISIS areas that can be configured on this router with the net command. By default, ISIS permits a maximum of three areas that can be defined on a router.
Use this attribute to set the authentication password for the Level-1 area and to set authentication on Level-1 SNP PDUs. This command enables authentication when receiving and sending LSP and SNP PDU in Level-1 areas. Area password must be the same for all the ISIS routers in the same area
Use this attribute to set the authentication password for the Level-1 area and to set authentication on Level-1 SNP PDUs. This command enables authentication when receiving and sending LSP and SNP PDU in Level-1 areas. Area password must be the same for all the ISIS routers in the same area
area-password WORD authenticate snp (send-only|validate)
Configure net
Use this attribute to add a Network Entity Title (NET) for the instance.On a router running ISIS, a NET can be 8 to 20 bytes in length. The last byte is always the n-selector, and must be zero. The n-selector indicates no transport entity, and means that the packet is for the routing software of the system. The six bytes directly preceding the n-selector are the system ID. The system ID length is a fixed size and cannot be changed. The system ID must be unique throughout each area (Level 1) and throughout the backbone (Level 2). The bytes preceding the system ID are the area ID, which can be from 1 - 13 bytes in length. By default, a maximum of three NETs per router are allowed with a different area ID but the system ID should be the same for all NETs. You can increase the number of area IDs per system ID with the max-area-address command.
Use this attribute to set the authentication password for the Level-2 domain, and optionally, the authentication password on Level-2 SNP PDUs.Configuring this command to enable authentication when receiving and sending LSP and SNP PDU in Level-2 domain. Domain password must be the same in Level-2 domain.
Use this attribute to set the authentication password for the Level-2 domain, and optionally, the authentication password on Level-2 SNP PDUs.Configuring this command to enable authentication when receiving and sending LSP and SNP PDU in Level-2 domain. Domain password must be the same in Level-2 domain.
Use this attribute to redistribute reachability information from one level to the other level. If an distribute-list name is given with this command for an access list that does not exist, the routes are still redistributed.
Use this attribute to redistribute reachability information from one level to the other level. If an distribute-list name is given with this command for an access list that does not exist, the routes are still redistributed.
redistribute isis level-1 into level-2 distribute-list WORD
Configure level-2-into-1-redistributes enable
Use this attribute to redistribute reachability information from one level to the other level. If an distribute-list name is given with this command for an access list that does not exist, the routes are still redistributed.
Use this attribute to redistribute reachability information from one level to the other level. If an distribute-list name is given with this command for an access list that does not exist, the routes are still redistributed.
redistribute isis level-2 into level-1 distribute-list WORD
Configure originate
Use this attribute to set originate reachability information to Default destination into LSP.There is no default information in Level-2 domain by default, while Level-1 router calculates default to L1L2 route during SPF calculation. This command enables to originate default route into Level-2 domain.
Use this attribute to configure the policy of adjacency based on the protocol related TLVs in the ISIS Hello packet. ISIS checks adjacency with protocol related TLVs including Protocols Supported TLV or IP Interface Address TLV by default. The command with no parameter disables this check.
Use this attribute to set the overload-bit in self-LSPs. If the overload-bit is set in LSPs, the router is not used as a transit router during SPF calculation. This configuration causes a router to update its own LSP with the overload bit set and causes the other routers not to use this router as a transit or forwarding router. The router continues to receive LSPs when the overload bit is set. If the on-startup option is specified, the router sets the overload bit only at startup, then clears the bit after the specified interval has elapsed. If the on-startup option is specified using the wait-for-bgp option, the overload bit is setup at startup, then the bit is cleared after the BGP router signals it has finished converging or if the router does not signal it has finished converging in 10 minutes. If there is no BGP process running, the overload bit clears immediately.
Use this attribute to redistribute reachability information from one level to the other level. If an distribute-list name is given with this command for an access list that does not exist, the routes are still redistributed.
Use this attribute to redistribute reachability information from one level to the other level. If an distribute-list name is given with this command for an access list that does not exist, the routes are still redistributed.
redistribute isis level-1 into level-2 distribute-list WORD
Configure level-2-into-1-redistributes enable
Use this attribute to redistribute reachability information from one level to the other level. If an distribute-list name is given with this command for an access list that does not exist, the routes are still redistributed.
Use this attribute to redistribute reachability information from one level to the other level. If an distribute-list name is given with this command for an access list that does not exist, the routes are still redistributed.
redistribute isis level-2 into level-1 distribute-list WORD
Configure default-route-informations originate
Use this attribute to originate reachability information to Default destination into LSP.There is no default information in Level-2 domain by default, while Level-1 router calculates default to L1L2 route during SPF calculation. This command enables to originate default route into Level-2 domain.
Reference bandwidth value constraint for flexible algorithm SPF’s automatic metric calculation. The bandwidth input ranges are 1 to 999 Kbps, 1 to 999 Mbps and 1 to 100 Gbps.
Granularity bandwidth value constraint for flexible algorithm SPF’s automatic metric calculation. The bandwidth input ranges are 1 to 999 Kbps, 1 to 999 Mbps and 1 to 100 Gbps.
no debug isis (ifsm|nfsm|pdu|lsp|spf|events|nsm|checksum|authentication|local-updates|protocol-errors|bfd|rib|lfa|ofib|asla|flexalgo|micro-loop-avoidance|all)
no debug isis (ifsm|nfsm|pdu|lsp|spf|events|nsm|checksum|authentication|local-updates|protocol-errors|bfd|rib|lfa|ofib|asla|flexalgo|micro-loop-avoidance|all)
Use this attribute to set minimum interval before regenerating the same LSP. The smaller the interval, the faster the convergence. However, this setting might cause more frequent flooding
Use this attribute to set the key chain to be used for authentication at the instance level. Authentication mode must be set to md5/text to configure the key chain.
fast-reroute tie-break (level-1|level-2) proto (ipv4) (primary-path|node-protecting|interface-disjoint|broadcast-interface-disjoint|downstream-path|secondary-path) index <1-255>
When set to true, adjacency is not advertised. The SA bit is used by a starting router to request that its neighbor suppress advertisement of the adjacency to the starting router in the neighbor’s LSPs.
Use this attribute to set the send-only option to the interface-related packets. Use this attribute before configuring the ISIS authentication mode and ISIS authentication key-chain, so that the implementation of authentication goes smoothly. That is, the routers will have more time for the keys to be configured on each router if authentication is inserted only on the packets being sent, not checked on packets being received. After all routers that must communicate are configured with this attribute, enable the authentication mode and key chain on each router.
Use this attribute to set the send-only option to the interface-related packets. Use this attribute before configuring the ISIS authentication mode and ISIS authentication key-chain, so that the implementation of authentication goes smoothly. That is, the routers will have more time for the keys to be configured on each router if authentication is inserted only on the packets being sent, not checked on packets being received. After all routers that must communicate are configured with this attribute, enable the authentication mode and key chain on each router.
Use this attribute to set the send-only option to the interface-related packets. Use this attribute before configuring the ISIS authentication mode and ISIS authentication key-chain, so that the implementation of authentication goes smoothly. That is, the routers will have more time for the keys to be configured on each router if authentication is inserted only on the packets being sent, not checked on packets being received. After all routers that must communicate are configured with this attribute, enable the authentication mode and key chain on each router.
Use this attribute to configure/unconfigure the padding of the ISIS Hello packet. ISIS pads the Hello packet by default to notify neighbors of the supported MTU size.
Use this attribute to configure/unconfigure the padding of the ISIS Hello packet. ISIS pads the Hello packet by default to notify neighbors of the supported MTU size.
Use this attribute to set the circuit type for the interface. If level-1 or level-2-only is specified in this attribute, ISIS sends only the specified level of PDUs. On the point-to-point interface, there is only one type of Hello packet, so in this case ISIS Hello will be sent regardless of circuit-type. If istype is configured as level-1 or level-2 only, routing for this instance is performed for only the specified level. In this manner, only the particular level of PDU is sent on the interface.
Use this attribute to enable ISIS IPv4 routing on the interface. This attribute is mandatory to ISIS configuration. Match the ISIS instance tag to one of existing instance.s tags, or a new instance with the tag name should be initiated, otherwise routing will not run on this interface. Configuring this attribute, the router sends ISIS Hello with IP address TLV on this interface, and IP reachability information TLV in the LSP will be updated.
Use this attribute to enable ISIS IPv6 routing on the interface. This attribute is mandatory to IPv6 ISIS configuration. Match the ISIS instance tag to one of existing instance.s tags, or a new instance with the tag name should be initiated, otherwise routing will not run on this interface.Configuring this attribute, the router sends ISIS Hello with IPv6 address TLV on this interface, and IPv6 reachability information TLV in the LSP will be updated.
