Vyatta Network OS Documentation

Learn how to install, configure and operate the Vyatta NOS, which helps drive our virtual networking & physical platforms portfolio.

Show Page Sections

New commands

Configuration commands have been added to this release.

New base Vyatta NOS commands

New baseline configuration commands have been added to this release.

urn:vyatta.com:mgmt:vyatta-interfaces-switch-vif-dhcp-client
  + interfaces switch <name> vif <tagnode> dhcp-options no-rfc3442

urn:vyatta.com:mgmt:vyatta-interfaces-switch-vif-dhcpv6-client
  + interfaces switch <name> vif <tagnode> dhcpv6-options parameters-only
  + interfaces switch <name> vif <tagnode> dhcpv6-options prefix-delegation
  + interfaces switch <name> vif <tagnode> dhcpv6-options temporary

urn:vyatta.com:mgmt:vyatta-ndpi
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name anydesk
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name bloomberg
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name capwap
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name discord
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name doh_dot
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name iec60870
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name microsoft365
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name nats
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name s7comm
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name soap
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name teams
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name websocket
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi name zabbix
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol anydesk
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol bloomberg
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol capwap
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol discord
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol doh_dot
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol iec60870
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol microsoft365
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol nats
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol s7comm
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol soap
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol teams
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol websocket
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi protocol zabbix
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi type connectivitycheck
  + security application firewall name <ruleset-name> rule <rule-number> engine ndpi type iot_scada

urn:vyatta.com:mgmt:vyatta-protocols-ospf
  + interfaces bonding <tagnode> ip ospf cost-fallback bandwidth-threshold <value>
  + interfaces bonding <tagnode> ip ospf cost-fallback cost <value>
  + interfaces bonding <tagnode> ip ospf database-filter
  + interfaces bonding <tagnode> vif <tagnode> ip ospf cost-fallback bandwidth-threshold <value>
  + interfaces bonding <tagnode> vif <tagnode> ip ospf cost-fallback cost <value>
  + interfaces bonding <tagnode> vif <tagnode> ip ospf database-filter
  + interfaces bridge <tagnode> ip ospf database-filter
  + interfaces dataplane <tagnode> ip ospf database-filter
  + interfaces dataplane <tagnode> vif <tagnode> ip ospf database-filter
  + interfaces l2tpeth <tagnode> ip ospf database-filter
  + interfaces l2tpeth <tagnode> vif <tagnode> ip ospf database-filter
  + interfaces loopback <tagnode> ip ospf database-filter
  + interfaces tunnel <tagnode> ip ospf database-filter
  + interfaces vti <tagnode> ip ospf database-filter
  + protocols ospf neighbor <tagnode> database-filter
  + protocols ospf process <instance> neighbor <tagnode> database-filter

urn:vyatta.com:mgmt:vyatta-protocols-ospf-routing-instance
  + routing routing-instance <instance-name> protocols ospf process <instance> neighbor <tagnode> database-filter

urn:vyatta.com:mgmt:vyatta-protocols-ospfv3
  + interfaces bonding <tagnode> ipv6 ospfv3 cost-fallback bandwidth-threshold <value>
  + interfaces bonding <tagnode> ipv6 ospfv3 cost-fallback cost <value>
  + interfaces bonding <tagnode> ipv6 ospfv3 database-filter
  + interfaces bonding <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces bonding <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces bonding <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces bonding <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces bonding <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
  + interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 cost-fallback bandwidth-threshold <value>
  + interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 cost-fallback cost <value>
  + interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 database-filter
  + interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces bonding <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
  + interfaces bridge <tagnode> ipv6 ospfv3 database-filter
  + interfaces bridge <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces bridge <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces bridge <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces bridge <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces bridge <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
  + interfaces dataplane <tagnode> ipv6 ospfv3 database-filter
  + interfaces dataplane <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces dataplane <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces dataplane <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces dataplane <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces dataplane <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
  + interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 database-filter
  + interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces dataplane <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
  + interfaces l2tpeth <tagnode> ipv6 ospfv3 database-filter
  + interfaces l2tpeth <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces l2tpeth <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces l2tpeth <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces l2tpeth <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces l2tpeth <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
  + interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 database-filter
  + interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces l2tpeth <tagnode> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
  + interfaces loopback <tagnode> ipv6 ospfv3 database-filter
  + interfaces loopback <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces loopback <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces loopback <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces loopback <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces loopback <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
  + interfaces tunnel <tagnode> ipv6 ospfv3 database-filter
  + interfaces tunnel <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces tunnel <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces tunnel <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces tunnel <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces tunnel <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter
  + interfaces vti <tagnode> ipv6 ospfv3 database-filter
  + interfaces vti <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces vti <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces vti <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces vti <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces vti <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter

urn:vyatta.com:mgmt:vyatta-protocols-switch-vif-ospf
  + interfaces switch <name> vif <tagnode> ip ospf database-filter

urn:vyatta.com:mgmt:vyatta-protocols-switch-vif-ospfv3
  + interfaces switch <name> vif <tagnode> ipv6 ospfv3 database-filter
  + interfaces switch <name> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> database-filter
  + interfaces switch <name> vif <tagnode> ipv6 ospfv3 instance-id <instance-id> neighbor <tagnode> database-filter
  + interfaces switch <name> vif <tagnode> ipv6 ospfv3 neighbor <tagnode> database-filter
  + interfaces switch <name> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> database-filter
  + interfaces switch <name> vif <tagnode> ipv6 ospfv3 process <tagnode> instance-id <tagnode> neighbor <tagnode> database-filter

urn:vyatta.com:mgmt:vyatta-security-vpn-ipsec-cpu-affinity
  + security vpn ipsec cpu-affinity dataplane crypto <value>
  + security vpn ipsec cpu-affinity dataplane crypto-fwd <value>

urn:vyatta.com:mgmt:vyatta-service-ssh
  + service ssh client-alive-attempts <value>
  + service ssh client-alive-interval <value>

urn:vyatta.com:mgmt:vyatta-service-ssh-routing-instance
  + routing routing-instance <instance-name> service ssh client-alive-attempts <value>
  + routing routing-instance <instance-name> service ssh client-alive-interval <value>

urn:vyatta.com:mgmt:vyatta-system-network
  + system ip arp stale-time <value>
  + system ip arp table-size 1024
  + system ip arp table-size 131072
  + system ip arp table-size 16384
  + system ip arp table-size 2048
  + system ip arp table-size 32768
  + system ip arp table-size 4096
  + system ip arp table-size 65536
  + system ip arp table-size 8192
  + system ipv6 neighbor table-size 131072

urn:vyatta.com:mgmt:vyatta-system-password-requirements
  + system password requirements expiration maximum-days <value>
  + system password requirements history forbid-previous <value>

