Optional
authOptional
configThe maximum depth for a client certificate chain. The depth of a chain is defined as the number of signing CA certificates that are present in the chain back to a trusted self-signed root CA certificate. The default value is 3
. Available since 2.22.
Optional
configEnable or disable validation of the "Not Before" and "Not After" validity dates in the authentication certificate(s). The default value is true
. Available since 2.22.
Optional
configThe TCP initial congestion window size for Config Sync clients, in multiples of the TCP Maximum Segment Size (MSS). Changing the value from its default of 2 results in non-compliance with RFC 2581. Contact support before changing this value. The default value is 2
. Available since 2.22.
Optional
configThe number of TCP keepalive retransmissions to a client using the Client Profile before declaring that it is not available. The default value is 5
. Available since 2.22.
Optional
configThe amount of time a client connection using the Client Profile must remain idle before TCP begins sending keepalive probes, in seconds. The default value is 3
. Available since 2.22.
Optional
configThe amount of time between TCP keepalive retransmissions to a client using the Client Profile when no acknowledgement is received, in seconds. The default value is 1
. Available since 2.22.
Optional
configThe TCP maximum window size for clients using the Client Profile, in kilobytes. Changes are applied to all existing connections. The default value is 256
. Available since 2.22.
Optional
configThe TCP maximum segment size for clients using the Client Profile, in bytes. Changes are applied to all existing connections. The default value is 1460
. Available since 2.22.
Optional
configEnable or disable configuration synchronization for High Availability or Disaster Recovery. The default value is false
. Available since 2.22.
Optional
configEnable or disable the synchronizing of usernames within High Availability groups. The transition from not synchronizing to synchronizing will cause the High Availability mate to fall out of sync. Recommendation: leave this as enabled. Changes to this attribute are synchronized to HA mates via config-sync. The default value is true
. Available since 2.22.
Optional
configEnable or disable the use of TLS encryption of the configuration synchronization communications between brokers in High Availability groups and/or Disaster Recovery sites. The default value is false
. Available since 2.22.
Optional
guaranteedThe days of the week to schedule defragmentation runs, specified as "daily" or as a comma-separated list of days. Days must be specified as "Sun", "Mon", "Tue", "Wed", "Thu", "Fri, or "Sat", with no spaces, and in sorted order from Sunday to Saturday. Please note "Sun,Mon,Tue,Wed,Thu,Fri,Sat" is not allowed, use "daily" instead. Changes to this attribute are synchronized to HA mates via config-sync. The default value is "daily"
. Available since 2.25.
Optional
guaranteedEnable or disable schedule-based defragmentation of Guaranteed Messaging spool files. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
. Available since 2.25.
Optional
guaranteedThe times of the day to schedule defragmentation runs, specified as "hourly" or as a comma-separated list of 24-hour times in the form hh:mm, or h:mm. There must be no spaces, and times (up to 4) must be in sorted order from 0:00 to 23:59. Changes to this attribute are synchronized to HA mates via config-sync. The default value is "0:00"
. Available since 2.25.
Optional
guaranteedEnable or disable threshold-based defragmentation of Guaranteed Messaging spool files. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
. Available since 2.25.
Optional
guaranteedPercentage of spool fragmentation needed to trigger defragmentation run. The minimum value allowed is 30%. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 50
. Available since 2.25.
Optional
guaranteedMinimum interval of time (in minutes) between defragmentation runs triggered by thresholds. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 15
. Available since 2.25.
Optional
guaranteedPercentage of spool usage needed to trigger defragmentation run. The minimum value allowed is 30%. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 50
. Available since 2.25.
Optional
guaranteedEnable or disable Guaranteed Messaging. The default value is false
. Available since 2.18.
Optional
guaranteedOptional
guaranteedOptional
guaranteedOptional
guaranteedOptional
guaranteedOptional
guaranteedOptional
guaranteedOptional
guaranteedOptional
guaranteedOptional
guaranteedOptional
guaranteedOptional
guaranteedOptional
guaranteedGuaranteed messaging cache usage limit. Expressed as a maximum percentage of the NAB's egress queueing. resources that the guaranteed message cache is allowed to use. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 10
. Available since 2.18.
Optional
guaranteedThe maximum total message spool usage allowed across all VPNs on this broker, in megabytes. Recommendation: the maximum value should be less than 90% of the disk space allocated for the guaranteed message spool. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 1500
. Available since 2.18.