Use this attribute to set the Link State Packet (LSP) transmission interval. Configuring this attribute changes the minimum interval between two consecutive LSP transmission. When flooding or some other event triggers LSP to transmit, the LSP is put on the interface queue and scheduled to transmit according to this interval. Two consecutive LSP transmissions are scheduled to have at least this interval.
Use this attribute to specify to block LSPs on the current interface. If an interface is configured as mesh group blocked,. the standard LSP database synchronization process is applied if the interface receives CSNP or PSNP.
Use this attribute to set the Hello interval in seconds. The Hello-interval is set with the hello-multiplier. Configuring this attribute changes the time interval between two consecutive Hello transmissions. If a device receives its own LSP with a maximum sequence number, then it suspends ISIS for the hold interval. DIS sends Hello transmissions at three times the rate than non-DIS. If ISIS is elected as DIS on this interface, ISIS sends Hello every 3.3 seconds. If minimal keyword is specified, Holding timer in Hello PDU is set to 1 second and Hello interval is calculated by dividing by the hello-multiplier.
Use this attribute to set multiplier for Hello holding time. Changes Holding Timer in Hello PDU. Holding timer is calculated by .Hello-Interval. multiplied by this value. If minimal keyword is specified with the Hello-Interval, the holding timer is set to 1 second and the hello-interval is calculated by dividing 1 by this value.
Use this attribute to set CSNP (Complete sequence number PDU) interval in seconds.Configuring this attribute changes the interval between two consecutive CSNP transmission. By default, CSNP is sent every 10 seconds only by LAN DIS. This parameter is only valid on broadcast interface, since periodic CSNP is only sent on broadcast interface, while CSNP on Point-to-Point interface is sent only when adjacency is initiated.
Use this attribute to set the priority for LAN DIS election. This attribute changes the priority value in LAN ISIS Hello PDUs. A lower priority value is less preferred in DIS election, and a higher priority value is more preferred
Use this attribute to set default metric for the interface. The interface default metric is put into IP reachability information TLVs, IS reachability information TLVs and IPv6 reachability TLVs in LSPs. The value is used for SPF calculation, and is applied when the metric-style is configured as .narrow.
Use this attribute to sets the tag for link-state packets (LSPs) sent out advertising routes for networks directly connected to an interface. If you do not specify a parameter, then the tag value is set for level-1-2 boundary
Use this attribute to set wide metric for the interface. Interface wide-metric is put into Extended IP reachability TLVs, Extended IS reachability TLVs and IPv6 reachability TLVs in LSPs. The value is used for SPF calculation. This value is applied when metric-style is configured as ’wide’.
Use this attribute to set the key chain to be used for authentication on the interface-related packets.Authentication mode must be set to md5/text to configure the key chain.Only one authentication key-chain is applied to an ISIS interface at a time. Authentication can be specified for an entire instance of ISIS, instead of at the interface level, by setting the authentication key-chain attribute at global level.
Use this attribute to configure PIM router-ID to uniquely identify the router.By default, PIM registers for the NSM router-id service. This attribute will override the router-id received from NSM.
Use this attribute to ignore the RP-SET priority value, and use only the hashing mechanism for RP selection. This is used to inter-operate with older Cisco IOS versions.
Use this attribute to configure the option to calculate the register checksum over the whole packet on multicast groups specified by the access control list.
ip pim (vrf NAME|) cisco-register-checksum group-list WORD
Configure cisco register checksum enable
Use this attribute to configure the option to calculate the register checksum over the whole packet. This is used to inter-operate with older Cisco IOS versions.
Use this attribute to to enable the ability of the last-hop PIM router to switch to SPT for multicast group addresses indicated by the given standard access control list.
Use this attribute to set Source Specific Multicast (SSM) and define the range of multicast IP addresses. Ranges can be either the default, which defines the SSM range as 232/8, or indicated by the given standard access control list.
This command is supported when following feature are enabled PIM Source Specific Multicast (SSM)
Use this attribute to allow a Multicast Source Discovery Protocol (MSDP) speaker that originates a Source-Active (SA) message to use the IP address of an interface as a rendezvous point (RP) address in the SA message.
This command is supported when following feature are enabled HAVE_PIM_MSDP
Use this attribute to set a Multicast Source Discovery Protocol (MSDP) peer from which to accept Source-Active (SA) messages.You can have multiple active default peers: 1. When you enter multiple ip msdp default-peer commands with a prefix-list keyword, all the default peers are used at the same time for different RP prefixes. This form is typically used in a service provider cloud that connects stub site clouds. 2. When you enter multiple ip msdp default-peer commands without a prefix-list keyword, a single active peer accepts all SA messages. If that peer fails, the next configured default peer accepts all SA messages. This form is typically used at a stub site.
This command is supported when following feature are enabled HAVE_PIM_MSDP
When set to true the device will not send bootstrap router messages over this interface. By default these are transmitted over all PIM IPv4 sparse mode (PIM-SM) enabled interfaces.
Use this attribute to configure a hello interval value other than the default. When a hello-interval is configured and hello-holdtime is not configured, or when the hello-holdtime value configured is less than the new hello-interval value, the holdtime value is modified to (3.5 * hello_interval). Otherwise, the hello-holdtime value is the configured value.
Use this attribute to enable filtering of neighbors on the interface. When configuring a neighbor filter, PIM IPv4 either not establishes adjacency with neighbor or terminates adjacency with existing neighbors, when denied by filtering access list.
Use this attribute to configure a PIM-DM State-Refresh origination interval other than the default value. The origination interval is the number of seconds between PIM-DM State Refresh control messages.
Use this attribute to configure PIM router-ID to uniquely identify the router.By default, PIM registers for the NSM router-id service. This attribute will override the router-id received from NSM.
Use this attribute to ignore the RP-SET priority value, and use only the hashing mechanism for RP selection. This is used to inter-operate with older Cisco IOS versions.
Use this attribute to configure the option to calculate the register checksum over the whole packet on multicast groups specified by the access control list.
ipv6 pim (vrf NAME|) cisco-register-checksum group-list WORD
Configure cisco register checksum enable
Use this attribute to configure the option to calculate the register checksum over the whole packet. This is used to inter-operate with older Cisco IOS versions.
Use this attribute to to enable the ability of the last-hop PIM router to switch to SPT for multicast group addresses indicated by the given standard access control list.
Use this attribute to set Source Specific Multicast (SSM) and define the range of multicast IP addresses. Ranges can be either the default, which defines the SSM range as FF3x::/96, or indicated by the given standard access control list.
This command is supported when following feature are enabled PIM Source Specific Multicast (SSM)
When set to true the device will not send bootstrap router messages over this interface. By default these are transmitted over all PIM IPv6 sparse mode (PIM-SM) enabled interfaces.
Use this attribute to configure a hello interval value other than the default. When a hello-interval is configured and hello-holdtime is not configured, or when the hello-holdtime value configured is less than the new hello-interval value, the holdtime value is modified to (3.5 * hello_interval). Otherwise, the hello-holdtime value is the configured value.
Use this attribute to enable filtering of neighbors on the interface. When configuring a neighbor filter, PIM IPv6 either not establishes adjacency with neighbor or terminates adjacency with existing neighbors, when denied by filtering access list.
Use this attribute to configure a PIM-DM State-Refresh origination interval other than the default value. The origination interval is the number of seconds between PIM-DM State Refresh control messages.
Use this command to configure the maximum number of ARP and ND cache disables on access ports configured with the port+VLAN options. This command does not limit the ARP and ND cache disables on access ports created with only the port option.
Use this attribute to set global direction(ingress/egress) for VxLAN. Ingreess means traffic coming to network side and egress means traffic going out from network side
This command is supported when following feature are enabled QOS feature
Use this attribute to know MAC address of the host.create a static route to reach a destination MAC in the VXLAN forwarding table. This command helps to supports different tenants so that they can have the same MAC/IP, but different VNIDs.This command is required for unicast tunnels to map the remote VTEP
Use this attribute to disable dynamic learning of MACs at the access port. This command also disables dynamic learning of MAC/IP from ARP/ND messages received on this access port.
