|Logging output integrated with SYSLOG
|Structured logging output can be sent to the SYSLOG deamon independently of the normal logging options.
|Logging messages can be customized with vendor-specific callback functions.
|Facility, Class, Severity support
|SYSLOG formatted and filtered message output is supported.
|External SYSLOG API support
|The default SYSLOG service can be replaced with vendor-specific callback functions.
|The commands available are automatically populated based on the YANG modules loaded into yp-shell. The command line syntax is derived from the YANG syntax.
|The config command is used to enter configuration mode. The YANG data nodes become the keywords and familiar CLI syntax is used to create, modify and delete configuration data.
|Several familiar command line recall mechanisms are supported:
history and recall commands to show recent command lines and recall a command line.
control-P (previous line) and Control-N (next line) to scroll through the history buffer.
The ! (bang character) to recall commands by line number or by matching the specified command string.
|Context Sensitive Editing
|The command completion text and available help text is context-sensitive, based on the YANG definitions, the current command mode or sub-mode, and the cursor position in the command line.
|Aliases are user-created commands that can be used to customize the command set and reduce typing.
|The '?' Help Key
|The ‘?’ (question mark) key can be used to get context-sensitive help for the keyword(s) or value that is expected next within the current command line. The ‘tab’ key is used for short help text and the ‘?’ key is used for long help.
Role Based Access Control
|The access control enforcement is integrated into the engine so no operations can bypass it and allow unauthorized access to configuration data.
|IETF NACM Support
|The (standard) IETF NETCONF Access Control Model is supported.
|Yuma NACM Support
|The (pre-standard) Yuma NETCONF Access Control Model is supported.
|External ACM Support
|An external (vendor-specific) access control model can be selected instead of Yuma NACM or IETF NACM, and easily integrated into the netconfd-pro server through a structured API.
|All CRUDX database operations
|The built-in transaction engine automatically handles all Create, Retrieval, Update, Delete, and eXecution operations for all NETCONF standards and all YANG modules.
|Smart XPath Caching
|The built-in XPath handler automatically detects which database nodes are referenced in any YANG must or when XPath expressions, allowing XPath results to be cached safely with no development effort or doctored YANG files.
|YANG Defaults Handling
|The built-in transaction engine automatically handles all CRUDX operations correctly, even if default leafs and/or default non-presence containers are involved.
|Standard YANG feature statements can be used to easily manage optional data model sections across multiple product platforms and product versions. Separate feature sets can be specified for each platform and release.
|Standard YANG extension statements and structured APIs can be used automatically process vendor-specific custom language statements.
|Full Database locking
|Automatic support for standard all NETCONF database locking features.
|Backup and Restore Management
|Integrated backup and restore operations to simplify configuration management changes. Delete named backups with the delete-backup operation and view backup information in the YumaWorks monitoring extension to the standard ietf-netconf-monitoring module.
|Configurable server transaction auditing with separate audit log.
|Optimized Transaction Validation Handling
|The built-in transaction engine automatically detects which commit validation tests can safely be skipped because the database nodes involved in the test have not changed value. This includes all YANG XPath expressions (must, when), all instance tests (min-elements, max-elements, mandatory, unique, key), and all edit operations.
|XPath Expression Pruning
|The built-in XPath handler automatically prunes false AND expressions and true OR expressions, which can greatly improve XPath validation speed.
|Standard YANG deviation statements can be used to easily manage data model diversity across multiple product platforms and product versions. Separate deviation files are automatically patched into the main module.
|YANG user-defined types
|Standard YANG typedef statements can be used to add any user-defined data types for reuse across multiple YANG modules.
|YANG insert operations
|Automatic order-list insertion management through full support for the YANG insert operation extensions to NETCONF.
|Partial Database locking
|Automatic support for standard all NETCONF partial-lock data sub-tree locking features.
|Automatic support for fully recoverable database edits, using a 3 phase transaction model, providing separate Validate, Apply, Commit and Rollback callback interfaces.
|Full automated support for the latest standard NETCONF confirmed-commit operations.