urn:vyatta.com:mgmt:vyatta-system-syslog-enhanced
  + system syslog-enhanced
  + system syslog-enhanced file <entry>
  + system syslog-enhanced file <entry> archive files <value>
  + system syslog-enhanced file <entry> archive size <value>
  + system syslog-enhanced file <entry> filename <value>
  + system syslog-enhanced host <entry>
  + system syslog-enhanced host <entry> hostname <value>
  + system syslog-enhanced host <entry> port <value>
  + system syslog-enhanced host <entry> protocol tcp
  + system syslog-enhanced host <entry> protocol udp
  + system syslog-enhanced host <entry> source-interface <value>
  + system syslog-enhanced host <entry> tls
  + system syslog-enhanced host <entry> tls authentication mode x509/fingerprint
  + system syslog-enhanced host <entry> tls authentication mode x509/name
  + system syslog-enhanced host <entry> tls authentication peers <peer>
  + system syslog-enhanced host <entry> tls authentication peers <peer> fingerprint <value>
  + system syslog-enhanced host <entry> tls cipher-suite <cipher>
  + system syslog-enhanced input journal rate-limit burst <value>
  + system syslog-enhanced input journal rate-limit interval <value>
  + system syslog-enhanced rule <rule-number>
  + system syslog-enhanced rule <rule-number> description <value>
  + system syslog-enhanced rule <rule-number> disable
  + system syslog-enhanced rule <rule-number> match facility all
  + system syslog-enhanced rule <rule-number> match facility auth
  + system syslog-enhanced rule <rule-number> match facility authpriv
  + system syslog-enhanced rule <rule-number> match facility cron
  + system syslog-enhanced rule <rule-number> match facility daemon
  + system syslog-enhanced rule <rule-number> match facility dataplane
  + system syslog-enhanced rule <rule-number> match facility kern
  + system syslog-enhanced rule <rule-number> match facility local0
  + system syslog-enhanced rule <rule-number> match facility local1
  + system syslog-enhanced rule <rule-number> match facility local2
  + system syslog-enhanced rule <rule-number> match facility local3
  + system syslog-enhanced rule <rule-number> match facility local4
  + system syslog-enhanced rule <rule-number> match facility local5
  + system syslog-enhanced rule <rule-number> match facility local6
  + system syslog-enhanced rule <rule-number> match facility local7
  + system syslog-enhanced rule <rule-number> match facility lpr
  + system syslog-enhanced rule <rule-number> match facility mail
  + system syslog-enhanced rule <rule-number> match facility mark
  + system syslog-enhanced rule <rule-number> match facility news
  + system syslog-enhanced rule <rule-number> match facility protocols
  + system syslog-enhanced rule <rule-number> match facility security
  + system syslog-enhanced rule <rule-number> match facility sensors
  + system syslog-enhanced rule <rule-number> match facility syslog
  + system syslog-enhanced rule <rule-number> match facility user
  + system syslog-enhanced rule <rule-number> match facility uucp
  + system syslog-enhanced rule <rule-number> match msg posix-match <regex>
  + system syslog-enhanced rule <rule-number> match msg posix-match <regex> unless <value>
  + system syslog-enhanced rule <rule-number> match severity at-least alert
  + system syslog-enhanced rule <rule-number> match severity at-least crit
  + system syslog-enhanced rule <rule-number> match severity at-least debug
  + system syslog-enhanced rule <rule-number> match severity at-least emerg
  + system syslog-enhanced rule <rule-number> match severity at-least err
  + system syslog-enhanced rule <rule-number> match severity at-least info
  + system syslog-enhanced rule <rule-number> match severity at-least notice
  + system syslog-enhanced rule <rule-number> match severity at-least warning
  + system syslog-enhanced rule <rule-number> match severity at-most alert
  + system syslog-enhanced rule <rule-number> match severity at-most crit
  + system syslog-enhanced rule <rule-number> match severity at-most debug
  + system syslog-enhanced rule <rule-number> match severity at-most emerg
  + system syslog-enhanced rule <rule-number> match severity at-most err
  + system syslog-enhanced rule <rule-number> match severity at-most info
  + system syslog-enhanced rule <rule-number> match severity at-most notice
  + system syslog-enhanced rule <rule-number> match severity at-most warning
  + system syslog-enhanced rule <rule-number> match severity equals alert
  + system syslog-enhanced rule <rule-number> match severity equals crit
  + system syslog-enhanced rule <rule-number> match severity equals debug
  + system syslog-enhanced rule <rule-number> match severity equals emerg
  + system syslog-enhanced rule <rule-number> match severity equals err
  + system syslog-enhanced rule <rule-number> match severity equals info
  + system syslog-enhanced rule <rule-number> match severity equals notice
  + system syslog-enhanced rule <rule-number> match severity equals warning
  + system syslog-enhanced rule <rule-number> match with-flag <value>
  + system syslog-enhanced rule <rule-number> match without-flag <value>
  + system syslog-enhanced rule <rule-number> otherwise clear-flag <value>
  + system syslog-enhanced rule <rule-number> otherwise console
  + system syslog-enhanced rule <rule-number> otherwise discard
  + system syslog-enhanced rule <rule-number> otherwise file <value>
  + system syslog-enhanced rule <rule-number> otherwise host <value>
  + system syslog-enhanced rule <rule-number> otherwise set-facility all
  + system syslog-enhanced rule <rule-number> otherwise set-facility auth
  + system syslog-enhanced rule <rule-number> otherwise set-facility authpriv
  + system syslog-enhanced rule <rule-number> otherwise set-facility cron