This command is supported when following feature are disabled DNX feature
Use this attribute to set the time a host mac entry will persist after unconfiguring. The feature holds the MAC in hardware until BGP has withdrawn from the neighbors. This helps to reduce flooding to other access ports. This setting applies when the access port is shut down, the physical port on which the access port is down, or the access port is removed from the VNID using the no form of the map vnid command. When the MAC hold time is configured as -1, then the MAC is not removed from the hardware and is also not withdrawn from EVPN BGP
This command is supported when following feature are disabled DNX feature
Use this attribute to restrict the flood of ARP/ND packets towards remote VTEPs or other access ports.This command applies only when the ARP cache and ND cache are enabled. When the ARP cache is disabled, ARP flooding is not suppressed even if this command is given. When the ND cache is disabled, ND flooding is not disabled, even if this command is given
This command is supported when following feature are disabled DNX feature
Use this attribute to disable the ARP cache for MAC/IP. When the ARP cache is disabled on a VxLAN access port, ZebOS-XP does not reply to any ARP arriving on this port from the cache. ZebOS-XP withdraws all MAC/IPs configured/learned on this access port and removes the MAC/IP entry for this access port from the local ARP cache. ZebOS-XP also makes sure that on withdrawing the MAC/IP route, the MAC does not become unknown. If all routes for this MAC are being withdrawn because of this command, then ZebOS-XP advertises a MAC-only route. This is done so that the MAC does not become unknown and only the cache functionality becomes disabled.See also nvo vxlan max-cache-disable. Use the no form of this command to enable ARP cache for MAC/IP. Note: On enabling the cache, an IP will be in conflict, then the cache enable will fail. The conflict has to be manually removed and then the cache enabled.
This command is supported when following feature are disabled DNX feature
Use this attribute to disable ND cache for MAC/IPv6. When the ARP cache is disabled on a VxLAN access port, ZebOS-XP does not reply to any ARP arriving on this port from the cache. ZebOS-XP withdraws all MAC/IPs configured/learned on this access port and removes the MAC/IP entry for this access port from the local ARP cache. ZebOS-XP also makes sure that on withdrawing the MAC/IP route, the MAC does not become unknown. If all routes for this MAC are being withdrawn because of this command, then ZebOS-XP advertises a MAC-only route. This is done so that the MAC does not become unknown and only the cache functionality becomes disabled. Use the no form of this command to enable ND cache for MAC/IPv6. Note: On enabling the cache, an IP will be in conflict, then the cache enable will fail. The conflict has to be manually removed and then the cache enabled.
This command is supported when following feature are disabled DNX feature
Use this attribute to set the Tpid for the outer vlan. Ox88A8: IEEE 802.1ad Provider Bridging and Ox9100: IEEE 802.1Q VLAN-tagged frame with double tagging
This command is supported when following feature are disabled DNX feature
Use this attribute to disable dynamic learning of MACs at the access port. This command also disables dynamic learning of MAC/IP from ARP/ND messages received on this access port.
This command is supported when following feature are disabled DNX feature
Use this attribute to set the time a host mac entry will persist after unconfiguring. The feature holds the MAC in hardware until BGP has withdrawn from the neighbors. This helps to reduce flooding to other access ports. This setting applies when the access port is shut down, the physical port on which the access port is down, or the access port is removed from the VNID using the no form of the map vnid command. When the MAC hold time is configured as -1, then the MAC is not removed from the hardware and is also not withdrawn from EVPN BGP
This command is supported when following feature are disabled DNX feature
Use this attribute to restrict the flood of ARP/ND packets towards remote VTEPs or other access ports.This command applies only when the ARP cache and ND cache are enabled. When the ARP cache is disabled, ARP flooding is not suppressed even if this command is given. When the ND cache is disabled, ND flooding is not disabled, even if this command is given
This command is supported when following feature are disabled DNX feature
Use this attribute to disable the ARP cache for MAC/IP. When the ARP cache is disabled on a VxLAN access port, ZebOS-XP does not reply to any ARP arriving on this port from the cache. ZebOS-XP withdraws all MAC/IPs configured/learned on this access port and removes the MAC/IP entry for this access port from the local ARP cache. ZebOS-XP also makes sure that on withdrawing the MAC/IP route, the MAC does not become unknown. If all routes for this MAC are being withdrawn because of this command, then ZebOS-XP advertises a MAC-only route. This is done so that the MAC does not become unknown and only the cache functionality becomes disabled.See also nvo vxlan max-cache-disable. Use the no form of this command to enable ARP cache for MAC/IP. Note: On enabling the cache, an IP will be in conflict, then the cache enable will fail. The conflict has to be manually removed and then the cache enabled.
This command is supported when following feature are disabled DNX feature
Use this attribute to disable ND cache for MAC/IPv6. When the ARP cache is disabled on a VxLAN access port, ZebOS-XP does not reply to any ARP arriving on this port from the cache. ZebOS-XP withdraws all MAC/IPs configured/learned on this access port and removes the MAC/IP entry for this access port from the local ARP cache. ZebOS-XP also makes sure that on withdrawing the MAC/IP route, the MAC does not become unknown. If all routes for this MAC are being withdrawn because of this command, then ZebOS-XP advertises a MAC-only route. This is done so that the MAC does not become unknown and only the cache functionality becomes disabled. Use the no form of this command to enable ND cache for MAC/IPv6. Note: On enabling the cache, an IP will be in conflict, then the cache enable will fail. The conflict has to be manually removed and then the cache enabled.
This command is supported when following feature are disabled DNX feature
Use this attribute to set the Tpid for the outer vlan. Ox88A8: IEEE 802.1ad Provider Bridging and Ox9100: IEEE 802.1Q VLAN-tagged frame with double tagging
This command is supported when following feature are disabled DNX feature
Use this attribute to disable dynamic learning of MACs at the access port. This command also disables dynamic learning of MAC/IP from ARP/ND messages received on this access port.
This command is supported when following feature are disabled DNX feature
Use this attribute to set the time a host mac entry will persist after unconfiguring. The feature holds the MAC in hardware until BGP has withdrawn from the neighbors. This helps to reduce flooding to other access ports. This setting applies when the access port is shut down, the physical port on which the access port is down, or the access port is removed from the VNID using the no form of the map vnid command. When the MAC hold time is configured as -1, then the MAC is not removed from the hardware and is also not withdrawn from EVPN BGP
This command is supported when following feature are disabled DNX feature
Use this attribute to restrict the flood of ARP/ND packets towards remote VTEPs or other access ports.This command applies only when the ARP cache and ND cache are enabled. When the ARP cache is disabled, ARP flooding is not suppressed even if this command is given. When the ND cache is disabled, ND flooding is not disabled, even if this command is given
This command is supported when following feature are disabled DNX feature
Use this attribute to disable the ARP cache for MAC/IP. When the ARP cache is disabled on a VxLAN access port, ZebOS-XP does not reply to any ARP arriving on this port from the cache. ZebOS-XP withdraws all MAC/IPs configured/learned on this access port and removes the MAC/IP entry for this access port from the local ARP cache. ZebOS-XP also makes sure that on withdrawing the MAC/IP route, the MAC does not become unknown. If all routes for this MAC are being withdrawn because of this command, then ZebOS-XP advertises a MAC-only route. This is done so that the MAC does not become unknown and only the cache functionality becomes disabled.See also nvo vxlan max-cache-disable. Use the no form of this command to enable ARP cache for MAC/IP. Note: On enabling the cache, an IP will be in conflict, then the cache enable will fail. The conflict has to be manually removed and then the cache enabled.
This command is supported when following feature are disabled DNX feature
Use this attribute to disable ND cache for MAC/IPv6. When the ARP cache is disabled on a VxLAN access port, ZebOS-XP does not reply to any ARP arriving on this port from the cache. ZebOS-XP withdraws all MAC/IPs configured/learned on this access port and removes the MAC/IP entry for this access port from the local ARP cache. ZebOS-XP also makes sure that on withdrawing the MAC/IP route, the MAC does not become unknown. If all routes for this MAC are being withdrawn because of this command, then ZebOS-XP advertises a MAC-only route. This is done so that the MAC does not become unknown and only the cache functionality becomes disabled. Use the no form of this command to enable ND cache for MAC/IPv6. Note: On enabling the cache, an IP will be in conflict, then the cache enable will fail. The conflict has to be manually removed and then the cache enabled.
This command is supported when following feature are disabled DNX feature
Use this attribute to set the severity level that a message for a specific module must reach before the messages is logged. Default value is 2-critical.
logging remote server (A.B.C.D|X:X::X:X|HOSTNAME) ((0|1|2|3|4|5|6|7)|) port <1024-65535> (vrf (NAME|management)|)
Configure severity
This atribute is used to specify the kind of messages by severity level. The default value is debug-detail. The possible values for levels are as follows: [Operator] 0-emerg; 1-alert; 2-critical; 3-error; 4-notify; 5-info [Debug] 3-error; 4-warning; 5-notif; 6-debug-info; 7-debug-detail
This command is supported when following feature are enabled Virtual routing and forwarding
This attribute is used to specify the facility level used by syslog messages. The default value is local7. The possible values are local0, local1, local2, local3, local4, local5, local6, local7 and user.
