Introduction To MCRNC SCLI Commands
Introduction To MCRNC SCLI Commands
DN09224125
Issue 01B
Approved on 2019/12/02
© 2023 Nokia. Nokia Condential Information. Use subject to agreed restrictions on disclosure and use.
Nokia is committed to diversity and inclusion. We are continuously reviewing our customer
documentation and consulting with standards bodies to ensure that terminology is inclusive
and aligned with the industry. Our future customer documentation will be updated
accordingly.
This document includes Nokia proprietary and condential information, which may not be
distributed or disclosed to any third parties without the prior written consent of Nokia. This
document is intended for use by Nokia’s customers (“You”/”Your”) in connection with a
product purchased or licensed from any company within Nokia Group of Companies. Use this
document as agreed. You agree to notify Nokia of any errors you may nd in this document;
however, should you elect to use this document for any purpose(s) for which it is not
intended, You understand and warrant that any determinations You may make or actions
You may take will be based upon Your independent judgment and analysis of the content of
this document.
Nokia reserves the right to make changes to this document without notice. At all times, the
controlling version is the one available on Nokia’s site.
NO WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
ANY WARRANTY OF AVAILABILITY, ACCURACY, RELIABILITY, TITLE, NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, IS MADE IN RELATION TO THE
CONTENT OF THIS DOCUMENT. IN NO EVENT WILL NOKIA BE LIABLE FOR ANY DAMAGES,
INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDIRECT, INCIDENTAL OR
CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT LIMITED TO LOSS OF PROFIT,
REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY OR DATA THAT MAY ARISE
FROM THE USE OF THIS DOCUMENT OR THE INFORMATION IN IT, EVEN IN THE CASE OF
ERRORS IN OR OMISSIONS FROM THIS DOCUMENT OR ITS CONTENT.
© 2023 Nokia.
2 Glossary ....................................................................................................................................... 32
Changes between document issues are cumulative. Therefore, the latest document issue
contains all changes made to previous issues.
Updated short description of the topic SCLI shell access from bash.
Updated the commands for audit trail entries in the topic SCLI auditing.
Removed _nokrcpautoremoteuser.
The structured command line interface (SCLI) provides interactive and menu-based access for
viewing and managing the configuration and state of the network element (NE).
Context-sensitive help and auto-completion of commands guide you through in the execution of
commands.
The actions of users in the SCLI shell are written to audit logs. Log entries are created when
commands are executed. These log entries include information about the user, the command
executed, and the execution time and status (success or failure).
The SCLI shell is the preferred, the secure management shell for managing, monitoring, and
troubleshooting the NE. It is the default login shell for all user accounts except root,
and_nokfsoperator.
You can access SCLI upon login. The SCLI shell is the default login shell for all user accounts
except for root and _nokfsoperator.
To enter the SCLI management shell, you must have at least the fsclishSessionAllow
permission.
Note:
The set user username command is used to switch to any user account.
The system provides limited bash and full bash shell access options.
You should use the SCLI as it is a fully-functional and secure command-line based management
interface that does not require any direct access to an insecure environment, like the bash shell.
The main purpose of the limited shell is to have the flexibility of the standard Linux/Unix when
accessing various management related files, like log files.
The limited shell provides a set of very basic commands. Some of the supported commands are:
bzip2, cat, cp, df, grep, gzip, head, less, ls, more, rm, sed, tail, and tar.
You can access this shell through SCLI if your user account belongs to the
_nokfsuilimitedbash group. To access the shell, use the following commands:
shell
shell bash limited
Limited bash runs in a secure chroot environment. In the chroot environment only directories
required for managing and troubleshooting the system are visible.
Note:
The /readme.txt file in the limited bash shell contains information about the available
directories in the chroot environment as well as information about the secondary groups
that you must be a member to have access to particular directory.
The full bash shell provides a wide variety of commands. This shell access is limited to users with
fsclishFullBashSessionAllow or fsclishAllowAll permission.
You can access the full bash shell using the shell bash full command.
