Efficient CLI PDF
Efficient CLI PDF
Efficient CLI PDF
June 2001
Copyright
Efficient Networks provides this publication as is without warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. All rights reserved. No part of this book may be reproduced in any form or by any means without written permission from Efficient Networks. Changes are periodically made to the information in this book. They will be incorporated in subsequent editions. Efficient Networks may make improvements and/or changes in the product described in this publication at any time. Copyright 1996-2001 Efficient Networks, Inc.
Trademarks
Efficient Networks is a registered trademark of Efficient Networks, Inc. All other trademarks and registered trademarks mentioned in this manual are the sole property of their respective companies.
Release 5.3:
Built-in firewall filters page 129 Options available for maximum, medium, minimum, and no security.
Support for Tollbridge voice gateways Additional voice troubleshooting commands available page 191
New voice router selections. alaw or law encoding page 24 CAS refresh signaling mode page 24
Support for G.shdsl routers Commands to manage G.shdsl link page 346
Support for Copper Mountain Plug & Play configuration Available when using the Copper Mountain CopperEdge 200 DSLAM, version 3.0, and router models 5871 IDSL, 5851 SDSL, and 7851 SDSL IAD page 48
New SNTP commands page 221 Commands to manage the SNTP server list and issue an SNTP time request.
New date and time commands page 212 and page 224 Commands to display and change the current date and time.
New command to turn on the PPP retry timer page 318 New IKE command page 376 Determines setting of IKE commit bit.
New debugging commands For ATM debugging (page 204); for IKE debugging (page 208); and for the ADSL DMT modem timeout (page 206).
Release 5.1.0:
New IP Filter types page 129
The IP filter type Forward has been replaced by the filter types Receive and Transmit.
H.323 support with Network Address Translation page 100 Configuration needed to receive incoming calls from NetMeeting or other H.323 applications.
Domain names allowed on ping and traceroute commands page 217 and page 224 Command requests IP address of domain from domain name server.
Rapid Secure Encryption hardware page 125 Hardware option available to accelerate encryption.
Over Subscription support for VoDSL routers page 22 Upstream over subscription is supported for CopperCom and Jetstream gateways.
Release 5.0:
VRRP Backup page 116 Implements the Virtual Router Redundancy Protocol (RFC 2338). Allows other routers in the LAN to serve as backups for a static default gateway.
Dial Backup see page 109 Uses a V.90 modem connected to the console port as an automatic backup when the DSL link fails.
SDSL Autobaud Pre-Activation Procedure see page 343 Shortens the time required to find the correct line speed by checking the line quality before activation.
New IKE Commands Perfect Forward Secrecy option to increase the security of the IKE key exchange see page 151. Option to restrict policy use to a specific interface see page 379. Option to have network address translation performed before IPSec encryption see page 382.
Interface Stop, Start and Restart Commands to stop, start, and restart a logical Ethernet interface see page 79. Commands to stop, start, and restart an active session for a remote see page 35.
Voice router support Command to change voice profile available if voice gateway is ATM standards-based see page 23. Command to adjust jitter buffer size see page 193.
Multiple BootP relays see page 167 Use dhcp addrelay and dhcp delrelay commands to change the BootP server list.
The command syntax has changed for system addSyslogServer and system delSyslogServer.
New all protocols option on AddServer commands system addServer see page 233; remote addServer see page 293; eth ip addServer see page 265.
New DHCP command see page 354 Command to clear all DHCP information.
IP Filter changes see eth ip filter, page 270 or remote ipfilter, page 300 New -tcp rst parameter allows a filter to match the TCP RESET flag. Watch messages are also sent to Unix Syslog servers.
New IP remote LANCONFIG option see page 311 PPP remote can receive IPCP information for dyamically reconfiguring the Ethernet interface.
Typographic Conventions
The following typeface conventions are used in this guide: Typeface Italics Item Book titles, command reference parameters, cross-references, text emphasis. Keywords in command reference instructions Examples. File names Examples Refer to the User Reference Guide. system name <name> save
remote listIpRoute hq
Copy le CFGMGR.EXE
Table of Contents
Whats New in This Release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Release 5.3:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Release 5.1.0: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Release 5.0:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 About This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 How This Manual is Organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Typographic Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 How to Access the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Terminal Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Terminal Session under Windows (HyperTerminal) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Terminal Session for Macintosh or UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Telnet Session for Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Chapter 1. Router Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Routing and Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 When to Use Routing or Bridging or Both . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 How Routing and Bridging Work Together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Routing and Bridging Controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 xDSL WAN Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Voice Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Configuring Your Telephony Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Changing Your ATM Standard Voice Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Selecting law or Alaw Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 CAS Refresh During Idle State. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 PAP/CHAP Security Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Authentication Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Authentication Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Authentication Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Interoperability Between the Router and Other Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Protocol Conformance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Encapsulation Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 PPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 PPPLLC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 RFC 1483 or RFC 1490 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 MAC Encapsulated Routing: RFC 1483MER (ATM) or RFC 1490MER (Frame Relay) . . . . . 31 FRF8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 rawIP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Router System and Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Chapter 2. Planning for Router Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Remote Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Managing the Remote Entries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Protocols to be Used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 PPP Link Protocol (over ATM or Frame Relay) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
RFC 1483/RFC 1490 Link Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 MAC Encapsulated Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 FRF8 Link Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Dual-Ethernet Router Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Copper Mountain Plug & Play . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Plug & Play Configuration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Bridge or Router? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Remote configuredForCMPPlay. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Chapter 3. Configuring the Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Configuration Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Configuring PPP with IP Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Configuring PPP with IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Configuring PPP with Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Configuring RFC 1483 / RFC 1490 with IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Configuring RFC 1483 / RFC 1490 with IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Configuring RFC 1483 / RFC 1490 with Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Configuring MAC Encapsulated Routing: RFC 1483MER / RFC 1490MER with IP Routing . 59 Configuring FRF8 with IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Configuring Mixed Network Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Configuring a Dual-Ethernet Router for IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Verify the Router Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Test IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Test Bridging to a Remote Destination. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Test IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Sample Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Sample Configuration 1: PPP with IP and IPX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Sample Configuration 2: RFC 1483 with IP and Bridging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Sample Configuration 3: Configuring a Dual-Ethernet Router for IP Routing . . . . . . . . . . . . . . 77 Chapter 4. Configuring Special Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 IP Subnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Logical Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Stopping and Starting an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Interface Routing and Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Virtual Routing Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Bridge Filtering and IP Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Configure Bridge Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Internet Firewall Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 IP Directed Broadcast Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 RIP Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Advertising the Local Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Changing the Multicast Address for RIP-2 Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Multicast Forwarding Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 DHCP (Dynamic Host Configuration Protocol) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 DHCP Address Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 DHCP Client Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 DHCP Administration and Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Manipulating Subnetworks and Explicit Client Leases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Setting Option Values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Managing BootP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Defining Option Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 DHCP Information File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Clearing All DHCP Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 9
General NAT Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Masquerading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Classic NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 NetMeeting (H.323) with NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 PPPoE (PPP over Ethernet) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Configuring for PPPoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Managing PPPoE Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Controlling Remote Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Disabling Remote Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Re-enabling Remote Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Validating Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Restricting Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Changing the SNMP Community Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Disabling WAN Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Dial Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Configuring Dial Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Specifying the Dialup Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Setting DSL Link Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Specifying Modem Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Disabling and Re-Enabling Dial Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 VRRP Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 VRRP Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Defining the VRRP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Defining the VRID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Defining VRRP Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Starting VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Disabling or Deleting VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Sample VRRP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Master Router Configuration File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Backup Router Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Chapter 5. Configuring Software Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 Software Option Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 Listing the Installed Software Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 Adding a New Software Option Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Encryption Hardware Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 PPP DES (RFC 1969) Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Diffie-Hellman Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 IP Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Built-in Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Filters and Interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Filter Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 IP Filter Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 ICMP Redirect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Filter Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 L2TP Tunneling Virtual Dial-Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Advantages of Tunneling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 L2TP Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Sample Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 IPSec (Internet Protocol Security). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Transport and Tunnel Encapsulation Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 ESP and AH Security Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
10
IKE Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .151 Main Mode and Aggressive Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .152 Additional IKE Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153 Security Associations (SAs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153 IKE Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154 IKE Peer Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154 IKE Proposal Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 IKE IPSec Proposal Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156 IKE IPSec Policy Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157 IKE Configuration Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159 Main Mode Example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159 Aggressive Mode Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162 IPSec Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163 Chapter 6. Managing the Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165 SNMP Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165 Telnet Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166 Client TFTP Facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166 TFTP Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166 BootP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167 BootP Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167 BootP Service by the DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167 Relaying BootP Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168 Syslog Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168 Boot Code Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169 What is the Boot Code?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169 Manual Boot Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .170 Identifying Fatal Boot Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173 Software Kernel Upgrades. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176 What is the Software Kernel? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176 Booting and Upgrading from the LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176 Upgrading from the WAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .178 Backup and Restore Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179 Backup Configuration Files (Recommended Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179 Restore Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179 Flash Memory Recovery Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180 Recovering Kernels for Routers with Configuration Switches. . . . . . . . . . . . . . . . . . . . . . . . . .180 Recovering Kernels for Routers with a Reset Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .181 Recovering Passwords and IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182 Routers with Configuration Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182 Routers with a Reset Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182 Batch File Command Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183 Chapter 7. Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184 Diagnostic Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184 Using LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184 History Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185 Ping Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .186 Investigating Hardware Installation Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .187 Investigating Software Configuration Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188 Connection Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188 Login Password Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188 Remote Network Access Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .189 Telnet Access Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .191
11
Software Download Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Voice Routing (VoDSL) Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 L2TP Tunnel Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Dial Backup Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 System Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Time-Stamped Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Debugging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 General Debug Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 ATM Debug Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Web GUI Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 SDSL Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 ADSL DMT Router Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Frame Relay Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 ATM Tracing Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 IP Filtering Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 IKE Debug Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Before Contacting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Chapter 8. Command Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Command Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Status Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 File System Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 SYSTEM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Ethernet Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 REMOTE Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 WAN Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 ADSL Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 ATM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 DMT Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 Dual-Ethernet Router (ETH) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Frame Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 HDSL Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 IDSL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 SDSL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 SHDSL Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346 DHCP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 L2TP Virtual Dial-Up Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 Bridge Filtering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 PPPoE Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 IKE (Internet Key Exchange) Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 IPSec Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 Appendix A. Network Information Worksheets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398 Configuring PPP with IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 Configuring PPP with IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Configuring PPP with Bridging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401 Configuring RFC 1483 / RFC 1490 with IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Configuring RFC 1483 / RFC 1490 with IPX Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Configuring RFC 1483 / RFC 1490 with Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 Configuring RFC 1483MER / RFC 1490MER with IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 Configuring FRF8 with IP Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406 Configuring a Dual-Ethernet Router for IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
12
Appendix B. Configuring IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .408 IPX Routing Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .408 Configure IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .408 Step 1: Collect Your Network Information for the Target (Local) Router . . . . . . . . . . . . . . . . .409 Step 2: Review your Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .410 Command Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .411 Topic Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .416
13
2. 3. 4.
5.
Enter the login password. (The default is admin. To change the login password, use the system admin command, page 236). You may then begin entering router commands.
The router supports both local access and remote access. In step 3 above, the terminal session could be: The terminal window from within the Quick Start or Configuration Manager application (for local access) A terminal session (for local access) A Telnet session (for remote access)
Terminal Window
To access the terminal window from within the Quick Start or Configuration Manager application: Select Tools and Terminal Window from the main menu.
