No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Command Reference

CloudEngine 8800, 7800, 6800, and 5800 V200R002C50

This document describes all the configuration commands of the device, including the command function, syntax, parameters, views, default level, usage guidelines, examples, and related commands.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
NETCONF Commands

NETCONF Commands

callhome

Function

The callhome command creates a callhome template and then displays the callhome template view or displays the view of an existing callhome template directly.

The undo callhome command deletes an existing callhome template.

By default, no callhome template is created.

NOTE:

Only the CE8860EI, CE8850EI, CE7855EI, CE7850EI, CE6880EI, CE6870EI, CE6860EI, CE6855HI, CE6851HI, CE6850HI, and CE6850U-HI support this command.

Format

callhome callhome-name

undo callhome callhome-name

Parameters

Parameter Description Value
callhome-name

Specifies the name of a callhome template.

The value is a string of 1 to 19 case-sensitive characters, spaces not supported. The character string can contain spaces if it is enclosed in double quotation marks (").

Views

NETCONF user interface view

Default Level

3: Management level

Usage Guidelines

Usage Scenario

If an NMS does not support automatic device discovery, it cannot manage devices in time. To address this problem, you can configure proactive NETCONF registration for a device to send a NETCONF connection request to the NMS when the device goes online so that the NMS can manage the device.

When configuring proactive NETCONF registration, you need to create a callhome template using the callhome command and create a NETCONF connection instance in the template using the endpoint command or configure an interval at which the device sends NETCONF connection requests to the NMS using the reconnection interval command.

Precautions

A device supports only one callhome template. To configure a new callhome template, run the undo callhome command to delete the existing one first.

Example

# Create a callhome template named root and enter the callhome template view.

<HUAWEI> system-view 
[~HUAWEI] netconf
[~HUAWEI-netconf] callhome root
[*HUAWEI-netconf-callhome-root]

display netconf authorization

Function

The display netconf authorization command displays the NETCONF authorization rule information.

Format

display netconf authorization { task-group-rules task-group-name | user-group-rules user-group-name } [ rule-name rule-name ]

Parameters

Parameter Description Value
task-group-rules Displays information about all NETCONF authorization task-group rules. -
task-group-name Displays information about the NETCONF authorization information of a specified task group. The task-group-name must already exist.
user-group-rules Displays information about all NETCONF authorization user-group-rules. -
user-group-name Displays information about the NETCONF authorization of a specified user group. The user-group-name must already exist.
rule-name rule-name Displays information about a specific NETCONF authorization rule. The rule-name must already exist.

Views

All views

Default Level

3: Management level

Usage Guidelines

To query NETCONF authorization rule information, run the display netconf authorization command. Information about all NETCONF authorization rule lists, all NETCONF authorization rules in a specific rule list, and a specific NETCONF authorization rule can be queried.

Example

# Display information about the NETCONF authorization for task-group-rules tg.

<HUAWEI> display netconf authorization task-group-rules tg
---------------------------------
Rule-name        Rule-type     
---------------------------------
rule1              operationRule   
rule2              datanodeRule   
---------------------------------
Total number of rule: 2

# Display information about the NETCONF authorization for task-group-rules ug with rule-name rule1.

<HUAWEI> display netconf authorization task-group-rules ug rule-name rule1
---------------------------------
Name        : rule1
Operation name : get
Action      : permit
Rule-type   : OperationRule
---------------------------------

# Display information about the NETCONF authorization for user-group-rules ug with rule-name rule1.

<HUAWEI> display netconf authorization user-group-rules ug rule-name rule1
---------------------------------
Name        : rule1
Operation name : get
Action      : permit
Rule-type   : OperationRule
---------------------------------
Table 18-30  Description of the display netconf authorization command output

Item

Description

Rule-list-name

Name of a NETCONF authorization rule list.

Total number of rule-list

Number of NETCONF authorization rule lists.

User-group-name

Name of a NETCONF authorization user group.

Total number of user-group

Number of NETCONF authorization user groups.

Rule-name

Name of a NETCONF authorization rule.

Rule-type

Type of a NETCONF authorization rule. The available options are as follows:
  • operationRule: authorization rules for operations.
  • datanodeRule: authorization rules for data nodes.

Total number of rule

Number of NETCONF authorization rules.

Name

Name of a NETCONF authorization rule.

RPC operation

RPC operation of NETCONF authorization.

Action

Action available for users:
  • permit
  • deny

Description

Description of a NETCONF authorization rule.

