Email us : sales@yumaworks.com

YumaPro Server Features

YumaPro Server Features

SYSLOG

FeatureDescription
Logging output integrated with SYSLOGStructured logging output can be sent to the SYSLOG deamon independently of the normal logging options.
Vendor-configurable messagesLogging messages can be customized with vendor-specific callback functions.
Facility, Class, Severity supportSYSLOG formatted and filtered message output is supported.
External SYSLOG API supportThe default SYSLOG service can be replaced with vendor-specific callback functions.

CLI

FeatureDescription
YANG-driven interfaceThe commands available are automatically populated based on the YANG modules loaded into yp-shell. The command line syntax is derived from the YANG syntax.
Config ModeThe config command is used to enter configuration mode. The YANG data nodes become the keywords and familiar CLI syntax is used to create, modify and delete configuration data.
Command RecallSeveral familiar command line recall mechanisms are supported:
history and recall commands to show recent command lines and recall a command line.
control-P (previous line) and Control-N (next line) to scroll through the history buffer.
The ! (bang character) to recall commands by line number or by matching the specified command string.
Context Sensitive EditingThe command completion text and available help text is context-sensitive, based on the YANG definitions, the current command mode or sub-mode, and the cursor position in the command line.
Command AliasesAliases are user-created commands that can be used to customize the command set and reduce typing.
The '?' Help KeyThe ‘?’ (question mark) key can be used to get context-sensitive help for the keyword(s) or value that is expected next within the current command line. The ‘tab’ key is used for short help text and the ‘?’ key is used for long help.

Role Based Access Control

FeatureDescription
Bypass ProtectionThe access control enforcement is integrated into the engine so no operations can bypass it and allow unauthorized access to configuration data.
IETF NACM SupportThe (standard) IETF NETCONF Access Control Model is supported.
Yuma NACM SupportThe (pre-standard) Yuma NETCONF Access Control Model is supported.
External ACM SupportAn external (vendor-specific) access control model can be selected instead of Yuma NACM or IETF NACM, and easily integrated into the netconfd-pro server through a structured API.

Automation

FeatureDescription
All CRUDX database operationsThe built-in transaction engine automatically handles all Create, Retrieval, Update, Delete, and eXecution operations for all NETCONF standards and all YANG modules.
Smart XPath CachingThe built-in XPath handler automatically detects which database nodes are referenced in any YANG must or when XPath expressions, allowing XPath results to be cached safely with no development effort or doctored YANG files.
YANG Defaults HandlingThe built-in transaction engine automatically handles all CRUDX operations correctly, even if default leafs and/or default non-presence containers are involved.
YANG featuresStandard YANG feature statements can be used to easily manage optional data model sections across multiple product platforms and product versions. Separate feature sets can be specified for each platform and release.
YANG extensionsStandard YANG extension statements and structured APIs can be used automatically process vendor-specific custom language statements.
Full Database lockingAutomatic support for standard all NETCONF database locking features.
Backup and Restore ManagementIntegrated backup and restore operations to simplify configuration management changes. Delete named backups with the delete-backup operation and view backup information in the YumaWorks monitoring extension to the standard ietf-netconf-monitoring module.
Transaction auditingConfigurable server transaction auditing with separate audit log.
Optimized Transaction Validation HandlingThe built-in transaction engine automatically detects which commit validation tests can safely be skipped because the database nodes involved in the test have not changed value. This includes all YANG XPath expressions (must, when), all instance tests (min-elements, max-elements, mandatory, unique, key), and all edit operations.
XPath Expression PruningThe built-in XPath handler automatically prunes false AND expressions and true OR expressions, which can greatly improve XPath validation speed.
YANG deviationsStandard YANG deviation statements can be used to easily manage data model diversity across multiple product platforms and product versions. Separate deviation files are automatically patched into the main module.
YANG user-defined typesStandard YANG typedef statements can be used to add any user-defined data types for reuse across multiple YANG modules.
YANG insert operationsAutomatic order-list insertion management through full support for the YANG insert operation extensions to NETCONF.
Partial Database lockingAutomatic support for standard all NETCONF partial-lock data sub-tree locking features.
Transaction managementAutomatic support for fully recoverable database edits, using a 3 phase transaction model, providing separate Validate, Apply, Commit and Rollback callback interfaces.
Confirmed-Commit HandlingFull automated support for the latest standard NETCONF confirmed-commit operations.

Data Retrieval Automation

TypeDescription
Streamed or Bulk OutputThe netconfd-pro server is configurable so protocol messages can be streamed from data structures directly or buffered and sent in bulk transfer mode.
Subtree FilteringOptimized NETCONF sub-tree filtering with streamed output.
Time-stamp FilteringThe if-modified-since parameter is provided all NETCONF retrieval operations to minimize polling overhead. The will be empty if the running configuration has not changed since the specified date and time.
XPath FilteringFull XML Path Language (version 1.0) filtering with streamed output.
Event-type FilteringConfigurable event type filtering for notification delivery; only send notifications for desired event-types.