Nokia advises that only advanced users with a profound understanding of the
Network Element (NE) behaviour use the full bash commands, and if so, then
commands available via the full bash shell are officially supported by Nokia
or processing capacity. In the worst case, this may cause, for example,
for commands executed by root or non-root users, or audit logs for the
commands are not applied in the full bash shell. Also, some of the typical
off-the-shelf Linux distributions. You can control access to the full bash
You can access SCLI upon login. The SCLI shell is the default login shell for all user accounts
except for root and _nokfsoperator. You can also access SCLI shell from the bash shell if you are
initially logged in to bash shell.
To enter the SCLI shell, you must have at least the fsclishSessionAllow permission unless
you have logged in as the root user and are using the fsclish command to access the SCLI
shell.
Note:
Access to the system with bash as a login shell is limited only to users who really need it.
Thus, when you access the bash as the login shell, you are prompted for confirmation and
warned with the following message:
ONLY FOR LIMITED USE. PLEASE USE A NON-ROOT ACCOUNT AND THE
Example
To start a session on a peer node, run the shell scli peer command.
Apart from executing commands on the node where the user is logged in, starting an SCLI session
and executing SCLI commands on the peer node are also possible.
Note:
Note that SCLI session on the peer node is applicable only on network elements that are
configured with dual cluster management nodes.
The following table lists the top-level SCLI commands and their descriptions.
Command Description
add
This family of commands is used mainly to add configuration items.
cmdtree
This command has been deprecated. Use the help cmd-tree to view the
command syntax tree of SCLI commands.
commit
This family of commands is used to commit or finalize the changes done or
initiated by other commands. For example, committing of configuration
directory changes done by previous add, delete, and set commands.
copy This family of commands is used to copy a file from the source to its
destination. The source and destination can be either on two different
management nodes or on the same node.
delete
This family of commands is used mainly to delete configuration items.
exit
This command is used to terminate the current SCLI session.
Note:
generate This family of commands is used to generate passwords using the random
password generator.
help
This command is used to show the shell help.
history
This command is used to show the command history.
load
This family of commands is used to load variables from a file into the
environment or session.
quit
This command is used to terminate the current SCLI session. The connection
is terminated automatically in case of a non-root user with the SCLI shell as a
default login shell.
refresh
This family of commands is used to refresh the SCLI command definitions
and statistics cache.
reset
This family of commands is used to reset the environmental variables.
restore
This family of commands is used to restore the general security-related data
and the configuration data from a backup configuration file.
rollback
This family of commands is used to roll back a Configuration Directory
transaction.
save
This family of commands is used to save current environment or session
variables to a file.
It is also used to save several types of data into the file system, such as
licenses, symptom-report, tracing, and so on.
set
This family of commands is used mainly to modify configuration items.
shell
This command is used to start another shell for an interactive command
execution.
show
This family of commands is used to view configuration items and other
information useful to operator.
start
This family of commands is used to start a command, but not necessarily
wait for the completion of an action initiated by the command.
stop
This family of commands is used to stop an operation started using the
start command.
The <operation> is the type of operation performed by a particular sub-module of the system,
for example, set, or show.
The <domain> segment defines the target functional area, for example, networking,
symptom-report.
To display the command syntax tree, enter the help cmd-tree command. Press Q to quit the
long text output after executing the command.
To display the command syntax tree of an SCLI command that belongs to a specific command
set, type the command after cmd-set. For example, type help cmd-tree cmd-set
/alarm to displays all branches of the command tree where alarm occurs as the second word,
such as show alarm, set alarm, add alarm, and so on. To display the command set up to
second level (maximum of two words), type the command after cmd-set and use / to separate
command words. For example, type help cmd-tree cmd-set /networking/vlan to
displays all branches of the command tree where networking occurs as the second word and
The SCLI commands in this document follow a unified notation regarding the mandatory and
optional parameters.
Notation Description
parameter <value>
Mandatory parameter.
[parameter
<value>] Optional parameter. It can be omitted.
{parameter <value>
parameter <value> Parameters inside curly brackets can be entered in a free order.
}
parameter
<value|value> Symbol | is read as logical exclusive OR (XOR).
To display help for a particular command, type the command followed by a question mark (?).
Example
To display the help information for the show alarm command, type the following command:
show alarm?
You need to have permissions to authorize your actions in the SCLI framework.
The user needs to have certain permissions in order to be able to run an SCLI command. For
more details regarding the required permissions to run the commands, see Permissions for
Management interfaces in Security document and SCLI commands.