Schema path

Path of a data node.

Access

Action available for users:
  • read
  • write
  • execute

Operation name

Name of an operation type.

display netconf authorization statistics

Function

The display netconf authorization statistics command displays the NETCONF authorization information.

Format

display netconf authorization statistics

Parameters

None

Views

All views

Default Level

3: Management level

Usage Guidelines

You can run the display netconf authorization statistics command to view the following information:
  • Number of times NETCONF operations are denied
  • Number of times write operations are denied on a data node

Example

# Display NETCONF authorization statistics.

<HUAWEI> display netconf authorization statistics
-----------------------------------------
Denied operations   : 0
Denied access write : 0
-----------------------------------------
Table 18-31  Description of the display netconf authorization statistics command output

Item

Description

Denied operations

Number of times NETCONF operations are denied.

Denied access write

Number of times write operations are denied on a data node

display netconf capability

Function

The display netconf capability command displays the capabilities that the NETCONF supports.

Format

display netconf capability

Parameters

None

Views

All views

Default Level

3: Management level

Usage Guidelines

NETCONF defines base and standard capabilities. Huawei defines private capabilities. Different operations are defined in different capabilities.

To view operations supported by different capabilities, run the display netconf capability command. This command improves maintainability.

NOTE:

The Hello packets exchanged between NETCONF agent and NETCONF manager describe the public and private capabilities supported by the NETCONF session.

Example

# Display NETCONF agent capabilities supported.

<HUAWEI> display netconf capability
----------------------------------
Capability         Scope   Version
----------------------------------
Base               public  1.0
Writable-Running   public  1.0
Candidate          public  1.0
Confirmed Commit   public  1.0
Distinct Startup   public  1.0
Rollback on Error  public  1.0
Sync               private 1.0
Sync               private 1.1
Sync               private 1.2
Exchange           private 1.0
Exchange           private 1.1
Active             private 1.0
Action             private 1.0
Discard Commit     private 1.0
Execute CLI        private 1.0
Update             private 1.0
Commit-Description private 1.0
Notification       public  1.0
Interleave         public  1.0
----------------------------------
Table 18-32  Description of the display netconf capability command output

Item

Description

Capability

Indicates the capabilities that the NETCONF agent supports in the device.

  • Base: Indicates NETCONF requires base capability to run the basic set of operations. The following are the basic operations that NETCONF agent supports:
    • get-config: Obtains all or specified configuration data from the <running/>, <candidate/>, and <startup/> configuration databases.
    • get: Obtains some or all running configuration data and status data from the <running/>, <candidate/>, or <startup/> configuration database.
    • edit-config: Creates, modifies, or deletes configuration data.
    • lock: Locks a configuration database. A locked configuration database cannot be modified by other users. Locking a configuration database ensures that the configuration of a database is not affected by the configuration of the NETCONF manager, Simple Network Management Protocol (SNMP), or command-line interface (CLI) script, preventing a conflict.
    • unlock: Unlocks a locked configuration database. Users can unlock only the configuration databases they have locked.
    • copy-config: Replaces the target configuration database with the source configuration database. If no target configuration database has been created, this operation creates a configuration database. If a target configuration database has been created, the source configuration database replaces the target configuration database.
    • delete-config: Deletes a configuration database. The <running/> configuration database cannot be deleted.
    • close-session: Closes an NETCONF session.
    • kill-session: Forcibly closes an NETCONF session. Only an administrator is authorized to perform this operation.
  • Writable-Running: This capability allows the device to access the <running/> configuration database. That is, the device supports <edit-config> and <copy-config> operations for running configuration data.
  • Candidate: This capability indicates that the device supports the <candidate/> configuration database. This capability allows the device to perform operations on configuration data without affecting the configuration data that is being used.
  • Confirmed Commit: Updates the data to the running database if the configuration is committed within the confirm-timeout period.
  • Distinct Startup: This capability allows the device to perform a distinct startup. The NETCONF agent checks parameter availability and consistency.
  • Rollback on Error: This capability allows the device to perform rollback when an error occurs. If an error occurs and the <rpc-error> element is generated, the server stops performing the <edit-config> operation and restores the specified configuration to the status before the <edit-config> operation is performed.
  • Sync: This capability allows the device to perform data synchronization. The NETCONF manager sends a request to the NETCONF agent to update the local data set of the NETCONF manager. A file transfer protocol is used to synchronize NETCONF agent data to a destination folder.
  • Exchange: This capability allows the device to exchange information. If an NETCONF session has the exchange capability, it supports the <get-next> operation.
  • Active: This capability allows the NETCONF manager to receive active messages during operations which take long time to produce the response if the NETCONF session has active capability.

