r1.9 svss command reference
TRANSCRIPT
-
8/2/2019 R1.9 SVSS Command Reference
1/462
NetSocket Service Visibility Solution Suite
Command Reference
Release 1.9
-
8/2/2019 R1.9 SVSS Command Reference
2/462
THE PRODUCT INFORMATION PRESENTED WITHIN THIS DOCUMENT IS SUBJECT TO CHANGE
WITHOUT NOTICE. ALL PRODUCT INFORMATION IS BELIEVED TO BE ACCURATE, BUT IS PROVIDED
WITHOUT WARRANTY OF ANY KIND, EXPRESSED OR IMPLIED. NETSOCKET, INC. ACCEPTS NO
RESPONSIBILITY FOR USERS SPECIFIC APPLICATION OF THE PRODUCT(S) FEATURED WITHIN THIS
DOCUMENT. NEITHER NETSOCKET, INC. NOR ITS SUPPLIERS SHALL BE LIABLE FOR DAMAGES OF
ANY KIND, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR REVENUE, ARISING FROM THE
USE OF THE FEATURED PRODUCT(S) AND ASSOCIATED INFORMATION PRESENTED WITHIN THIS
DOCUMENT.
NETSOCKET INC., CONFIDENTIAL
THE INFORMATION CONTAINED IN THIS DOCUMENT IS THE PROPERTY OF NETSOCKET. EXCEPT AS
SPECIFICALLY AUTHORIZED IN WRITING BY NETSOCKET, THE HOLDER OF
THIS DOCUMENT SHALL KEEP THE INFORMATION CONTAINED HEREIN CONFIDENTIAL AND SHALL
PROTECT SAME IN WHOLE OR IN PART FROM DISCLOSURE AND DISSEMINATION
TO THIRD PARTIES AND USE SAME FOR EVALUATION, OPERATION AND MAINTENANCE PURPOSES
ONLY.
THE CONTENT OF THIS DOCUMENT IS PROVIDED FOR INFORMATION PURPOSES ONLY AND IS
SUBJECT TO MODIFICATION. IT DOES NOT CONSTITUTE ANY REPRESENTATION OR WARRANTY
FROM NETSOCKET AS TO THE CONTENT OR ACCURACY OF THE
INFORMATION CONTAINED HEREIN, INCLUDING BUT NOT LIMITED TO THE SUITABILITY AND
PERFORMANCES OF THE PRODUCT OR ITS INTENDED APPLICATION.
NetSocket 2012
-
8/2/2019 R1.9 SVSS Command Reference
3/462
NetSocket, Inc. - Proprietary and Confidential i
Table of Contents1 Introduction ................................................................................................................................ 1-1
1.1 About the Document ........................................................................................................ 1-11.2 Audience .......................................................................................................................... 1-11.3 How to Get Help .............................................................................................................. 1-11.4 Product Documentation ................................................................................................... 1-1
2 System Overview ...................................................................................................................... 2-12.1 Session2Topology Correlation..................................................................................... 2-12.2 SVM ................................................................................................................................. 2-22.3 SVP .................................................................................................................................. 2-22.4 SVA .................................................................................................................................. 2-2
2.4.1 SVA Standard IP MOS Monitoring ...................................................................... 2-32.4.2 SVA IP MOS Plus Analogue ............................................................................... 2-3
2.5 SVM Dashboard .............................................................................................................. 2-33 Initial System Access ................................................................................................................ 3-1
3.1 1U Server ......................................................................................................................... 3-13.2 2U Server ......................................................................................................................... 3-23.3 CLI Access using the Default IP Address ........................................................................ 3-23.4 CLI Access using the Serial Ports ................................................................................... 3-3
3.4.1 System Serial Ports ............................................................................................. 3-33.4.2 Accessing the CLI from a Serial Port .................................................................. 3-4
3.5 CLI Access using a Monitor and Keyboard ..................................................................... 3-44 CLI Basics ................................................................................................................................. 4-1
4.1 Command Structure ........................................................................................................ 4-14.1.1 Command Classes .............................................................................................. 4-14.1.2 Command Modes ................................................................................................ 4-14.1.3 Command Syntax ................................................................................................ 4-3
4.2 CLI Fundamentals ........................................................................................................... 4-44.2.1 CLI Functions ...................................................................................................... 4-44.2.2 CLI Customization ............................................................................................... 4-7
5 CLI Command Definitions ......................................................................................................... 5-1
-
8/2/2019 R1.9 SVSS Command Reference
4/462
NetSocket, Inc. - Proprietary and Confidential 1-1
1 IntroductionThe NetSocket solution consists of the Service Visibility Manager (SVM), the Service VisibilityPoint (SVP), and the Service Visibility Analyzer (SVA). This document provides basicdescription of the SVM, SVP, and SVA, as well as a web-based Graphical User Interface (GUI)
called the SVM Dashboard.
1.1 About the Document
This Command and Configuration Guide describes the steps used to configure the NetSocketvisibility solution and defines the CLI commands used. A brief overview of the solution at thebeginning of the document is followed by configuration examples for the SVM, SVP, and SVA.The final section of the document gives the CLI command definitions used on the NetSocketproducts.
1.2 Audience
The Command and Configuration Guide is intended for the individuals tasked with the turn-upand configuration of the SVM, SVP, and SVA in the providers network.
1.3 How to Get Help
To receive technical support, contact NetSocket in one of the following ways:
NetSocket technical support e-mail address: [email protected]
Visit http://www.support.netsocket.com for additional information. Use your companys
login information to access the documentation.
1.4 Product Documentation
Following is the list of all documents included into the product documentation suite:
Software Release Notes
Installation Guide contains installation procedures.
User Guide contains description and explanation of the SVM, SVP, and SVA
functionality. The User Guide is intended for SVM Dashboard users.
Command and Configuration Guide contains CLI command definitions and configuration
examples.
SVM SNMP Reference contains information about NetSockets proprietary MIBs andSNMP Traps.
-
8/2/2019 R1.9 SVSS Command Reference
5/462
NetSocket, Inc. - Proprietary and Confidential 2-1
2 System OverviewThe NetSocket Visibility Solution provides real-time IP service assurance in Fixed MobileConvergence (FMC), IP MPLS, and Enterprise environments by performingSession2Topology correlation for real-time IP services such as VoIP and Video.
The solution consists of three system types:
The Service Visibility Manager (SVM) is an element management system for the SVPsand SVAs. The SVM provides a web based GUI, called the Dashboard, used to monitorthe NetSocket Visibility Solution.
The Service Visibility Point (SVP) is a server appliance that monitors the layer-3 IPnetwork and the layer-4 session signaling.
The Service Visibility Analyzer (SVA) is a server appliance that monitors and analyzesRTP media streams associated with the sessions monitored by the SVP.
The NetSocket Visibility Solution works in a hierarchical model where one SVM monitors one ormore SVPs and an SVP can monitor zero or more SVAs. After the initial configuration, the user
accesses and monitors the entire solution via the SVM Dashboard.
This chapter provides a functional overview of the SVM, the SVP and the SVA. The followingtopics are covered within this chapter:
Session2Topology Correlation
SVM
SVP
SVA
SVM Dashboard
2.1 Session2Topology CorrelationAs the name suggests, this key technology automatically correlates the real-time state andchanges in the IP network to the individual sessions being carried through that network. Inreal-time, the NetSocket solution knows the exact hop-by-hop path of any session, and canidentify what network event has impacted, or is impacting, that session. Further, this sameknowledge is used to proactively alert the service manager to changes in network configurationthat can impact the traffic on the network.
Unique aspects of the Session2Topology correlation engine include:
Works in real time to create a service assurance mashup, providing a dynamic "map" of
the network onto which media and application/service information is correlated.
Monitors the network without imposing any burden on the deployed network nodes, suchas routers; it passively participates in the routed network using standard IP routing
protocols.
The results of the Session2Topology correlation are presented in the Quality of SessionRecord (QSR).
-
8/2/2019 R1.9 SVSS Command Reference
6/462
System Overview
NetSocket, Inc. - Proprietary and Confidential 2-2
2.2 SVM
The Service Visibility Manager is a management node for the SVPs and SVAs deployed in anetwork. For each application, the SVM provides metrics applicable to that application. Inaddition, the SVM provides Fault, Configuration, Accounting, Performance, and Security(FCAPS) management for the SVPs deployed. The SVM receives operational information fromall the SVPs within the network, which is then displayed on the SVM Dashboard. An industrycompatible Command Line Interface (CLI) is also supported by the SVM. The CLI is used forconfiguration and maintenance. A user can access the CLI remotely through the SVMsEthernet ports, or locally through the console serial ports.
