Persistence
Optionally, the BOF persist parameter can specify whether the system should preserve
system indexes when a save command is executed. During a subsequent boot, the index file
is read along with the configuration file. As a result, a number of system indexes are
preserved between reboots, including the interface index, LSP IDs, path IDs, etc. If
persistence is not required and the configuration file is successfully processed, then the
system becomes operational. If persist is required, then a matching x.ndx file must be located
and successfully processed before the system can become operational. Matching files
(configuration and index files) must have the same filename prefix such as test123.cfg and
test123.ndx and are created at the same time when a save command is executed. Note that
the persistence option must be enabled to deploy the Network Management System (NMS).
The default is off.
Traps, logs, and console messages are generated if problems occur and SNMP shuts down for
all SNMP gets and sets, however, traps are issued.
Lawful Intercept
Lawful Intercept (LI) describes a process to intercept telecommunications by which law
enforcement authorities can unobtrusively monitor voice and data communications to combat
crime and terrorism with higher security standards of lawful intercept capabilities in
accordance with local law and after following due process and receiving proper authorization
from competent authorities. The interception capabilities are sought by various
telecommunications providers.
As lawful interception is subject to national regulation, requirements vary from one country
to another. This implementation satisfies most national standard's requirements. LI is
configurable for all service types.
FIPS-140-2 Mode
The 7750 SR includes a configurable parameter in the bof.cfg file to make the node run in
FIPS-140-2 mode. When the node boots in FIPS-140-2 mode, the following behaviors are
enabled on the node:
Basic System Configuration Guide
•
The node performs an HMAC-SHA1 integrity test on the software images .tim files.
•
The node limits the use of encryption and authentication algorithms to only those
allowed for the associated FIPS-140-2 certification of the 7750-SR.
•
Cryptographic module startup tests are executed on the CPM when the node boots to
ensure the associated approved FIPS-140-2 algorithms are operating correctly.
Boot Options
197