Parameter | Description |
---|
Name
| Specifies the name of the system. |
Actual System Name | Indicates the system name assigned by user. Note: If a system name is not assigned, this field displays the default system name. |
Mgmt Mode Available_since |
---|
|
Type | Available Since |
---|
Release | 6.2.1This parameter specifies whether the instances are managed either manually, or through EMS/VNFM. Two modes for managing the HA/Redundancy of SWe Cloud NFV are supported:Centralized (default) - Use this mode for traditional HA/redundancy model (1:1 scenario) where one active instance is backed up by one standby instance. In Centralized mode, the configuration is synchronized between active and standby s. The Centralized mode is preferred for deployments where the scale/sessions requirements are low.Distributed - Use this mode for SWe Cloud deployments where up to N active instances are backed up by a single standby instance (N:1). In this mode, each node is configured separately, and the configuration on active and standby instances are not synchronized. The instances in such deployments also have homogeneous configuration. The microservices based Distributed- deployment is ideal for Communications Service Providers (CSPs) with large scale/sessions requirements. The Distributed mode is preferred in such deployments, as the lifecycle of the instances (instance spin-off, initial configuration, delta configuration, and instance termination) are managed by the EMS/VNFM and Configurator.
| Cluster ID | An unique alpha-numeric string for identifying the cluster to which the instance belongs. |
Location
| Specifies the physical location of the system. |
Contact
| Specifies the contact information of the system. |
Local Authentication Enabled
| Specifies the confd CLI user information stored locally can be used for authentication. |
External Authentication Enabled
| Specifies the confd CLI user information stored on remote Radius Server used for authentication. |
Util Monitor Stats Interval
| Specifies the time interval for system resource monitoring statistics. The value ranges from 5 to 60 minutes and the default value is 15 minutes. Note: If using the EMS in your network, configure EMS PM data collection intervals for the to be both: - Equal to or greater than the interval size, and
- Not less than the interval size multiplied by the number of intervals.
See Insight User Guide for configuration details. |
Util Monitors Stats Num of Past Interval
| Specifies the number of past intervals saved by the system resource monitoring statistics. |
Audit Log State
| Specifies the state of the management audit log. The options are: Disabled Enabled (default)
|
Dsp Mismatch Action
| Specifies the action to take for one of the following DSP Mismatch conditions: - Mismatch in DSP card installation across any/all slot locations: Cards must match by slot location. For any mismatched slot, DSP capacity is not used when "
Preserve Redundancy " is configured (and card dried up if calls were already in place when the mismatch occurred), or card is left unprotected when "Preserve Capacity " is configured. - Mismatch in DSP card type within as lot location: Card installations must match by type – DSP25 (higher capacity) or DSP20 (lower capacity). Same rules as above apply.
The options are: Preserve Redundancy (default): The Active automatically triggers a graceful dry-up in an attempt to align DSP hardware capabilities. Once dry-up completes, the Active uses the protected, matching DSP capacity to preserve redundancy.
Note: During the dry-up period, active calls using the higher Capacity DSPs are not protected in the event that a switchover occurs before the dry up completes. Preserve Capacity : The Active continues to use the extra DSP capacity, as needed, assuming appropriate session licenses are in place; partial redundancy is in effect.
Note: If a switchover occurs, calls using the higher capacity DSPs on Active are not protected during switchover (i.e. partial redundancy). |
Cli Set Warning Support
| Specifies whether to enable warning prompts configured for the Set commands or not. The options are: Disabled Enabled (default)
|
SSH Public Key Authentication Enabled | If set to True and the SSH keys are populated, SSH users can log into their servers without the need to enter their passwords. |