Remote CLI access is through SSH or Telnet. CLI access authentication and authorization canbe enabled via RADIUS or TACACS+. Further, the solution allows a user to configure accesslists to filter incoming or outgoing traffic on any interface.
SNMP traps can be used to provide the operators NMS/OSS with SVM fault/alarm information.The SVM supports SNMP v1 and v2c for this purpose.
2.3 SVPThe Service Visibility Point provides a way to monitor user traffic (i.e., sessions) in a routed IPnetwork, giving carriers the power to understand how these sessions traverse their IP networks.It determines the paths taken by sessions through an IP network, stores information pertainingto the sessions, and provides real-time and historical operational statistics for the network. Withthis understanding, service providers can quickly identify and rectify issues, increaseoperational efficiency, and improve customer satisfaction.
The SVP learns network topology and status of available network resources by using standardIP routing protocols, such as OSPF and BGP, and by collecting information from the monitoredrouters using SNMP and CLI. The SVP passively monitors signaling information exchanged
with the session control node (e.g., Femtocell Gateway in a Femtocell deployment, a CallController in a VoIP deployment, etc.) to obtain real-time session information. This informationis correlated to the IP network topology monitored in real-time by the SVP. This correlation iscalled Session2Topology correlation, and is key to the network visibility provided by theNetSocket solution.
As sessions are established and released, the SVP maintains operational metrics about eachsession. If these metrics deviate outside the normal operational range (based on user definedthresholds), the SVP alerts the Operations team of potential problems and provides a list ofaffected sessions. This allows proactive management of the network and can significantlyreduce the Mean Time to Isolate (MTTI) in problem resolution.
2.4 SVAThe Service Visibility Analyzer analyzes voice and video RTP streams associated with thesessions monitored by an SVP. Each SVA provides four 10/100/1000 Ethernet monitoringinterfaces or two 10-Gigabit Ethernet monitoring interfaces. The SVA can be deployed with twodifferent monitoring configurations: standard IP MOS monitoring and IP monitoring plusanalogue analysis.
-
8/2/2019 R1.9 SVSS Command Reference
7/462
System Overview
NetSocket, Inc. - Proprietary and Confidential 2-3
2.4.1 SVA Standard IP MOS Monitoring
The SVA Standard IP MOS Monitoring configuration analyzes RTP streams for degradationthat can be attributed directly to the IP network. The metrics are independently on eachmonitoring interface. The SVA calculates interval metric values every 30 seconds and at theend of the session. Cumulative metrics are also provided, which are calculated over the entire
session. It is important to note that the interval and cumulative metrics are done independently.The cumulative metrics are not averages of the interval metrics.
Cumulative metrics are also calculated for Call Hold and Re-invite scenarios which occurfollowing call establishment.
2.4.2 SVA IP MOS Plus Analogue
The SVA IP MOS Plus Analogue configuration analyzes both directions of the G.711 A-law andG.711 -law RTP streams associated with a call. Therefore, unlike the standard configuration,RTP streams for all configured interfaces are analyzed as a whole. Duplication of streamsacross multiple interfaces must be avoided so that accurate results can be calculated. In thisconfiguration, the SVA reports the standard IP MOS monitoring metrics as well Signal to Noise
and Echo. These calculations are performed over a subset of the entire call according to themedia analysis configuration command on the SVA. The results are reported as part of thecumulative metrics.
2.5 SVM Dashboard
The SVM contains a web server to enable access to the SVM Dashboard using industrystandard web browsers such as Firefox and Internet Explorer. The Dashboard can be accessedfrom any personal workstation within an operators network where the SVM is deployed. Itpresents information about the SVM-monitored domain in an easily understood and meaningfulformat and allows a user to run various searches and reports, while analyzing a network issue.
The SVM Dashboard presents information about SVPs, SVAs and the operators network inboth tabular and graphical formats.
-
8/2/2019 R1.9 SVSS Command Reference
8/462
NetSocket, Inc. - Proprietary and Confidential 3-1
3 Initial System AccessThe SVM, SVP, and SVA systems are delivered with the NetSocket software installed but willneed to be configured before they are placed in service. The systems are configured using acommand line interface (CLI) which is typically accessed via SSH or Telnet using the IP
address assigned to the management interface. However, during the initial configuration thisinterface will not have an IP address that is accessible on the management network. Thefollowing sections describe how to access the CLI using the default IP address, the serial ports,and a monitor and keyboard. The figures and table below show the connection points used toaccess the CLI using these three methods.
3.1 1U Server
Figure 3-1 - 1U Server Rear Panel Connection Points
Table 3-1 2U Server CLI Access Connection Points
Letter Location Description
A Rear Panel Serial port
B Rear Panel VGA connector
C Rear Panel USB ports
D Rear Panel Management interface (nnet0)
-
8/2/2019 R1.9 SVSS Command Reference
9/462
-
8/2/2019 R1.9 SVSS Command Reference
10/462
Initial System Access
NetSocket, Inc. - Proprietary and Confidential 3-3
3.4 CLI Access using the Serial Ports
3.4.1 System Serial Ports
The 1U servers have a single serial port located on the rear panel. The 2U servers have two
serial ports; one on the front panel and one at the rear panel. Connections can be made toeither the front or the rear port. However, if the front panel serial port is used the rear serialport is deactivated. Both ports cannot be used at the same time. The serial ports have 8-pinRJ-45 connectors.
The table below lists the pinout for the front and back panel serial port connectors.
Table 3-3 - Serial Port Pinout
Pin Signal
1 RTS (Request to Send)
2 DTR (Data Terminal Ready)
3 TXD (Transmit Data)
4 GND
5 RIA (Ring Indicator)
6 RXD (Receive Data)
7 DSR/DCD (Data set Ready / Data Carrier Detect
8 CTS (Clear to Send)
To connect a PC to the system a RJ-45 to DB-9 adapter will be required. The pinout for thisadapter is provided in the table below.
Table 3-4 - RJ-45 to DB-9 Adapter Pinout
SVM/SVP/SVA RJ-45 Serial Port PC DB-9 Serial PortSignal Pin Pin Signal
RTS 1 8 CTS
DTR 2 6 DSR
TXD 3 2 RXD
GND 4 5 GND
RIA 5 5 GND
RXD 6 3 TXD
DSR/DCD 7 4 DTR
CTS 8 7 RTS
The serial port on the NetSocket servers has the same pinouts as Cisco routers and switches.Therefore, console cables that can be used to connect to a Cisco device may also be used toconnect to a NetSocket server. Note that the NetSocket serial port uses a higher baud ratethan Cisco devices as shown in the table below.
-
8/2/2019 R1.9 SVSS Command Reference
11/462
-
8/2/2019 R1.9 SVSS Command Reference
12/462
NetSocket, Inc. - Proprietary and Confidential 4-1
4 CLI BasicsThis chapter provides information about the Command Line Interface (CLI) used to provisionthe NetSocket SVP, SVA, and SVM.
4.1 Command Structure
In its basic form, a CLI command can be thought of as a single-word command followed bypossible mandatory or optional keywords and arguments. However, when forming names ofCLI commands for documentation purposes, the single-word command is often combined withmandatory keyword choices to produce one or more commands. For example, the show alarmsand show aliases CLI commands are documented as two separate commands instead of asingle show command with alarms and aliases as keyword choices. This breakdown of largecommands into smaller units is done so that the resulting commands can be more effectivelylocated and understood by the user of the documentation.
4.1.1 Command Classes
The CLI command set is comprised of three classes of commands: Configuration, Monitoring,and Operations.
The Configuration class of commands includes all commands that allow a user to create,
modify, or delete persistent configuration information within the SVP, SVA, and SVM.
Configuration commands are available within various configuration command modes.
The Monitoring class of commands includes all commands that allow a user to retrieve
configuration and status information from the system. Monitoring commands are available
entirely within the EXEC command mode.
The Operations class of commands includes all commands that allow a user to initiate
specific functions of the system, but not to change any configuration information.Operations commands are available entirely within the EXEC command mode.
4.1.2 Command Modes
The CLI contains a hierarchical structure for accessing commands. Sets of commands areavailable within different command modes located at various levels within the hierarchicalstructure. The left column of the following table lists the names of all supported commandmodes. For configuration command modes that vary the set of commands available dependingupon the type of object being configured, a command mode qualifier is also specified as part ofthe command mode. The command mode qualifier is simply the name for the type of objectbeing configured, enclosed within parentheses.
By default, the CLI prompt indicates the current command mode. The right column lists the CLIdefault prompt values for each command mode. The contents of the CLI prompt can becustomized using the prompt command.
-
8/2/2019 R1.9 SVSS Command Reference
13/462
CLI Basics
NetSocket, Inc. - Proprietary and Confidential 4-2
Table 4-1 - Command Modes and Prompts
Command Mode Prompt
User EXEC Router>
Privileged EXEC Router#
Global Configuration Router(config)#
Address Family Configuration (at-type) Router(config-router-af)#
Flow Aggregation Cache Configuration Router(config-flow-cache)#
Interface Configuration (entity-type) Router(config-if)#
IP Extended Access-List Configuration Router(config-ext-nacl)#
IP Standard Access-List Configuration Router(config-std-nacl)#
Route-Map Assign Router(route-map-assign)#
Route-Map Configuration Router(config-route-map)#
Router Configuration (protocol) Router(config-router)#
Session-Thresholds Router(config- session-threshold)
Subinterface Configuration (entity-type) Router(config-subif)#
Traceoptions Configuration Router(config-traceoptions)#
Topology Map Router (config-topology-map)#
Topology Map Router Router (config-topology-map-router)#
When establishing a connection with the CLI, the user is placed in the EXEC command mode.The EXEC command mode has 16 possible privilege levels (ranging from 0 to 15), but by
default, the user starts at privilege level 1, or the User level. When at the User level, the EXECcommand mode is referred to as the User EXEC Mode. The User EXEC Mode has a limited setof commands made available to the user.
To gain access to additional commands at a higher privilege level, the user enters the enablecommand (followed by a password if configured). As an initial system default, all commands notavailable at the User level are available at privilege level 15, referred to as the Privileged
level. When at the Privileged level, the EXEC command mode is referred to as the PrivilegedEXEC Mode. Once the user is in the Privileged EXEC Mode, all other command modes areaccessible.
The Global Configuration Mode can be used to configure items that are of a non-specific
nature. From the Privileged EXEC Mode, the user enters the configure command to move tothe Global Configuration Mode. From the Global Configuration Mode, a number of specificconfiguration modes can also be reached by entering the specific configuration mode entrycommand. For example, the Controller Configuration Mode can be reached from the GlobalConfiguration Mode by entering controller (followed by a controller entity-name).
By using a small set of commands, a user can move from one command mode to another. Fora complete list of all mode navigation commands, see the following table.
-
8/2/2019 R1.9 SVSS Command Reference
14/462
CLI Basics
NetSocket, Inc. - Proprietary and Confidential 4-3
Table 4-2 - Mode Navigation Commands
From I To Command
from EXEC to User EXEC (creates a new
session)
login
from User EXEC to Privileged EXE enable
from Privileged EXEC to User EXEC
(creates a new session)
login
from Privileged EXEC to Global
Configuration
configure
from Global Configuration to any
configuration mode
specific configuration mode entry command
from any configuration mode to Global
Configuration
any Global Configuration command
from any configuration mode to back onemode
exit (config)
from any configuration mode to Privileged
EXEC
end
from Privileged EXEC to User EXEC disable (EXEC)
from any EXEC mode to log off router exit (EXEC) or logout
4.1.3 Command Syntax
As an aid in conveying CLI syntax requirements, command syntax conventions have beenadopted within the command documentation. These syntax conventions are summarizedbelow.
Table 4-3 - Syntax Conventions
Syntax Convention Description
bold Bold indicates keywords input exactly as shown
italics Italic type indicates arguments that must be supplied by the user
output Non-proportional font indicates output from the router
In Progress ... Output message indicates the entered command is in progress
a Nothing indicates required keyword, argument, or combination
[a] Brackets indicate optional keyword, argument, or combination
... I * Ellipsis, pipe, and asterisk indicate operators of an expression
[a]... Brackets followed by an ellipsis indicate optional one or more unique
instances of an argument, expression, or combination
-
8/2/2019 R1.9 SVSS Command Reference
15/462
CLI Basics
NetSocket, Inc. - Proprietary and Confidential 4-4
{a}... Braces followed by an ellipsis indicate required one or more unique
instances of an argument, expression, or combination
[a I b] Brackets separated by one or more pipes indicate optional choice of
a keyword, argument, expression, or combination
{a I b} Braces separated by one or more pipes indicate required choice of akeyword, argument, expression, or combination
*[a I b] Brackets preceded by an asterisk and separated by one or more
pipes indicate optional one or more non-ordered choices of a
keyword, argument, expression, or combination
*{a I b} Braces preceded by an asterisk and separated by one or more pipes
indicate required one or more non-ordered choices of a keyword,
argument, expression, or combination
4.2 CLI Fundamentals4.2.1 CLI Functions
The CLI allows unique abbreviations to be substituted within commands in place of fullyentered keywords (and certain arguments). This function is merely a time-saving feature to beused or not used by preference of the user.
The CLI provides command-line help functions to assist the user in forming valid commandinput. The following table summarizes the available command-line help functions and how toaccess them. Note that help is only offered for the commands that are valid within the currentcommand mode.
Table 4-4 - Command-Line HelpHelp Function How to Access
Show command-line help information Type help and then the enter key
Show a list of all available commands Type ?
Show commands starting with given input Type ? after entering input
Show available keywords and arguments Type a command, a space, and then ?
Auto-complete command or keyword Type first letter(s) and then the tab key
The CLI provides a set of command-line editing functions. These functions are invoked by
special key combinations. A list of these key combinations and corresponding functions isshown below. Note that a dash (-) means two keys must be pressed at the same time.
-
8/2/2019 R1.9 SVSS Command Reference
16/462
CLI Basics
NetSocket, Inc. - Proprietary and Confidential 4-5
Table 4-5 - Command-Line Editing
Key Combination Function
Ctrl-a Move cursor to the start of the line being edited
{Ctrl-b I lt arrow} Move cursor backward one character (to the left)
Ctrl-e Move cursor to the end of the line being edited
{Ctrl-f I rt arrow} Move cursor forward one character (to the right)
{del I backspace} Delete character to the left of the cursor
Ctrl-d Delete character directly under cursor
Ctrl-k Delete characters from the cursor to the end of the line being edited
{Ctrl-u I Ctrl-x} Delete characters from the cursor to the start of the line being edited
Ctrl-w Delete entire word to the left of the cursor
Ctrl-t Transpose character under the cursor with the character to the left
{Ctrl-p I up arrow} Display older command within the command history buffer
{Ctrl-n I dn arrow} Display newer command within the command history buffer
The CLI provides the capability within all show commands to filter out certain lines in the outputbased on matching a regular expression string. By simply appending the output modifier syntaxshown in the following table to the normal show command syntax, the corresponding filterfunction can be applied. Note that the reg-exp (regular expression) argument of the outputmodifier syntax is case sensitive.
If the regular expression string includes one or more spaces to be used in the filtering criteria,parentheses must be used as delimiters.
Table 4-6 - Show Output Filtering
Output Modifier Function
I begin reg-exp Display show output beginning at line matched by reg-exp string
I include reg-exp Display show output including all lines matched by reg-exp string
I exclude reg-exp Display show output excluding all lines matched by reg-exp string
The CLI provides the capability to enter and display numeric constants using multiple formatsbased on special prefixes applied to the constant. The following table shows the prefixesunderstood by the CLI and the corresponding meaning.
Table 4-7 - Numeric Constant Prefixes
Prefix Meaning
(none) Numeric constant is interpreted as decimal (base 10)
0 Numeric constant is interpreted as octal (base 8)
0x Numeric constant is interpreted as hexadecimal (base 16)
-
8/2/2019 R1.9 SVSS Command Reference
17/462
CLI Basics
NetSocket, Inc. - Proprietary and Confidential 4-6
While displaying output that exceeds the length of a single display screen, the CLI provides apaging capability that allows entry of various paging-related commands. These CLI pagingcommands are listed below.
Table 4-8 - Paging Commands
Command Function:help Display paging command help[n] {f I Ctrl-f I space} Forward nlines, default one screen[n] {b I Ctrl-b} Backward nlines, default one screen[n] {j I cr} Forward nlines, default one line[n] k Backward nlines, default one line[n] {d I Ctrl-d} Forward nlines, default half screen or last n[n] {u I Ctrl-u} Backward nlines, default half screen or last n[n] g Go to line n, default line 1{r I Ctrl-l} Repaint screen[n] Ipattern Search forward for nth line containing the pattern[n] I!pattern Search forward for nth line not containing the pattern[n] ?pattern Search backward for nth line containing the pattern[n] ?!pattern Search backward for nth line not containing the pattern[n] n Repeat previous search (for nth occurrence)[n] N Repeat previous search other direction (for nth occurrence){= I Ctrl-g} Display current status{q I :q I ZZ} Exit
Finally, the CLI provides many powerful utilities that can be accessed by the user. These CLIutilities are listed below.
Table 4-9 - Utility Commands
Command Utility
send Sends an asynchronous user message to another user
telnet Opens a telnet connection with a remote host
wall Sends an asynchronous user message to all users
-
8/2/2019 R1.9 SVSS Command Reference
18/462
CLI Basics
NetSocket, Inc. - Proprietary and Confidential 4-7
4.2.2 CLI Customization
Some aspects of the CLI can be modified to accommodate the individual needs of the user.The CLI commands and corresponding functions that provide this level of CLI customization arelisted below.
Table 4-10 - CLI Customization Commands
Command Function
alias Sets a command alias to be used instead of an original command
banner enable Sets a message to display upon enabling to a new privilege level
banner exec Sets a message to display after user login
banner login Sets a message to display before user login
banner motd Sets a message of the day (MOTD) message
enable password Sets a password to control access to a specified privilege level
exec-banner Enables both the EXEC and message of the day (MOTD) banners
exec-timeout Sets the EXEC time-out period
motd-banner Enables the message of the day (MOTD) banner
privilege level Assigns a privilege level to a command
prompt Enables a custom prompt string to be configured
terminal history Enables the command history feature or sets the command buffer
size
terminal length Sets the number of display lines per screen
terminal monitor Enables output of debug and error messages
terminal width Sets the number of characters per display line
-
8/2/2019 R1.9 SVSS Command Reference
19/462
NetSocket, Inc. - Proprietary and Confidential 5-1
5 CLI Command Definitions
aaa accounting commands
Enables AAA accounting for commands at a specified privilege level. The no form of thiscommand disables this function (default).
Syntax
aaa accounting commandslevel
no aaa accounting commands[level]
Parameters
Parameter Description Type/Range
level Privilege level, 1 usuallyindicates the EXEC mode
and 15 (default) usually
indicates the Privileged
EXEC Mode.
1 to 15
Mode
Global Configuration
aaa accounting execEnables AAA accounting for an EXEC session. The no form of this command disables thisfunction (default).
Syntax
aaa accounting exec default {none | radius | start-stop | stop-only} tacacs+
no aaa accounting exec default [[none | radius | start-stop | stop-only] tacacs+]
Parameters
Parameter Description
none Disables accounting services for this (tty)
line
radius Include the RADIUS servers methods.
start-stop Sends an accounting notice when a process
starts and ends.
-
8/2/2019 R1.9 SVSS Command Reference
20/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-2
stop-only Sends an accounting notice only when a
process ends.
tacacs+ Include the TACACS+ method.
Mode
Global Configuration
aaa accounting system
Enables AAA accounting for non-user, system level events. The no form of this commanddisables this function (default).
Syntax
aaa accounting system default {none | start-stop | stop-only} tacacs+
no aaa accounting system default [[none | start-stop | stop-only] tacacs+]
Parameters
Parameter Description
none Disables accounting services for this (tty)
line
start-stop Sends an accounting notice when a process
starts and ends.
stop-only Sends an accounting notice only when a
process ends.
tacacs+ Include the TACACS+ method.
Mode
Global Configuration
aaa authentication login
Creates the default AAA authentication method list. The no form of this command deletes the
default AAA authentication method list (default).
Syntax
aaa authentication login default *{local | radius | tacacs+}
no aaa authentication login default *[local | radius | tacacs+]
-
8/2/2019 R1.9 SVSS Command Reference
21/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-3
Parameters
Parameter Description
default Use the list of authentication methods that
follow to create the default list.
local Include the local user name database
method.
radius Include the RADIUS servers method.
tacacs+ Include the TACACS+ servers method.
Mode
Global Configuration
Guidelines
If the default login AAA authentication method list does not exist, the local user name databaseis used as the default login AAA authentication method list.
aaa authorization commands
Creates an AAA authorization method list for commands at a specified privilege level. The noform of this command removes the authorization method list (default).
Syntax
aaa authorization commands leveldefault *{local | tacacs+}
no aaa authorization commands [level] default *[local | tacacs+]
Parameters
Parameter Description Type/Range
level Privilege level, 1 usually
indicates the EXEC mode
and 15 (default) usually
indicates the PrivilegedEXEC Mode.
1 to 15
default Use the list of authorization
methods that follow to
create the default list.
local Include the local user
name database method.
-
8/2/2019 R1.9 SVSS Command Reference
22/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-4
tacacs+ Include the TACACS+
servers method.
Mode
Global Configuration
aaa authorization config-commands
Enables AAA configuration command authorization method for all global-config commands.The no form of this command disables this function.
Syntax
aaa authorization config-commands
no aaa authorization config-commands
Mode
Global Configuration
aaa authorization exec
Creates the default EXEC shell AAA authorization method list. The no form of this commanddeletes the default EXEC shell AAA authorization method list (default).
Syntax
aaa authorization exec default *{local | radius | tacacs+}
no aaa authorization exec default *[local | radius | tacacs+]
Parameters
Parameter Description
default Use the list of authorization methods that
follow to create the default list.
local Include the local user name database
method.
radius Include the RADIUS servers method.
tacacs+ Include the TACACS+ servers method.
Mode
-
8/2/2019 R1.9 SVSS Command Reference
23/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-5
Global Confguration
Guidelines
If the default EXEC shell AAA authorization method list does not exist, the local user namedatabase is used as the default EXEC shell AAA authorization method list.
aar
Average Active Registrations (AAR) is an average number of active registrations. Thecommand replaces the existing settings for the intervals specified. This alert can be used if aknown minimum number of registrations is expected. The no form of the command with noarguments disables the AAR alert for all time intervals. The no form of the command with asingle interval, regardless of set/clear threshold value, will disable the AAR alert for that timeinterval.
This command enables generation of alerts to the SVM and traps to the NMS. The setthreshold must be less than or equal to the clear threshold.
Syntax
aar {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
no aar {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
Parameters
Parameter Description Type/Range Default
interval1 set/clear thresholds forfirst interval of the day.
None
interval2 set/clear thresholds for
second interval of the day.
None
interval3 set/clear thresholds for
third interval of the day.
None
interval4 set/clear thresholds for
fourth interval of the day.
None
set If number of active tunnels
is less than this value,
alert will set.
0 to 300,000 where
00 implies off.
0
clear If number of active tunnels
is greater than or equal to
this value, alert will clear.
00 to 300,000 0
Mode
Session thresholds configuration
-
8/2/2019 R1.9 SVSS Command Reference
24/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-6
aat
Average Active Tunnels (AAT) is an average number of active tunnels. This alert can be used ifa known minimum number of tunnels expected. The command replaces the existing settings forthe intervals specified. The no form of the command with no arguments disables the AAT alertfor all time intervals. The no form of the command with a single interval, regardless of set/clearthreshold value, will disable the AAT alert for that time interval.
This command enables generation of alerts to the SVM and traps to the NMS. The setthreshold must be less than or equal to the clear threshold.
Syntax
aat {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
no aat {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
Parameters
Parameter Description Type/Range Default
interval1 set/clear thresholds for
first interval of the day.
None
interval2 set/clear thresholds for
second interval of the day.
None
interval3 set/clear thresholds forthird interval of the day.
None
interval4 set/clear thresholds for
fourth interval of the day.
None
set If number of active tunnels
is less than this value,
alert will set.
0 to 300,000 where
00 implies off.
0
clear If number of active tunnels
is greater than or equal to
this value, alert will clear.
00 to 300,000 0
Mode
Session thresholds configuration
access-list (extended)
-
8/2/2019 R1.9 SVSS Command Reference
25/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-7
Creates an extended access-list. If no sequence number or matching clause is specified, the noform of this command deletes the entire access-list; otherwise, only the access-list clausespecified by the sequence number and/or matching clause is deleted.
Syntax
access-listaccess-list-id[seqsequence-number] {{deny | permit} {protocol| ip} {source-ipaddress source-wildmask| any | hostsource-ip-address} {dest-ip-address dest-wildmask|any | hostdest-ip-address} *[dscpdscp-value| precedenceprecedence-value| tos tos-value| {log | log-input} | fragments] | remarkstring} [class-mapclass-map-name]
no access-listaccess-list-id[seqsequence-number] [{deny | permit} {protocol| ip} {source-ipaddress source-wildmask| any | hostsource-ip-address} {dest-ip-address dest-wildmask|any | hostdest-ip-address} *[dscpdscp-value| precedenceprecedence-value| tostos-value| {log | log-input} | fragments] | remarkstring] [class-mapclass-map-name]
Parameters
Parameter Description
access-list-id Alphanumeric name string (40 characters maximum) of the
extended access-list being defined.
sequence-number Unique sequence number of the deny, permit, or remark
clause being added to (or deleted from) the access list; by
default, sequence numbers start at 10 and increment by 10
for each entry added to the end of the access list.
deny Access is denied for the source and destination addresses
specified.
permit Access is permitted for the source and destination
addresses specified.
protocol Name or number of an internet protocol, or symbol-name as
defined in define ipprotocol, valid protocol numbers are 0 to
255 (SVP option only).
ip Any IP protocol.
source-ip-address source-
wildmask
Access is denied or permitted for packets originating from
this source IP address and wildcard mask combination.
any Access is denied or permitted for packets originating from
any source IP address.
host source-ip-address Access is denied or permitted for packets originating from
this source IP address host.dest-ip-address dest-
wildmask
Access is denied or permitted for packets sent to this
destination IP address and wildcard mask combination.
any Access is denied or permitted for packets sent to any
destination IP address.
host dest-ip-address Access is denied or permitted for packets sent to this
destination IP address host.
-
8/2/2019 R1.9 SVSS Command Reference
26/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-8
dscp-value DSCP value to be matched, range is 0 to 63, or a well-
known DSCP name, or symbol-name if defined in define
dscp.
precedence-value Precedence level to be matched, valid entries are 0 to 7, or
a well-known precedence name, or symbol-name if defined
in define ip-precedence.
tos-value Service level to be matched, range is 0 to 15, or a well-
known ToS name (SVP option only).
log Specifies that information about matching packets will be
sent to the console.
log-input Specifies that the input interface is to be included in the log.
fragments Specifies that packets in IP datagram fragments are to be
matched (SVP option only).
string Text about or explanation of the access-list, up to 100
characters long.
class-map-name Name of an existing class-map (created with class-map
command) to which the access-list is being applied.
Mode
Global Configuration
access-list (extended ICMP)
Creates an ICMP extended access-list. If no sequence number or matching clause is specified,the no form of this command deletes the entire access-list; otherwise, only the access-listclause specified by the sequence number and/or matching clause is deleted.
See the access-list (extended) command for other descriptions of inputs that are commonbetween the access-list family of commands.
Syntax
access-list access-list-id[seq sequence-number] {{deny | permit} {1 | icmp} {source-ipaddress source-wildmask| any | host source-ip-address} {dest-ip-address dest-wildmask|any | host dest-ip-address} *[dscp dscp-value| precedence precedence-value| tos tos-value
| {log | log-input} | fragments | icmp-type[icmp-subcode]] | remark string} [class-map class-mapname]
no access-list access-list-id[seq sequence-number] [{deny | permit} {1 | icmp} {source-ipaddress source-wildmask| any | host source-ip-address} {dest-ip-address dest-wildmask|any | host dest-ip-address} *[dscp dscp-value| precedence precedence-value| tos tos-value| {log | log-input} | fragments | icmp-type[icmp-subcode]] | remark string] [class-map class-mapname]
-
8/2/2019 R1.9 SVSS Command Reference
27/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-9
Parameters
Parameter Description
icmp-type ICMP name or code to be matched, range is 0 to 255, or
symbol-name may be used if defined in define icmp-code.
icmp-subcode ICMP subcode to be matched, range is 0 to 255.
Mode
Global Configuration
access-list (extended IGMP)
Creates an IGMP extended access-list. If no sequence number or matching clause is specified,the no form of this command deletes the entire access-list; otherwise, only the access-list
clause specified by the sequence number and/or matching clause is deleted.
See the access-list (extended) command for other descriptions of inputs that are commonbetween the access-list family of commands.
Syntax
access-list access-list-id[seq sequence-number] {{deny | permit} {2 | igmp} {source-ipaddress source-wildmask| any | host source-ip-address} {dest-ip-address dest-wildmask|any | host dest-ip-address} *[dscp dscp-value| precedence precedence-value| tos tos-value| {log | log-input} | fragments | igmp-type] | remark string} [class-map class-map-name]
no access-list access-list-id[seq sequence-number] [{deny | permit} {2 | igmp} {source
ipaddress source-wildmask| any | host source-ip-address} {dest-ip-address dest-wildmask|any |host dest-ip-address} *[dscp dscp-value| precedence precedence-value| tos tos-value| {log |log-input} | fragments | igmp-type] | remark string] [class-map class-map-name]
Parameter Description Type/Range
igmp-type IGMP protocol name or
code to be matched or
symbol-name may be used
if defined in define igmp.
0 to 15
Mode
Global Configuration
access-list (extended TCP)
Creates an TCP extended access-list. If no sequence number or matching clause is specified,the no form of this command deletes the entire access-list; otherwise, only the access-listclause specified by the sequence number and/or matching clause is deleted.
-
8/2/2019 R1.9 SVSS Command Reference
28/462
-
8/2/2019 R1.9 SVSS Command Reference
29/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-11
access-list (extended UDP)
Creates an UDP extended access-list. If no sequence number or matching clause is specified,the no form of this command deletes the entire access-list; otherwise, only the access-listclause specified by the sequence number and/or matching clause is deleted.
See the access-list (extended) command for other descriptions of inputs that are commonbetween the access-list family of commands.
Syntax
access-list access-list-id[seq sequence-number] {{deny | permit} {17 | udp} {source-ipaddress source-wildmask| any | host source-ip-address} [{eq | gt | lt | neq} source-udp-port| range source-udp-port1 source-udp-port2] {dest-ip-address dest-wildmask| any | host dest-ipaddress} [{eq | gt | lt | neq} dest-udp-port| range dest-udp-port1 dest-udp-port2] *[dscpdsc-pvalue| precedence precedence-value| tos tos-value| {log | log-input} | fragments] |remark string} [class-map class-map-name]
no access-list access-list-id[seq sequence-number] [{deny | permit} {17 | udp} {source-ipaddress source-wildmask| any | host source-ip-address} [{eq | gt | lt | neq} source-udp-port| range source-udp-port1 source-udp-port2] {dest-ip-address dest-wildmask| any | host dest-ipaddress} [{eq | gt | lt | neq} dest-udp-port| range dest-udp-port1 dest-udp-port2] *[dscpdscp-value| precedence precedence-value| tos tos-value| {log | log-input} | fragments] |remark string] [class-map class-map-name]
Parameters
Parameter Description
eq Specifies that port must be equal to a value.
gt Specifies that port must be greater than a value.
lt Specifies that port must be less than a value.
neq Specifies that port must be not equal to a value.
range Specifies that port must be within a range of values.
source-udp-port Decimal number or well-known name of the source UDP
port, or symbol name if defined in define udp-port.
dest-udp-port Decimal number or well-known name of the destination UDP
port, or symbol name if defined in define udp-port.
Mode
Global Configuration
access-list sequence-enable
Enables the display of sequence numbers when showing access-lists. The no form of thiscommand disables the display of sequence numbers when showing access-lists (default).
-
8/2/2019 R1.9 SVSS Command Reference
30/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-12
This command does not affect access-list commands displayed within running configurationoutput. Sequence numbers are not displayed within running configuration output.
Syntax
access-list sequence-enable
no access-list sequence-enable
Mode
Global Configuration
access-list (standard)
Creates a standard access-list. If no sequence number or matching clause is specified, the no
form of this command deletes the entire access-list; otherwise, only the access-list clausespecified by the sequence number and/or matching clause is deleted.
Syntax
access-list access-list-id[seq sequence-number] {{deny | permit} {ip-address[wildmask] |any | host ip-address} [log] | remark string} [class-map class-map-name]
no access-list access-list-id[seq sequence-number] [{deny | permit} {ip-address[wildmask] |any | host ip-address} [log] | remark string] [class-map class-map-name]
Parameters
Parameter Description
access-list-id Alphanumeric name string (40 characters maximum) of the
standard access-list being defined.
sequence-number Unique sequence number of the deny, permit, or remark
clause being added to (or deleted from) the access list; by
default, sequence numbers start at 10 and increment by 10
for each entry added to the end of the access list.
deny Access is denied for the source addresses specified.
permit Access is permitted for the source addresses specified.
ip-address [wildmask] Access is denied or permitted for packets originating fromthis source IP address and wildcard mask combination (if
wildcard mask is not specified, 0.0.0.0 is assumed).
any Access is denied or permitted for packets originating from
any source IP address.
host ip-address Access is denied or permitted for packets originating from
this source IP address host.
-
8/2/2019 R1.9 SVSS Command Reference
31/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-13
log Specifies that information about matching packets will be
sent to the console.
string Text about or explanation of the access-list, up to 100
characters long.
class-map-name Name of an existing class-map (created with class-map
command) to which the access-list is being applied.
Mode
Global Configuration
acd
Average Call Duration (ACD) is an average duration of successfully connected calls from thebeginning of the call request to the release of the call. The command replaces the existing
settings for the intervals specified. The no form of the command with no arguments disables theACD alert for all time intervals. The no form of the command with a single interval, regardless ofset/clear threshold value, will disable the ACD alert for that time interval.