The menu selection Commands provides shortcuts to most of the commands described in this manual.
3. 4.
In the Phone Number window, under Connect using, select Choose Direct to Com 1 (or 2). In the Com 1 (or 2) Properties page, enter the following port settings and select OK: Bits per second: 9600 Data bits: Parity: Stop bits: Flow control: 8 None 1 Hardware
(To use a baud rate other than 9600, see page 172.)
15
(To use a baud rate other than 9600, see page 172.)
16
4.
The router displays a line identifying itself and then displays the Login: prompt.
17
Routing
Routing is the process that determines where data is sent. A router can route user data from source to destination over different LAN and WAN links. Routing relies on routing address tables to determine the best path for each packet to take. The routes within a routing address table are established in two ways: You can enter specific static routes. For each route, you enter the address for a remote destination with path details and a value for the perceived cost of that route (path latency). The routing tables can also be built dynamically; i.e., the location of remote stations, hosts, and networks are updated from broadcast packet information.
Routing offers advantages over bridging because: It limits broadcasts to the local LAN segment. It limits the protocols that are routed beyond the LAN segment. Routed protocols allow networks to grow as large as needed. Filters and firewalls can provide screens for improved security and managed traffic flow.
18
Numerous network protocols have evolved, and within certain protocol suites are associated protocols for routing, error handling, network management, etc. The following chart lists networking protocols and associated protocols supported by the router. Network Protocol IP (Internet Protocol) Associated Protocols RIP (Routing Information Protocol) Description Maintains a map of the network
ARP (Address-Resolution Protocol) RARP (Reverse Address Resolution Protocol)a ICMP (Internetwork Control Message Protocol) SNMP (Simple Network Management Protocol) IPX (Internet Packet Exchange) RIP (Routing Information Protocol)b
Maps IP addresses to data-link addresses Maps data-link addresses to IP addresses Diagnostic and error reporting/ recovery Network management Maintains a map of the network
SAP (Service Advertising Protocol) a Used only during a network boot. b IPX-RIP is a different protocol from IP-RIP and it includes time delays.
Bridging
Bridging connects two or more LANs so that all devices share the same logical LAN segment and network numbers. Transparent bridging allows locally connected devices to send frames to all devices as if they were local. The MAC layer header contains source and destination addresses used to transfer frames. An address table is dynamically built and updated with the logical port a device is connected to as frames are received. (To see the contents of the bridging table, use the command bi list, page 212.) Bridging has these capabilities: Allows protocols that cannot be routed (such as NETBIOS) to be forwarded. Allows optimizing internetwork capacity by localizing traffic on LAN segments. Extends the physical reach of networks beyond the limits of each LAN segment. Bridge filtering may increase network security.
Our bridging support includes the IEEE 802.1D standard for LAN-to-LAN bridging and the Spanning Tree Protocol for interoperability with other vendors bridge/routers. Bridging is provided over PPP as well as adjacent LAN ports.
19
Bridge Filtering
You can control the flow of packets through the router using bridge filters. The filters can deny or allow packets to cross the network based on the content of the packets. This feature lets you restrict or forward messages with a specified address, protocol, or data content. Common uses are to prevent access to remote networks, control unauthorized access to the local network, and limit unnecessary traffic. For example, to restrict remote access for specific users, you could define bridge filters using the local MAC address of each user to be restricted. Each bridge filter is specified as a deny filter based on the MAC address and position of the address within the packet. Deny filtering mode is then enabled to initiate bridge filtering. While in deny mode, all packets containing one of the filtered MAC addresses are denied bridging across the router. Similarly, protocol filtering can be used to prevent a specific protocol from being bridged. In this case, the protocol ID field in a packet is used to deny or allow a packet. You can also restrict the bridging of specific broadcast packets. For a further discussion of bridge filtering, see page 81.
Bridge-Only Units
A series of bridge-only units is available, both upgradable and non-upgradable. An upgradable bridge can be upgraded to a router; a non-upgradable bridge cannot. These bridge-only units are pre-configured; no further configuration is required. The unit comes up in bridge mode automatically. Upgrading an upgradable bridge to become a router requires the addition of a software option key. The software option key turns on the IP Routing feature. To read about software option keys, see page 124.
IP/IPX Routing On
Data packets carried Operational characteristics Typical usage
IP/IPX Routing On
Data packets carried
20
IP/IPX routing; allows other protocols, such as NetBEUI (that cant be routed), to be bridged. When only IP/IPX trafc is to be routed but some non-routed protocol is required. Used for client/server congurations.
Operation of the router is influenced by routing and bridging controls and filters set during router configuration as well as automatic spoofing and filtering performed by the router. For example, general IP or IPX routing, and routing or bridging from specific remote routers are controls set during the configuration process. Spoofing and filtering, which minimize the number of packets that flow across the WAN, are performed automatically by the router. For example, RIP routing packets and certain NetBEUI packets are spoofed even if only bridging is enabled.
21
The WAN interface of the router is displayed each time the router reboots, as in the following IDSL example:
Efficient 5871 IDSL Router (120-5871-001/2) v5.0.0 Ready Login:
Voice Routing
A Voice over DSL (VoDSL) router allows the delivery of both telephony (voice) and data services over a single DSL line. It acts as an Integrated Access Device (IAD), residing on the customer premises and connecting to a DSL circuit. As such, it serves as a circuit/packet gateway and provides standard telephone service as well as Internet service via an Ethernet connection. Thus, the user has access to toll-quality telephone lines and continuous, high-speed Internet and remote LAN services over a single copper loop. This diagram illustrates how a Voice over DSL router connects both a phone system to the PSTN and a LAN to the Internet over the same DSL line.
Phone system
Class 5 Switch
PSTN
DSL Line
Ethernet LAN
Router
Internet
Features provided in your VoDSL router may include: Support for these voice gateways: Jetstream (proprietary) CopperCom (proprietary)
22
Tollbridge (proprietary) ATM standards-based (ATM Forum document VMOA-0145.00), also known as BLES (broadband loop emulation service)
Upstream traffic shaping (bandwidth management) of data when the telephony interface is active ADPCM or PCM voice encoding Local echo canceling (G.168)
Upstream over subscription is supported for most gateways. If the bandwidth is insufficient to support a new outgoing call, the user does not receive a dial tone when going off hook. Downstream over subscription should be managed by the gateway. Currently, if the bandwidth is occupied by calls and a new call is received, all users may hear clicking.
Use the Web GUI to verify the VPI/VCI or DLCI numbers for the data and voice connections.You can change the value if necessary (see Voice Routing (VoDSL) Troubleshooting, page 191). The phone number for each port is set by your voice service provider. The phone dial tone is provided by the Class 5 switch via the voice gateway at your regional switching center (RSC). All voice features of the switch are passed through to the phone set. The router supports the calling services that you subscribe to from your service provider, such as call forwarding, caller ID, messaging, etc. The bandwidth required to initiate an upstream call is always about 80 Kbps (64 Kb plus overhead), whether PCM or ADPCM encoding is used. Although for ADPCM only about 40 Kb is used (32 Kb plus overhead), 80Kbps is always reserved because the ADPCM call can switch to a PCM call on the fly. This switching is done for all V.90 calls and some fax calls by the voice gateway. Configuration for voice and data routing can be performed using the Web-based Easy Setup configuration program. For ATM standards-based gateways, the voice profile must match the configuration of the voice gateway (see Changing Your ATM Standard Voice Profile, page 23). You can use the Port Monitor GUI program to see the voice PVC and the last event message. To see LMI statistics for a frame relay router, use the frame stats command (page 334). To see AAL2 statistics for the voice gateway, use the voice l2stats command (Jetstream gateway only). For other commands to monitor telephony services, see Trouble-Shooting Telephony Services (page 191).
23
Silence suppression supported: yes or no? Voice cell payload size: 44 bytes or 40 bytes?
You can display and change your active voice profile. The default voice profile is 9. To display the current voice profile, enter this command: voice profile To change your active voice profile, specify the profile number on the voice profile command. voice profile <profile> Note: Currently, only profiles 9 and 10 are supported. profile 7 8 9 10 11 12 ADPCM32? Yes No No Yes Yes Yes Silence Payload Suppression? Size? Yes 44 bytes Yes No No No Yes 44 bytes 44 bytes 44 bytes 40 bytes 40 bytes
24
To have CAS refresh signals sent both when voice is present and during an idle state, enter this command: voice refreshcas always To have CAS refresh signals sent only when voice is present, enter this command: voice refreshcas active Note: A mode change is effective immediately. However, you must save the change if it is to persist across reboots.
New York System Name=New York System Password=xyz Remote Router Database Remote=Chicago Password=abc
...New
Chicago System Name=Chicago System Password=abc Remote Router Database Remote=New York Password=xyz
2 .....Accepted/Rejected.......
CHAP is more secure than PAP because unencrypted passwords are not sent across the network. CHAP uses a three-way handshake. One router (known as the authenticator) challenges the other router (known as the peer) by generating a random number and sending it along with the system name. The peer then applies a one-way hash algorithm to the random number and returns this encrypted information along with the system name. The authenticator then runs the same algorithm and compares the result with the expected value. This authentication method depends upon a password or secret known only to both ends.
25
CHAP Authentication
New York System Name=New York System Password=xyz Remote Router Database Remote=Chicago Password=abc
Chicago & encrypted secret Performs same hash with number and secret abc and compares results 3
.....Accepted/Rejected.......
Authentication Process
The authentication process occurs regardless of whether a remote router connects to the local router or vice versa, and even if the remote end does not request authentication. It is a bi-directional process, where each end can authenticate the other using the protocol of its choice (provided the other end supports it). During link negotiation (LCP), each side of the link negotiates which protocol to use for authentication during the connection. Note: If desired, you can override the negotiation of an authentication protocol and force the local router to use the designated protocol. To designate PAP or CHAP, use the command system authen (page 236). If both routers have PAP authentication, then they negotiate PAP authentication. Otherwise, the local router always requests CHAP authentication first; if CHAP is refused, PAP is requested. If the remote does not accept either PAP or CHAP, the link is dropped; i.e., the router does not communicate without a minimum security level. On the other hand, the local router does accept any authentication scheme required by the remote, including no authentication at all.
CHAP Authentication
For CHAP, the router issues a CHAP challenge request to the remote side. The challenge includes the system name and random number. The remote end, using a hash algorithm, transforms the name and number into a response value. When the remote end returns the challenge response, the router can validate the response challenge value using the entry in the remote router database. If the response is invalid, the call is disconnected. If the other end negotiated CHAP, the remote end can, similarly, request authentication from the local router. The router uses its system name and password to respond to the CHAP challenge.
PAP Authentication
For PAP, when a PAP login request is received from the remote end, the router checks the remote router PAP security using the remote router database. If the remote router is not in the remote router database or the remote router password is invalid, the call is disconnected. If the remote router and password are valid, the local router acknowledges the PAP login request.
26
If PAP was negotiated by the remote end for the remote-side authentication, the router issues PAP login requests only if it knows the identity of the remote end. The identity is known if the call was initiated from the router, or if the remote end returned a successful CHAP challenge response. For security reasons, the router never identifies itself using PAP without first knowing the identity of the remote router. If PAP was negotiated by the remote end for the local side of the authentication process and the minimum security level is CHAP, as configured in the remote router database, the link is dropped as a security violation.