Data Retrieval Automation
|Streamed or Bulk Output
|The netconfd-pro server is configurable so protocol messages can be streamed from data structures directly or buffered and sent in bulk transfer mode.
|Optimized NETCONF sub-tree filtering with streamed output.
|The if-modified-since parameter is provided all NETCONF retrieval operations to minimize polling overhead. The
|Full XML Path Language (version 1.0) filtering with streamed output.
|Configurable event type filtering for notification delivery; only send notifications for desired event-types.
|Fully Supported IETF Standard
|Secure Shell (SSH) Transport Layer Protocol
|NETCONF base 1.0
|NETCONF over SSH v1
|NETCONF Partial Locking
|PATCH Method for HTTP
|YANG Data Types v1
|NETCONF base 1.1
|NETCONF over SSH v1.1
|NETCONF With-Defaults Capability
|NETCONF Base Notifications
|Translation of SMIv2 to YANG
|YANG Data Types v2
|HTTP/1.1 Message Syntax and Routing
|HTTP/1.1 Semantics and Content
|HTTP/1.1 Conditional Requests
|NETCONF over TLS with Mutual X.509 Authentication
|JSON Encoding of YANG Data
|RFC 8341, RFC 6536
|NETCONF Access Control Model
|Network Management Datastore Architecture (NMDA)
|RFC 8525, RFC 7895
|YANG Module Library
|NETCONF Extensions to Support NMDA
|YANG Schema Mount
|Subscription to YANG Notifications
|Dynamic Subscription to YANG Events and Datastores over NETCONF
|Subscription to YANG Notifications for Datastore Updates
|Support for Structure and Augment-Structure YANG Extension Statements
|Concise Binary Object Representation (CBOR)
|Encoding of Data Modeled with YANG in the Concise Binary Object Representation (CBOR)
* = partially supported
YANG Modules Included
|YANG Module Name
|Standard type for storing passwords using a hash function and features to indicate which hash functions are supported by an implementation, from RFC 7317.
|Standard YANG identities for IANA-registered interface types from RFC 7224.
|Standard set of identities for identifying datastores for use with NMDA, from RFC 8342.
|Standard YANG definitions for managing network interfaces from RFC 7223.
|Standard YANG networking data types from RFC 6021.
|Standard YANG data model for NETCONF protocol operations from RFC 6241.
|Standard NETCONF Access Control Model (NACM) from RFC 6536.
|Standard NETCONF monitoring data model and
|Standard set of NETCONF operations to support the Network Management Datastore Architecture (NMDA) from RFC 8526.
|Standard NETCONF Notification delivery with replay buffer and command interleave mode from RFC 5277.
|Defines an 'origin' metadata annotation and a set of identities for the origin value for use with NMDA, from RFC 8342.
|Standard NETCONF :with-defaults capability extensions to the
|Standard RESTCONF protocol message artifacts from RFC 8040.
|Standard RESTCONF monitoring from RFC 8040.
|Standard YANG Module Library for RESTCONF and YANG 1.1 from RFC 7895
|Standard YANG Patch Media Type used by RESTCONF and DB-API from RFC 8072
|Standard YANG data types from RFC 6021.
|Netconf Central YANG module for notification monitoring data model from RFC 5277.
|Netconf Central YANG module for
|Example SIL module.
|Netconf Central YANG module for Linux ARP management.
|Netconf Central YANG module for Linux interface monitoring.
|Netconf Central YANG module for setting and retrieving session-specific session parameters.
|Netconf Central YANG module for NETCONF Access Control, used as the starting point for NACM in RFC 6536.
|Netconf Central YANG language extensions.
|Netconf Central YANG module for Linux /proc system information.
|Netconf Central YANG module for NETCONF system management and notifications, which was used as the starting point for RFC 6470.
|Netconf Central YANG module for time-stamp based filtered of configuration data.
|Netconf Central YANG module for extended data types.
|This module contains abstract object definitions for the last-modified and etag XML attributes.
|YumaPro common identities.
|YumaWorks YANG module adds configurable event type filtering for notification delivery.
|YumaWorks YANG language extensions.
|YumaWorks YANG identities.
|YumaWorks RESTCONF monitoring extensions.
|YumaWorks RESTCONF confirmed commit extensions.
|Runtime access to netconfd-pro server parameters.
|This module contains the get-support-save operation and the support-save-data yang-data structure.
|YumaWorks extensions for CM maintenance such as the backup, restore, and delete-backup operations.
|YumaWorks configuration templates extension to edit-config.
|Notification event for terminal message feature.
|This module contains data structures representing replayable test suites for specific use cases and YANG modules for use with yangcli-pro.
|YumaWorks YANG data type extensions.
|YANG model mapping control block parameters for yangcli-pro.