This command enables generation of alerts to the SVM and traps to the NMS. The setthreshold must be less than or equal to the clear threshold.
Syntax
acd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
no acd {[interval1set clear ] [interval2set clear ] [interval3set
clear ] [interval4set clear ] }
Parameters
Parameter Description Type/Range Default
interval1 set/clear thresholds for
first interval of the day.
None
interval2 set/clear thresholds for
second interval of the day.
None
interval3 set/clear thresholds for
third interval of the day.
None
interval4 set/clear thresholds for
fourth interval of the day.
None
set Value of duration in
seconds is less than this
value, alert will set.
0 to 600 where 00
implies off.
0
-
8/2/2019 R1.9 SVSS Command Reference
32/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-14
clear Value of duration in
seconds is greater than or
equal to this value, alert
will clear.
00 to 600 0
Mode
Session thresholds configuration
acdd
Average Call Disconnect Delay (ACDD) is an average delay for VoIP sessions measured fromthe release request to the acknowledgement. The command replaces the existing settings forthe intervals specified. The no form of the command with no arguments disables the ACDDalert for all time intervals. The no form of the command with a single interval, regardless ofset/clear threshold value, will disable the ACDD alert for that time interval.
This command enables generation of alerts to the SVM and traps to the NMS based on theAverage Call Disconnect Delay. The set threshold must be greater than or equal to the clearthreshold.
Syntax
acdd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
no acdd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
Parameters
Parameter Description Type/Range Default
interval1 set/clear thresholds for
first interval of the day.
None
interval2 set/clear thresholds for
second interval of the day.
None
interval3 set/clear thresholds for
third interval of the day.
None
interval4 set/clear thresholds for
fourth interval of the day.
None
set Value of duration in
seconds is greater than
this value, alert will set.
0 to 600 where 00
implies off.
0
-
8/2/2019 R1.9 SVSS Command Reference
33/462
-
8/2/2019 R1.9 SVSS Command Reference
34/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-16
Mode
Session thresholds configuration
address-family ipv4Enables IPv4 address family based running configuration on the RCP and enters into thespecified Address Family Configuration Mode. The no form of this command does a no activatecommand on all peers and peer groups in the address family, removes all peers from their peergroups, and clears out all the attributes from peers.
Syntax
address-family ipv4 [multicast | [unicast] [vrf vrf-name]]
no address-family ipv4 [multicast | [unicast] [vrf vrf-name]]
Parameters
Parameter Description
ipv4 Specifies IP version 4
multicast Specifies Multicast mode.
unicast Specifies Unicast mode (default).
vrf-name Alpha-numeric-symbolic name for the VRF
the address-family information is associated
with, range is 1 to 40 characters.
Mode
Router Configuration (BGP)
Guidelines
Once address family based running configuration is enabled on the RCP, it cannot be disabled.
address-family (traceoptions)
Enables debug messages of specified BGP address family names to be placed in the trace file.
The no form of this command disables debug messages of specified BGP address familynames (or all names if none specified) from being placed in the trace file (default).
Syntax
address-family {family-name}...
no address-family [family-name]...
-
8/2/2019 R1.9 SVSS Command Reference
35/462
-
8/2/2019 R1.9 SVSS Command Reference
36/462
-
8/2/2019 R1.9 SVSS Command Reference
37/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-19
interval4 set/clear thresholds for
fourth interval of the day.
None
set Value of duration in
seconds is greater than
this value, alert will set.
0 to 600 where 00
implies off.
0
clear Value of duration in
seconds is less than or
equal to this value, alert
will clear.
00 to 600 0
Mode
Session thresholds configuration
ard
Average Registration Delay (ARD) is the average delay for VoIP applications for registrationdelay duration. The command replaces the existing settings for the intervals specified. The noform of the command with no arguments disables the ARD alert for all time intervals. The noform of the command with a single interval, regardless of set/clear threshold value, will disablethe ARD alert for that time interval.
This command enables generation of alerts to the SVM and traps to the NMS based on theAverage Registration Delay. The set threshold must be greater than or equal to the clearthreshold.
Syntax
ard {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
no ard {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
Parameters
Parameter Description Type/Range Default
interval1 set/clear thresholds for
first interval of the day.
None
interval2 set/clear thresholds forsecond interval of the day.
None
interval3 set/clear thresholds for
third interval of the day.
None
interval4 set/clear thresholds for
fourth interval of the day.
None
-
8/2/2019 R1.9 SVSS Command Reference
38/462
-
8/2/2019 R1.9 SVSS Command Reference
39/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-21
area default-cost
In an Area Border Router (ABR), specifies the cost of the default summary route sent into astub area. The no form of this command removes the specified default summary route cost, andsets the default-cost to 1 (default).
Syntax
area {ip-address| area-id} default-cost cost
no area {ip-address| area-id} default-cost [cost]
Parameters
Parameter Description Type/Range
ip-address IPv4 or IPv6 address of the
area into which the default-
cost is being sent.
IPv4 or IPv6
area-id Area into which the default-
cost is being sent,
expressed as a decimal
number
0 to 4294967295
cost Default summary route cost
for the stub area
1 to 65535, default is 1.
Mode
Router Configuration (OSPF)
area nssa
Enables an OSPF area to be a not-so-stubby-area (NSSA). The no form of this commandremoves an OSPF area from NSSA designation.
Syntax
area {ip-address| area-id} nssa [no-redistribution] [default-information-originate][nosummary]
no area {ip-address| area-id} nssa [no-redistribution] [default-information-originate][nosummary]
Parameters
Parameter Description Type/Range
-
8/2/2019 R1.9 SVSS Command Reference
40/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-22
ip-address Area being designated as
an NSSA, expressed as an
ip address (dotted
decimal).
area-id Area being designated as
an NSSA, expressed as adecimal number
0 to 4294967295
no-redistribution Configures this router
(which must be an NSSA
Area Border Router) to not
redistribute routes into the
NSSA, but to allow
redistribution into the non-
NSSA areas.
no-summary Configures this router to
not send Network
Summary LSAs (Type 3)into the NSSA
default-information-
originate
Configures this router
(which must be an NSSA
Area Border Router) to
generate an NSSA External
LSA (Type 7) default route
into the NSSA.
Mode
Router Configuration (OSPF)
area virtual-link
Sets an OSPF virtual link (a link to the backbone through a non-backbone area). The no form ofthis command removes the virtual link.
Syntax
area {ip-address| area-id} virtual-link router-id*[authentication [null | message-digest] |dead-interval seconds| hello-interval seconds| retransmit-interval seconds| transmitdelayseconds] [authentication-key [encryption-type] password| message-digest-key key-idmd5
[encryption-type] key]
no area {ip-address| area-id} virtual-link router-id*[authentication [null | message-digest] |dead-interval seconds| hello-interval seconds| retransmit-interval seconds| transmitdelayseconds] [authentication-key [encryption-type] password| message-digest-key key-idmd5[encryption-type] key]
Parameters
-
8/2/2019 R1.9 SVSS Command Reference
41/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-23
Parameter Description Type/Range
ip-address IP address of the area of
the non-backbone (transit)
area being used for the
virtual link.
area-id Area of the non-backbone
(transit) area being used for
the virtual link
0 to 4294967295
router-id Router-id of the ABR with
which the virtual-link is
being established.
hello-interval seconds Amount of time in seconds
that passes between the
sending of Hello packets.
1 to 8192, default is 10
retransmit-interval
seconds
Amount of time in seconds
to wait betweenunacknowledged OSPF
packet retransmissions
1 to 8192, default is 5
transmit-delay seconds Amount of time in seconds
it takes to transmit an LSA
on this interface. The LSA
age will be increased by
this amount as it exits this
interface or resides in the
LSA database
1 to 8192, default is 1
dead-interval seconds Amount of time in seconds
that the RCP will wait tohear a Hello from a
neighbor on the network to
which the interface is
connected before declaring
the neighbor dead (down)
1 to 8192, default is 40
authentication Configures the link to use
simple (password)
authentication.
authentication null Configures the link to use
no authentication.
authentication message-digest
Configures the link to useMD5 authentication.
authentication-key
encryption-type
Optional number specifying
the type of encryption to
use when storing and
displaying the simple
password
0 to 7, default is 0 (no
encryption).
-
8/2/2019 R1.9 SVSS Command Reference
42/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-24
password Continuous string of
characters, up to 8 bytes
long, that is the simple
password to be used by
neighboring routers.
key-id Identifier for the MD5 key 1 to 255
md5 encryption-type Optional number specifying
the type of encryption to
use when storing and
displaying the md5 key
0 to 7, default is 0 (no
encryption).
key Alphanumeric string of up
to 16 characters that is the
value of the MD5 key.
Mode
Router Configuration (OSPF)
Guidelines
If the command password-encryption has been enabled, all passwords are encrypted forstorage and display, regardless of the encryption type parameters specified here.
arp
Creates a static entry within the Address Resolution Protocol (ARP) table. The no form of thiscommand removes a static entry.
Syntax
arp ip-address mac-address
no arp ip-address[mac-address]
Parameters
Parameter Description
ip-address IP address of the static entry.
mac-address 48-bit IEEE MAC address using three 4-digithex numbers separated by periods
(xxxx.xxxx.xxxx)
Mode
Global Configuration
-
8/2/2019 R1.9 SVSS Command Reference
43/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-25
assign
Creates a variable that can have multiple match commands associated with it, so that morethan one match condition may exist for a set command. The no form of this command deletesthe variable definition.
Syntax
assign variable-name
no assign variable-name
Parameters
Parameter Description Type/Range
variable-name Name of the variable being
created, can be one
alphabetic character
a-z
Mode
Route-Map Configuration
Guidelines
This command enters Route-Map Assign Mode, where all of the route-map match commandsare available. After entering the match commands to be assigned to this variable, type exit toreturn to normal Route-Map Configuration Mode.
atdAverage Tunnel Duration (ATD) is an average duration of successfully established tunnelsessions. The command replaces the existing settings for the intervals specified. The no formof the command with no arguments disables the ATD alert for all time intervals. The no form ofthe command with a single interval, regardless of set/clear threshold value, will disable the ATDalert for that time interval.
This command enables generation of alerts to the SVM and traps to the NMS based on theAverage Tunnel Duration. The set threshold must be less than or equal to the clear threshold.
Syntax
atd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
no atd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
Parameters
-
8/2/2019 R1.9 SVSS Command Reference
44/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-26
Parameter Description Type/Range Default
interval1 set/clear thresholds for
first interval of the day.
None
interval2 set/clear thresholds for
second interval of the day.
None
interval3 set/clear thresholds for
third interval of the day.
None
interval4 set/clear thresholds for
fourth interval of the day.
None
set Value of duration in
seconds is less than this
value, alert will set.
0 to 300 where 00
implies off.
0
clear Value of duration in
seconds is greater than or
equal to this value, alert
will clear.
00 to 300 0
Mode
Session thresholds configuration
avd
Average Video Duration (AVD) is an average duration of successfully connected video session
from the beginning of the request to the release of the session. The command replaces theexisting settings for the intervals specified. The no form of the command with no argumentsdisables the AVD alert for all time intervals. The no form of the command with a single interval,regardless of set/clear threshold value, will disable the AVD alert for that time interval.
This command enables generation of alerts to the SVM and traps to the NMS. The setthreshold must be less than or equal to the clear threshold.
Syntax
avd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
no avd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
Parameters
Parameter Description Type/Range Default
interval1 set/clear thresholds for
first interval of the day.
None
-
8/2/2019 R1.9 SVSS Command Reference
45/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-27
interval2 set/clear thresholds for
second interval of the day.
None
interval3 set/clear thresholds for
third interval of the day.
None
interval4 set/clear thresholds for
fourth interval of the day.
None
set Value of duration in
seconds is less than this
value, alert will set.
0 to 600 where 00
implies off.
0
clear Value of duration in
seconds is greater than or
equal to this value, alert
will clear.
00 to 600 0
Mode
Session thresholds configuration
avdd
Average Video Disconnect Delay (AVDD) is the average from the request for termination untilthe acknowledgement. The command replaces the existing settings for the intervals specified.The no form of the command with no arguments disables the AVDD alert for all time intervals.The no form of the command with a single interval, regardless of set/clear threshold value, willdisable the AVDD alert for that time interval.
This command enables generation of alerts to the SVM and traps to the NMS based on theAverage Video Disconnect Delay. The set threshold must be greater than or equal to the clearthreshold.
Syntax
avdd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
no avdd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
Parameters
Parameter Description Type/Range Default
interval1 set/clear thresholds for
first interval of the day.
None
interval2 set/clear thresholds for
second interval of the day.
None
-
8/2/2019 R1.9 SVSS Command Reference
46/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-28
interval3 set/clear thresholds for
third interval of the day.
None
interval4 set/clear thresholds for
fourth interval of the day.
None
set Value of duration in
seconds is greater than
this value, alert will set.
0 to 600 where 00
implies off.
0
clear Value of duration in
seconds is less than or
equal to this value, alert
will clear.
00 to 600 0
Mode
Session thresholds configuration
avpdd
Average Video Post Dial Delay (AVPDD) is the average delay from the initial request to theringing. The command replaces the existing settings for the intervals specified. The no form ofthe command with no arguments disables the AVPDD alert for all time intervals. The no form ofthe command with a single interval, regardless of set/clear threshold value, will disable theAVPDD alert for that time interval.
This command enables generation of alerts to the SVM and traps to the NMS. The setthreshold must be greater than or equal to the clear threshold.
Syntax
avpdd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
no avpdd {[interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear ] }
Parameters
Parameter Description Type/Range Default
interval1 set/clear thresholds for
first interval of the day.
None
interval2 set/clear thresholds for
second interval of the day.
None
interval3 set/clear thresholds for
third interval of the day.
None
interval4 set/clear thresholds for
fourth interval of the day.
None
-
8/2/2019 R1.9 SVSS Command Reference
47/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-29
set Value of duration in
seconds is greater than
this value, alert will set.
0 to 600 where 00
implies off.
0
clear Value of duration in
seconds is less than or
equal to this value, alertwill clear.
00 to 600 0
Mode
Session thresholds configuration
bandwidth (interface)
Sets the bandwidth informational value for an interface. The no form of this command sets thebandwidth informational value to the default value.
Syntax
bandwidth kilobits
no bandwidth [kilobits]
Parameters
Parameter Description Type/Range
kilobits Bandwidth in kilobits per
second
Range is 1 to 80000000,
default values are 9 for
Tunnel; 10000 for Admin
and NNET; and Loopback,
and Null. For Port-chan and
Pos-chan, the default is for
the bandwidth value to be
dynamically set according
to the number of active
members. Subinterface
defaults are same as
parent interface.
Mode
Interface Configuration (Admin, Em, Loopback, NNET, Null, Tunnel)
Guidelines
When an interface is assigned as a member of a link bundle interface, the bandwidth value forthat interface is changed to the default value for that interface. Once an interface is removed as
-
8/2/2019 R1.9 SVSS Command Reference
48/462
-
8/2/2019 R1.9 SVSS Command Reference
49/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-31
Parameters
Parameter Description
c Delimiting character, any character is
allowed but it must use a different character
than any used in the banner message.message Banner message text.
Mode
Global Configuration
banner login
Sets a message to display before user login. The no form of this command deletes an existingmessage (default).
Syntax
banner login c message c
no banner login [c message c]
Parameters
Parameter Description
c Delimiting character, any character isallowed but it must use a different character
than any used in the banner message.
message Banner message text.
Mode
Global Configuration
banner motdSets a message-of-the-day (MOTD) message to display before login message. The no form ofthis command deletes an existing message (default).
Syntax
banner motd c message c
-
8/2/2019 R1.9 SVSS Command Reference
50/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-32
no banner motd [c message c]
Parameters
Parameter Description
c Delimiting character, any character isallowed but it must use a different character
than any used in the banner message.
message Banner message text.
Mode
Global Configuration
bgpEnables the RCP to allow any integer as a valid router ID, including 0. The no form of thiscommand enables the RCP to reject bad router IDs (default).
Syntax
bgp allow-illegal-routerid
no bgp allow-illegal-routerid
Mode
Router Configuration (BGP)Address Family Configuration (IPv4 Unicast)Address Family Configuration (IPv4 Unicast VRF)Address Family Configuration (IPv6 Unicast VRF)
bgp client-to-client reflection
Enables route reflection from a BGP route reflector to clients (default). The no form of thiscommand disables client-to-client reflection.
Syntax
bgp client-to-client reflection
no bgp client-to-client reflection
Mode
Router Configuration (BGP)Address Family Configuration (IPv4 Unicast)
-
8/2/2019 R1.9 SVSS Command Reference
51/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-33
Address Family Configuration (IPv4 Unicast VRF)Address Family Configuration (IPv4 Multicast)Address Family Configuration (IPv6 Unicast)Address Family Configuration (IPv6 Unicast VRF)Address Family Configuration (IPv6 Multicast)Address Family Configuration (VPNv4 Unicast)
Address Family Configuration (VPNv4 Multicast)Address Family Configuration (VPNv6 Unicast)Address Family Configuration (VPNv6 Multicast)
bgp cluster-id
Sets the cluster ID for the routers acting as route reflectors if the BGP cluster has more thanone route reflector. The no form of this command removes the cluster ID.