Use this attribute to set the severity level for the SYSLOG messages that will be sent over SNMP traps. The Default value to this attribute is 3(error).
This command is supported when following feature are enabled VLOGD feature
username USERNAME role (network-admin|network-engineer|network-operator|network-user) password PASSWORD
Configure password hashed
Use this attribute to specify user password in encrypted form. This option is provided for reconfiguring a user password using an earlier encrypted password that was available in running configuration display or get-config payload. Users are advised not to use this option for entering passwords generated in any other method
username USERNAME role ROLE-NAME password PASSWORD
Configure user password-hashed
Use this attribute to specify user password in encrypted form. This option is provided for reconfiguring a user password using an earlier encrypted password that was available in running configuration display or get-config payload. Users are advised not to use this option for entering passwords generated in any other method
Use this attribute to specify user password in encrypted form. This option is provided for reconfiguring a user password using an earlier encrypted password that was available in running configuration display or get-config payload. Users are advised not to use this option for entering passwords generated in any other method
Use this attribute to configure one or more trusted authentication keys. If a key is trusted, the device will synchronize with a system that specifies this key in its NTP packets
ip name-server (vrf (NAME|management)|) (A.B.C.D|X:X::X:X)
Configure domain name
Use this attribute to define a list of default domain names used to complete unqualified host names. Each domain in the list is to be tried in turn. The ip domain-list command is similar to the ip domain-name command, except that with the ip domain-list command you can define a list of domains, each to be tried in turn.If there is no domain list, the default domain name specified with the ip domain-name command is used. If there is a domain list, the default domain name is not used.
Use this attribute to Specify maximum time (in seconds) that the client should wait for the duplicate address detection (DAD) to complete on an interface.
Length in seconds that will be assigned to a lease if the client requesting the lease does not ask for a specific expiration time. The default is 86400
Length in seconds that will be assigned to a lease if the client requesting the lease does not ask for a specific expiration time. The default is 86400
The IP address associated with this agent. In the case of a multi-homed agent, this should be the loopback address of the agent. The sFlowAgent address must provide SNMP connectivity to the agent. The address should be an invariant that does not change as interfaces are reconfigured, enabled, disabled,added or removed. A manager should be able to use the sFlowAgentAddress as a unique key that will identify this agent over extended periods of time so that a history can be maintained.
The statistical sampling rate for packet sampling from this source. Set to N to sample 1/Nth of the packets in the monitored flows.An agent should choose its own algorithm to introduce variance into the sampling so that exactly every Nth packet is not counted. A sampling rateof 1 counts all packets. A sampling rate of 0 disables sampling.The agent is permitted to have minimum and maximum allowable values for the sampling rate. A minimum rate lets the agent designer set an upper bound on the overhead associated with sampling, and a maximum rate may be the result of hardware restrictions (such as counter size). In addition not all values between the maximum and minimum may be realizable as the sampling rate (again because of implementation considerations).When the sampling rate is set the agent is free to adjust the value so that it lies between the maximum and minimum values and has the closest achievable value.When read, the agent must return the actual sampling rate it will be using (after the adjustments previously described). The sampling algorithm must converge so that over time the number of packets sampled approaches 1/Nth of the total number of packets in the monitored flows.
The statistical sampling rate for packet sampling from this source. Set to N to sample 1/Nth of the packets in the monitored flows.An agent should choose its own algorithm to introduce variance into the sampling so that exactly every Nth packet is not counted. A sampling rateof 1 counts all packets. A sampling rate of 0 disables sampling.The agent is permitted to have minimum and maximum allowable values for the sampling rate. A minimum rate lets the agent designer set an upper bound on the overhead associated with sampling, and a maximum rate may be the result of hardware restrictions (such as counter size). In addition not all values between the maximum and minimum may be realizable as the sampling rate (again because of implementation considerations).When the sampling rate is set the agent is free to adjust the value so that it lies between the maximum and minimum values and has the closest achievable value.When read, the agent must return the actual sampling rate it will be using (after the adjustments previously described). The sampling algorithm must converge so that over time the number of packets sampled approaches 1/Nth of the total number of packets in the monitored flows.
To enable or disable sampling on an interface after giving the sflow sampling-rate command on the same interface, or it can use the global configuration for sampling and polling-interval on this interface.
The maximum number of seconds between successive samples of the counters associated with this data source. A sampling interval of 0 disables counter sampling.The agent is permitted to have minimum and maximum allowable values for the counter polling interval. A minimum interval lets the agent designer set an upper bound on the overhead associated with polling, anda maximum interval may be the result of implementation restrictions (such as counter size).In addition notall values between the maximum and minimum may be realizable as the sampling interval (again because of implementation considerations).When the sampling rate is set the agent is free to adjust the value so that it lies between the maximum and minimum values and has the closest achievable value.When read, the agent must return the actual sampling interval it will be using (after the adjustments previously described).The sampling algorithm must converge so that over time the number of packets sampledapproaches 1/Nth of the total number of packets in the monitored flows.
The statistical sampling rate for packet sampling from this source. Set to N to sample 1/Nth of the packets in the monitored flows.An agent should choose its own algorithm to introduce variance into the sampling so that exactly every Nth packet is not counted. A sampling rateof 1 counts all packets. A sampling rate of 0 disables sampling.The agent is permitted to have minimum and maximum allowable values for the sampling rate. A minimum rate lets the agent designer set an upper bound on the overhead associated with sampling, and a maximum rate may be the result of hardware restrictions (such as counter size). In addition not all values between the maximum and minimum may be realizable as the sampling rate (again because of implementation considerations).When the sampling rate is set the agent is free to adjust the value so that it lies between the maximum and minimum values and has the closest achievable value.When read, the agent must return the actual sampling rate it will be using (after the adjustments previously described). The sampling algorithm must converge so that over time the number of packets sampled approaches 1/Nth of the total number of packets in the monitored flows.
The statistical sampling rate for packet sampling from this source. Set to N to sample 1/Nth of the packets in the monitored flows.An agent should choose its own algorithm to introduce variance into the sampling so that exactly every Nth packet is not counted. A sampling rateof 1 counts all packets. A sampling rate of 0 disables sampling.The agent is permitted to have minimum and maximum allowable values for the sampling rate. A minimum rate lets the agent designer set an upper bound on the overhead associated with sampling, and a maximum rate may be the result of hardware restrictions (such as counter size). In addition not all values between the maximum and minimum may be realizable as the sampling rate (again because of implementation considerations).When the sampling rate is set the agent is free to adjust the value so that it lies between the maximum and minimum values and has the closest achievable value.When read, the agent must return the actual sampling rate it will be using (after the adjustments previously described). The sampling algorithm must converge so that over time the number of packets sampled approaches 1/Nth of the total number of packets in the monitored flows.
no software-watchdog (nsm|ripd|ripngd|ospfd|ospf6d|isisd|hostpd|mribd|pimd|authd|mstpd|imi|onmd|hsl|oamd|vlogd|vrrpd|ndd|ribd|bgpd|l2mribd|lagd|sflow|udld|cmld|cmmd)
Use this attribute to turn on/off multicast routing on the router when turned off, the multicast protocol daemon remains present, but does not perform multicast functions. When multicast routing is enabled, the MRIB re-creates tunnels, and starts processing any VIF addition/deletion requests, MRT addition/deletion requests, and any multicast forwarding events.
Use this attribute to limit the number of multicast routes that can be added to a multicast routing table. It generates an error message when the limit is exceeded.
ip multicast (vrf WORD|) route-limit <1-2147483647>
Configure warning threshold
Use this attribute to limit the number of multicast routes that can be added to a multicast routing table. It generates an error message when the limit is exceeded. If the threshold parameter is set, a threshold warning message is generated when this threshold is exceeded and the message continues to occur until the number of mroutes reaches the limit set by the limit argument.
debug ip mrib (vrf WORD|) (all|event|vif|mrt|stats|fib-msg|register-msg|nsm-msg|mrib-msg|mtrace|mtrace-detail)
Configure ttl threshold
Use this attribute to configure the time-to-live (TTL) threshold of packets being forwarded out of an interface. Only multicast packets with a TTL value greater than the threshold are forwarded out of the interface.