Authentication Passwords
Access to the router is controlled by an administration password set by the command system admin (page 236). As part of the router configuration, you may set the following authentication passwords: System authentication password the default system password used to access any remote router. Remote sites use this password to authenticate the local site. This default authentication password is set by the command system passwd (page 252). System override password optional password used only to connect to a specific remote router for authentication by that remote site. To specify a unique system override password for a remote router, use the command remote SetOurPasswd (page 315). This password is used instead of the general system password only for connecting to a specific remote router. This allows you to set a unique CHAP or PAP authentication password for authentication of the local site by the remote site only when the router connects to that remote site. A common use for the system override password is to set the password assigned to you by your Internet Service Provider (ISP). Similarly, the system name of the local router (set by the command system name) can be overridden for connecting to a specific remote with the command remote setOurSysName (page 316). Remote authentication password password used by the router to authenticate the remote site. Each remote router entered in the remote router database has a password used when the remote site attempts to gain access to the local router. To set the remote authentication password, use the command remote setpasswd (page 316).
Authentication Levels
The router also uses security levels, as follows: Remote authentication protocol Each remote router entered in the remote router database has a minimum security level that must be negotiated before the remote router gains access to the local router. System authentication protocol A system-wide control is available for overriding the minimum security level in the entire remote router database.
27
Network layer
The data-link protocol level defines the transmission of data packets between two systems over the LAN or WAN physical link. The frame type or encapsulation method defines a way to run multiple network-level protocols over a single LAN or WAN link. Most protocols do not support negotiable options, except for PPP. The router supports both ATM (Asynchronous Transfer Mode) and Frame Relay transmission. ATM transport uses fixed-length cells; Frame Relay transport uses variable-length packets. The router supports the following WAN encapsulations: PPP (VC multiplexing) PPP (LLC multiplexing) PPPoE (PPP over Ethernet) RFC 1483 (for ATM) RFC 1483 with MAC encapsulated routing (for ATM) FRF8 (for ATM) RFC 1490 (for Frame Relay) RFC 1490 with MAC encapsulated routing (for Frame Relay)
The packet formats for these encapsulation methods are given in Encapsulation Options, page 29.
Protocol Conformance
The router conforms to RFCs designed to address performance, authentication, and multi-protocol encapsulation. The following RFCs are supported: RFC 1058 RFC 1144 RFC 1220 RFC 1332 Routing Information Protocol (RIP) Compressing TCP/IP headers (Van Jacobson) Bridging Control Protocol (BNCP) IP Control Protocol (IPCP)
28
RFC 1334 RFC 1389 RFC 1483 RFC 1490 RFC 1542 RFC 1552 RFC 1577 RFC 1631 RFC 1661 RFC 1723 RFC 1769 RFC 1877 RFC 1962 RFC 1969 RFC 1973 RFC 1974 RFC 1990 RFC 1994 RFC 2104 RFC 2131 RFC 2132 RFC 2364 RFC 2401 RFC 2402 RFC 2403 RFC 2404 RFC 2405 RFC 2406 RFC 2407 RFC 2408 RFC 2409 RFC 2410 RFC 2412 RFC 2419 RFC 2451
Password Authentication Protocol and Challenge Handshake Authentication Protocol (PAP/ CHAP) RIP2 Multiprotocol Encapsulation over ATM Adaptation Layer 5 Multiprotocol Interconnect over Frame Relay DHCP Relay Agent Novell IPX Control Protocol (IPXCP) Classical IP and ARP over ATM Network Renumbering Point-to-Point Protocol (PPP) RIP Version 2 Simple Network Time Protocol (SNTP) Automatic IP / DNS PPP Compression Control Protocol (CCP) PPP DES Encryption Protocol (ECP) PPP in Frame Relay PPP Stac LZS Compression Protocol Multi-Link Protocol (MLP) User Authentication PAP / CHAP HMAC: Keyed-Hashing for Message Authentication Dynamic Host Configuration Protocol (DHCP) DHCP Client PPP over AAL5 Security Architecture for the Internet Protocol IP Authentication Header The Use of HMAC-MD5-96 within ESP and AH The Use of HMAC-SHA-1-96 within ESP and AH The ESP DES-CBC Cipher Algorithm With Explicit IV IP Encapsulating Security Payload (ESP) The Internet IP Security Domain of Interpretation for ISAKMP Internet Security Association and Key Management Protocol (ISAKMP) The Internet Key Exchange (IKE) The NULL Encryption Algorithm and Its Use with IPSec The OAKLEY Key Determination Protocol PPP DES Encryption v2 The ESP CBC-Mode Cipher Algorithms
IP Routing
IP routing support, in conformance with RFC 791, provides the ability to process TCP/IP frames at the network layer for routing. IP routing support includes the Routing Interface Protocol (RIP), in conformance with RFC 1058 (RIP v.1) and RFC 1723 (RIP v.2).
IPX Routing
IPX routing conforms to the Novell NetWare IPX Router Development Guide, Version 1.10.
Encapsulation Options
This section describes the packet format for each encapsulation option supported by the router.
29
The encapsulation method used by a remote is defined by the remote setProtocol command (page 320). Note: The same encapsulation method must be used by both ends of the connection (the router and the DSLAM).
PPP
This protocol uses VC multiplexing, as defined in RFC 2364; it dedicates a virtual circuit to PPP traffic only. (The other encapsulation method defined in RFC 2364, LLC multiplexing, is described in the next section, PPPLLC.) Each packet begins with a one- or two-byte protocol ID. Typical IDs are: 0xc021 0x8021 0x0021 0x002d 0x002f 0x8031 0x0031 LCP IPCP IP Van Jacobson compressed TCP/IP Van Jacobson uncompressed TCP/IP Bridge NCP Bridge Frame
The command for this encapsulation option is: remote setProtocol PPP <remoteName> (page 320). Note: With PPP over ATM, the address and control fields (i.e., FF03) are never present; this also is the case for LCP packets.
PPPLLC
This protocol (LLC-multiplexed) allows PPP traffic to be carried simultaneously with other traffic on a single virtual circuit (as opposed to the PPP method of encapsulationVC multiplexingwhich dedicates a virtual circuit to PPP traffic only). Each PPP packet is prepended with the sequence 0xFEFE03CF. Thus, an LLC packet has the format: 0xFEFE03CF 0xC021. The command for this encapsulation option is: remote setProtocol PPPLLC <remoteName> (page 320).
Routing
IP packets are prepended with the header 0xAAAA0300 0x00000800.
30
IPX packets are prepended with the header 0xAAAA0300 0x00008137. For this encapsulation option, the commands, as described on page 320, are: remote setProtocol RFC1483 <remoteName> (for ATM) remote setProtocol FR <remoteName> (for Frame Relay - RFC 1490)
MAC Encapsulated Routing: RFC 1483MER (ATM) or RFC 1490MER (Frame Relay)
MER encapsulation allows IP packets to be carried as bridged frames, but does not prevent bridged frames from being sent as well, in their normal encapsulation format: RFC 1483 (ATM) or RFC 1490 (Frame Relay). If IP routing is enabled, then IP packets are prepended with the sequence 0xAAAA0300 0x80c20007 0x0000 and sent as bridged frames. If IP routing is not enabled, then the packets appear as bridged frames. The commands for this encapsulation option are: remote setProtocol RFC1483MER <remoteName> (for ATM) remote setProtocol MER <remoteName> (for Frame Relay)
FRF8
IP packets have prepended to them the following sequence: 0x03CC. The command for this encapsulation option is: remote setprotocol FRF8 <remoteName> Note: This protocol allows sending ATM over Frame Relay.
rawIP
IP packets do not have any protocol headers prepended to them; they appear as IP packets on the wire. Only IP packets can be transported since there is no possible method to distinguish other types of packets (bridged frames or IPX). The command for this encapsulation option is: remote setProtocol rawIP <remoteName>
31
The router configuration files are as follows: SYSTEM.CNF System configuration information, including: DOD SYS ETH DHCP.DAT FILTER.DAT ETH.DEF ATM.DAT ATOM.DAT SDSL.DAT SHDSL.DAT DMT.DAT IPSEC.DAT IKE.DAT Remote router database System settings: name, message, authentication method, and passwords Ethernet LAN configuration settings
DHCP data. Bridge filters. File used by the manufacturer to set a default Ethernet configuration. ATM configuration. ATM configuration. SDSL configuration. SHDSL configuration. DMT configuration. IPSec configuration. IKE configuration.
The following files are for automatic execution of command scripts. For more information, see page 183. AUTOEXEC.BAT Autoexec file of commands to run on next reboot.
32
The following script files are used for creating firewall filters via the web GUI. maxsec.txt Maximum security medsec.txt Medium security minsec.txt nosec.txt Minimum security No security
The keys for software options that have been purchased are kept in the file KEYFILE.DAT. Do not copy the key file from one router to another router, even if the two routers are the same model with the same kernel. The software keys are isomorphic to one and only one router. For more information on software option keys, see page 124.
33
An alternate configuration method, called Plug & Play, is available with the Copper Mountain CopperEdge 200 DSLAM. This method is described at the end of the chapter.
Remote Routers
This manual frequently refers to the local router and remote routers, which are defined as follows. Local router. Router that you are configuring. Also referred to as target router. Remote routers. All the routers to which the local (target) router may connect. Remote router database. Database which resides in the local router and contains information about the remote routers to which the local router can connect. The following diagram illustrates these terms.
Local Router
Router A Remote router database Router B Router C Router D DSL Network
Remote Routers
Router B Router C Router D
As shown in the illustration, the remote router database in the local router contains an entry for each remote router. A remote router entry defines: Connection parameters Security features
34
The commands that define information for a remote router entry start with the word remote and end with the name of the remote entry. Most of these commands are described in the section REMOTE Commands, on page 289.
Protocols to be Used
The information needed to configure the router depends on the link protocol and network protocols that are to be used. The link protocol and network protocols used are generally determined by your Network Service Provider. This chapter is organized in sections that apply to specific protocols. Note: Use the blank Network Information Worksheets in appendix A to collect your network information. If you are using Link and Network Protocols: PPP with: IP Routing, go to page 36 IPX Routing, go to page 38 Bridging, go to page 40
RFC 1483 or RFC 1490 with: IP Routing, go to page 41 IPX Routing, go to page 42 Bridging, go to page 43
RFC 1483 MER or RFC 1490 MER (MAC Encapsulated Routing) with: IP Routing, go to page 44
35
To configure a Dual-Ethernet Router: Select one of these two configurations: Configuring the Dual-Ethernet Router as a Bridge, on page 47 Configuring the Dual-Ethernet Router for IP Routing, on page 47
36
The DLCI (Data Link Connection Identifier) number applies to Frame Relay routers only. Get your DLCI from your service provider. DNS Internet Account Information (optional) The Domain Name Service (DNS) maps host names to IP addresses. DNS is performed by Domain Name Servers. The router can get DNS information automatically. Or, you can choose to configure DNS manually. Consult with your Network Service Provider to determine if you need to enter the following information: DNS server address DNS second server address DNS domain name
IP Routing Addresses For the Ethernet interface: Ethernet IP Address (Local LAN) An Ethernet LAN IP address and subnet mask are required for the routers local Ethernet LAN connection. This information is defined by the user or your network administrator. Note: An Ethernet route is usually defined when there are multiple routers on the Ethernet that cannot exchange routing information. This feature is only used in special circumstances. For the WAN interface: The following information is defined by your network service provider. Source (Local) WAN Port Address If Network Address Translation (NAT) is enabled, you must specify a source WAN IP address for the WAN connection to the remote router if IP address negotiation under PPP does not provide one. Check with your network administrator for details on whether the router must communicate in numbered or unnumbered mode and which addresses are required. Remote WAN Address You may need to specify a remote WAN IP address for the WAN connection to the remote router depending on IP address negotiation under PPP. Check with your network administrator for details on whether the router must communicate in numbered or unnumbered mode and which addresses are required. TCP/IP Remote Routes An IP route includes an IP address, subnet mask, and metric (a number representing the perceived cost to reach the remote network or station). A TCP/IP Default Route should be designated in the routing table for all traffic that cannot be directed to other specific routes. Define the default route to a remote router or, in special circumstances, define an Ethernet gateway. There can be only one default route specified.
37
38
WAN Network Number Important: This number is part of the routing information. It only identifies the WAN segment between the two routers. Note that only those two routers need to have the WAN Network Number configured. Service Advertisement Protocol (SAP) SAP entries should reflect primary logon servers for the clients on the local LAN. Only the servers on the remote side of the link have to be entered. Local servers do not need to be entered. Frame Type With local servers on your LAN, make sure to select the proper frame type for the IPX network number. To determine this, consult with your network administrator. When you have only NetWare clients on your LAN, keep the default (802.2) selected as most clients can support any type. The frame type choices are: 802.2 802.3 DIX Default recommended by Novell Other most common type For DEC, Intel, Xerox; this setting is also referred to as Ethernet II, and it is becoming obsolete.
Note: For step-by-step information on how to configure IPX routing, see Configuring IPX Routing, on page 408.
39
40
IP Routing Entries For the Ethernet Interface: This information is defined by the user or the Network Administrator. Ethernet IP Address (Local LAN) An Ethernet LAN IP address and subnet mask are required for the routers local Ethernet LAN connection. TCP/IP Ethernet Routes You normally do not need to define an Ethernet IP route. An Ethernet IP route consists of an IP address, a mask, a metric, and a gateway. An Ethernet route is usually defined when there are multiple routers on the Ethernet that cannot exchange routing information.
41
For the WAN Interface: This information is obtained from the Network Administrator. Source (Target/Local) WAN Port Address If Network Address Translation (NAT) is enabled, you must specify a source WAN IP address for the WAN connection to the remote router. If NAT is not enabled, you may need to specify a source WAN IP address for the WAN connection to the remote router. TCP/IP Remote Routes An IP route includes an IP address, subnet mask, and metric (a number representing the perceived cost to reach the remote network or station). A TCP/IP Default Route should be designated in the routing table for all traffic that cannot be directed to other specific routes. Define the default route to a remote router or, in special circumstances, define an Ethernet gateway. There can be only one default route specified.
42
WAN Network Number Important: This number is part of the routing information. It is only used to identify the WAN segment between the two routers. Note that only those two routers need to have the WAN Network Number configured. Service Advertisement Protocol (SAP) SAP entries should reflect primary logon servers for the clients on the local LAN. Only the servers on the remote side of the link have to be entered. Local servers do not need to be entered. Frame Type With local servers on your LAN, make sure to select the proper frame type for the IPX network number. To determine this, consult with your network administrator. When you have only NetWare clients on your LAN, keep the default (802.2) selected as most clients can support any type. The frame type choices are: 802.2 802.3 DIX Default recommended by Novell Other most common type For DEC, Intel, Xerox; this setting is also referred to as Ethernet II, and it is becoming obsolete.
43
used by ATM routers. RFC 1490 with MER (referred to as RFC 1490MER) is a multiprotocol encapsulation method over Frame Relay used by Frame-Relay routers. RFC 1483MER and RFC 1490MER combined with the IP, IPX, or Bridging network protocols share the same configuration characteristics, except for the connection identifiers: VPI/VCI numbers are used for RFC 1483MER and a DLCI number is used for RFC 1490. Obtain the information as described in the appropriate section. This data will be later used to configure your router using the Command Line Interface (see Configuring MAC Encapsulated Routing: RFC 1483MER / RFC 1490MER with IP Routing, on page 59).
Note: If you intend to only connect to the Internet, enter this information using the Internet Quick Start configurator. IP Routing Entries For the Ethernet Interface This information is defined by the user or the Network Administrator. Ethernet IP Address (Local LAN) An Ethernet LAN IP address and subnet mask are required for the routers local Ethernet LAN connection. TCP/IP Ethernet Routes You normally do not need to define an Ethernet IP route. An Ethernet IP route consists of an IP address, a mask, a metric, and a gateway. An Ethernet route is usually defined when there are multiple routers on the Ethernet that cannot exchange routing information between them.
44
For the ATM WAN Interface This information is obtained from the Network Administrator or the Network Service Provider. Source (Target/Local) WAN Port Address and Mask You must specify a Source WAN IP address for the WAN connection to the remote router (whether or not Network Address Translation is enabled). The Source WAN Address is the address of the local router on the remote network. The mask is the mask used on the remote network. Check with your system administrator for details. TCP/IP Remote Routes If you are using RFC 1483MER or RFC 1490MER, the IP route includes an IP address, subnet mask, metric (a number representing the perceived cost in reaching the remote network or station), and a gateway. The gateway address that you enter is the address of a router on the remote LAN. Check with your system administrator for details. A TCP/IP Default Route should be designated in the routing table for all traffic that cannot be directed to other specific routes. You will need to define the default route to a remote router or, in DLCI (special circumstances, define an Ethernet gateway. There can be only one default route specified.
45
Note: If you intend to connect only to the Internet, enter this information using the Internet Quick Start configurator. IP Routing Entries For the Ethernet Interface This information is defined by the user or the Network Administrator. Ethernet IP Address (Local LAN) An Ethernet LAN IP address and subnet mask are required for the routers local Ethernet LAN connection. TCP/IP Ethernet Routes You normally do not need to define an Ethernet IP route. An Ethernet IP route consists of an IP address, a mask, a metric, and a gateway. An Ethernet route is usually defined when there are multiple routers on the Ethernet that cannot exchange routing information.
46
For the ATM WAN Interface This information is obtained from the Network Administrator or the Network Service Provider. Source (Target/Local) WAN Port Address and Mask You must specify a Source WAN IP address for the WAN connection to the remote router (whether or not Network Address Translation is enabled). The Source WAN address is the address of the local router on the remote network. The mask is the mask used on the remote network. TCP/IP Remote Routes If you are using FRF8, the IP route includes an IP address, subnet mask, metric (a number representing the perceived cost to reach the remote network or station). A TCP/IP Default Route should be designated in the routing table for all traffic that cannot be directed to other specific routes. Define the default route to a remote router or, in special circumstances, define it to an Ethernet gateway. There can be only one default route specified.
Bridging is enabled by default when the router boots up. IP and IPX routing are disabled. The routers default IP address is 192.168.254.254. DHCP is enabled by default and the routers DHCP server issues IP addresses to any PC request. The DHCP default IP pool is 192.168.254. 2 through 192.168.254.20. To connect to the router, use the routers default IP address using a Telnet session, for example, and any 10Base-T port on the router.
47
You can customize your router by using the scripting feature, which loads batch files of preset configuration commands into the router (refer to the Batch File Command Execution, on page 183 section). A Dual-Ethernet router sample configuration with IP Routing is provided in the Sample Configuration 3: Configuring a Dual-Ethernet Router for IP Routing, on page 77 section.
48
2. 3. 4. 5. 6.
When the router is placed on the Copper Mountain DSL line, it trains with the DSLAM and senses the encapsulation type and relevant layer 2 parameters such as the DLCI being used (DLCI 528). Once it senses these parameters, by default, it enables IP routing and activates the built-in remote router database entry named configuredforCMPPlay. The router then sends a DHCP request to the WAN for its IP address information. IP filters are also automatically created for UDP port 500 to and from the router. The Copper Mountain DSLAM, despite being a layer 2 pass-through device in most network models, intercepts this request and answers it with the values configured in step 1.
Bridge or Router?
If the router is to be used as a bridge (that is, as a pass-through device), you need to enter a command before you place the router on the Copper Mountain DSL line. The command is as follows: frame cmPPlay bridge Then, after it is placed on the DSL line, the router automatically activates in bridge mode. Otherwise, the router automatically activates in router mode. To see the current mode of the router, you can list the remote entry configuredForCMPPlay as shown in the next section. In bridging mode, the Bridging enabled line is set to yes. The Copper Mountain DSLAM supports the use of RFC 1483 IP encapsulation (routed) and RFC 1483 Ethernet (bridged) encapsulation. However, the frame cmpplay command setting does not correlate to the type of encapsulation used on the DSL link, but rather to the mode used when the DSL link activates. In router mode, the protocol type in the remote is set to RFC1483MER and IP translation is turned on. MER implies that, although bridged 1483 encapsulation is used on the WAN, the router is still an IP router. Conversely, in bridge mode, bridged 1483 encapsulation is used, but the router is not acting as an IP router, but just as a pass-through device.
Remote configuredForCMPPlay
When configured using Copper Mountain Plug & Play, the router creates a remote profile and automatically sets up IP filters as shown below.
# rem list INFORMATION FOR <configuredForCMPPlay> Status............................... Interface in use..................... Protocol in use...................... Data Link Connection Id (DLCI)....... IP address translation............... IP filters defined................... Send/Receive Multicast............... Block NetBIOS Packets................ Source IP address/subnet mask........ Remote IP address/subnet mask........ Management IP address/subnet mask....
enabled FR RFC1483 (SNAP) - MAC Encapsulated Routing 528 on yes off off 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0
49
Send IP RIP to this dest............. Send IP default route if known..... Receive IP RIP from this dest........ Receive IP default route by RIP.... Keep this IP destination private..... Total IP remote routes............... 0.0.0.0/0.0.0.0/1 IPX network number................... Use IPX RIP/SAP (negotiate with PPP): Total IPX remote routes.............. Total IPX SAPs....................... Bridging enabled..................... Exchange spanning tree with dest... Bridge only PPPoE with dest........ mtu..................................
Begin IPFilters for configuredForCMPPlay # watching for dropped/rejected packets is OFF # Begin rules for input list remote ipfilter flush input configuredForCMPPlay remote ipfilter insert 2 input accept -c 0 -p udp -sp 500 -da 172.17.32.132 -dp 500 (IKE Global Filter) configuredForCMPPlay # End rules for input list # Begin rules for receive list remote ipfilter flush receive configuredForCMPPlay # End rules for receive list # Begin rules for transmit list remote ipfilter flush transmit configuredForCMPPlay remote ipfilter insert 0 transmit accept -c 0 -p udp -sa 172.17.32.132 -sp 500 -dp 500 (IKE Global Filter) configuredForCMPPlay # End rules for transmit list # Begin rules for output list remote ipfilter flush output configuredForCMPPlay # End rules for output list End IPFilters for configuredForCMPPlay
50
These tasks are described in the User Reference Guide that came with your router. If you intend to use the Configuration Manager, it is assumed that you have installed the Configuration Manager software and can access the terminal window. For more information, see How to Access the Command Line, on page 14. This chapter contains: configuration commands for each combination of link protocol and network protocol supported by the router. (Your Network Service Provider determines the link protocol that you use.) A configuration table for the Dual-Ethernet Router (with IP routing enabled) is also provided. a section on verifying the router configuration describes how to test IP, IPX, and bridging. two sample configurations with diagrams, commands, and list outputs.