NETCONF Standards

Fully Supported IETF StandardDescription
RFC 4253Secure Shell (SSH) Transport Layer Protocol
RFC 4741NETCONF base 1.0
RFC 4742NETCONF over SSH v1
RFC 5277NETCONF Notifications
RFC 5717NETCONF Partial Locking
RFC 5789PATCH Method for HTTP
RFC 6020YANG 1.0
RFC 6021YANG Data Types v1
RFC 6022NETCONF Monitoring
RFC 6241NETCONF base 1.1
RFC 6242NETCONF over SSH v1.1
RFC 6243NETCONF With-Defaults Capability
RFC 6470NETCONF Base Notifications
RFC 6643Translation of SMIv2 to YANG
RFC 6991YANG Data Types v2
RFC 7230*HTTP/1.1 Message Syntax and Routing
RFC 7231*HTTP/1.1 Semantics and Content
RFC 7232*HTTP/1.1 Conditional Requests
RFC 7589NETCONF over TLS with Mutual X.509 Authentication
RFC 7950YANG v1.1
RFC 7951JSON Encoding of YANG Data
RFC 8040RESTCONF
RFC 8071*Call Home
RFC 8072YANG Patch
RFC 8341, RFC 6536NETCONF Access Control Model
RFC 8342Network Management Datastore Architecture (NMDA)
RFC 8525, RFC 7895YANG Module Library
RFC 8526*NETCONF Extensions to Support NMDA
RFC 8528*YANG Schema Mount
RFC 8639*Subscription to YANG Notifications
RFC 8640*Dynamic Subscription to YANG Events and Datastores over NETCONF
RFC 8641*Subscription to YANG Notifications for Datastore Updates
RFC 8791Support for Structure and Augment-Structure YANG Extension Statements
RFC 8949*Concise Binary Object Representation (CBOR)
RFC 9254Encoding of Data Modeled with YANG in the Concise Binary Object Representation (CBOR)

*  = partially supported

YANG Modules Included

YANG Module NameDescription
iana-crypt-hashStandard type for storing passwords using a hash function and features to indicate which hash functions are supported by an implementation, from RFC 7317.
iana-if-typeStandard YANG identities for IANA-registered interface types from RFC 7224.
ietf-datastoresStandard set of identities for identifying datastores for use with NMDA, from RFC 8342.
ietf-interfacesStandard YANG definitions for managing network interfaces from RFC 7223.
ietf-inet-typesStandard YANG networking data types from RFC 6021.
ietf-netconfStandard YANG data model for NETCONF protocol operations from RFC 6241.
ietf-netconf-acmStandard NETCONF Access Control Model (NACM) from RFC 6536.
ietf-netconf-monitoringStandard NETCONF monitoring data model and operation from RFC 6022 to retrieve YANG modules from the server.
ietf-netconf-nmdaStandard set of NETCONF operations to support the Network Management Datastore Architecture (NMDA) from RFC 8526.
ietf-netconf-notificationsStandard NETCONF Notification delivery with replay buffer and command interleave mode from RFC 5277.
ietf-originDefines an 'origin' metadata annotation and a set of identities for the origin value for use with NMDA, from RFC 8342.
ietf-netconf-partial-lockStandard NETCONF and operations from RFC 5717 to support concurrent non-overlapping database edits.
ietf-netconf-with-defaultsStandard NETCONF :with-defaults capability extensions to the and operations, from RFC 6243.
ietf-restconfStandard RESTCONF protocol message artifacts from RFC 8040.
ietf-restconf-monitoringStandard RESTCONF monitoring from RFC 8040.
ietf-yang-libraryStandard YANG Module Library for RESTCONF and YANG 1.1 from RFC 7895
ietf-yang-patchStandard YANG Patch Media Type used by RESTCONF and DB-API from RFC 8072
ietf-yang-typesStandard YANG data types from RFC 6021.
nc-notificationsNetconf Central YANG module for notification monitoring data model from RFC 5277.
notificationsNetconf Central YANG module for operation from RFC 5277.
toasterExample SIL module.
yuma-arpNetconf Central YANG module for Linux ARP management.
yuma-interfacesNetconf Central YANG module for Linux interface monitoring.
yuma-mysessionNetconf Central YANG module for setting and retrieving session-specific session parameters.
yuma-nacmNetconf Central YANG module for NETCONF Access Control, used as the starting point for NACM in RFC 6536.
yuma-ncxNetconf Central YANG language extensions.
yuma-procNetconf Central YANG module for Linux /proc system information.
yuma-systemNetconf Central YANG module for NETCONF system management and notifications, which was used as the starting point for RFC 6470.
yuma-time-filterNetconf Central YANG module for time-stamp based filtered of configuration data.
yuma-typesNetconf Central YANG module for extended data types.
yumaworks-attrsThis module contains abstract object definitions for the last-modified and etag XML attributes.
yumaworks-config-changeYumaPro common identities.
yumaworks-event-filterYumaWorks YANG module adds configurable event type filtering for notification delivery.
yumaworks-extensionsYumaWorks YANG language extensions.
yumaworks-getbulkYumaWorks NETCONF protocol operation.
yumaworks-idsYumaWorks YANG identities.
yumaworks-restconfYumaWorks RESTCONF monitoring extensions.
yumaworks-restconf-commit
YumaWorks RESTCONF confirmed commit extensions.
yumaworks-serverRuntime access to netconfd-pro server parameters.
yumaworks-support-saveThis module contains the get-support-save operation and the support-save-data yang-data structure.
yumaworks-systemYumaWorks extensions for CM maintenance such as the backup, restore, and delete-backup operations.
yumaworks-templatesYumaWorks configuration templates extension to edit-config.
yumaworks-term-msgNotification event for terminal message feature.
yumaworks-testThis module contains data structures representing replayable test suites for specific use cases and YANG modules for use with yangcli-pro.
yumaworks-typesYumaWorks YANG data type extensions.
yumaworks-yangmapYANG model mapping control block parameters for yangcli-pro.