Optional
guaranteedThe maximum time, in milliseconds, that can be tolerated for remote acknowledgement of synchronization messages before which the remote system will be considered out of sync. The default value is 10000
. Available since 2.18.
Optional
guaranteedThe maximum time, in milliseconds, that can be tolerated for remote disk writes before which the remote system will be considered out of sync. The default value is 10000
. Available since 2.18.
Optional
guaranteedThe replication compatibility mode for the router. The default value is "legacy"
. The allowed values and their meaning are:"legacy" - All transactions originated by clients are replicated to the standby site without using transactions."transacted" - All transactions originated by clients are replicated to the standby site using transactions. Changes to this attribute are synchronized to HA mates via config-sync. The default value is "legacy"
. The allowed values and their meaning are:
"legacy" - All transactions originated by clients are replicated to the standby site without using transactions. "transacted" - All transactions originated by clients are replicated to the standby site using transactions.
Available since 2.18.
Optional
oauthThe default OAuth profile for OAuth authenticated SEMP requests. Changes to this attribute are synchronized to HA mates via config-sync. The default value is ""
. Available since 2.24.
Optional
serviceEnable or disable the AMQP service. When disabled new AMQP Clients may not connect through the global or per-VPN AMQP listen-ports, and all currently connected AMQP Clients are immediately disconnected. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
. Available since 2.17.
Optional
serviceTCP port number that AMQP clients can use to connect to the broker using raw TCP over TLS. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 0
. Available since 2.17.
Optional
serviceOptional
serviceEnable or disable the health-check service. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
. Available since 2.17.
Optional
serviceThe port number for the health-check service. The port must be unique across the message backbone. The health-check service must be disabled to change the port. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 5550
. Available since 2.17.
Optional
serviceEnable or disable the mate-link service. The default value is true
. Available since 2.17.
Optional
serviceThe port number for the mate-link service. The port must be unique across the message backbone. The mate-link service must be disabled to change the port. The default value is 8741
. Available since 2.17.
Optional
serviceEnable or disable the MQTT service. When disabled new MQTT Clients may not connect through the per-VPN MQTT listen-ports, and all currently connected MQTT Clients are immediately disconnected. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
. Available since 2.17.
Optional
serviceEnable or disable the msg-backbone service. When disabled new Clients may not connect through global or per-VPN listen-ports, and all currently connected Clients are immediately disconnected. The default value is true
. Available since 2.17.
Optional
serviceEnable or disable the redundancy service. The default value is true
. Available since 2.17.
Optional
serviceThe first listen-port used for the redundancy service. Redundancy uses this port and the subsequent 2 ports. These port must be unique across the message backbone. The redundancy service must be disabled to change this port. The default value is 8300
. Available since 2.17.
Optional
serviceOptional
serviceEnable or disable the REST service incoming connections on the router. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
. Available since 2.17.
Optional
serviceEnable or disable the REST service outgoing connections on the router. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
. Available since 2.17.
Optional
serviceEnable or disable cross origin resource requests for the SEMP service. Changes to this attribute are synchronized to HA mates via config-sync. The default value is true
. Available since 2.24.
Optional
serviceEnable or disable extended SEMP timeouts for paged GETs. When a request times out, it returns the current page of content, even if the page is not full. When enabled, the timeout is 60 seconds. When disabled, the timeout is 5 seconds. The recommended setting is disabled (no legacy-timeout). This parameter is intended as a temporary workaround to be used until SEMP clients can handle short pages. This setting will be removed in a future release. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
. Available since 2.18.
Optional
serviceEnable or disable plain-text SEMP service. Changes to this attribute are synchronized to HA mates via config-sync. The default value is true
. Available since 2.17.
Optional
serviceThe TCP port for plain-text SEMP client connections. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 80
. Available since 2.17.
Optional
serviceThe session idle timeout, in minutes. Sessions will be invalidated if there is no activity in this period of time. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 15
. Available since 2.21.
Optional
serviceThe maximum lifetime of a session, in minutes. Sessions will be invalidated after this period of time, regardless of activity. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 43200
. Available since 2.21.
Optional
serviceEnable or disable TLS SEMP service. Changes to this attribute are synchronized to HA mates via config-sync. The default value is true
. Available since 2.17.
Optional
serviceThe TCP port for TLS SEMP client connections. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 1943
. Available since 2.17.
Optional
serviceTCP port number that SMF clients can use to connect to the broker using raw compression TCP. The default value is 55003
. Available since 2.17.
Optional
serviceEnable or disable the SMF service. When disabled new SMF Clients may not connect through the global listen-ports, and all currently connected SMF Clients are immediately disconnected. The default value is true
. Available since 2.17.