For complete, individual descriptions of the commands mentioned in this chapter, refer to Chapter 8. Command Reference on page 209. Worksheets are provided in appendix A so that you can enter details about your local router and remote routers. The worksheets list the commands used. Fill out one worksheet for the local router and one for each remote router. Note: If you are setting up both ends of the network, use a mirror image of the information listed below for configuring the router on the other end of the link. Important: If you change any the of the following settings, you must save the change and then either reboot the router or restart the interface for the change to take effect: Ethernet LAN: Ethernet IP or IPX address, TCP/IP routing, IPX routing Bridging: Bridging, filters Remote Router: TCP/IP route addresses, IPX routes, IPX SAPs and bridging control, and enable, disable, or add remote routers
51
Conguration Tables
The following tables give you step-by-step instructions for standard configurations of the following network protocol/link protocol combinations, as well as a configuration table for a dual-Ethernet router: Link Protocol PPP PPP PPP RFC 1483 RFC 1490 RFC 1483 RFC 1490 RFC 1483 RFC 1490 RFC 1483MER RFC 1490MER FRF8 Network Protocol IP routing IPX routing Bridging IP routing IP routing IPX routing IPX routing Bridging Bridging IP routing IP routing IP routing Configuration Table page 53 page 54 page 55 page 56 page 56 page 57 page 57 page 58 page 58 page 59 page 59 page 60 page 61 page 62
52
Commands
Change Login
Enter: Remote Name Select: PPP Enter: VPI/VCI numbers Select: PPP Enter: DLCI number Choose security level Enter: password Must be off Enter: Explicit or default route To enable NAT, use: You may need to enter a Source WAN Port Address
remote add <remoteName> remote setProtocol PPP <remoteName> remote setPVC <vpi number>*<vci number> <remoteName> remote setProtocol PPP <remoteName> remote setDLCI <number> <remoteName> remote setAuthen <protocol> <remoteName> remote setOurPasswd <password> <remoteName> remote disBridge <remoteName> remote addIproute <ipnet> <ipnetmask> <hops> <remoteName> remote setIpTranslate on <remoteName> remote setSrcIpAddr <ipaddr> <mask> <remoteName> remote setSrcIpAddr <ipaddr> <mask> <remoteName>
Link Protocol/DLCIb
(for Frame Relay routers)
Security c Remotes Password Bridging On/Off TCP/IP Route Address If NAT is enabled:
IP and IPX Routing TCP/IP Routing (Internet Firewall) IPX Routing Store Reboot Must be enabled (optional) Must be disabled eth ip enable eth ip rewall <on | off> eth ipx disable save reboot
a Enter this information if you are using PPP in an ATM environment. b Enter this information if you are using PPP in a Frame Relay environment. c If the ISP does not support the authentication of the ISP system by the caller, use the command remote disauthen <remoteName> to disable the authentication.
53
Enter: Remote Name Select: PPP Enter: VPI/VCI numbers Select: PPP Enter: DLCI number Choose security level Enter: password Must be off Enter appropriate info Enter appropriate info Enter appropriate info
remote setProtocol PPP <remoteName> remote setDLCI <number> <remoteName> remote setAuthen <protocol> <remoteName> remote setPasswd <password> <remoteName> remote disBridge <remoteName> remote addIpxroute <ipxNet> <metric> <ticks> <remoteName> remote addIpxsap <servicename> <ipxNet> <ipxNode> <socket> <type> <hops> <remoteName> remote setIpxaddr <ipxNet> <remoteName>
Securityc Remotes Password Bridging On/Off Add IPX Routes Add IPX SAPs WAN Network #
IP and IPX Routing TCP/IP Routing IPX Routing Store Reboot Must be disabled Must be enabled eth ip disable eth ipx enable save reboot
a Enter this information if you are using PPP in an ATM environment. b Enter this information if you are using PPP in a Frame- Relay environment.
c If the ISP does not support the authentication of the ISP system by the caller, use the command:
remote disauthen <remoteName> to disable the authentication.
54
Commands
Enter: Remote Name Select: PPP Enter: VPI/VCI Select: PPP Enter: DLCI number Choose security level Enter: Password Must be ON
remote setProtocol PPP <remoteName> remote setDLCI <number> <remoteName> remote setAuthen <protocol> <remoteName> remote setOurPasswd <password> <remoteName> remote enaBridge <remoteName>
IP and IPX Routing IP Routing IPX Routing Store Reboot Must be disabled Must be disabled eth ip disable eth ipx disable save reboot
55
Commands
Change Login
Enter: Remote Name Select: RFC 1483 Enter: VPI/VCI Numbers Select: FR Enter: DLCI number Must be OFF Enter: Explicit or default route with remote gateway To enable NAT, use: Enter: Source WAN Port Address You may still need to enter a Source WAN Port Address
remote add <remoteName> remote setProtocol RFC1483 <remoteName> remote setPVC <vpi number>*<vci number> <remoteName> remote setProtocol FR <remoteName> remote setDLCI <number> <remoteName> remote disBridge <remoteName>
remote addiproute <ipnet> <ipnetmask> <hops> <remoteName>
Bridging On/Off TCP/IP Route Address If Address Translation (NAT) is enabled: TCP/IP Route Addresses If NAT is off: TCP/IP Route Addresses
remote setIpTranslate on <remoteName> remote setSrcIpAddr <ipaddr> <mask> <remoteName> remote setSrcIpAddr <ipaddr> <mask> <remoteName>
IP and IPX Routing TCP/IP Routing (Internet Firewall) IPX Routing Store Reboot Must be enabled (Optional) Must be disabled eth ip enable eth ip rewall <on | off > eth ipx disable save reboot
a Enter this information if you are using RFC 1483 in an ATM environment. b Enter this information if you are using RFC 1490 in a Frame-Relay environment.
56
Settings
Commands
Optional
Remote Routers New Entry Link Protocol/PVC (for ATM routers) Link Protocol/DLCIa (for Frame Relay routers) Bridging on/off IPX Routes Add IPX SAPs Add WAN Network Number Enter: Remote Name Select: RFC 1483 Enter: VPI/VCI Numbers Select: FR Enter: DLCI number Must be off Enter appropriate info Enter appropriate info Enter appropriate info remote add <remoteName> remote setProtocol RFC1483 <remoteName>
remote setPVC <vpi number>* <vci number> <remoteName>
remote setProtocol FR <remoteName> remote setDLCI < number> <remoteName> remote disBridge <remoteName> remote addIpxroute <ipxNet> <metric> <ticks> <remoteName> remote addIpxsap <servicename> <ipxNet> < ipxNode> <socket> <type> <hops> <remoteName> remote setIpxaddr <ipxNet> <remoteName>
IP and IPX Routing TCP/IP Routing (Internet Firewall) IPX Routing Store Reboot Must be disabled (optional) Must be enabled eth ip disable eth ip rewall <on | off > eth ipx enable save reboot
a Enter this information if you are using RFC 1490 in a Frame Relay environment.
57
Commands
Change Login
Enter: Remote Name Select: RFC 1483 Enter: VPI/VCI Numbers Select: FR Enter: DLCI number Must be on
remote add <remoteName> remote setProtocol RFC1483 <remoteName> remote setPVC <vpi number>*<vci number> <remoteName> remote setProtocol FR <remoteName> remote setDLCI <number> <remoteName> remote enaBridge <remoteName>
Bridging On/Off
IP and IPX Routing IP Routing IPX Routing Store Reboot Must be disabled Must be disabled eth ip disable eth ipx disable save reboot
a Enter this information if you are using RFC 1490 in a Frame-Relay environment.
58
Configuring MAC Encapsulated Routing: RFC 1483MER / RFC 1490MER with IP Routing
This table outlines configuration commands for the RFC 1483MER and RFC 1490MER link protocols with the IP Routing network protocol.
Commands
Change Login
Enter: Remote Name Select: RFC 1483MER Enter: VPI/VCI Numbers Select: MER Enter: DLCI number Must be off Enter: Explicit or default route with remote gateway To enable NAT, use: Enter: Source WAN Port Address + mask of the remote network
Enter a Source WAN Port Address + mask of the remote networks mask
remote add <remoteName> remote setProtocol RFC1483MER <remoteName> remote setPVC <vpi number>*<vci number> <remoteName> remote setProtocol MER <remoteName> remote setDLCI <number> <remoteName> remote disBridge <remoteName> remote addiproute <ipnet> <ipnetmask><ipGateway> <ipGateway> <remoteName> remote setIpTranslate on <remoteName> remote setSrcIpAddr <ipaddr> <mask><remoteName>
IP and IPX Routing TCP/IP Routing (Internet Firewall) IPX Routing Store Reboot Must be enabled (optional) Must be disabled eth ip enable eth ip rewall <on | off > eth ipx disable save reboot
a Enter this information if you are using RFC 1483 in an ATM environment. b Enter this information if you are using RFC 1490 in a Frame-Relay environment.
59
Change Login
Bridging On/Off TCP/IP Route Address If Address Translation (NAT) is enabled: If NAT is OFF:
IP and IPX Routing TCP/IP Routing (Internet Firewall) IPX Routing Store Reboot Must be enabled (Optional) Must be disabled eth ip enable eth ip rewall <on | off > eth ipx disable save reboot
60
General configuration rules: IP (and IPX) routing takes precedence over bridging. Each network protocol in the combination is individually configured as described in the preceding tables. When configuring multiple network protocols, make sure that they are all enabled (even though the configuration tables show them to be mutually exclusive). For example, to configure bridging and IP routing (both with link protocol RFC 1483), you would refer to the tables for RFC 1483 with Bridging and RFC 1483 with IP Routing. However, you must enable both bridging and IP routing. IP routing will take precedence over bridging.
61
DHCP Settings Already enabled; additional settings may be required DHCP settings Dene DHCP network Create an address pool DNS Domain Name DNS Server WINS Server Address dhcp add | <net> <mask> | <ipaddr> | <code> <min> <max> <type> dhcp set addresses <rst ipaddr> <last ipaddr> dhcp set valueoption domainname <domainname> dhcp set valueoption domainnameserver <ipaddr> dhcp set valueoption winsserver <ipaddr>
62
63
64
Sample Congurations
Sample Configuration 1: PPP with IP and IPX
In this configuration example of a hypothetical network, a small office/home office (SOHO) accesses: The Internet through an Internet Service Provider (ISP); it uses PPP as the link protocol with IP routing as the network protocol. Network Address Translation (NAT) is enabled to the ISP because the ISP assigned the SOHO only one IP address. A central site (HQ) through a Network Service Provider. (The NSP provides access to the DSL/ATM Wide Area Network.) It uses PPP as the link protocol with IP and IPX as its network protocols.
IP addresses are issued by the DHCP server. DHCP is set up to issue DNS information to the SOHO LAN.