  + system syslog-enhanced rule <rule-number> otherwise set-facility daemon
  + system syslog-enhanced rule <rule-number> otherwise set-facility dataplane
  + system syslog-enhanced rule <rule-number> otherwise set-facility kern
  + system syslog-enhanced rule <rule-number> otherwise set-facility local0
  + system syslog-enhanced rule <rule-number> otherwise set-facility local1
  + system syslog-enhanced rule <rule-number> otherwise set-facility local2
  + system syslog-enhanced rule <rule-number> otherwise set-facility local3
  + system syslog-enhanced rule <rule-number> otherwise set-facility local4
  + system syslog-enhanced rule <rule-number> otherwise set-facility local5
  + system syslog-enhanced rule <rule-number> otherwise set-facility local6
  + system syslog-enhanced rule <rule-number> otherwise set-facility local7
  + system syslog-enhanced rule <rule-number> otherwise set-facility lpr
  + system syslog-enhanced rule <rule-number> otherwise set-facility mail
  + system syslog-enhanced rule <rule-number> otherwise set-facility mark
  + system syslog-enhanced rule <rule-number> otherwise set-facility news
  + system syslog-enhanced rule <rule-number> otherwise set-facility protocols
  + system syslog-enhanced rule <rule-number> otherwise set-facility security
  + system syslog-enhanced rule <rule-number> otherwise set-facility sensors
  + system syslog-enhanced rule <rule-number> otherwise set-facility syslog
  + system syslog-enhanced rule <rule-number> otherwise set-facility user
  + system syslog-enhanced rule <rule-number> otherwise set-facility uucp
  + system syslog-enhanced rule <rule-number> otherwise set-flag <value>
  + system syslog-enhanced rule <rule-number> otherwise set-indicator <value>
  + system syslog-enhanced rule <rule-number> otherwise set-severity alert
  + system syslog-enhanced rule <rule-number> otherwise set-severity crit
  + system syslog-enhanced rule <rule-number> otherwise set-severity debug
  + system syslog-enhanced rule <rule-number> otherwise set-severity emerg
  + system syslog-enhanced rule <rule-number> otherwise set-severity err
  + system syslog-enhanced rule <rule-number> otherwise set-severity info
  + system syslog-enhanced rule <rule-number> otherwise set-severity notice
  + system syslog-enhanced rule <rule-number> otherwise set-severity warning
  + system syslog-enhanced rule <rule-number> otherwise user <value>
  + system syslog-enhanced rule <rule-number> rate-limit <flag>
  + system syslog-enhanced rule <rule-number> rate-limit <flag> burst <value>
  + system syslog-enhanced rule <rule-number> rate-limit <flag> interval <value>
  + system syslog-enhanced rule <rule-number> rate-limit <flag> select-every-nth <value>
  + system syslog-enhanced rule <rule-number> then clear-flag <value>
  + system syslog-enhanced rule <rule-number> then console
  + system syslog-enhanced rule <rule-number> then discard
  + system syslog-enhanced rule <rule-number> then file <value>
  + system syslog-enhanced rule <rule-number> then host <value>
  + system syslog-enhanced rule <rule-number> then set-facility all
  + system syslog-enhanced rule <rule-number> then set-facility auth
  + system syslog-enhanced rule <rule-number> then set-facility authpriv
  + system syslog-enhanced rule <rule-number> then set-facility cron
  + system syslog-enhanced rule <rule-number> then set-facility daemon
  + system syslog-enhanced rule <rule-number> then set-facility dataplane
  + system syslog-enhanced rule <rule-number> then set-facility kern
  + system syslog-enhanced rule <rule-number> then set-facility local0
  + system syslog-enhanced rule <rule-number> then set-facility local1
  + system syslog-enhanced rule <rule-number> then set-facility local2
  + system syslog-enhanced rule <rule-number> then set-facility local3
  + system syslog-enhanced rule <rule-number> then set-facility local4
  + system syslog-enhanced rule <rule-number> then set-facility local5
  + system syslog-enhanced rule <rule-number> then set-facility local6
  + system syslog-enhanced rule <rule-number> then set-facility local7
  + system syslog-enhanced rule <rule-number> then set-facility lpr
  + system syslog-enhanced rule <rule-number> then set-facility mail
  + system syslog-enhanced rule <rule-number> then set-facility mark
  + system syslog-enhanced rule <rule-number> then set-facility news
  + system syslog-enhanced rule <rule-number> then set-facility protocols
  + system syslog-enhanced rule <rule-number> then set-facility security
  + system syslog-enhanced rule <rule-number> then set-facility sensors
  + system syslog-enhanced rule <rule-number> then set-facility syslog
  + system syslog-enhanced rule <rule-number> then set-facility user
  + system syslog-enhanced rule <rule-number> then set-facility uucp
  + system syslog-enhanced rule <rule-number> then set-flag <value>
  + system syslog-enhanced rule <rule-number> then set-indicator <value>
  + system syslog-enhanced rule <rule-number> then set-severity alert
  + system syslog-enhanced rule <rule-number> then set-severity crit
  + system syslog-enhanced rule <rule-number> then set-severity debug
  + system syslog-enhanced rule <rule-number> then set-severity emerg
  + system syslog-enhanced rule <rule-number> then set-severity err
  + system syslog-enhanced rule <rule-number> then set-severity info
  + system syslog-enhanced rule <rule-number> then set-severity notice
  + system syslog-enhanced rule <rule-number> then set-severity warning
  + system syslog-enhanced rule <rule-number> then user <value>
  + system syslog-enhanced tls
  + system syslog-enhanced tls certificate-authority <CA>
  + system syslog-enhanced tls certificate-authority <CA> file <value>
  + system syslog-enhanced tls local-certificate certificate <value>
  + system syslog-enhanced tls local-certificate key <value>