Syntax
bgp cluster-id cluster-id
no bgp cluster-id [cluster-id]
Parameters
Parameter Description
cluster-id Cluster ID of this route reflector expressed
as a nonzero-32-bit-integer (1 to
4294967295) or a dotted decimal IP
address.
Mode
Router Configuration (BGP)Address Family Configuration (IPv4 Unicast)Address Family Configuration (IPv4 Unicast VRF)Address Family Configuration (IPv4 Multicast)Address Family Configuration (IPv6 Unicast)Address Family Configuration (IPv6 Unicast VRF)Address Family Configuration (IPv6 Multicast)Address Family Configuration (VPNv4 Unicast)Address Family Configuration (VPNv4 Multicast)
Address Family Configuration (VPNv6 Unicast)Address Family Configuration (VPNv6 Multicast)
bgp default ipv4-unicast
Sets the RCPs default address-family to IPv4-unicast (default). The no form of this commandcauses the RCP to not activate the IPv4-unicast address-family by default.
-
8/2/2019 R1.9 SVSS Command Reference
52/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-34
Syntax
bgp default ipv4-unicast
no bgp default ipv4-unicast
Mode
Router Configuration (BGP)Address Family Configuration (IPv4 Unicast)
bgp default route-target filter
Enables automatic BGP route-target community filtering. The no form of this command disablesthis feature.
Syntax
bgp default route-target filter
no bgp default route-target filter
Mode
Router Configuration (BGP)Address Family Configuration (IPv4 Unicast)
bgp fast-external-fallover
Enables the BGP sessions of any directly adjacent external peers to immediately reset if thelink used to reach them goes down (default). The no form of this command disables thisfunction.
Syntax
bgp fast-external-fallover
no bgp fast-external-fallover
Modes
Router Configuration (BGP)Address Family Configuration (IPv4 Unicast)Address Family Configuration (IPv4 Unicast VRF)Address Family Configuration (IPv6 Unicast VRF)
bgp log-neighbor-changes
-
8/2/2019 R1.9 SVSS Command Reference
53/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-35
Enables logging of BGP neighbor status changes (up or down) and resets. The no form of thiscommand disables the logging of changes (default).
Syntax
bgp log-neighbor-changes [access-list-id]
no bgp log-neighbor-changes [access-list-id]
Parameters
Parameter Description
access-list-id Neighbor changes are logged for neighbors
matching this access list.
Mode
Router Configuration (BGP)Address Family Configuration (IPv4 Unicast)Address Family Configuration (IPv4 Unicast VRF)Address Family Configuration (IPv6 Unicast VRF)
bgp peer-restart-timer
Sets the time gap between the command that is the cause of the peer reset and the actual peerreset. The no form of this command returns the timers to their default values.
Syntax
bgp peer-restart-timer {level-1 time-in-seconds| level-2 time-in-seconds| level-3 time-inseconds}
no bgp peer-restart-timer {level-1 [time-in-seconds] | level-2 [time-in-seconds] | level-3[timein-seconds]}
Parameters
Parameter Description Type/Range Default
level-1 time-in-
seconds
Period of time between thetrigger event and the peerreset for level-1 restarttimers
0 to 180 30
level-2 time-in-
seconds
Period of time between
the trigger event and the
peer reset for level-2
restart timers
0 to 180 20
-
8/2/2019 R1.9 SVSS Command Reference
54/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-36
level-3 time-in-
seconds
Period of time between
the trigger event and the
peer reset for
level-3 restart timers
0 to 180, 5
Mode
Router Configuration (BGP)Address Family Configuration (IPv4 Unicast)Address Family Configuration (IPv4 Unicast VRF)Address Family Configuration (IPv6 Unicast VRF)
Guidelines
This command is not available in Address-family Router Configuration Mode.
bgp reset-peer-on-illegal-nexthopEnables the RCP to shut down a peering session when an illegal next-hop is received from thatpeer. The no form of this command causes BGP to ignore incoming routes with illegal next-hops and keep the peering session up (default).
Syntax
bgp reset-peer-on-illegal-nexthop
no bgp reset-peer-on-illegal-nexthop
Modes
Router Configuration (BGP)Address Family Configuration (IPv4 Unicast)Address Family Configuration (IPv4 Unicast VRF)Address Family Configuration (IPv6 Unicast VRF)
Guidelines
Illegal nexthop values are 0.0.0.0, 0.*.*.*, the address of any local interface on this router, andany address in the range 224.*.*.* to 255.*.*.*.
bgp router-idSets the BGP router-id. The no form of this command sets the router-id to the default setting,which is the highest IP address on the RCP, or the highest loopback address on the RCP.
Syntax
bgp router-id ip-address
-
8/2/2019 R1.9 SVSS Command Reference
55/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-37
no bgp router-id [ip-address]
Parameters
Parameter Description
ip-address IP address of this router.
Mode
Router Configuration (BGP)Address Family Configuration (IPv4 Unicast)Address Family Configuration (IPv4 Unicast VRF)Address Family Configuration (IPv6 Unicast VRF)
bgp-topology-neighbor
To add a BGP neighbor into the RCP managed topology, use the bgp-topology-neighborcommand in topology-map configuration mode. Multiple BGP neighbor can be specified intopology map.
Syntax
bgp-topology-neighbor [md5 password [] ] [as-num ]
no bgp-topology-neighbor [md5 password [] ][as-num ]
Parameters
Parameter Description Type/Range Default
ip-address IP address of BGP neighbor String None
md5 [Optional] Use MD5 algorithm.
Password. String None
encrypted [Optional] Whether the
password will be encrypted for
display.
as-number Autonomous System ID Integer None
Mode
Topology map configuration
bmosp
The SVA calculates MOS values for RTP streams that are detected at an SVA monitoring point
-
8/2/2019 R1.9 SVSS Command Reference
56/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-38
and correspond to a session monitored by its associated SVP. For call sessions, the codecused has an associated nominal score. The actual calculated MOS may be better if measuredvalues are higher than default values or lower if network impairments affect the voice stream.Since the SVP attempts to isolate network impairments, the session quality is determined bycalculating a percentage using the calculated MOS and the nominal MOS.
There is no nominal MOS value defined for video codecs. A given video codec can adjust manyfactors which can significantly alter the perceived quality. These changes in quality areattributed to the codec itself and not related to the performance of the transport network. TheSVA generates a scaled MOS score based on network induced degradation. For each session,a degradation factor is computed: 0 meaning no impairment and 10 meaning the most severe.Measured network induced factors are used to generate a scaled MOS score which is higherthan the MOS value calculated based on the severity of the impairment. This scaled MOSscore can then be used to identify sessions that low quality based on the network impairmentmeasured for that session. The SVP calculates a percentage using the measured MOS and thescaled MOS.
Since nominal MOS is used for speech sessions and scaled MOS is used for video sessions,each session type has its own threshold value. Thresholds are defined to categorize sessions
as Bad, Poor, Fair and Good. The system compares the percentage value with the Bad, Poor,and then Fair thresholds in that order. If the value is less than or equal to a threshold, thecomparison stops. Otherwise the comparison continues to the next threshold value. Sessionswith a percentage greater than the Fair threshold are considered Good.
This command specifies the threshold to determine if a session has a bad MOS percentageand specifies the ratio of such sessions that would trigger an alert to be generated. All sessionswith a MOS percentage less than or equal to the configured value will be marked as having aBad MOS value. The command replaces the existing BMOS thresholds and/or the settings forthe intervals specified. The no form of the command with no arguments disables the BMOSPalert for all time intervals and returns the BMOS thresholds to their default value. The no form ofthe command with a single interval, regardless of set/clear threshold value, will disable theBMOSP alert for that time interval. The no form of the command with the BSMOS and/or
BVMOS value will return the threshold to its default value.
This command enables generation of alerts to the SVM and traps to the NMS. The setthreshold must be greater than or equal to the clear threshold.
Syntax
bmosp {[bsmos ] [bvmos ] [interval1set clear ] [interval2set clear ] [interval3set clear ] [interval4set clear] }
no bmosp {[bsmos ] [bvmos ] [interval1set clear ][interval2set clear ] [interval3set clear ] [interval4set clear ] }
Parameters
Parameter Description Type/Range Default
-
8/2/2019 R1.9 SVSS Command Reference
57/462
CLI Command Definitions
NetSocket, Inc. - Proprietary and Confidential 5-39
bsmos Bad Speech MOS
percentage threshold
value.
0-10