65
IPX = 456
0,39 (HQ)
SOHO
Local Router
PC/Client 192.168.254.2 255.255.255.0 Workstation/Server 192.168.254.3 255.255.255.0 IP:192.168.254.254 255.255.255.0
0,38 (ISP)
2 Virtual Circuits
PPP/IP
192.168.200.20
IPX WAN = 789
Remote Router
HQ 0.0.0.0 255.255.255.255 ISP IP:172.16.0.1 255.255.255.0
66
Sample Configuration 1: Tables for Local Router (SOHO) SOHO System Settings
Conguration Section Item System Settings System name Message (optional) Authentication password Ethernet IP address and subnet mask
(default IP address)
Commands
system name SOHO system msg Congured_Dec_1998 system password SOHOpasswd eth ip addr 192.168.254.254 255.255.255.0
Ethernet IPX network number DNS Domain Name DNS Server WINS Server Address
dhcp set valueoption domainname myISP.com dhcp set valueoption domainnameserver 192.168.200.1 dhcp set valueoption winsserver 172.16.0.2
Note: Fill in one worksheet for each remote router in the remote router database.
IPX Address
IPX SAPs
67
68
remote list
INFORMATION FOR <HQ> Status............................... Protocol in use...................... Authentication....................... Authentication level required........ Connection Identifier (VPI*VCI)...... IP address translation............... Compression Negotiation.............. Source IP address/subnet mask........ Remote IP address/subnet mask........ Send IP RIP to this dest............. Send IP default route if known..... Receive IP RIP from this dest........ Receive IP default route by RIP.... Keep this IP destination private..... Total IP remote routes............... 172.16.0.0/255.255.255.0/1 IPX network number................... Total IPX remote routes.............. 00001001/1/4 Total IPX SAPs....................... enabled PPP enabled PAP 0*39 off off 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 no no no no yes 1 00000789 1 1
69
SERV312_FP 00001001 00:00:00:00:00:01 0451 0003 1 Bridging enabled..................... no Exchange spanning tree with dest... yes INFORMATION FOR <ISP> Status............................... Protocol in use...................... Authentication....................... Authentication level required........ Connection Identifier (VPI*VCI)...... IP address translation............... Compression Negotiation.............. Source IP address/subnet mask........ Remote IP address/subnet mask........ Send IP RIP to this dest............. Send IP default route if known..... Receive IP RIP from this dest........ Receive IP default route by RIP.... Keep this IP destination private..... Total IP remote routes............... 0.0.0.0/255.255.255.255/1 IPX network number................... Total IPX remote routes.............. Total IPX SAPs....................... Bridging enabled..................... Exchange spanning tree with dest...
enabled PPP enabled PAP 0*38 on off 192.168.200.20/255.255.255.255 0.0.0.0/0.0.0.0 no no no no yes 1 00000000 0 0 no yes
dhcp list
bootp server ................. none bootp file ................... n/a DOMAINNAMESERVER (6) ......... 192.168.200.1 DOMAINNAME (15) .............. myISP.com WINSSERVER (44) .............. 172.16.0.2 Subnet 192.168.254.0, disabled - other DHCP servers detected When DHCP servers are active . stop Mask ......................... 255.255.255.0 first ip address ............. 192.168.254.2 last ip address .............. 192.168.254.20 lease ........................ default bootp ........................ not allowed bootp server ................. none bootp file ................... n/a
eth list
ETHERNET INFORMATION FOR <ETHERNET/0> Hardware MAC address................. Bridging enabled..................... IP Routing enabled................... Firewall filter enabled ........... Send IP RIP to the LAN............. Advertise me as default router... Process IP RIP packets received.... Receive default route by RIP..... RIP Multicast address................ IP address/subnet mask............... IP static default gateway............ IPX Routing enabled.................. 00:20:6F:02:A1:BF no yes yes rip-1 compatible yes rip-1 compatible yes default 192.168.254.254/255.255.255.0 none yes
70
71
IP addresses are issued by the DHCP server. DHCP will be set up to issue DNS information to the SOHO LAN.
0,39 (HQ)
SOHO
Local Router
IP:192.168.254.254 255.255.255.0
0,38 (ISP)
2 Virtual Circuits
RFC 1483 / IP
192.168.200.20
Remote Router
HQ 0.0.0.0 255.255.255.255 ISP IP:172.16.0.1 255.255.255.0
72
Sample Configuration 2: Tables for Local Router (SOHO) SOHO System Settings
Conguration Section Message (optional) Ethernet IP address and subnet mask DHCP settings DNS domain name DNS server address WINS server address myISP.com 192.168.200.1 172.16.0.2 dhcp set valueoption domainname myISP.com dhcp set valueoption domainnameserver 192.168.200.1 dhcp set valueoption winsserver 172.16.0.2 Item RFC1483_dec98 (Default IP address) Commands system msg RFC1483_dec98 eth ip addr 192.168.254.254 255.255.255.0
Enable Network Address Translation In Advanced: Source WAN IP address and subnet mask
73
74
eth list
ETHERNET INFORMATION FOR <ETHERNET/0> Hardware MAC address................. 00:20:6F:02:A1:BF Bridging enabled..................... yes IP Routing enabled................... yes Firewall filter enabled ........... yes Send IP RIP to the LAN............. rip-1 compatible Advertise me as default router... yes Process IP RIP packets received.... rip-1 compatible Receive default route by RIP..... yes RIP Multicast address................ default IP address/subnet mask............... 192.168.254.254/255.255.255.0 IP static default gateway.......... none IPX Routing enabled.................. no External network number............ 00000000 Frame type.......................... 802.2
remote list
INFORMATION FOR <HQ> Status............................... Protocol in use...................... Connection Identifier (VPI*VCI)...... IP address translation............... Compression Negotiation.............. Source IP address/subnet mask........ Remote IP address/subnet mask........ Send IP RIP to this dest............. Send IP default route if known..... Receive IP RIP from this dest........ Receive IP default route by RIP.... Keep this IP destination private..... Total IP remote routes............... 172.16.0.0/255.255.255.0/1 IPX network number................... Total IPX remote routes.............. Total IPX SAPs....................... Bridging enabled..................... Exchange spanning tree with dest... INFORMATION FOR <ISP> Status............................... Protocol in use...................... Connection Identifier (VPI*VCI)...... IP address translation............... enabled RFC1483 (SNAP) 0*39 off off 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 no no no no yes 1 00000000 0 0 yes yes
75
Compression Negotiation.............. Source IP address/subnet mask........ Remote IP address/subnet mask........ Send IP RIP to this dest............. Send IP default route if known.....
Receive IP RIP from this dest......... .no Receive IP default route by RIP.... no Keep this IP destination private..... yes Total IP remote routes............... 1 0.0.0.0/255.255.255.255/1 IPX network number................... 00000000 Total IPX remote routes.............. 0 Total IPX SAPs....................... 0 Bridging enabled..................... no Exchange spanning tree with dest.... yes
dhcp list
bootp server ................. none bootp file ................... n/a DOMAINNAMESERVER (6) ......... 192.168.200.1 DOMAINNAME (15) .............. myISP.com WINSSERVER (44) .............. 172.16.0.2 Subnet 192.168.254.0, disabled - other DHCP servers detected When DHCP servers are active . stop Mask ......................... 255.255.255.0 first ip address ............. 192.168.254.2 last ip address .............. 192.168.254.20 lease ........................ default bootp ........................ not allowed bootp server ................. none bootp file .................... n/a
76
eth_router Conguration
Conguration Section Item System Settings System Name (optional) Message (optional) eth_router Congured_Jan_1999 system name eth_router system msg Congured_Jan_1999 Ethernet Settings Enable IP routing Disable bridging Dene ETH/0 IP address Dene ETH/1 IP address TCP/IP default route 192.168.254.254 255.255.255.0 192.168.253.254 255.255.255.0 ETH/0 sends all trafc to ETH/1 eth ip enable eth br disable eth ip addr 192.168.254.254 255.255.255.0 0 eth ip addr 192.168.253.254 255.255.255.0 1 eth ip addroute 0.0.0.0 0.0.0.0 192.168.253.254 1 1 Commands
DHCP Settings Dene DHCP network for ETH/1 Create an address pool for ETH/1 DNS domain name DNS server WINS server address 192.168.253.0 255.255.255.0 192.168.253.2 thru 192.168.253.20 myISP.com 192.168.200.1 172.16.0.2 dhcp add 192.168.253.0 255.255.255.0 dhcp set addresses 192.168.253.2 192.168.253.20 dhcp set valueoption domainname myISP.com dhcp set valueoption domainnameserver 192.168.200.1 dhcp set valueoption winsserver 172.16.0.2
77
Additional features can be purchased as software option keys. These features are described in Configuring Software Options, page 124. To determine which software options are installed on your router, use the vers command. (If a feature has not been enabled, it is listed with a ~ prefix.)
78
IP Subnets
You may configure the router to provide access to multiple IP subnets on the Ethernet network. (This feature does not apply to IPX or bridged traffic.) Each IP subnet is referenced as a logical (or virtual) Ethernet interface. You may define multiple logical interfaces for each physical Ethernet interface (that is, port) in the router. Each logical interface is referenced by its port number and logical interface number (port #:logical#).
Note: When you stop or restart an interface, interface changes are discarded if they have not been saved.
eth ip bindRoute Adds an Ethernet IP route that uses the logical Ethernet interface. The route is added to a virtual routing table (page 266). eth ip filter eth ip options Manages IP filters for the logical Ethernet interface. Lists of input, output, and forward filters may be defined for the interface (page 270). Sets RIP options for the logical interface; these options set IP routing information protocol controls (page 276).
Note: In general, logical interface commands are not effective until you save the change and either restart the logical interface or reboot the router. However, the eth ip bindRoute and eth ip filter commands are effective immediately if the logical Ethernet interface is already active.
79
To add and remove routes from a virtual routing table, use these commands: eth ip bindRoute eth ip unbindRoute remote bindIPVirtualRoute Adds an Ethernet route to a virtual routing table (page 266). Removes an Ethernet route from a virtual routing table (page 277). Adds a remote route to a virtual routing table (page 293).
remote unbindIPVirtualRoute Removes a remote route from a virtual routing table (page 324). Note: Unlike changes to the default routing table, changes to IP virtual routing tables take effect immediately. However, the changes are lost if they are not saved before the next reboot.
80
Up to 40 allow filters or 40 deny filters can be activated from the filter database. Enter the filters, including the pattern, offset, and filter mode, into a filter database. If you intend to restrict specific stations or subnetworks from bridging, then add the filters with a deny designation and then enable deny filtering. If you wish to allow only specific stations or subnetworks to bridge, then add the filters with an allow designation and enable allow filtering. Add each filter with the following command: filter br add [pos] [data] [deny | allow] where [pos] is the byte offset within a packet (number from 0-127) to a [data] (a hex number up to 6 bytes). This data and offset number can be used to identify an address, a protocol id, or data content. After entering your filters, verify your entries with the following command: filter br list If you have entered an incorrect filter, delete the filter using the filter br del command. When you are satisfied with the filter list, save the filtering database with the save filter command. You must reboot the router to load the filtering database. Then enable bridging filtering with the following command: filter br use [none | deny | allow] To test the filtering configuration, access the remote destination identified in the filter.