Use this attribute to turn on/off multicast routing on the router when turned off, the multicast protocol daemon remains present, but does not perform multicast functions. When multicast routing is enabled, the MRIB re-creates tunnels, and starts processing any VIF addition/deletion requests, MRT addition/deletion requests, and any multicast forwarding events.
Use this attribute to limit the number of multicast routes that can be added to a multicast routing table. It generates an error message when the limit is exceeded.
Use this attribute to limit the number of multicast routes that can be added to a multicast routing table. It generates an error message when the limit is exceeded. If the threshold parameter is set, a threshold warning message is generated when this threshold is exceeded and the message continues to occur until the number of mroutes reaches the limit set by the limit argument.
Use this attribute to enable the IGMP operation on an interface. This command enables IGMP operation in standalone mode, and can be used to learn local-membership information prior to enabling a multicast routing protocol on the interface. This command will has no effect on interfaces configured for IGMP proxy.
Use this attribute to set the maximum number of group membership states, at either the router level or at the interface level. Once the specified number of group memberships is reached, all further local-memberships are ignored. Optionally, an exception access-list can be configured to specify the group-address(es) to be excluded from being subject to the limit. This command applies to interfaces configured for IGMP Layer-3 multicast protocols and IGMP Proxy. The limit applies, individually, to each of its constituent interfaces.
ip igmp (vrf NAME|) limit <1-2097152> (except WORD|)
Configure member limit
Use this attribute to set the maximum number of group membership states, at either the router level or at the interface level. Once the specified number of group memberships is reached, all further local-memberships are ignored. Optionally, an exception access-list can be configured to specify the group-address(es) to be excluded from being subject to the limit. This command applies to interfaces configured for IGMP Layer-3 multicast protocols and IGMP Proxy. The limit applies, individually, to each of its constituent interfaces.
Use this attribute to specify the static mode of defining SSM mapping. SSM mapping statically assigns sources to IGMPv1 and IGMPv2 groups to translate such (star G) groups memberships to (S,G) memberships for use with PIMSSM.This attribute applies to interfaces configured for IGMP Layer-3 multicast protocols and IGMP Proxy.
Use this attribute to enable the IGMP operation on an interface. This attributeenables IGMP operation in standalone mode, and can be used to learn local-membership information prior to enabling a multicast routing protocol on the interface. This attribute will have no effect on interfaces configured for IGMP proxy
Use this attribute to set the last-member query-count value. This attribute applies to interfaces configured for IGMP Layer-3 multicast protocols and IGMP Proxy.
Use this attribute to configure the frequency at which the router sends IGMP group-specific host query messages. This attribute applies to interfaces configured for IGMP Layer-3 multicast protocols and IGMP Proxy.
Use this attribute to set the timeout period before the router takes over as the querier for the interface after the previous querier has stopped querying. This attribute applies to interfaces configured for IGMP Layer-3 multicast protocols and IGMP Proxy.
Use this attribute to set the frequency of sending IGMP host query messages. This attribute applies to interfaces configured for IGMP Layer-3 multicast protocols and IGMP Proxy.
Use this attribute to set the maximum response time advertised in IGMP queries. This attribute applies to interfaces configured for IGMP Layer-3 multicast protocols and IGMP Proxy.
Use this attribute to set the robustness variable value on an interface. This attribute applies to interfaces configured for IGMP Layer-3 multicast protocols and IGMP Proxy.
Use this attribute to set the current IGMP protocol version on an interface. This attribute applies to interfaces configured for IGMP Layer-3 multicast protocols and IGMP Proxy.
Use this attribute to designate an interface to be the IGMP proxy-service (upstream host-side) interface, thus enabling IGMP host-side protocol operation on this interface. All associated downstream router-side interfaces will have their memberships consolidated on this interface, according to IGMP host-side functionality
Use this attribute to specify the IGMP Proxy service interface with which to be associated. IGMP router-side protocol operation is enabled only when the specified upstream proxy-service interface is functional.
ip igmp proxy unsolicited-report-interval <1000-25500>
Configure limit exception acl
Use this attribute to set the maximum number of group membership states, at either the router level or at the interface level. Once the specified number of group memberships is reached, all further local-memberships are ignored. Optionally, an exception access-list can be configured to specify the group-address to be excluded from being subject to the limit.
Use this attribute to set the maximum number of group membership states, at either the router level or at the interface level. Once the specified number of group memberships is reached, all further local-memberships are ignored. Optionally, an exception access-list can be configured to specify the group-address to be excluded from being subject to the limit.
Use this attribute to control the multicast local-membership groups learned on an interface. This attribute applies to interfaces configured for IGMP Layer-3 multicast protocols, IGMP proxy.
In IGMP version 2, use this attribute to minimize the leave latency of IGMP memberships. This attribute is used when only one receiver host is connected to each interface. This command applies to interfaces configured for IGMP Layer-3 multicast protocols, IGMP Proxy.
Use this attribute to statically configure group membership entries on an interface. To statically add only a group membership, do not specify any parameters. This attribute applies to IGMP operation on a specific interface to statically add group and/or source records on a VLAN interface to statically add group and/or source records.
Use this attribute to disable IGMP Snooping. When this attribute is given in the Configure mode, IGMP snooping is enabled at switch level on all the vlans in switch. When this attribute is given at the VLAN interface level, IGMP Snooping is enabled for that VLAN.
Use this attribute to enable IGMP Snooping fast-leave processing. Fast-leave processing is analogous to immediateleave processing the IGMP group-membership is removed, as soon as an IGMP leave group message is received without sending out a group-specific query
Use this attribute to enable IGMP snooping querier functionality on a VLAN when IGMP is not enabled on the particular VLAN. When enabled, the IGMP Snooping querier sends out periodic IGMP queries for all interfaces on that VLAN.The IGMP Snooping querier uses the 0.0.0.0 source IP address, because it only masquerades as a proxy IGMP querier for faster network convergence. It does not start, or automatically cease, the IGMP Querier operation if it detects query message(s) from a multicast router. It restarts as the IGMP Snooping querier if no queries are seen within the other querier interval.
Use this attribute to enable IGMP Snooping fast-leave processing. Fast-leave processing is analogous to immediateleave processing the IGMP group-membership is removed, as soon as an IGMP leave group message is received without sending out a group-specific query
Use this attribute to enable IGMP snooping querier functionality on a VLAN when IGMP is not enabled on the particular VLAN. When enabled, the IGMP Snooping querier sends out periodic IGMP queries for all interfaces on that VLAN.The IGMP Snooping querier uses the 0.0.0.0 source IP address, because it only masquerades as a proxy IGMP querier for faster network convergence. It does not start, or automatically cease, the IGMP Querier operation if it detects query message(s) from a multicast router. It restarts as the IGMP Snooping querier if no queries are seen within the other querier interval.
no debug igmp snooping (decode|encode|events|fsm|tib|all)
IPI-MLD-SNOOPING
Configure disable mld snooping
Use this attribute to enable MLD Snooping. When this command is given in the Configure mode, MLD Snooping is enabled at the switch level. When this attribute is given at the VLAN interface level, 5MLD Snooping is enabled for that VLAN.
Use this attribute to enable MLD Snooping fast-leave processing. Fast-leave processing is analogous to immediateleave processing the MLD group-membership is removed, as soon as an MLD leave group message is received without sending out a group-specific query.
Use this attribute to enable MLD querier operation on a subnet (VLAN) when no multicast routing protocol is configured in the subnet VLAN. When enabled, the MLD Snooping querier sends out periodic MLD queries for all interfaces on that VLAN. The MLD Snooping querier uses the 0.0.0.0 source IP address, because it masquerades as a proxy MLD querier for faster network convergence. It does not start or automatically cease the MLD querier operation if it detects a query message from a multicast router. It restarts as MLD snooping querier if no queries are seen within another querier interval
Use this attribute to set the maximum number of group membership states at the router level. Once the specified number of group memberships is reached, all further local-memberships are ignored. Optionally, an exception access-list can be configured to specify the group-address(es) to be excluded from being subject to the limit. This command applies to interfaces configured for MLD Layer-3 multicast protocols and MLD Proxy. The limit applies, individually, to each of its constituent interfaces.
Use this attribute to set the maximum number of group membership states at the router level. Once the specified number of group memberships is reached, all further local-memberships are ignored. Optionally, an exception access-list can be configured to specify the group-address(es) to be excluded from being subject to the limit. This command applies to interfaces configured for MLD Layer-3 multicast protocols and MLD Proxy. The limit applies, individually, to each of its constituent interfaces.