In SCLI commands, each command description includes a reference to all the permissions
required to execute the specific command. That means that the user must have at least one of
the permissions to be able to execute the command.
In a runtime system, to view the permission to SCLI command mapping, enter the following
command:
You can also enter the following command to show the required permission for executing a
specific SCLI command:
The SCLI framework generates audit logs for each executed command.
For each executed command SCLI generates audit logs. These are categorized into four audit
modes.
write This mode includes actions that involve changing the system
configuration.
read This mode includes actions that involve reading normal system
configuration.
To view all the audit trail entries in the system, enter the following command:
[OX] write-to-file - named full path of file to write logs (default: console)
In SCLI commands, each command description includes a reference to the audit mode the
particular command uses when generating audit log entries, under Audit policy column.
Procedure
1 Login to the NE.
2 Type the command with all the parameters in the command line and press Enter.
Step example
show has view Enter
If you are unsure of the exact command to execute, use the autocompletion feature of SCLI.
The SCLI command autocompletion displays the possible choices allowed for a command. To use
this feature, use Tab at any point while typing the command.
The meanings of the symbols displayed after pressing Tab are as follows:
Example
addTab
[X] mgmt-service - Adds config of network management agents and local management
interfaces.
The wildcard matching is used to search all the possible values of a parameter.
Use the asterisk (*) character as the wildcard to match any number of unknown characters. For
-------------------------------
owner : /CLA-0
MAC : fa:16:3e:b5:2b:af
MTU : 1500
admin state : up
IPv4 forwarding : no
IPv6 forwarding : no
....
The wildcard function does not work for all parameters by default. To check if a parameter is
supported by a wildcard, check its help text by typing a question mark (?). For example:
[X] 1 - Indeterminate
[X] 2 - Critical
[X] 3 - Major
[X] 4 - Minor
[X] 5 - Warning
[X] 6 - Cleared
In this example, the user is able to select from the list shown after the first line
(<SEVERITY> - severity level).
There are parameters that occur at a fixed position in a command. For example:
[X] null - null device (which is a special file that discards all the
this session.
lock.
In this example, the multiple fixed position parameters displayed are config-mode-
exclusive, config-mode-on and mass-config. Then, exclusive, on or mass-
config are the possible values of the config-mode.
2. Parameters that do not provide a list of allowed values for autocompletion
Note:
The message is displayed only if the command supports autocompletion for the
specific parameter.
For example:
In this example, there is no list of possible values for the peer parameter.
There are parameters for which the user must enter the appropriate parameter value. For
example:
Special characters are used to remove the special meaning of certain characters or words to the
shell during command execution.
The following are the acceptable special characters in SCLI. In the examples below, <sample-
command> indicates a random SCLI command and <sample-parameter> an equivalent
parameter of the command.
Non-quoted backslash ( \ ) is used as an escape character that preserves the literal value of the
next character that follows.
Examples:
To include a double quotation mark in the input, enter:
SCLI command confirmation prompt refers to the message that appears when a system critical
command is executed.
Example
The option in capital letter is the default answer for the confirmation prompt message.
The SCLI batch file mode is used to execute the sequence of commands given in a file.
Example
Executed commands:20
Failed commands:0
The SCLI maintains history in memory and updates the user account-specific history file when the
session is closed.
Command Description
up arrow Shows commands from the list of previously entered commands one at
a time.
down arrow Browses towards the more recent commands in the list of entered
commands.
!nn Executes a specific command from the history list (for example, enter
!125 to execute command number 125 from the command history
list).
!-nn Executes the nnth previous command from the last one in the command
history (for example, enter !-3 to execute the third from the last
command from the command history list).
When a command for displaying data (for example, show) is executed successfully, the requested
data is displayed.
However, if the requested data is not available, the command displays a message indicating that
there is no information to display or an empty table. It is also possible that in some cases the
When a command other than the show command (for example, add, delete, set, start, and
so on) is executed successfully, the command output may or may not display a confirmation
message. If no message is displayed, it means the command has executed successfully. If the
command has failed, an error messaged is displayed.
The pager provides the capability to print a specific number of rows as output at a time.
This feature is available when help and command outputs have more than one page of
information to display. Paging is enabled by default.
To configure the number of lines to be displayed per page, use the following command:
Press space to view the next page or press Enter to view the next row.
To exit the pager, press Q. In case the shell does not return to the command prompt, press
Ctrl+C to stop the execution of the command, or press Ctrl+C, Ctrl+Z to forcefully stop the
command execution.
You can configure the SCLI output and error destination as described below.
To redirect the errors from command execution to a file, execute this command:
Note:
By redirecting the outstream and/or errorstream to a file, the command output and errors
will be no longer shown on the terminal.
Environment variables: typically viewable and modifiable by the user and used to control the
behavior of the SCLI shell.
The read/write built-in environment variables (or built-in properties) control the behavior of the
SCLI framework. The read-only built-in environment variables expose certain attributes which
are common to all sessions in the cluster or the node.
session-id
user
node-name
In case of shared accounts (for example, _nokadmin), the environment variables are stored in
the same file for all the sessions of the same user account. If a user in a session decides to
save the updated environment variables, the next session opened under the same user
The following SCLI commands are used for managing environment and session variables.
Command Description
set cli env [NAME VALUE]+ This command allows to define or modify environment
variables. The change to the environment is applicable
only for the current SCLI session where the command is
executed.
Note:
save cli env The save cli env command is used to save the
save cli env <SAVE_MODE> environment variables to a file. Save mode can be one
save cli env file of the following:
<FILENAME> • update: modify existing variables, add new variables
save cli env file • replace: remove all the existing variables first and then
<FILENAME> <SAVE_MODE> write to the file
• create: create a new file. This command fails if a file
with the same name already exists.
Note:
load cli env The load cli env command is used to load the
load cli env file environment variables from a file. Load mode can be
<FILENAME> one of the following:
load cli env file • update: values of existing variables are modified and
<FILENAME> <LOAD_MODE> then new variables are added
• replace: all variables are cleaned and then the new file
is loaded
• add: new variables are added and existing ones are not
modified.
Note:
save cli session file This command saves the session variables to a file. Save
<FILENAME> mode can be one of the following:
save cli session file • update: modify existing variables, add new variables
<FILENAME> <SAVE_MODE> • replace: remove all the existing variables first and then
write to the file
• create: create a new file. This command fails if a file
with the same name already exists.
Note:
load cli session file The load cli session command is used to load
<FILENAME> the session variables from a file. Load mode can be one
load cli session file of the following:
<FILENAME> <LOAD_MODE> • update: values of existing variables are modified and
then new variables are added
• replace: all variables are cleaned and then the new file
is loaded
• add: new variables are added and existing ones are not
modified.
Note:
SCLI built-in environment variables (built-in properties) control the SCLI framework behavior.
Property Description
on-failure Built in feature that controls the system on what to do if an error happens when
executing a batch of commands, that is, to stop after the first error or continue.
Default value: stop
Allowed values: continue | stop
output This variable controls the format used to display the command output.
Default value: pretty
Allowed values: pretty | structured | xml
Note:
The majority of the commands support only the pretty mode. Only few
commands support the structured or xml mode.
constraint- With this variable set to on, additional information about the expected value is
hint included in the parameter hint, if the value is restricted by any of the built-in
constraints. This additional information contains the type(s) of the constraint(s)
and the expected value(s).
Default value: off
Allowed values: on | off
confirmation- For SCLI commands that are defined to ask for confirmation prompt, this variable
prompt controls whether to ask for confirmation or not. The SCLI commands deemed
dangerous are typically defined to ask for confirmation from the user before
execution.
Default value: on
Allowed values: on | off
relative-mode This variable controls whether the user can enter the command sub-level or not.
When it is set to on, the user can move through the command tree by pressing
Enter after every written command. For example:
user@CLA-1 [TestCluster] > set Enter
user@CLA-1 [TestCluster] set >
The parameters under that level then become accessible directly without the
need to type the full command.
Default value: off
Allowed values: on | off
command-line interface interface in which the users interact with their computers by typing
(CLI) text into a command line
Structured Command Line text-based user interface for viewing and managing the configuration
Interface (SCLI) and state of a Network Element (NE). It is interactive and menu-
based, and provides context-sensitive help and auto-completion of
commands to guide the user in the execution of commands. It
provides audit logging. The SCLI shell is the preferred, safe, and
secure management shell to be used for managing, monitoring, and
troubleshooting the NE