    NOTE:

    NETCONF supports active capability on exchange of NETCONF manager's hello message.

  • Action: This capability allows the NETCONF agent supports action capability to provide a new operation, which is used by NETCONF manager to send any executable request to CFG in XML encoded format. CFG performs the requested operation and send the response to NETCONF manager in XML encoded format.
  • Discard Commit: This capability allows the confirmed-commit operation to be canceled or ended.
  • Execute CLI: This capability indicates that the device can interact with the request sender in request processing. Only a device with exchange capability supports the execute cli operation. Execute cli operation is used to execute CLI commands through NETCONF. Maximum 60 commands are allowed in a single rpc request.
  • Update: This capability allows the device to update configuration data. Updates configuration data in the <candidate/> configuration database to the <running/> configuration database when a conflict occurs during data commitment.
  • Commit-Description: When the data in the <candidate/> configuration database is updated to the <running/> configuration database, the carried information in the data can be configured.
  • Notification: Allows the traps or events to be sent in notification messages to the NMS.

  • Interleave: Allows multiple functions to be performed for a NETCONF session on a device. A user can maintain a device and manage traps and events using the same NETCONF session.

Scope

Indicates the scope of NETCONF capability. The NETCONF supports:
  • public: indicates the standard capability defined by NETCONF.
  • private: indicates the private capability defined by Huawei.

Version

Indicates the capability version number.

endpoint

Function

The endpoint command creates a NETCONF connection instance and then displays the NETCONF connection instance view or displays the view of an existing NETCONF connection instance directly.

The undo endpoint command deletes existing NETCONF connection instance.

By default, no NETCONF connection instance is created.

NOTE:

Only the CE8860EI, CE8850EI, CE7855EI, CE7850EI, CE6880EI, CE6870EI, CE6860EI, CE6855HI, CE6851HI, CE6850HI, and CE6850U-HI support this command.

Format

endpoint endpoint-name

undo endpoint endpoint-name

Parameters

Parameter Description Value
endpoint-name

Specifies the name of a NETCONF connection instance.

The value is a string of 1 to 19 case-sensitive characters, spaces not supported. The character string can contain spaces if it is enclosed in double quotation marks (").

Views

Callhome template view

Default Level

3: Management level

Task Name Operations
ssh-server write

Usage Guidelines

Usage Scenario

If an NMS does not support automatic device discovery, it cannot manage devices in time. To address this problem, you can configure proactive NETCONF registration for a device to send a NETCONF connection request to the NMS when the device goes online so that the NMS can manage the device.

When configuring proactive NETCONF registration, you need to create a NETCONF connection instance using the endpoint command in the callhome template view and configure the IP address and TCP port number of the NMS with which the device is to establish a NETCONF connection using the peer-ip command.

Precautions

A device supports only one NETCONF connection instance. To configure a new NETCONF connection instance, run the undo endpoint command to delete the existing one first.

Example

# Create a NETCONF connection instance named huawei and enter the NETCONF connection instance view.

<HUAWEI> system-view 
[~HUAWEI] netconf
[~HUAWEI-netconf] callhome root
[*HUAWEI-netconf-callhome-root] endpoint huawei
[*HUAWEI-netconf-callhome-root-endpoint-huawei]

idle-timeout (netconf user-interface view)

Function

The idle-timeout command sets the timeout period to disconnect from the NETCONF user interface. If the user does not invoke the command for a certain period, the connection gets disconnected.

The undo idle-timeout command restores the default timeout period.

By default, the timeout period is 10 minutes.

Format

idle-timeout minutes [ seconds ]

undo idle-timeout

Parameters

Parameter Description Value
minutes

Specifies the time period in minutes to disconnect from user interface view.

It is an integer data type. The value range is from 0 to 35791 minutes.
seconds

Specifies the time period in seconds to disconnect from the user interface view.

It is an integer data type. The value range is from 0 to 59 seconds.

Views

NETCONF user interface view

Default Level

3: Management level

Usage Guidelines

Usage Scenario

If a user logs in to the device and does not perform an operation, the user interface is occupied unnecessarily. You can run the idle-timeout command to disconnect the user's terminal from the device.