Use this attribute to specify the static mcast source for SSM mapping. SSM mapping statically assigns sources to MLDv1 groups to translate such (star G) groups memberships to (S,G) memberships for use with PIM-SSM.This attribute applies to interfaces configured for MLD Layer-3 multicast protocols and MLD Proxy.
Use this attribute to enable the MLD protocol operation on an interface. This attribute enables MLD protocol operation in stand-alone mode, and can be used to learn local-membership information prior to enabling a multicast routing protocol on the interface. This attribute will have no effect on interfaces configured for MLD Proxy.
Use this attribute to set the last-member query-count value. This attribute applies to interfaces configured for MLD Layer-3 multicast protocols, MLD Snooping, or MLD Proxy.
Use this attribute to set the frequency at which the router sends MLD group-specific host query messages. This attribute applies to interfaces configured for MLD Layer-3 multicast protocols, MLD Snooping, or MLD Proxy
Use this attribute to configure the timeout period before the router takes over as the querier for the interface after the previous querier has stopped querying. This attribute applies to interfaces configured for MLD Layer-3 multicast protocols, MLD Snooping, or MLD Proxy.
Use this attribute to set the frequency of sending MLD host query messages. This attribute applies to interfaces configured for MLD Layer-3 multicast protocols, MLD Snooping, or MLD Proxy.
Use this attribute to set the maximum response time advertised in MLD queries. This attribute applies to interfaces configured for MLD Layer-3 multicast protocols, MLD Snooping, or MLD Proxy.
Use this attribute to set the robustness variable value on an interface. This attribute applies to interfaces configured for MLD Layer-3 multicast protocols, MLD Snooping, or MLD Proxy.
Use this attribute to set the current MLD protocol version on an interface. This attribute applies to interfaces configured for MLD Layer-3 multicast protocols, MLD Snooping, or MLD Proxy.
Use this attribute to designate an interface to be the MLD proxy-service upstream host-side interface, thus enabling MLD host-side protocol operation on this interface. All associated downstream router-side interfaces will have their memberships consolidatedon this interface, according to MLD host-side functionality. This attribute should not be used when configuring interfaces enabled for MLD in association with a multicast-routing protocol, otherwise the behavior will be undefined.
Use this attribute to specify the MLD Proxy service (upstream host-side) interface with which to be associated. MLD router-side protocol operation is enabled only when the specified upstream proxy-service interface is functional. This attribute should not be configured on interfaces enabled for MLD in association with a multicast routing protocol otherwise, the behavior will be undefined.
Use this attribute to set the maximum number of group membership states, at either the router level or at the interface level. Once the specified number of group memberships is reached, all further local-memberships are ignored. Optionally, an exception access-list can be configured to specify the group-address to be excluded from being subject to the limit.
Use this attribute to set the limit on the maximum number of group membership states at either the router level, or forthe specified interface. Once the specified number of group memberships is reached, all further local-memberships will be ignored. Optionally, an exception access-list can be configured to specify the group-address(es) to be excluded from being subject to the limit.
Use this attribute to control the multicast local-membership groups learned on an interface. This attribute applies to interfaces configured for MLD Layer-3 multicast protocols, MLD proxy.
In MLD version 2, use this attribute to minimize the leave latency of MLD memberships. This attribute is used when only one receiver host is connected to each interface. This command applies to interfaces configured for MLD Layer-3 multicast protocols, MLD Proxy.
Use this attribute to statically configure IPv6 group membership entries on an interface. To statically add only a group membership, do not specify any parameters. This attribute applies to MLD operation on a specific interface to statically add group and/or source records or to MLD Snooping on a VLAN interface to statically add group and/or source records.
Use this attribute to enter the route-map mode and to permit or deny match/set operations.If deny is specified, and the match criteria are met, the route is not redistributed, and any other route maps with the same map tag are not examined.If permit is specified, and the match criteria are met, the route is redistributed as specified by the set actions. If the match criteria are not met, the next route map with the same tag is tested.
The continue clause provides the capability to execute additional entries in a route map after an entry is executed with a successful match and set clauses Example the continue command allows multiple entries to be evaluated within a single route-map.
Use this attribute to match a metric of a route. The route specified by the policies might not be the same as specified by the routing protocols. Setting policies enable packets to take different routes depending on their length or content. Packet forwarding based on configured policies overrides packet forwarding specified in routing tables.
Use this command to set a tag value. The parameter is the route tag that is labeled by another routing protocol (BGP or other IGP when redistributing), because AS-external-LSA has a route-tag field in its LSAs. In addition, when using route-map, OcNOS can tag the LSAs with the appropriate tag value. Sometimes the tag matches with using route-map and sometimes, the value may be used by another application.
Use this attribute to match an external route type. AS-external LSA is either Type-1 or Type-2. External type-1 matches only Type 1 external routes and external type-2 matches only Type 2 external routes.
Use this command to match an autonomous system path access list. This command specifies the autonomous system path to be matched. If there is a match for the specified AS path, and permit is specified, the route is redistributed or controlled, as specified by the set action. If the match criteria are met, and deny is specified, the route is not redistributed or controlled. If the match criteria are not met then the route is neither accepted nor forwarded,irrespective of permit or deny specifications.The route specified by the policies might not be the same as specified by the routing protocols. Setting policies enable packets to take different routes, depending on their length or content. Packet forwarding based on configured policies overrides packet forwarding specified in routing tables.
Use this attribute to match origin code.The origin attribute defines the origin of the path information. The egp parameter is indicated as an e in the routing table, and it indicates that the origin of the information is learned via EGP (Exterior Gateway Protocol). The igp parameter is indicated as an i in the routing table, and it indicates the origin of the path information is interior to the originating AS. The incomplete parameter is indicated as a ? in the routing table, and indicates that the origin of the path information is unknown or learned through other means. If a static route is redistributed into BGP, the origin of the route is incomplete.This command specifies the origin to be matched. If there is a match for the specified origin, and permit is specified when you created the route-map, the route is redistributed or controlled as specified by the set action. If the match criteria are met, and deny is specified, the route is not redistributed or controlled. If the match criteria are not met, the route is neither accepted nor forwarded, irrespective of permit or deny specifications. The route specified by the policies might not be the same as specified by the routing protocols. Setting policies enable packets to take different routes depending on their length or content. Packet forwarding based on configured policies overrides packet forwarding specified in routing tables
Use this attribute to specify the community to be matched.Communities are used to group and filter routes. They are designed to provide the ability to apply policies to large numbers of routes by using match and set commands.Community lists are used to identify and filter routes by their common attributes. This command allows the matching based on community lists.The values set by the match community command overrides the global values. The route that does not match at least one match clause is ignored.
match community (WORD|<1-99>|<100-500>) ((exact-match)|)
Configure extended community identifier
Use this attribute to match BGP external community list.Communities are used to group and filter routes. They are designed to provide the ability to apply policies to large numbers of routes by using match and set commands. Community lists are used to identify and filter routes by their common attributes. This command allows the matching based on community lists. The values set by this command overrides the global values. The route that does not match at least one match clause is ignored
Use this attribute to specify the community to be matched.Communities are used to group and filter routes. They are designed to provide the ability to apply policies to large numbers of routes by using match and set commands.Community lists are used to identify and filter routes by their common attributes. This command allows the matching based on community lists.The values set by the match community command overrides the global values. The route that does not match at least one match clause is ignored.
match large-community (WORD|<1-99>|<100-500>) ((exact-match)|)
Configure ip access list name
Use this attribute to specify the match address of route. If there is a match for the specified IP address, and permit is specified, the route is redistributed or controlled, as specified by the set action. If the match criteria are met, and deny is specified then the route is not redistributed or controlled. If the match criteria are not met, the route is neither accepted nor forwarded, irrespective of permit or deny specifications.The route specified by the policies might not be the same as specified by the routing protocols. Setting policies enable packets to take different routes, depending on their length or content. Packet forwarding based on configured policies overrides packet forwarding specified in routing tables.
Use this attribute to match entries of a prefix-list. The route specified by the policies might not be the same as specified by the routing protocols. Setting policies enable packets to take different routes depending on their length or content. Packet forwarding based on configured policies overrides packet forwarding specified in routing tables.
Use this attribute to specify a next-hop address to be matched in a route-map. The route specified by the policies might not be the same as specified by the routing protocols. Setting policies enable packets to take different routes depending on their length or content. Packet forwarding based on configured policies overrides packet forwarding specified in routing tables.