Optional
serviceOptional
serviceTCP port number that SMF clients can use to connect to the broker using raw TCP. The default value is 55555
. Available since 2.17.
Optional
serviceTCP port number that SMF clients can use to connect to the broker using raw routing control TCP. The default value is 55556
. Available since 2.17.
Optional
serviceTCP port number that SMF clients can use to connect to the broker using raw TCP over TLS. The default value is 55443
. Available since 2.17.
Optional
serviceOptional
serviceEnable or disable the web-transport service. When disabled new web-transport Clients may not connect through the global listen-ports, and all currently connected web-transport Clients are immediately disconnected. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
. Available since 2.17.
Optional
serviceThe TCP port for plain-text WEB client connections. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 8008
. Available since 2.17.
Optional
serviceThe TCP port for TLS WEB client connections. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 1443
. Available since 2.17.
Optional
serviceUsed to specify the Web URL suffix that will be used by Web clients when communicating with the broker. The default value is ""
. Available since 2.17.
Optional
tlsEnable or disable the blocking of TLS version 1.1 connections. When blocked, all existing incoming and outgoing TLS 1.1 connections with Clients, SEMP users, and LDAP servers remain connected while new connections are blocked. Note that support for TLS 1.1 will eventually be discontinued, at which time TLS 1.1 connections will be blocked regardless of this setting. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
.
Optional
tlsThe colon-separated list of cipher suites used for TLS management connections (e.g. SEMP, LDAP). The value "default" implies all supported suites ordered from most secure to least secure. Changes to this attribute are synchronized to HA mates via config-sync. The default value is "default"
.
Optional
tlsThe colon-separated list of cipher suites used for TLS data connections (e.g. client pub/sub). The value "default" implies all supported suites ordered from most secure to least secure. Changes to this attribute are synchronized to HA mates via config-sync. The default value is "default"
.
Optional
tlsThe colon-separated list of cipher suites used for TLS secure shell connections (e.g. SSH, SFTP, SCP). The value "default" implies all supported suites ordered from most secure to least secure. Changes to this attribute are synchronized to HA mates via config-sync. The default value is "default"
.
Optional
tlsEnable or disable protection against the CRIME exploit. When enabled, TLS+compressed messaging performance is degraded. This protection should only be disabled if sufficient ACL and authentication features are being employed such that a potential attacker does not have sufficient access to trigger the exploit. Changes to this attribute are synchronized to HA mates via config-sync. The default value is true
.
Optional
tlsThe PEM formatted content for the server certificate used for TLS connections. It must consist of a private key and between one and three certificates comprising the certificate trust chain. This attribute is absent from a GET and not updated when absent in a PUT, subject to the exceptions in note 4. Changing this attribute requires an HTTPS connection. The default value is ""
.
Optional
tlsThe password for the server certificate used for TLS connections. This attribute is absent from a GET and not updated when absent in a PUT, subject to the exceptions in note 4. Changing this attribute requires an HTTPS connection. The default value is ""
.
Optional
tlsEnable or disable the standard domain certificate authority list. The default value is true
. Available since 2.19.
Optional
tlsThe TLS ticket lifetime in seconds. When a client connects with TLS, a session with a session ticket is created using the TLS ticket lifetime which determines how long the client has to resume the session. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 86400
.
Optional
webEnable or disable the use of unencrypted wizards in the Web-based Manager UI. This setting should be left at its default on all production systems or other systems that need to be secure. Enabling this option will permit the broker to forward plain-text data to other brokers, making important information or credentials available for snooping. Changes to this attribute are synchronized to HA mates via config-sync. The default value is false
. Available since 2.28.
Optional
webReserved for internal use by Solace. Changes to this attribute are synchronized to HA mates via config-sync. The default value is ""
. Available since 2.25.
Optional
webEnable or disable redirection of HTTP requests for the broker manager to HTTPS. Changes to this attribute are synchronized to HA mates via config-sync. The default value is true
. Available since 2.24.
Optional
webThe HTTPS port that HTTP requests will be redirected towards in a HTTP 301 redirect response. Zero is a special value that means use the value specified for the SEMP TLS port value. Changes to this attribute are synchronized to HA mates via config-sync. The default value is 0
. Available since 2.24.
The client certificate revocation checking mode used when a client authenticates with a client certificate. Changes to this attribute are synchronized to HA mates via config-sync. The default value is
"none"
. The allowed values and their meaning are: