New commands
Configuration commands have been added to this release.
New base Vyatta NOS commands
New baseline configuration commands have been added to this release.
urn:vyatta.com:mgmt:vyatta-interfaces-switch-vif-dhcp-client
+ interfaces switch <name> vif <tagnode> dhcp-options no-rfc3442
urn:vyatta.com:mgmt:vyatta-interfaces-switch-vif-dhcpv6-client
+ interfaces switch <name> vif <tagnode> dhcpv6-options parameters-only
+ interfaces switch <name> vif <tagnode> dhcpv6-options prefix-delegation
+ interfaces switch <name> vif <tagnode> dhcpv6-options temporary
urn:vyatta.com:mgmt:vyatta-ndpi
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name anydesk
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name bloomberg
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name capwap
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name discord
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name doh_dot
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name iec60870
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name microsoft365
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name nats
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name s7comm
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name soap
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name teams
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name websocket
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi name zabbix
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol anydesk
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol bloomberg
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol capwap
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol discord
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol doh_dot
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol iec60870
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol microsoft365
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol nats
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol s7comm
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol soap
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol teams
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol websocket
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol zabbix
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi type connectivitycheck
+ security application firewall name <ruleset-name> rule <rule-number> engine ndpi type iot_scada
urn:vyatta.com:mgmt:vyatta-protocols-ospf
+ interfaces bonding <tagnode> ip ospf cost-fallback bandwidth-threshold <value>
+ interfaces bonding <tagnode> ip ospf cost-fallback cost <value>
+ interfaces bonding <tagnode> ip ospf database-filter
+ interfaces bonding <tagnode> vif <tagnode> ip ospf cost-fallback bandwidth-threshold <value>
+ interfaces bonding <tagnode> vif <tagnode> ip ospf cost-fallback cost <value>
+ interfaces bonding <tagnode> vif <tagnode> ip ospf database-filter
+ interfaces bridge <tagnode> ip ospf database-filter
+ interfaces dataplane <tagnode> ip ospf database-filter
+ interfaces dataplane <tagnode> vif <tagnode> ip ospf database-filter
+ interfaces l2tpeth <tagnode> ip ospf database-filter
+ interfaces l2tpeth <tagnode> vif <tagnode> ip ospf database-filter
+ interfaces loopback <tagnode> ip ospf database-filter
+ interfaces tunnel <tagnode> ip ospf database-filter
+ interfaces vti <tagnode> ip ospf database-filter
+ protocols ospf neighbor <tagnode> database-filter
+ protocols ospf process <instance> neighbor <tagnode> database-filter
urn:vyatta.com:mgmt:vyatta-protocols-ospf-routing-instance
+ routing routing-instance <instance-name> protocols ospf process <instance> neighbor <tagnode> database-filter
urn:vyatta.com:mgmt:vyatta-protocols-ospfv3
+ interfaces bonding <tagnode> ipv6 ospfv3 cost-fallback bandwidth-threshold <value>
+ interfaces bonding <tagnode> ipv6 ospfv3 cost-fallback cost <value>
+ interfaces bonding <tagnode> ipv6 ospfv3 database-filter
+ interfaces bonding <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces bonding <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces bonding <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces bonding <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces bonding <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
+ interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 cost-fallback bandwidth-threshold <value>
+ interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 cost-fallback cost <value>
+ interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 database-filter
+ interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
+ interfaces bridge <tagnode> ipv6 ospfv3 database-filter
+ interfaces bridge <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces bridge <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces bridge <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces bridge <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces bridge <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
+ interfaces dataplane <tagnode> ipv6 ospfv3 database-filter
+ interfaces dataplane <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces dataplane <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces dataplane <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces dataplane <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces dataplane <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
+ interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 database-filter
+ interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
+ interfaces l2tpeth <tagnode> ipv6 ospfv3 database-filter
+ interfaces l2tpeth <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces l2tpeth <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces l2tpeth <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces l2tpeth <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces l2tpeth <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
+ interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 database-filter
+ interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
+ interfaces loopback <tagnode> ipv6 ospfv3 database-filter
+ interfaces loopback <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces loopback <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces loopback <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces loopback <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces loopback <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
+ interfaces tunnel <tagnode> ipv6 ospfv3 database-filter
+ interfaces tunnel <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces tunnel <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces tunnel <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces tunnel <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces tunnel <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
+ interfaces vti <tagnode> ipv6 ospfv3 database-filter
+ interfaces vti <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces vti <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces vti <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces vti <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces vti <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
urn:vyatta.com:mgmt:vyatta-protocols-switch-vif-ospf
+ interfaces switch <name> vif <tagnode> ip ospf database-filter
urn:vyatta.com:mgmt:vyatta-protocols-switch-vif-ospfv3
+ interfaces switch <name> vif <tagnode> ipv6 ospfv3 database-filter
+ interfaces switch <name> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
+ interfaces switch <name> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
+ interfaces switch <name> vif <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
+ interfaces switch <name> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
+ interfaces switch <name> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
urn:vyatta.com:mgmt:vyatta-security-vpn-ipsec-cpu-affinity
+ security vpn ipsec cpu-affinity dataplane crypto <value>
+ security vpn ipsec cpu-affinity dataplane crypto-fwd <value>
urn:vyatta.com:mgmt:vyatta-service-ssh
+ service ssh client-alive-attempts <value>
+ service ssh client-alive-interval <value>
urn:vyatta.com:mgmt:vyatta-service-ssh-routing-instance
+ routing routing-instance <instance-name> service ssh client-alive-attempts <value>
+ routing routing-instance <instance-name> service ssh client-alive-interval <value>
urn:vyatta.com:mgmt:vyatta-system-network
+ system ip arp stale-time <value>
+ system ip arp table-size 1024
+ system ip arp table-size 131072
+ system ip arp table-size 16384
+ system ip arp table-size 2048
+ system ip arp table-size 32768
+ system ip arp table-size 4096
+ system ip arp table-size 65536
+ system ip arp table-size 8192
+ system ipv6 neighbor table-size 131072
urn:vyatta.com:mgmt:vyatta-system-password-requirements
+ system password requirements expiration maximum-days <value>
+ system password requirements history forbid-previous <value>