Precautions

  • If you set the time to zero, then the line connection remains alive until you close it.
  • If the function is not configured after timeout of NETCONF user interface, other users may fail to set up NETCONF user interface connections when the login user is in the idle state.
  • If the idle timeout interval is set to 0 or a large value, the terminal will remain in the login state. If an administrator does not close an operation interface, non-administrator users may perform unauthorized operations, resulting in security risks.
  • You are advised to set the timeout duration to 10-15 minutes.

Example

# Set the timeout period to 1 minute and 30 seconds.

<HUAWEI> system-view
[~HUAWEI] netconf
[~HUAWEI-netconf] idle-timeout 1 30
Related Topics

max-sessions

Function

The max-sessions command configures the maximum number of clients for the NETCONF service.

The undo max-sessions command restores the default maximum number of clients that are connected to the server for the NETCONF service.

By default, the maximum number of clients that can be connected to the SSH server with the NETCONF service is 5.

Format

max-sessions max-sessions-count

undo max-sessions

Parameters

Parameter Description Value
max-sessions-count Specify the maximum number of sessions for NETCONF. It is an integer data type. The value range is from 0 to 5.

Views

NETCONF interface view

Default Level

3: Management level

Usage Guidelines

You can use this command to configure the maximum number of clients that can be connected to the server at any time for the NETCONF service.

Example

# Configure a maximum 3 clients for the NETCONF service

<HUAWEI> system-view
[~HUAWEI] netconf
[~HUAWEI-netconf] max-sessions 3
Related Topics

netconf

Function

The netconf command displays the NETCONF user-interface view.

Format

netconf

Parameters

None

Views

System view

Default Level

3: Management level

Usage Guidelines

You can use this command to enter into netconf user-interface and configure for netconf sessions.

Example

# Enter the NETCONF user-interface view.

<HUAWEI> system-view
[~HUAWEI] netconf
[~HUAWEI-netconf]

netconf authorization-rule

Function

The netconf authorization-rule command configures a NETCONF authorization rule for operations and data nodes.

The undo netconf authorization-rule command restores the default setting.

By default, no NETCONF authorization rule is configured.

Format

netconf authorization-rule rule-name { { deny { rpc-operation rpc-oper-name | schema-path data-node-path } } | { permit { rpc-operation rpc-oper-name | schema-path data-node-path access-operation { read | write | execute }* } } } [ description description-text ]

undo netconf authorization-rule rule-name

Parameters

Parameter Description Value
rule-name Specifies the name of a NETCONF authorization rule. The value is a string of 1 to 15 case-insensitive characters, spaces not supported. When quotation marks are used around the string, spaces are allowed in the string.
deny Indicates that the NETCONF authorization rule is denied. -
rpc-operation rpc-oper-name Specifies RPC operations for NETCONF authorization, as shown in Table 18-33 -
schema-path data-node-path Specifies the path of a NETCONF authorization node. The value is a string of 1 to 255 characters starting with / without any spaces. When quotation marks are used around the string, spaces are allowed in the string.
permit Indicates that the NETCONF authorization rule is permitted. -
access-operation Indicates the operation allowed by a user. -
read Indicates the read authority of a user. -
write Indicates the write authority of a user. -
execute Indicates the execute authority of a user. -
description description-text Indicates the description of a NETCONF authorization rule. The question mark ? is not supported. The ASCII codes ranging from 0 - 31 and 127 - 255 are not supported. The value is a string of 1 to 63 characters.

Views

Task group view, User Group view

Default Level

3: Management level

Usage Guidelines

Usage Scenario

After a NETCONF session is set up using SSH, all SSH users can manage the session-related device, which renders the device insecure. To resolve this problem, run the netconf authorization-rule command to configure a NETCONF authorization rule. NETCONF authorization allows you to authorize specific users to perform NETCONF operations and access NETCONF resources. After NETCONF authorization is configured, you can run the display netconf information command to view related information.

Table 18-33 shows operations supported by a NETCONF agent. Users can also define specific operations in XML encoded format.