urn:vyatta.com:mgmt:vyatta-system-syslog-enhanced-routing-instance
  + system syslog-enhanced host <entry> routing-instance <value>

UfiSpace S9500-30XS

UfiSpace S9500-30XS configuration commands have been added to this release.

urn:vyatta.com:mgmt:vyatta-policy-qos
  + interfaces bonding <tagnode> switch-group port-parameters policy qos <value>
  - policy egress-map <id> designation <id>
  - policy egress-map <id> designation <id> dscp <value>
  - policy egress-map <id> designation <id> pcp <value>
  + policy egress-map <id> dscp-group <id>
  + policy egress-map <id> dscp-group <id> dscp <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> mark-probability <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> max-threshold <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> min-threshold <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> mark-probability <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> max-threshold <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> min-threshold <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time filter-weight <value>
  + policy qos name <id> shaper traffic-class <id> queue-limit-time <value>
  + policy qos profile <id> queue <id> wred-map-time
  + policy qos profile <id> queue <id> wred-map-time drop-precedence <colour>
  + policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> mark-probability <value>
  + policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> max-threshold <value>
  + policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> min-threshold <value>
  + policy qos profile <id> queue <id> wred-map-time dscp-group <group-name>
  + policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> mark-probability <value>
  + policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> max-threshold <value>
  + policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> min-threshold <value>
  + policy qos profile <id> queue <id> wred-map-time filter-weight <value>

urn:vyatta.com:mgmt:vyatta-service-ptp
  + service ptp instance <instance-number> clock-profile vyatta-g.8275.1-v1:g.8275.1-forwardable-profile
  + service ptp instance <instance-number> clock-profile vyatta-g.8275.1-v1:g.8275.1-non-forwardable-profile

UfiSpace S9700-53DX

UfiSpace S9700-53DX configuration commands have been added to this release.