81
82
RIP Controls
The RIP control options allows you to decide what routing information you want to receive and what routing information you choose to share on the network. For a remote interface, the default is to not send or receive IP RIP packets. If you choose to use this default, you must use the remote addiproute command (page 291) to configure static routes for this WAN link. You can configure the router to send and receive RIP packet information, respectively, to and from the remote router. This means that the local site will learn all about the routes beyond the remote router and the remote router will learn all about the local sites routes. You may not want this to occur in some cases. For example, if you are connecting to a site outside your company, such as the Internet, you may want to keep knowledge about your local sites routes private. To see the current settings for a remote interface, use the command remote list and check the output lines:
Send IP RIP to this dest............. no Send IP default route if known..... no Receive IP RIP from this dest........ no Receive IP default route by RIP.... no
For an Ethernet interface, the default is to: receive and process IP RIP-1 compatible and RIP-2 broadcast packets from the Ethernet LAN. receive and process RIP-2 packets that are multicast as defined by the eth ip ripmulticast command. transmit RIP-1 compatible broadcast packets and RIP-2 multicast packets over the Ethernet LAN.
To see the current settings for an Ethernet interface, use the command eth list and check the output lines:
Send IP RIP to the LAN............... rip-1 compatible Advertise me as default router..... yes Process IP RIP packets received...... rip-1 compatible Receive default route by RIP....... yes
To set or clear RIP options for a remote interface or an Ethernet interface, use these commands: remote setipoptions <option> on | off <remoteName> eth ip options <option> on | off <interface> The available RIP options on these commands are: rxrip txrip rxrip1 txrip1 rxrip2 txrip2 rxdef Receive IP RIP packets Send IP RIP packets Receive and process RIP-1 packets only Send RIP-1 packets only Receive and process RIP-2 packets only Send RIP-2 packets only Receive the default route
83
txdef avdfr
To turn off this security mechanism, use this command: remote setipoptions private off <remoteName>
84
This section describes how to configure DHCP using the Command Line Interface. Configuring DHCP can be a complex process; this section is therefore intended for network managers. For a complete list and explanation of the DHCP commands, see DHCP Commands, page 350. Note: Some DHCP values can be set using the Windows Quick Start application, the Windows Configuration Manager, or the web-based EZ Setup application.
85
To see the gateway and source IP addresses that were returned, use the iproutes command. The IP addresses and options assigned to a client are collectively called the lease. The lease is only valid for a certain period of time and is automatically renewed by the client.
Note: To save the DHCP conguration or changes to ash memory in the router, remember to use the command dhcp save.
To enable the client lease 192.168.254.17 if that client lease exists, enter:
dhcp enable 192.168.254.17
To disable the client lease 192.168.254.18 if that client lease exists, enter:
dhcp disable 192.168.254.18
To check the results of these commands, use: dhcp list If the client lease does not exist, it must be explicitly created.
86
Example 2: The following command deletes the subnetwork 192.168.254.0 and deletes all client leases associated with that subnetwork:
dhcp del 192.168.254.0
Dynamic Client Leases Dynamic client leases are created from the pool of IP addresses associated with that subnetwork.
87
To set or change the pool, use: dhcp set addresses <first ip addr> <last ip addr> To clear the values from the pool, use: dhcp clear addresses <net> Note: Any client leases that currently exist will not be affected. To remove a client lease that was dynamically created, use: dhcp del <ipaddr> Caution: If <ipaddr> is a subnet, you will delete the entire subnet.
Commands
The following commands are used by network administrators to control lease time. To set the lease time explicitly for the client lease, use: dhcp set lease <ipaddr> <hours> To set the lease time explicitly for the subnetwork lease, use: dhcp set lease <net> <hours> To set the lease time explicitly for the global lease, use: dhcp set lease <hours> Example 1: To set the lease time to default for the client 192.168.254.17, type:
dhcp set lease 192.168.254.17 default
Example 2: To set the subnetwork lease time to infinite for the subnet 192.168.254.0, type:
dhcp set lease 192.168.254.0 infinite
88
To change the client lease expiration time to a given value: dhcp set expire <ipaddr> <hours> Setting the expiration time to default will cause the server to compute the lease time using the algorithm as described in Setting the Lease Time, page 88. To release the client lease so it becomes available for other assignments: dhcp clear expire <ipaddr>
Concepts
The server returns values for options explicitly requested in the client request. It selects the values to return based on the following algorithm: 1. 2. 3. 4. If the value is defined for the client, then the server returns the requested value for an option. If the value for the option has not been set for the client, then the server returns the value option if it has been defined for the subnetwork. If the value option does not exist for the client and does not exist for the subnetwork, then the server returns the value option if it has been defined globally. If the value option is not defined anywhere, the server does not return any value for that option in its reply to the client request.
It does not return any option values not requested by the client. It does not support the definition of a class of clients. It does not return any non-default option values unless the client requests the option value and the server has a value defined for that option. It does not return any non-default values on the clients subnet unless the client requests the value for that option.
89
90
This command lists the subnet 192.168.254.0 including any options set specifically for that subnet:
dhcp list 192.168.254.0
Managing BootP
Administrators can enable and disable BootP and specify the BootP server. BootP can be enabled at the subnetwork and at the client lease level. Note: By default, the DHCP server does not satisfy BootP requests unless the administrator has explicitly enabled BootP (at the subnetwork or lease level).
Enable/Disable BootP
To allow BootP request processing for a particular client/subnet, use the command: dhcp bootp allow <net>|<ipaddr> To disallow BootP request processing for a particular client/subnet, type: dhcp bootp disallow <net>|<ipaddr>
91
Example 5: To clear the global BootP server IP address and file name:
dhcp bootp tftpserver 0.0.0.0
Example 6: To clear the subnet 192.168.254.0 server IP address and file name:
dhcp bootp tftpserver 192.168.254.0 0.0.0.0
Commands
The following commands are available for adding/deleting option types: dhcp add <code> <min> <max> <type> To list option types that are currently defined, use: dhcp list definedoptions... To list the definitions for all known options, use: dhcp list definedoptions
92
To get help information, use: dhcp list definedoptions? To list the definition for option 1, if option 1 is defined, type:|
dhcp list definedoptions 1
To list the definition for all options that are well-known AND have a name starting with h, type:
dhcp list definedoptions h
Example: To define a new option with a code of 128, a minimum number of IP addresses of 1, a maximum number of IP addresses of 4, of type IP address, type:
dhcp add 128 1 4 ipAddress
This information implies that: Some DHCP client will know about the option with code 128. Option 128 allows IP addresses. The server can have a minimum of 1 IP address. The server can have up to 4 IP addresses. The administrator will still need to set the option value either globally, specific to a subnetwork, or specific to a client for the option to have any meaning.
The values for this option that have been set globally, specific to a subnetwork, or specific to a client will not be removed. The administrator must remove those values explicitly. Well-known type option codes cannot be changed or deleted.
93
At this point, the DHCP information is cleared from memory, but the DHCP.DAT file remains unchanged. To clear the information from the DHCP.DAT file as well, enter: save Note: You cannot abbreviate the word records in the dhcp clear all records command.
94
Note: Some applications that use IP or UDP protocols may have problems with Network Address Translation. You may be able to avoid this problem by running in TCP mode or by disabling NAT and running as a subnetwork to your ISP. Supported applications include AOL chat, CUSeeMe, Doom, FTP, L2TP, HTTP, Kali Netbios over IP, NetMeeting, PCanywhere, Quake, Quicktime Video, Real Audio, RTSP, SGI Media Base, SMTP, StreamWorks, Telnet, TFTP, Unix commands (finger, rcp, rshell, rlogin, whois) and VDO. To read more about H.323 with NAT, see NetMeeting (H.323) with NAT, page 100.
Masquerading
With masquerading, multiple local (PC) IP addresses are mapped to a single global IP address. Many local (PCs) IP addresses are therefore hidden behind a single global IP address. The advantage of this type of NAT is that users only need one global IP address, but the entire local LAN can still access the Internet. This NAT technique requires not only remapping IP addresses but also TCP and UDP ports. Each PC on the LAN side has an IP address and a mask. When the router connects to an ISP, the router appears to be a host with one IP address and mask. The IP address that the router uses to communicate with the ISP is obtained dynamically (with PPP/IPCP or DHCP) or is statically configured. When the PC connects to the ISP, the IP address and port used by the PC are remapped to the IP address assigned to the router. This remapping is done dynamically.
95
Client Configuration
Enable NAT To enable NAT for a remote interface, use the commands: remote setIpTranslate on <remoteName> save To enable NAT for an Ethernet interface, use the commands: eth ip translate on <interface> save The save command makes the above changes persistent across reboots; these changes turn NAT on when the specified interface is used. Obtain an IP Address for NAT The IP address (the IP address known by the remote ISP) used for this type of NAT can be assigned in two ways. The ISP dynamically assigns the IP address. Use the commands: remote setSrcIpAddr 0.0.0.0 0.0.0.0 <remoteName> save The IP address is assigned locally. Use the commands: remote setSrcIpAddr ww.xx.yy.zz 255.255.255.255 <remoteName>
save
Note: ww.xx.yy.zz is the IP address that the user on the local LAN assigns.
Server Configuration
This section is intended for users and network administrators who wish to allow WAN access to a Web server, FTP server, SMTP server, etc., on their local LAN, while using NAT. NAT needs a way to identify which local PC [local IP address(es)] should receive these server requests. The servers can be configured on a per-remote-router and per-Ethernet-interface basis as well as globally. Interface-Specific Commands You can specify servers for specific remote interfaces and for specific Ethernet interfaces. Servers can also be designated for specific protocols and ports. To enable and disable a local IP address (on your LAN) as the server for a specific remote interface, use these commands: remote addServer <action> <protocol> <port> [<last port>[<first private port>]] <remoteName> remote delServer <action> <protocol> <port> [<last port>[<first private port>]] <remoteName> See the command descriptions on page 293 and page 298. To see all of the remote entries, use the command remote list <remoteName> To enable and disable a local IP address (on your LAN) as the server for a specific Ethernet interface, use these commands:
96
eth ip addServer <action> <protocol> <port> [<last port>[<first private port>]] <interface> eth ip delServer <action> <protocol> <port> [<last port>[<first private port>]] <interface> See the command descriptions on page 265 and page 268. Remember to type save to make the changes persistent across reboots. Example 1: Assume that the local LAN network is 192.168.1.0 255.255.255.0. The following commands enable a Telnet server on the local LAN with the IP address 192.168.1.3, and an FTP server with the IP address 192.168.1.2.
remote addServer 192.168.1.3 tcp telnet router1 remote addServer 192.168.1.2 tcp ftp router1
When the local router receives a request from router1 to communicate with the local Telnet server, the local router sends the request to 192.168.1.3. If router1 asks to talk to the local FTP server, the local router sends the request to 192.168.1.2. Example 2: Assume that the local LAN network is 192.168.1.0 255.255.255.0. When the port value of 0 (zero) is used, it directs all ports of the specified protocol to the IP address specified.