Table 18-33  Operations supported by a NETCONF agent

Operation

Description

commit

Committing the configuration in the candidate database to the running database.

copy-config

Copying the configuration database.

delete-config

Deleting the configuration database.

discard-changes

Discarding the configuration that has not been committed.

discard-commit

Cancelling or ending the confirmed-commit operation.

edit-config

Modifying the configuration database.

execute-action

Performing actions based on schema.

get

Obtaining data from the running database or device statistics.

get-config

Obtaining data from the running database, candidate database, and startup database.

get-next

Querying again if the previous query expires.

kill-session

Ending a session.

lock

Locking the configuration database to allow only the running session to be written in.

unlock

Unlocking the configuration database to allow all session to be written in.

update

Synchronizing the candidate database with the running database.

sync-full

Synchronizing the device configuration file to a target server in compressed mode.

sync-increment

Synchronizing the device configuration file between two check points.

Prerequisites

To enable the NETCONF component, you need to execute the snetconf server enable or protocol inbound ssh port 830 command.

To create a task group, you need to execute the task-group task-group-name command.

NOTE:
A task group is a NETCONF rule list.

Example

# Configure a NETCONF authorization rule named rule2 for operations to allow the get operation.

<HUAWEI> system-view
[~HUAWEI] snetconf server enable
[*HUAWEI] commit
[~HUAWEI] aaa
[~HUAWEI-aaa] task-group tg1
[*HUAWEI-aaa-task-group-tg1] netconf authorization-rule rule2 permit rpc-operation get description permit get operation

# Configure a NETCONF authorization rule named rule3 for data nodes to allow the read, write, and execute operations for SNMP.

<HUAWEI> system-view
[~HUAWEI] snetconf server enable
[*HUAWEI] commit
[~HUAWEI] aaa
[~HUAWEI-aaa] task-group tg1
[*HUAWEI-aaa-task-group-tg1] netconf authorization-rule rule3 permit schema-path /snmp access-operation read write execute description permit snmp

peer-ip

Function

The peer-ip command configures the IP address and TCP port number of the NMS with which a device is to establish a NETCONF connection.

The undo peer-ip command deletes the IP address and TCP port number of the NMS.

By default, no IP address and TCP port number of any NMS are configured.

NOTE:

Only the CE8860EI, CE8850EI, CE7855EI, CE7850EI, CE6880EI, CE6870EI, CE6860EI, CE6855HI, CE6851HI, CE6850HI, and CE6850U-HI support this command.

Format

peer-ip { ipv4-address | ipv6-address } port port-number

undo peer-ip [ ipv4-address | ipv6-address ]

Parameters

Parameter Description Value
ipv4-address

Specifies the IPv4 address of an NMS.

The value is in dotted decimal notation.

ipv6-address

Specifies the IPv6 address of an NMS.

The value is a 32-digit hexadecimal number, in the format of X:X:X:X:X:X:X:X.

port port-number

Specifies the TCP port number of an NMS.

The value is an integer ranging from 1 to 65535.

Views

NETCONF connection instance view

Default Level

3: Management level

Usage Guidelines

Usage Scenario

If an NMS does not support automatic device discovery, it cannot manage devices in time. To address this problem, you can configure proactive NETCONF registration for a device to send a NETCONF connection request to the NMS when the device goes online so that the NMS can manage the device.

When configuring proactive NETCONF registration, you need to configure the IP address and TCP port number for the NMS with which the device is to establish a NETCONF connection using the peer-ip command in the NETCONF connection instance view.

Precautions

A device can establish NETCONF connections with only one NMS, and port-number must be the same as that used on the NMS to establish the NETCONF connection.

Example

# Set the IP address and TCP port number of the NMS with which the device is to establish a NETCONF connection to 10.2.83.53 and 8032, respectively.

<HUAWEI> system-view 
[~HUAWEI] netconf
[~HUAWEI-netconf] callhome root
[*HUAWEI-netconf-callhome-root] endpoint huawei
[*HUAWEI-netconf-callhome-root-endpoint-huawei] peer-ip 10.2.83.53 port 8032

protocol inbound ssh port 830

Function

The protocol inbound ssh port 830 command enables the NETCONF service of SSH server on port 830.

The undo protocol inbound ssh port 830 command disables the NETCONF service of SSH server on port 830.

By default, the NETCONF service of SSH server is disabled on port 830.

Format

protocol inbound ssh [ ipv4 | ipv6 ] port 830

undo protocol inbound ssh [ ipv4 | ipv6 ] port 830

Parameters

Parameter

Description

Value

ipv4

Enables IPv4 NETCONF.

-

ipv6

Enables IPv6 NETCONF.