Use this attribute to specify the match address of route. The route specified by the policies might not be the same as specified by the routing protocols. Setting policies enable packets to take different routes depending on their length or content. Packet forwarding based on configured policies overrides packet forwarding specified in routing tables
This command is supported when following feature are enabled IPV6 feature
Use this attribute to match entries of a prefix-list. The route specified by the policies might not be the same as specified by the routing protocols. Setting policies enable packets to take different routes, depending on their length or content. Packet forwarding based on configured policies overrides packet forwarding specified in routing tables.
This command is supported when following feature are enabled IPV6 feature
Use this attribute to match entries of a prefix-list. The route specified by the policies might not be the same as specified by the routing protocols. Setting policies enable packets to take different routes depending on their length or content. Packet forwarding based on configured policies overrides packet forwarding specified in routing tables.
This command is supported when following feature are enabled IPV6 feature
Use this attribute to specify the next-hop address to be matched. The route specified by the policies might not be the same as specified by the routing protocols. Setting policies enable packets to take different routes depending on their length or content. Packet forwarding based on configured policies overrides packet forwarding specified in routing tables.
This command is supported when following feature are enabled IPV6 feature
Use this command to set a metric value for a route and influence external neighbors about the preferred path into an Autonomous System (AS). The preferred path is the one with a lower metric value. A router compares metrics for paths from neighbors in the same ASs. To compare metrics from neighbors coming from different ASs, use the bgp always-compare-med command.To use this command, you must first have a match clause. Match and set commands set the conditions for redistributing routes from one routing protocol to another. The match command specifies the match criteria under which redistribution is allowed for the current route-map. The set command specifies the set redistribution actions to be performed, if the match criteria are met.If the packets do not match any of the defined criteria, they are routed through the normal routing process.
Use this attributes to discard routes based on policy/rules configured for a route map.Route maps can be applied to BGP neighbors. When this command is given for a route map and that route map is applied to a BGP neighbor, the discard route entries are added by BGP for the prefix permitted by the route map.
Use this attribute to set a tag value. The parameter is the route tag that is labeled by another routing protocol (BGP or other IGP when redistributing), because AS-external-LSA has a route-tag field in its LSAs. In addition, when using route-map, OcNOS can tag the LSAs with the appropriate tag value. Sometimes the tag matches with using route-map, and sometimes, the value may be used by another application.
Use this attribute to set weights for the routing table. The weight value is used to assist in best path selection. It is assigned locally to a router. When there are several routes with a common destination, the routes with a higher weight value are preferred. To use this command, you must first have a match clause. Match and set commands set the conditions for redistributing routes from one routing protocol to another. The match command specifies the match criteria under which redistribution is allowed for the current route-map. The set command specifies the set redistribution actions to be performed, if the match criteria are met.
Use this command to set the BGP origin code. The origin attribute defines the origin of the path information. To use this command, you must first have a match clause. Match and set commands set the conditions for redistributing routes from one routing protocol to another. The match command specifies the match criteria under which redistribution is allowed for the current route-map. The set command specifies the set redistribution actions to be performed, if the match criteria are met.If the packets do not match any of the defined criteria, they are routed through the normal routing process.
Use this command to set the metric type for the destination routing protocol. Select a type to be either Type-1 or Type2 in the AS-external-LSA when the route-map matches the condition.
Use this command to modify an autonomous system path for a route. By specifying the length of the AS-Path, the router influences the best path selection by a neighbor
Use this attribute to set an atomic aggregate attribute.To use this command, you must first have a match clause. Match and set commands set the conditions for redistributing routes from one routing protocol to another. The match command specifies the match criteria under which redistribution is allowed for the current route-map. The set command specifies the set redistribution actions to be performed, if the match criteria are met.If the packets do not match any of the defined criteria, they are routed through the normal routing process.
set large-comm-list (WORD|<1-99>|<100-500>) delete
Configure bgp originator id
Use this command to set the originator ID attribute. To use this command, you must first have a match clause. Match and set commands set the conditions for redistributing routes from one routing protocol to another. The match command specifies the match criteria under which redistribution is allowed for the current route-map. The set command specifies the set redistribution actions to be performed, if the match criteria are met.If the packets do not match any of the defined criteria, they are routed through the normal routing process
Use this attributes to modify an autonomous system path for a route. By specifying the length of the AS-Path, the router influences the best path selection by a neighbor.Use this command to prepend an AS path string to routes increasing the AS path length.To use this command, you must first give the match and set commands configure the conditions for redistributing routes from one routing protocol to another: 1. The match command specifies the match criteria under which redistribution is allowed for the current route-map. 2.The set command specifies the set redistribution actions to be performed if the match criteria are met.If the packets do not match any of the defined criteria, they are routed through the normal routing process.
Use this command to set a VPNv4 next-hop address. To use this command, you must first have a match clause. Match and set commands set the conditions for redistributing routes from one routing protocol to another. The match command specifies the match criteria under which redistribution is allowed for the current route-map. The set command specifies the set redistribution actions to be performed, if the match criteria are met. If the packets do not match any of the defined criteria, they are routed through the normal routing process.
set dampening <1-45> <1-20000> <1-20000> <1-255> <1-45>
Configure enable dampening
Use this attribute to enable route dampening and set various parameters. Route dampening minimizes the instability caused by route flapping. A penalty is added for every flap in a flapping route. As soon as the total penalty reaches the suppress limit the advertisement of the route is suppressed. This penalty is decayed according to the configured half time value. Once the penalty is lower than the reuse limit, the route advertisement is unsuppressed. The dampening information is purged from the router once the penalty becomes less than half of the reuse limit.Reachability half-life time for the penalty in minutes. The time for the penalty to decrease to one-half of its current value.
Autonomous system (AS) number and network number entered in the 4-byte new community format. This value is configured with two 2-byte numbers separated by a colon. A number from 1 to 65535 can be entered as each 2-byte number. A single community can be entered or multiple communities can be entered, each separated by a space.
ethertype name (ip|x25|arp|g8bpqx25|ieeepup|ieeeaddrtrans|dec|decdnadumpload|decdnaremoteconsole|decdnarouting|declat|decdiagnostics|rarp|atalkddp|atalkaarp|ipx|ipv6|atmmulti|pppdiscovery|pppsession|atmtransport|ETHERNAME) priority <0-7>
Configure ether value
Use this attribute to configure priority
This command is supported when following feature are enabled DCB feature
Use this attribute to classify traffic based on the Differentiated Services Control Protocol (DSCP) value. Warning: In CLI show running, DSCP values with well-known names (ex.: af11, cs0) will be displayed as such. On Netconf, DSCP values will always be numeric.
Use this attribute to classify traffic based on the precedence value. Warning: In CLI show running, precedence values with well-known names (ex.: priority, immediate) will be displayed as such. On Netconf, precedence values will always be numeric.
Use this attribute to classify traffic based on the Differentiated Services Control Protocol (DSCP) value. The DSCP value range is 0-63. Warning: In CLI show running, DSCP values with well-known names (ex.: af11, cs0) will be displayed as such. On Netconf, DSCP values will always be numeric. The string type allow up to 8 characters on well-known name.
match dscp (default|cs1|af11|af12|af13|cs2|af21|af22|af23|cs3|af31|af32|af33|cs4|af41|af42|af43|cs5|ef|cs6|cs7|<0-63>)
Configure precedence all
Use this attribute to classify traffic based on the precedence value. The precedence value range is 0-7. Warning: In CLI show running, precedence values with well-known names (ex.: priority, immediate) will be displayed as such. On Netconf, precedence values will always be numeric. The string type allow up to 13 characters on well-known name.
Use this attribute to match traffic classes set action as change precedence in the egress packet to the defined value. The precedence value range is 0-7. Warning: In CLI show running, precedence values with well-known names (ex.: priority, immediate) will be displayed as such. On Netconf, precedence values will always be numeric. The string type allow up to 13 characters on well-known name.
Use this attribute to match traffic classes set action as change DSCP in the egress packet to the defined value. The DSCP value range is 0-63. Warning: In CLI show running, DSCP values with well-known names (ex.: af11, cs0) will be displayed as such. On Netconf, DSCP values will always be numeric. The string type allow up to 8 characters on well-known name.
Use this attribute to enable remarking only bridged packets. The DSCP value range is 0-63. Warning: In CLI show running, DSCP values with well-known names (ex.: af11, cs0) will be displayed as such. On Netconf, DSCP values will always be numeric. The string type allow up to 8 characters on well-known name.
Use this attribute to set the MC-LAG mode. active-standby: The interface is ready to transition from active to standby state should a failure occur in the other node.
Use this attribute to set the timer for MC-LAG switchover revertive type. After Revertive timer expires Slave will handover the control to Master Node. If a failure happens that triggers a switchover, after failure recovery the initially-active node becomes active again. Default switchover type is revertive 10s.