urn:vyatta.com:mgmt:vyatta-system-syslog-enhanced
+ system syslog-enhanced
+ system syslog-enhanced file <entry>
+ system syslog-enhanced file <entry> archive files <value>
+ system syslog-enhanced file <entry> archive size <value>
+ system syslog-enhanced file <entry> filename <value>
+ system syslog-enhanced host <entry>
+ system syslog-enhanced host <entry> hostname <value>
+ system syslog-enhanced host <entry> port <value>
+ system syslog-enhanced host <entry> protocol tcp
+ system syslog-enhanced host <entry> protocol udp
+ system syslog-enhanced host <entry> source-interface <value>
+ system syslog-enhanced host <entry> tls
+ system syslog-enhanced host <entry> tls authentication mode x509/fingerprint
+ system syslog-enhanced host <entry> tls authentication mode x509/name
+ system syslog-enhanced host <entry> tls authentication peers <peer>
+ system syslog-enhanced host <entry> tls authentication peers <peer> fingerprint <value>
+ system syslog-enhanced host <entry> tls cipher-suite <cipher>
+ system syslog-enhanced input journal rate-limit burst <value>
+ system syslog-enhanced input journal rate-limit interval <value>
+ system syslog-enhanced rule <rule-number>
+ system syslog-enhanced rule <rule-number> description <value>
+ system syslog-enhanced rule <rule-number> disable
+ system syslog-enhanced rule <rule-number> match facility all
+ system syslog-enhanced rule <rule-number> match facility auth
+ system syslog-enhanced rule <rule-number> match facility authpriv
+ system syslog-enhanced rule <rule-number> match facility cron
+ system syslog-enhanced rule <rule-number> match facility daemon
+ system syslog-enhanced rule <rule-number> match facility dataplane
+ system syslog-enhanced rule <rule-number> match facility kern
+ system syslog-enhanced rule <rule-number> match facility local0
+ system syslog-enhanced rule <rule-number> match facility local1
+ system syslog-enhanced rule <rule-number> match facility local2
+ system syslog-enhanced rule <rule-number> match facility local3
+ system syslog-enhanced rule <rule-number> match facility local4
+ system syslog-enhanced rule <rule-number> match facility local5
+ system syslog-enhanced rule <rule-number> match facility local6
+ system syslog-enhanced rule <rule-number> match facility local7
+ system syslog-enhanced rule <rule-number> match facility lpr
+ system syslog-enhanced rule <rule-number> match facility mail
+ system syslog-enhanced rule <rule-number> match facility mark
+ system syslog-enhanced rule <rule-number> match facility news
+ system syslog-enhanced rule <rule-number> match facility protocols
+ system syslog-enhanced rule <rule-number> match facility security
+ system syslog-enhanced rule <rule-number> match facility sensors
+ system syslog-enhanced rule <rule-number> match facility syslog
+ system syslog-enhanced rule <rule-number> match facility user
+ system syslog-enhanced rule <rule-number> match facility uucp
+ system syslog-enhanced rule <rule-number> match msg posix-match <regex>
+ system syslog-enhanced rule <rule-number> match msg posix-match <regex> unless <value>
+ system syslog-enhanced rule <rule-number> match severity at-least alert
+ system syslog-enhanced rule <rule-number> match severity at-least crit
+ system syslog-enhanced rule <rule-number> match severity at-least debug
+ system syslog-enhanced rule <rule-number> match severity at-least emerg
+ system syslog-enhanced rule <rule-number> match severity at-least err
+ system syslog-enhanced rule <rule-number> match severity at-least info
+ system syslog-enhanced rule <rule-number> match severity at-least notice
+ system syslog-enhanced rule <rule-number> match severity at-least warning
+ system syslog-enhanced rule <rule-number> match severity at-most alert
+ system syslog-enhanced rule <rule-number> match severity at-most crit
+ system syslog-enhanced rule <rule-number> match severity at-most debug
+ system syslog-enhanced rule <rule-number> match severity at-most emerg
+ system syslog-enhanced rule <rule-number> match severity at-most err
+ system syslog-enhanced rule <rule-number> match severity at-most info
+ system syslog-enhanced rule <rule-number> match severity at-most notice
+ system syslog-enhanced rule <rule-number> match severity at-most warning
+ system syslog-enhanced rule <rule-number> match severity equals alert
+ system syslog-enhanced rule <rule-number> match severity equals crit
+ system syslog-enhanced rule <rule-number> match severity equals debug
+ system syslog-enhanced rule <rule-number> match severity equals emerg