-

Views

NETCONF user interface view

Default Level

3: Management level

Usage Guidelines

Usage Scenario

A NETCONF connection can be set up using SSH known port 22 or 830. The client can use port 830 to set up NETCONF connection only after the protocol inbound ssh [ ipv4 | ipv6 ] port 830 command is run to enable NETCONF of SSH server on port 830. If ipv4 or ipv6 is not specified, both IPv4 NETCONF and IPv6 NETCONF are enabled.

Precautions

After the NETCONF service of SSH server is disabled on port 830, all clients connecting to port 830 through NETCONF are disconnected.

After the NETCONF function is enabled and the current version is downgraded to V200R001C00 or an earlier version, this configuration will be lost. Then you need to run the protocol inbound ssh port 830 command again.

Example

# Enable IPv4 and IPv6 NETCONF service of SSH server on port 830.

<HUAWEI> system view
[~HUAWEI] netconf
[~HUAWEI-netconf] protocol inbound ssh port 830
Related Topics

reconnection interval

Function

The reconnection interval command configures an interval at which a device sends NETCONF connection requests to the NMS.

The undo reconnection interval command restores the default interval at which a device sends NETCONF connection requests to the NMS.

By default, the interval is 5s.

NOTE:

Only the CE8860EI, CE8850EI, CE7855EI, CE7850EI, CE6880EI, CE6870EI, CE6860EI, CE6855HI, CE6851HI, CE6850HI, and CE6850U-HI support this command.

Format

reconnection interval interval

undo reconnection interval

Parameters

Parameter Description Value
interval

Specifies an interval at which the device sends NETCONF connection requests to the NMS.

The value is an integer ranging from 5 to 300, in seconds. The default value is 5.

Views

Callhome template view

Default Level

3: Management level

Usage Guidelines

Usage Scenario

When configuring proactive NETCONF registration, you can configure an interval at which the device sends NETCONF connection requests to the NMS using the reconnection interval command.

Example

# Set the interval at which the device sends NETCONF connection requests to the NMS to 30s.

<HUAWEI> system-view 
[~HUAWEI] netconf
[~HUAWEI-netconf] callhome root
[*HUAWEI-netconf-callhome-root] reconnection interval 30
Related Topics

rpc-message log protocol-operation get

Function

The rpc-message log protocol-operation get command enables NETCONF operation log query.

The undo rpc-message log protocol-operation get command disables NETCONF operation log query.

By default, NETCONF operation log query is disabled.

Format

rpc-message log protocol-operation get

undo rpc-message log protocol-operation get

Parameters

None

Views

NETCONF user interface view

Default Level

3: Management level

Usage Guidelines

Usage Scenario

To query NETCONF operation logs, run the rpc-message log protocol-operation get command to enable NETCONF operation log query.

Prerequisites

To enable the NETCONF component, you need to execute the snetconf server enable or protocol inbound ssh port 830 command.

Example

# Enable NETCONF operation log query.

<HUAWEI> system-view
[~HUAWEI] snetconf server enable
[*HUAWEI] netconf
[*HUAWEI-netconf] rpc-message log protocol-operation get

snetconf server enable

Function

The snetconf server enable command enables the NETCONF service of SSH server on TCP port 22.

The undo snetconf server enable command disables the NETCONF service of SSH server on TCP port 22.

By default, the NETCONF service of SSH server is disabled on TCP port 22.

Format

snetconf [ ipv4 | ipv6 ] server enable

undo snetconf [ ipv4 | ipv6 ] server enable

Parameters

Parameter

Description

Value

ipv4

Enables IPv4 NETCONF.

-

ipv6

Enables IPv6 NETCONF.

-

Views

System view

Default Level

3: Management level

Usage Guidelines

Usage Scenario

The client can set up a NETCONF connection with the SSH server through port 22 only after the NETCONF service of SSH server is enabled on this port by using the snetconf [ ipv4 | ipv6 ] server enable command. If ipv4 or ipv6 is not specified, both IPv4 NETCONF and IPv6 NETCONF are enabled.

Precautions

After the NETCONF service of SSH server is disabled on TCP port 22, all clients connecting to TCP port 22 through NETCONF are disconnected.

After the NETCONF function is enabled and the current version is downgraded to V200R001C00 or an earlier version, this configuration will be lost. Then you need to run the snetconf server enable command again.

Example

# Enable IPv4 and IPv6 NETCONF service of SSH server on TCP port 22.

<HUAWEI> system-view
[~HUAWEI] snetconf server enable
Related Topics
Translation
Download
Updated: 2019-03-21

Document ID: EDOC1000166501

Views: 51092

Downloads: 337

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next