Use this attribute to set the MC-LAG switchover to non-revertive type. Do not switch back to the initially-active node after failure recovery. Default switchover type is revertive 10s.
Use this attribute to enable MAC authentication globally. If MAC authentication is not enabled, other MAC authentication related commands throw an error when issued.
This command is supported when following feature are enabled HAVE_AUTHD feature
Use this attribute to set the protocol version of dot1x to 1 or 2. The protocol version must be synchronized with the Xsupplicant being used in that interface.
This command is supported when following feature are enabled HAVE_AUTHD feature
Use this attribute to set the quiet-period time interval.When a switch cannot authenticate a client, the switch remains idle for a quiet-period interval of time, then tries again. By administratively changing the quiet-period interval, by entering a lower number than the default, a faster response time can be provided
This command is supported when following feature are enabled HAVE_AUTHD feature
Use this attribute to set the maximum reauthentication value, which sets the maximum number of reauthentication attempts after which the port will be unauthorized.
This command is supported when following feature are enabled HAVE_AUTHD feature
Use this attribute to either enable or disable MAC aging. When enabled, a MAC entry is added to the forwarding database, with aging time equal to the bridge aging time. Otherwise, the MAC entry will not be aged out. If MAC aging is disabled, the MAC entry will not be aged out
This command is supported when following feature are enabled MAC_AUTH feature,HAVE_AUTHD feature
Use this attribute to set the global timeout which is how long the device waits for a response from a RADIUS server before declaring a timeout failure.
This command is supported when following feature are enabled OpenSSL crypto library available
(<1-268435453>|) (deny|permit) response ip (any|host A.B.C.D|A.B.C.D/M|A.B.C.D A.B.C.D) (any|host A.B.C.D|A.B.C.D/M|A.B.C.D A.B.C.D) mac any any (vlan <1-4094>|) (inner-vlan <1-4094>|) ((log|sample)|)
Configure name
Use this attribute to indicate any source address.
(<1-268435453>|) (deny|permit) response ip (any) (any) mac any host (XX-XX-XX-XX-XX-XX|XX:XX:XX:XX:XX:XX|XXXX.XXXX.XXXX) (vlan <1-4094>|) (inner-vlan <1-4094>|) ((log|sample)|)
Configure type
Use this attribute to indicate any source address.
(<1-268435453>|) (deny|permit) response ip (any) (any) mac any (XX-XX-XX-XX-XX-XX|XX:XX:XX:XX:XX:XX|XXXX.XXXX.XXXX) (XX-XX-XX-XX-XX-XX|XX:XX:XX:XX:XX:XX|XXXX.XXXX.XXXX) (vlan <1-4094>|) (inner-vlan <1-4094>|) ((log|sample)|)
(<1-268435453>|) (deny|permit) response ip (any) (any) mac host (XX-XX-XX-XX-XX-XX|XX:XX:XX:XX:XX:XX|XXXX.XXXX.XXXX) any (vlan <1-4094>|) (inner-vlan <1-4094>|) ((log|sample)|)
(<1-268435453>|) (deny|permit) response ip (any) (any) mac (XX-XX-XX-XX-XX-XX|XX:XX:XX:XX:XX:XX|XXXX.XXXX.XXXX) (XX-XX-XX-XX-XX-XX|XX:XX:XX:XX:XX:XX|XXXX.XXXX.XXXX) any (vlan <1-4094>|) (inner-vlan <1-4094>|) ((log|sample)|)
Use this attribute to perform the split-horizon action on the interface. Deleting this attribute would set the split-horizon to poisoned reverse which is the default value.
Use this attribute to perform the split-horizon action on the interface. Deleting this attribute would set the split-horizon to poisoned reverse which is the default value.
Use this attribute to set the administrative distance. The administrative distance is a feature used by the routers to select the path when there are two or more different routes to the same destination from two different routing protocols. A smaller administrative distance indicating a more reliable protocol
Use this attribute to specify a link local address of neighbor router. It is used for each connected point-to-point link. This command exchanges non-broadcast routing information. It can be used multiple times for additional neighbors
Use this attribute to set the administrative distance. The administrative distance is a feature used by the routers to select the path when there are two or more different routes to the same destination from two different routing protocols. A smaller administrative distance indicating a more reliable protocol
Use this attribute to specify a link local address of neighbor router. It is used for each connected point-to-point link. This command exchanges non-broadcast routing information. It can be used multiple times for additional neighbors
Use this attribute to set the ARP aging timeout. The bridge aging time affects the ARP entries which are dependent upon the MAC addresses in hardware. If a MAC address ages out, it causes the corresponding ARP entry to refresh.
In revertive mode the ’wait to restore’ (WTR) timer is used to prevent frequent operation of the protection switching due to intermittent signal failure defects. When recovering from a Signal fail, the delay timer must be long enough to allow the recovering network to become stable. WTR timer is activated on RPL owner node. When WTR timer is expired RPL owner node initiates the reversion process by transmitting an R-APS (NR, RB) message.
This command is supported when following feature are enabled ERPS V2 feature
The hold-off timer is used to coordinate the timing of protection switches. When a new defect or more severe defect occurs (new SF), this event is not to be reported immediately to protection switching if the provisioned hold-off timer value is non-zero. Instead, the hold-off timer is started. When the hold-off timer expires, the trail that started the timer is checked as to whether a defect still exists. If one does exist, that defect is reported to protection switching. Hold off timer values SHOULD be specified in multiple of 100.
This command is supported when following feature are enabled ERPS V2 feature
The guard time is used to prevent Ethernet ring nodes from acting upon outdated R-APS messages and prevents the possibility of forming a closed loop. This timer period SHOULD be greater than the maximum expected forwarding delay in which an R-APS message traverses the entire ring. The period of the guard timer MAY be configured by the operator in 10 ms steps between 10 ms and 2 seconds.
This command is supported when following feature are enabled ERPS V2 feature
This leaf defines G.8032 ring protection mode. A ring may operate in revertive or non-revertive mode. In revertive operation, after the condition(s) causing a switch has cleared, the traffic channel is restored to the working transport entity, i.e., blocked on the RPL. In non-revertive operation, the traffic channel continues to use the RPL, if it has not failed, after a switch condition has cleared.
This command is supported when following feature are enabled ERPS V2 feature
G.8032 ring profile name. If this profile exists in the profile configuration list, profile parameters will be imported from it, default values will be used otherwise.
This command is supported when following feature are enabled ERPS V2 feature
Defines type of a ethernet ring. A ring can be configured as major ring where ring nodes are connected in closed loop or as a sub-ring when a ring may not have a complete closed loop
This command is supported when following feature are enabled ERPS V2 feature
List of VLAN-IDs, protected by ring instance. For example ’2, 3-7, 9, 10-100’ VLAN-IDs MUST not overlap with VLAN-IDs of any other instance of the same ring.
This command is supported when following feature are enabled ERPS V2 feature
This parameter specifies the ERPS instance on major ring which allows the RAPS messages of Sub-ring, so RAPS message will be sent to other nodes in the sub-ring
This command is supported when following feature are enabled ERPS V2 feature
Integer that is unique among all the MEPs in the same MA. Other definition is: a small integer, unique over a given Maintenance Association, identifying a specific Maintenance association End Point
This command is supported when following feature are enabled CFM feature
ethernet cfm mep (down|up) mpid <1-8191> active (false|true) IFNAME
Configure direction
Integer that is unique among all the MEPs in the same MA. Other definition is: a small integer, unique over a given Maintenance Association, identifying a specific Maintenance association End Point
This command is supported when following feature are enabled CFM feature
Integer that is unique among all the MEPs in the same MA. Other definition is: a small integer, unique over a given Maintenance Association, identifying a specific Maintenance association End Point
This command is supported when following feature are enabled CFM feature
Attribute to specify the mode in which CLI should be allowed/denied. Command prompt string such as ’config-router’ or ’config-if’, deny/Permit access to the command only in this mode.
Attribute to specify the mode in which CLI should be allowed/denied. Command prompt string such as ’config-router’ or ’config-if’, deny/Permit access to the command only in this mode.
Use this attribute to create a TACACS+ Role-Based Authorization (RBAC) role and to switch to RBAC role mode. End-user cannot specify one of these roles already defined in OcNOS: network-admin network-user network-operator network-engineer For more about these built-in roles, see ’username’ CLI configuration
Use this attribute to control terminal monitor initial behavior as disable when user session starts. The executive command terminal monitor has precedence over configuration command.
This command is supported when following feature are enabled IMI feature