+ system syslog-enhanced rule <rule-number> match severity equals err
+ system syslog-enhanced rule <rule-number> match severity equals info
+ system syslog-enhanced rule <rule-number> match severity equals notice
+ system syslog-enhanced rule <rule-number> match severity equals warning
+ system syslog-enhanced rule <rule-number> match with-flag <value>
+ system syslog-enhanced rule <rule-number> match without-flag <value>
+ system syslog-enhanced rule <rule-number> otherwise clear-flag <value>
+ system syslog-enhanced rule <rule-number> otherwise console
+ system syslog-enhanced rule <rule-number> otherwise discard
+ system syslog-enhanced rule <rule-number> otherwise file <value>
+ system syslog-enhanced rule <rule-number> otherwise host <value>
+ system syslog-enhanced rule <rule-number> otherwise set-facility all
+ system syslog-enhanced rule <rule-number> otherwise set-facility auth
+ system syslog-enhanced rule <rule-number> otherwise set-facility authpriv
+ system syslog-enhanced rule <rule-number> otherwise set-facility cron
+ system syslog-enhanced rule <rule-number> otherwise set-facility daemon
+ system syslog-enhanced rule <rule-number> otherwise set-facility dataplane
+ system syslog-enhanced rule <rule-number> otherwise set-facility kern
+ system syslog-enhanced rule <rule-number> otherwise set-facility local0
+ system syslog-enhanced rule <rule-number> otherwise set-facility local1
+ system syslog-enhanced rule <rule-number> otherwise set-facility local2
+ system syslog-enhanced rule <rule-number> otherwise set-facility local3
+ system syslog-enhanced rule <rule-number> otherwise set-facility local4
+ system syslog-enhanced rule <rule-number> otherwise set-facility local5
+ system syslog-enhanced rule <rule-number> otherwise set-facility local6
+ system syslog-enhanced rule <rule-number> otherwise set-facility local7
+ system syslog-enhanced rule <rule-number> otherwise set-facility lpr
+ system syslog-enhanced rule <rule-number> otherwise set-facility mail
+ system syslog-enhanced rule <rule-number> otherwise set-facility mark
+ system syslog-enhanced rule <rule-number> otherwise set-facility news
+ system syslog-enhanced rule <rule-number> otherwise set-facility protocols
+ system syslog-enhanced rule <rule-number> otherwise set-facility security
+ system syslog-enhanced rule <rule-number> otherwise set-facility sensors
+ system syslog-enhanced rule <rule-number> otherwise set-facility syslog
+ system syslog-enhanced rule <rule-number> otherwise set-facility user
+ system syslog-enhanced rule <rule-number> otherwise set-facility uucp
+ system syslog-enhanced rule <rule-number> otherwise set-flag <value>
+ system syslog-enhanced rule <rule-number> otherwise set-indicator <value>
+ system syslog-enhanced rule <rule-number> otherwise set-severity alert
+ system syslog-enhanced rule <rule-number> otherwise set-severity crit
+ system syslog-enhanced rule <rule-number> otherwise set-severity debug
+ system syslog-enhanced rule <rule-number> otherwise set-severity emerg
+ system syslog-enhanced rule <rule-number> otherwise set-severity err
+ system syslog-enhanced rule <rule-number> otherwise set-severity info
+ system syslog-enhanced rule <rule-number> otherwise set-severity notice
+ system syslog-enhanced rule <rule-number> otherwise set-severity warning
+ system syslog-enhanced rule <rule-number> otherwise user <value>
+ system syslog-enhanced rule <rule-number> rate-limit <flag>
+ system syslog-enhanced rule <rule-number> rate-limit <flag> burst <value>
+ system syslog-enhanced rule <rule-number> rate-limit <flag> interval <value>
+ system syslog-enhanced rule <rule-number> rate-limit <flag> select-every-nth <value>
+ system syslog-enhanced rule <rule-number> then clear-flag <value>
+ system syslog-enhanced rule <rule-number> then console
+ system syslog-enhanced rule <rule-number> then discard
+ system syslog-enhanced rule <rule-number> then file <value>
+ system syslog-enhanced rule <rule-number> then host <value>
+ system syslog-enhanced rule <rule-number> then set-facility all
+ system syslog-enhanced rule <rule-number> then set-facility auth
+ system syslog-enhanced rule <rule-number> then set-facility authpriv
+ system syslog-enhanced rule <rule-number> then set-facility cron
+ system syslog-enhanced rule <rule-number> then set-facility daemon
+ system syslog-enhanced rule <rule-number> then set-facility dataplane
+ system syslog-enhanced rule <rule-number> then set-facility kern