urn:vyatta.com:mgmt:vyatta-interfaces-bonding-storm-control
  + interfaces bonding <tagnode> vif <tagnode> storm-control profile <value>


urn:vyatta.com:mgmt:vyatta-ippf
  - security ip-packet-filter group <group-name> rule <number> match protocol final
  - security ip-packet-filter group <group-name> rule <number> match protocol final name dccp
  - security ip-packet-filter group <group-name> rule <number> match protocol final name esp
  - security ip-packet-filter group <group-name> rule <number> match protocol final name gre
  - security ip-packet-filter group <group-name> rule <number> match protocol final name icmp
  - security ip-packet-filter group <group-name> rule <number> match protocol final name igmp
  - security ip-packet-filter group <group-name> rule <number> match protocol final name ipv6-frag
  - security ip-packet-filter group <group-name> rule <number> match protocol final name ipv6-icmp
  - security ip-packet-filter group <group-name> rule <number> match protocol final name sctp
  - security ip-packet-filter group <group-name> rule <number> match protocol final name tcp
  - security ip-packet-filter group <group-name> rule <number> match protocol final name udp
  - security ip-packet-filter group <group-name> rule <number> match protocol final name udplite
  - security ip-packet-filter group <group-name> rule <number> match protocol final number <value>


urn:vyatta.com:mgmt:vyatta-policy-filter-classification
  + interfaces dataplane <tagnode> policy filter-classification-group <value>
  + policy filter-classification
  + policy filter-classification group <group-name>
  + policy filter-classification group <group-name> classifier <classifier-name>
  + policy filter-classification group <group-name> classifier <classifier-name> description <value>
  + policy filter-classification group <group-name> classifier <classifier-name> import <value>
  + policy filter-classification group <group-name> classifier <classifier-name> type ipv4
  + policy filter-classification group <group-name> classifier <classifier-name> type ipv6
  + policy filter-classification group <group-name> classify <value>
  + policy filter-classification group <group-name> counters
  + policy filter-classification group <group-name> counters sharing per-interface
  + policy filter-classification group <group-name> counters type auto-per-rule
  + policy filter-classification group <group-name> description <value>
  + policy filter-classification group <group-name> map result <result>
  + policy filter-classification group <group-name> map result <result> action
  + policy filter-classification group <group-name> map result <result> action mark designation <value>
  + policy filter-classification group <group-name> map result <result> action mark drop-precedence green
  + policy filter-classification group <group-name> map result <result> action mark drop-precedence red
  + policy filter-classification group <group-name> map result <result> action mark drop-precedence yellow
  + policy filter-classification group <group-name> map result <result> action police
  + policy filter-classification group <group-name> map result <result> action police bandwidth <value>
  + policy filter-classification group <group-name> map result <result> action police burst <value>
  + policy filter-classification group <group-name> map result <result> action police colour-awareness colour-aware
  + policy filter-classification group <group-name> map result <result> action police colour-awareness colour-unaware
  + policy filter-classification group <group-name> map result <result> action police excess-bandwidth <value>
  + policy filter-classification group <group-name> map result <result> action police excess-burst <value>

urn:vyatta.com:mgmt:vyatta-policy-qos
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> mark-probability <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> max-threshold <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time drop-precedence <colour> min-threshold <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> mark-probability <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> max-threshold <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time dscp-group <group-name> min-threshold <value>
  + policy qos name <id> shaper profile <id> queue <id> wred-map-time filter-weight <value>
  + policy qos name <id> shaper traffic-class <id> queue-limit-time <value>
  + policy qos profile <id> queue <id> wred-map-time
  + policy qos profile <id> queue <id> wred-map-time drop-precedence <colour>
  + policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> mark-probability <value>
  + policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> max-threshold <value>
  + policy qos profile <id> queue <id> wred-map-time drop-precedence <colour> min-threshold <value>
  + policy qos profile <id> queue <id> wred-map-time dscp-group <group-name>
  + policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> mark-probability <value>
  + policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> max-threshold <value>
  + policy qos profile <id> queue <id> wred-map-time dscp-group <group-name> min-threshold <value>
  + policy qos profile <id> queue <id> wred-map-time filter-weight <value>

urn:vyatta.com:mgmt:vyatta-protocols-bfd-micro-bfd-broadcom-stratadnx
  + interfaces bonding <tagnode> bfd micro destination <destination-address>
  + interfaces bonding <tagnode> bfd micro destination <destination-address> source <source-address>
  + interfaces bonding <tagnode> bfd micro destination <destination-address> source <source-address> template <value>
  + interfaces bonding <tagnode> bfd micro template <value>