+ system syslog-enhanced rule <rule-number> then set-facility local0
+ system syslog-enhanced rule <rule-number> then set-facility local1
+ system syslog-enhanced rule <rule-number> then set-facility local2
+ system syslog-enhanced rule <rule-number> then set-facility local3
+ system syslog-enhanced rule <rule-number> then set-facility local4
+ system syslog-enhanced rule <rule-number> then set-facility local5
+ system syslog-enhanced rule <rule-number> then set-facility local6
+ system syslog-enhanced rule <rule-number> then set-facility local7
+ system syslog-enhanced rule <rule-number> then set-facility lpr
+ system syslog-enhanced rule <rule-number> then set-facility mail
+ system syslog-enhanced rule <rule-number> then set-facility mark
+ system syslog-enhanced rule <rule-number> then set-facility news
+ system syslog-enhanced rule <rule-number> then set-facility protocols
+ system syslog-enhanced rule <rule-number> then set-facility security
+ system syslog-enhanced rule <rule-number> then set-facility sensors
+ system syslog-enhanced rule <rule-number> then set-facility syslog
+ system syslog-enhanced rule <rule-number> then set-facility user
+ system syslog-enhanced rule <rule-number> then set-facility uucp
+ system syslog-enhanced rule <rule-number> then set-flag <value>
+ system syslog-enhanced rule <rule-number> then set-indicator <value>
+ system syslog-enhanced rule <rule-number> then set-severity alert
+ system syslog-enhanced rule <rule-number> then set-severity crit
+ system syslog-enhanced rule <rule-number> then set-severity debug
+ system syslog-enhanced rule <rule-number> then set-severity emerg
+ system syslog-enhanced rule <rule-number> then set-severity err
+ system syslog-enhanced rule <rule-number> then set-severity info
+ system syslog-enhanced rule <rule-number> then set-severity notice
+ system syslog-enhanced rule <rule-number> then set-severity warning
+ system syslog-enhanced rule <rule-number> then user <value>
+ system syslog-enhanced tls
+ system syslog-enhanced tls certificate-authority <CA>
+ system syslog-enhanced tls certificate-authority <CA> file <value>
+ system syslog-enhanced tls local-certificate certificate <value>
+ system syslog-enhanced tls local-certificate key <value>
urn:vyatta.com:mgmt:vyatta-system-syslog-enhanced-routing-instance
+ system syslog-enhanced host <entry> routing-instance <value>
UfiSpace S9500-30XS
UfiSpace S9500-30XS configuration commands have been added to this release.
urn:vyatta.com:mgmt:vyatta-policy-qos
+ interfaces bonding <tagnode> switch-group port-parameters policy qos <value>
- policy egress-map <id> designation <id>
- policy egress-map <id> designation <id> dscp <value>
- policy egress-map <id> designation <id> pcp <value>
+ policy egress-map <id> dscp-group <id>
+ policy egress-map <id> dscp-group <id> dscp <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> mark-probability <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> max-threshold <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> min-threshold <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> mark-probability <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> max-threshold <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> min-threshold <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time filter-weight <value>
+ policy qos name <id> shaper traffic-class <id> queue-limit-time <value>
+ policy qos profile <id> queue <id> wred-map-time
+ policy qos profile <id> queue <id> wred-map-time drop-precedence <colour>
+ policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> mark-probability <value>
+ policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> max-threshold <value>
+ policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> min-threshold <value>
+ policy qos profile <id> queue <id> wred-map-time dscp-group <group-name>
+ policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> mark-probability <value>
+ policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> max-threshold <value>
+ policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> min-threshold <value>
+ policy qos profile <id> queue <id> wred-map-time filter-weight <value>
urn:vyatta.com:mgmt:vyatta-service-ptp
+ service ptp instance <instance-number> clock-profile vyatta-g.8275.1-v1:g.8275.1-forwardable-profile
+ service ptp instance <instance-number> clock-profile vyatta-g.8275.1-v1:g.8275.1-non-forwardable-profile
UfiSpace S9700-53DX
UfiSpace S9700-53DX configuration commands have been added to this release.