urn:vyatta.com:mgmt:vyatta-resources-packet-classifier
  + resources packet-classifier
  + resources packet-classifier classifier <classifier-name>
  + resources packet-classifier classifier <classifier-name> description <value>
  + resources packet-classifier classifier <classifier-name> results <result>
  + resources packet-classifier classifier <classifier-name> rule <number>
  + resources packet-classifier classifier <classifier-name> rule <number> description <value>
  + resources packet-classifier classifier <classifier-name> rule <number> disable
  + resources packet-classifier classifier <classifier-name> rule <number> match destination ipv4
  + resources packet-classifier classifier <classifier-name> rule <number> match destination ipv4 host <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match destination ipv4 prefix <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match destination ipv6
  + resources packet-classifier classifier <classifier-name> rule <number> match destination ipv6 host <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match destination ipv6 prefix <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match destination port number <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af11
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af12
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af13
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af21
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af22
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af23
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af31
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af32
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af33
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af41
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af42
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name af43
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs1
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs2
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs3
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs4
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs5
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs6
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name cs7
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name default
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name ef
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp name va
  + resources packet-classifier classifier <classifier-name> rule <number> match dscp value <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match fragment any
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name TOS-host-redirect
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name TOS-host-unreachable
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name TOS-network-redirect
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name TOS-network-unreachable
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name address-mask-reply
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name address-mask-request
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name communication-prohibited
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name destination-unreachable
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name echo-reply
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name echo-request
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name fragmentation-needed
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name host-precedence-violation
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name host-prohibited
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name host-redirect
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name host-unknown
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name host-unreachable
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name ip-header-bad
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name network-prohibited
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name network-redirect
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name network-unknown
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name network-unreachable
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name parameter-problem
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name port-unreachable
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name precedence-cutoff
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name protocol-unreachable
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name redirect
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name required-option-missing
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name router-advertisement
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name router-solicitation
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name source-quench
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name source-route-failed
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name time-exceeded
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name timestamp-reply
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name timestamp-request
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name ttl-zero-during-reassembly
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp name ttl-zero-during-transit
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp type <type-number>
  + resources packet-classifier classifier <classifier-name> rule <number> match icmp type <type-number> code <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 class error
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 class info
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name address-unreachable
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name bad-header
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name communication-prohibited
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name destination-unreachable
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name echo-reply
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name echo-request
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name mobile-prefix-advertisement
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name mobile-prefix-solicitation
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name multicast-listener-done
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name multicast-listener-query
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name multicast-listener-report
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name neighbor-advertisement
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name neighbor-solicitation
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name no-route
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name packet-too-big
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name parameter-problem
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name port-unreachable
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name redirect
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name router-advertisement
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name router-solicitation
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name time-exceeded
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name ttl-zero-during-reassembly
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name ttl-zero-during-transit
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name unknown-header-type
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 name unknown-option
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 type <type-number>
  + resources packet-classifier classifier <classifier-name> rule <number> match icmpv6 type <type-number> code <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name dccp
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name esp
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name gre
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name icmp
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name igmp
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name ipv6-frag
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name ipv6-icmp
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name sctp
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name tcp
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name udp
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base name udplite
  + resources packet-classifier classifier <classifier-name> rule <number> match protocol base number <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match source ipv4
  + resources packet-classifier classifier <classifier-name> rule <number> match source ipv4 host <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match source ipv4 prefix <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match source ipv6
  + resources packet-classifier classifier <classifier-name> rule <number> match source ipv6 host <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match source ipv6 prefix <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match source port number <value>
  + resources packet-classifier classifier <classifier-name> rule <number> match ttl equals <value>
  + resources packet-classifier classifier <classifier-name> rule <number> result <value>
  + resources packet-classifier classifier <classifier-name> type ipv4
  + resources packet-classifier classifier <classifier-name> type ipv6

urn:vyatta.com:mgmt:vyatta-security-storm-control
  + interfaces dataplane <tagnode> vif <tagnode> storm-control profile <value>