urn:vyatta.com:mgmt:vyatta-interfaces-bonding-storm-control
+ interfaces bonding <tagnode> vif <tagnode> storm-control profile <value>
urn:vyatta.com:mgmt:vyatta-ippf
- security ip-packet-filter group <group-name> rule <number> match protocol final
- security ip-packet-filter group <group-name> rule <number> match protocol final name dccp
- security ip-packet-filter group <group-name> rule <number> match protocol final name esp
- security ip-packet-filter group <group-name> rule <number> match protocol final name gre
- security ip-packet-filter group <group-name> rule <number> match protocol final name icmp
- security ip-packet-filter group <group-name> rule <number> match protocol final name igmp
- security ip-packet-filter group <group-name> rule <number> match protocol final name ipv6-frag
- security ip-packet-filter group <group-name> rule <number> match protocol final name ipv6-icmp
- security ip-packet-filter group <group-name> rule <number> match protocol final name sctp
- security ip-packet-filter group <group-name> rule <number> match protocol final name tcp
- security ip-packet-filter group <group-name> rule <number> match protocol final name udp
- security ip-packet-filter group <group-name> rule <number> match protocol final name udplite
- security ip-packet-filter group <group-name> rule <number> match protocol final number <value>
urn:vyatta.com:mgmt:vyatta-policy-filter-classification
+ interfaces dataplane <tagnode> policy filter-classification-group <value>
+ policy filter-classification
+ policy filter-classification group <group-name>
+ policy filter-classification group <group-name> classifier <classifier-name>
+ policy filter-classification group <group-name> classifier <classifier-name> description <value>
+ policy filter-classification group <group-name> classifier <classifier-name> import <value>
+ policy filter-classification group <group-name> classifier <classifier-name> type ipv4
+ policy filter-classification group <group-name> classifier <classifier-name> type ipv6
+ policy filter-classification group <group-name> classify <value>
+ policy filter-classification group <group-name> counters
+ policy filter-classification group <group-name> counters sharing per-interface
+ policy filter-classification group <group-name> counters type auto-per-rule
+ policy filter-classification group <group-name> description <value>
+ policy filter-classification group <group-name> map result <result>
+ policy filter-classification group <group-name> map result <result> action
+ policy filter-classification group <group-name> map result <result> action mark designation <value>
+ policy filter-classification group <group-name> map result <result> action mark drop-precedence green
+ policy filter-classification group <group-name> map result <result> action mark drop-precedence red
+ policy filter-classification group <group-name> map result <result> action mark drop-precedence yellow
+ policy filter-classification group <group-name> map result <result> action police
+ policy filter-classification group <group-name> map result <result> action police bandwidth <value>
+ policy filter-classification group <group-name> map result <result> action police burst <value>
+ policy filter-classification group <group-name> map result <result> action police colour-awareness colour-aware
+ policy filter-classification group <group-name> map result <result> action police colour-awareness colour-unaware
+ policy filter-classification group <group-name> map result <result> action police excess-bandwidth <value>
+ policy filter-classification group <group-name> map result <result> action police excess-burst <value>
urn:vyatta.com:mgmt:vyatta-policy-qos
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> mark-probability <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> max-threshold <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> min-threshold <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> mark-probability <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> max-threshold <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> min-threshold <value>
+ policy qos name <id> shaper profile <id> queue <id> wred-map-time filter-weight <value>
+ policy qos name <id> shaper traffic-class <id> queue-limit-time <value>
+ policy qos profile <id> queue <id> wred-map-time
+ policy qos profile <id> queue <id> wred-map-time drop-precedence <colour>
+ policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> mark-probability <value>
+ policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> max-threshold <value>
+ policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> min-threshold <value>
+ policy qos profile <id> queue <id> wred-map-time dscp-group <group-name>
+ policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> mark-probability <value>
+ policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> max-threshold <value>
+ policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> min-threshold <value>
+ policy qos profile <id> queue <id> wred-map-time filter-weight <value>
urn:vyatta.com:mgmt:vyatta-protocols-bfd-micro-bfd-broadcom-stratadnx
+ interfaces bonding <tagnode> bfd micro destination <destination-address>
+ interfaces bonding <tagnode> bfd micro destination <destination-address> source <source-address>
+ interfaces bonding <tagnode> bfd micro destination <destination-address> source <source-address> template <value>
+ interfaces bonding <tagnode> bfd micro template <value>
urn:vyatta.com:mgmt:vyatta-resources-packet-classifier
+ resources packet-classifier
+ resources packet-classifier classifier <classifier-name>
+ resources packet-classifier classifier <classifier-name> description <value>
+ resources packet-classifier classifier <classifier-name> results <result>
+ resources packet-classifier classifier <classifier-name> rule <number>
+ resources packet-classifier classifier <classifier-name> rule <number> description <value>
+ resources packet-classifier classifier <classifier-name> rule <number> disable
+ resources packet-classifier classifier <classifier-name> rule <number> match destination ipv4
+ resources packet-classifier classifier <classifier-name> rule <number> match destination ipv4 host <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match destination ipv4 prefix <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match destination ipv6
+ resources packet-classifier classifier <classifier-name> rule <number> match destination ipv6 host <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match destination ipv6 prefix <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match destination port number <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af11
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af12
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af13
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af21
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af22
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af23
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af31
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af32
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af33
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af41
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af42
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name af43
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs1
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs2
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs3
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs4
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs5
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs6
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs7
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name default
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name ef
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp name va
+ resources packet-classifier classifier <classifier-name> rule <number> match dscp value <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match fragment any
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name TOS-host-redirect
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name TOS-host-unreachable
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name TOS-network-redirect
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name TOS-network-unreachable
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name address-mask-reply
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name address-mask-request
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name communication-prohibited
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name destination-unreachable
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name echo-reply
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name echo-request
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name fragmentation-needed
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name host-precedence-violation
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name host-prohibited
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name host-redirect
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name host-unknown
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name host-unreachable
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name ip-header-bad
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name network-prohibited
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name network-redirect
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name network-unknown
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name network-unreachable
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name parameter-problem
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name port-unreachable
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name precedence-cutoff
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name protocol-unreachable
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name redirect
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name required-option-missing
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name router-advertisement
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name router-solicitation
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name source-quench
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name source-route-failed
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name time-exceeded
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name timestamp-reply
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name timestamp-request
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name ttl-zero-during-reassembly
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp name ttl-zero-during-transit
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp type <type-number>
+ resources packet-classifier classifier <classifier-name> rule <number> match icmp type <type-number> code <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 class error
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 class info
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name address-unreachable
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name bad-header
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name communication-prohibited
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name destination-unreachable
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name echo-reply
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name echo-request
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name mobile-prefix-advertisement
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name mobile-prefix-solicitation
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name multicast-listener-done
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name multicast-listener-query
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name multicast-listener-report
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name neighbor-advertisement
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name neighbor-solicitation
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name no-route
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name packet-too-big
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name parameter-problem
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name port-unreachable
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name redirect
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name router-advertisement
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name router-solicitation
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name time-exceeded
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name ttl-zero-during-reassembly
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name ttl-zero-during-transit
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name unknown-header-type
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name unknown-option
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 type <type-number>
+ resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 type <type-number> code <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name dccp
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name esp
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name gre
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name icmp
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name igmp
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name ipv6-frag
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name ipv6-icmp
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name sctp
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name tcp
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name udp
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base name udplite
+ resources packet-classifier classifier <classifier-name> rule <number> match protocol base number <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match source ipv4
+ resources packet-classifier classifier <classifier-name> rule <number> match source ipv4 host <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match source ipv4 prefix <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match source ipv6
+ resources packet-classifier classifier <classifier-name> rule <number> match source ipv6 host <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match source ipv6 prefix <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match source port number <value>
+ resources packet-classifier classifier <classifier-name> rule <number> match ttl equals <value>
+ resources packet-classifier classifier <classifier-name> rule <number> result <value>
+ resources packet-classifier classifier <classifier-name> type ipv4
+ resources packet-classifier classifier <classifier-name> type ipv6
urn:vyatta.com:mgmt:vyatta-security-storm-control
+ interfaces dataplane <tagnode> vif <tagnode> storm-control profile <value>