remote addServer 192.168.1.4 tcp 0 router1
Note: addserver commands using specific port numbers take priority over the port 0 setting. 192.168.1.4 will be asked to serve requests coming from router1 to the local router. If the local router also has the same Telnet and FTP entries from the previous example, 192.168.1.3 will serve the Telnet request, 192.168.1.2 will serve the FTP request, and 192.168.1.4 will serve any other request, including HTTP, SMTP, etc. Example 3:
remote addServer 192.168.1.10 tcp 9000 9000 telnet route-in remote addServer 192.168.1.11 tcp 9001 9001 telnet route-in
In this example, an incoming request on TCP port 9000 will be sent to 192.168.1.10 with the port changed from 9000 to the telnet port (port 23). An incoming request on TCP port 9001 will be sent to 192.168.1.11 with the port changed from 9001 to the telnet port. Error Message: Failed to add server The error message Failed to add server indicates that a server entry could not be created. This can occur either due to port overlap or due to not enough memory. Port overlap For example, you enter:
# remote addserver 192.168.1.10 tcp 9000 9000 telnet router1 # remote addserver 192.168.1.11 tcp 9000 9000 telnet router1 Failed to add server
97
The second command gets an error due to port overlap. If the second server entry was allowed and the remote end sends a server request to port 9000, the router wouldnt know whether to send the request to 192.168.1.10 or 192.168.1.11. Not enough memory was available to create an entry. This condition should not ordinarily occur because the amount of memory needed for a server entry is less than 30 bytes. Should this problem occur, it may cause many related problems or failures. System Commands The following two commands are used to globally enable/disable a local IP address (on your LAN) as the server for that particular protocol and/or port. system addServer <action> <protocol> <port> [<last port>[<first private port>]] system delServer <action> <protocol> <port> [<last port>[<first private port>]] For more information, see the command descriptions on page 233 and page 244. Remember to type save to make the changes persistent across boots. Examples:
system addserver 192.168.1.5 tcp smtp system addserver 192.168.1.6 tcp 0 system addserver 192.168.1.6 udp 0
The router sends a server request for SMTP to 192.168.1.5 when such a request comes from any remote router running NAT. The router sends any other server request (tcp or udp) to 192.168.1.6.
98
8. If none of the above, the local router selects itself (the local router) as the server.
Classic NAT
With classic NAT, one PC IP address is translated to one NAT IP address. This NAT technique is primarily used to make certain hosts on a private LAN globally visible and give them the ability to remap these IP addresses as well.
Client Configuration
Classic NAT requires that you first enable NAT Masquerading (as described in the previous section); thus, for the Classic and Masquerading forms of NAT, the clients are configured in the same way. Refer to the Client Configuration, page 96 section.
System Commands
Use these commands to enable or disable host remapping systemwide: system addHostMapping <first private addr> <second private addr> <first public addr> system delHostMapping <first private addr> <second private addr> <first public addr> Use the command system addHostMapping whenever a host on the local LAN is known by the same IP address on all remotes.
IP Address Range
The range of local LAN IP addresses to be remapped is defined by <first private addr> to <second private addr> inclusive. These addresses are mapped one-to-one to the public addresses.
99
The range of public IP addresses is defined by <first public addr> only. The rest of the range is computed automatically (from <first public addr> to <first public addr> + number of addresses remapped - 1) inclusive.
The above entries create three mappings: 192.168.207.40 through 192.168.207.49 are mapped to 10.0.20.11 through 10.0.20.20 192.168.207.93 through 192.168.207.99 are mapped to 10.0.20.4 through 10.0.20.10 192.168.209.71 through 192.168.209.80 are mapped to 10.12.14.16 through 10.12.14.25
For example, to enable IP/port translation to a remote router and make the IP addresses 10.1.1.7 through 10.1.1.10 globally visible, it is permissible to use either one of the following commands:
remote addHostMapping 10.1.1.7 10.1.1.10 10.1.1.7 remoteName system addHostMapping 10.1.1.7 10.1.1.10 10.1.1.7
If the remapped hosts IP address (classic NAT, one-to-one IP address translation) and the masquerading IP address (many-to-one IP address translation) are the same, then NAT masquerading has precedence over classic NAT.
100
incoming NetMeeting calls from outside the local LAN are to be received, NAT needs additional directions from you. NAT prevents requests coming from outside the LAN from connecting to private addresses on the LAN unless you specify the connections that are to be allowed.To receive NetMeeting audio and video connections from outside the local LAN while NAT is enabled, you must enter commands to direct the outside connections. To do this, you would enter commands to either: direct connections for TCP ports 1720 (h323) and 1503 (t120), or map a public IP address to a private IP address on the LAN.
Scenario 1: Global Server Connection Lets suppose you want one private IP address on the local LAN to receive NetMeeting audio and video connections from outside the LAN while NAT is enabled. To allow this, you specify the IP address on the following command: system addServer <ipaddr> tcp h323 The NetMeeting options, Share Program, Chat, Whiteboard, and Transfer Files use the TCP protocol T.120. To use these options, enter another command specifying the IP address, as follows: system addServer <ipaddr> tcp t120 All IP addresses on the LAN can continue to connect to addresses outside the LAN, but only the specified IP address can receive the specified TCP connections from the outside. Scenario 2: Interface-Specific Server Connection Scenario 2 is the same as scenario 1, except that you want to limit the connections from outside to a specific interface. For a remote interface, you specify the IP address and the remote name on the following commands: remote addServer <ipaddr> tcp h323 <remote> remote addServer <ipaddr> tcp t120 <remote> For a dual-Ethernet router where the connection to the WAN is through an Ethernet interface, you would use these commands that specify the IP address and the Ethernet interface that is connected to the WAN: eth ip addServer <ipaddr> tcp h323 <interface> eth ip addServer <ipaddr> tcp t120 <interface> Scenario 3: Address Remapping If the local LAN has more than one IP address visible from the WAN, you could map one of those visible IP addresses to a private IP address on the LAN. The router would then direct all connections for the outside IP address to the inside IP address. The command to do this is: system addhostmapping <private IPaddr> <privateIPaddr> <publicIPaddr> The first two parameters specify the first and last addresses in the address range. To remap just one address, you specify the same private address twice and then the public IP address. Address remapping can also be done for a specific interface. For a remote interface, you would specify the addresses and the remote name on the following command:
101
remote addhostmapping <private IPaddr> <privateIPaddr> <publicIPaddr> <remote> For an Ethernet interface, you would specify the addresses and the Ethernet interface on this command: eth ip addhostmapping <private IPaddr> <privateIPaddr> <publicIPaddr> <interface>
102
Our router provides additional advantages to PPPoE users and service providers, as follows. Using our router, no software changes are required in the user PCs. Because the router acts as the PPPoE client, no PPPoE software is needed in the PC. Our router acts as both the PPPoE client and as the bridge connecting the Ethernet LAN to the DSL line. It does all IP address translation. The PPPoE client information (user name, password, and domain) are configured into the router. Once configured, the user does not need to enter them, ever.
The following diagram illustrates how our router connects an Ethernet LAN to a service provider by serving as both the bridge and the PPPoE client. Ethernet LAN Router User User User Serves as bridge and as PPPoE client DSL Line ATM/Frame Network Service Provider PPPoE server
PPPoE Session
PPPoE Bridge
PPPoE requires a remote router entry defined for bridging. All PPPoE traffic must be bridged through the PVC or DLCI of a remote router entry. The entry can use any protocol that supports bridging including PPP, RFC 1483, or RFC 1490. The remote entry must be enabled for bridging using the remote enabridge command. The PPPoE bridge does not require the Spanning Tree Protocol. Turn off the protocol with this command:
103
remote setBrOptions stp off <remoteName> In addition, if the remote entry should be used only for PPPoE traffic, define it as PPPoE only using this command: remote setBrOptions pppoeOnly on <remoteName> For a Dual-Ethernet router, an Ethernet interface can be designated as PPPoE only using this command: eth br options pppoeOnly on <port#>
PPPoE Client
PPPoE configuration requires creation of a new remote router entry to serve as the PPPoE client. The PPPoE client provides the user name, password, and domain name required for each PPPoE session. In our router, we refer to the PPPoE domain name as a service name as described later. The user name and password can be the router name and password provided by the system name and system passwd commands. Or a name and password can be specified for the remote router entry using the remote setOurSysName and remote setOurPasswd commands. To create the entry, begin by entering these two commands: remote add <remoteName> remote setPPPoEservice * <remoteName> The preceding two commands create a remote router entry that can be used to connect to all PPPoE services. To create an entry for a specific PPPoE service, use the following two commands: remote add <remoteName> remote setPPPoEservice <serviceName> <remoteName> The service name is the domain name defined by your service provider. After defining the remote entry with the remote add and remote setPPPoEservice commands, enter commands to: Turn off authentication of the remote router by the target router (remote disauthen). Specify the user name and password for the service (remote setoursysname and remote setourpasswd). Define the IP route for the remote (remote addiproute). (IP routing must be enabled for the Ethernet interface with eth ip enable.) Turn on Network Address Translation (NAT) if needed (remote setiptranslate). Permanently allocate a channel or allocate a channel only when needed (remote setminline). If your service provider charges by the hour, you may want a PPPoE session to timeout after a period of no traffic. However, if you do use a timeout, bringing up a PPPoE session takes 2-3 seconds longer. To permanently allocate a channel, use: remote setminline 1 <remotename>
104
To set up a timeout, set the minline value to 0 and specify the timeout period in seconds, as follows: remote setminline 0 <remotename> remote settimer <seconds> <remotename>
105
remote setourpasswd Secret PPPoEuser # # Define an IP route for the remote. remote addiproute 0.0.0.0 0.0.0.0 1 PPPoEuser # # Turn on Network Address Translation for the remote. remote setiptranslate on PPPoEuser # # Permanently allocate a channel for the connection. remote setminline 1 PPPoEuser # To have PPPoE sessions timeout after 10 min. (600 sec.) of no traffic, # change the setminline value to 0 and add this command: # remote settimer 600 PPPoEuser # # ----------------------------------------------# Save the configuration changes and then reboot. save reboot
to PPPoEbridge to PPPoEbridge
to PPPoEuser
You can list more information about the current PPPoE sessions using the pppoe list command. The following is an example:
# pppoe list PPPoE Client Session ...... PPPoE/Ifs number..... Access Concentrator.. Peer MAC Address .... Session ID .......... State ............... Flags ............... DialUpPPP.net 1 15021109931568-efficient 00:10:67:00:66:E2 2 2 1
To close a PPPoE session before it terminates, use the pppoe close command. The session is specified by its number. (Use the PPPoE/n number from the ifs output or the PPPoE/Ifs number from the pppoe list output.)
106
Validating Clients
The following commands are used to validate clients for Telnet, SNMP, HTTP, or Syslog. They define a range of IP addresses that are allowed to access the router via that interface. Only the IP addresses in the range specified for the interface can access the router via that interface. This validation feature is off by default. Multiple address ranges can be specified for each filter. If no range is defined, then access to the router is through the LAN or WAN. Note: These commands do not require a reboot and are effective immediately. system addtelnetfilter <first ip addr> [<last ip addr>] | LAN system addsnmpfilter <first ip addr> [<last ip addr>] | LAN system addhttpfilter <first ip addr> [<last ip addr>] | LAN system addsyslogfilter <first ip addr> [<last ip addr>] | LAN first ip addr First IP address of the client range last ip addr Last IP address of the client range. May be omitted if the range contains only one IP address. LAN Local Ethernet LAN
107
Example:
system addsnmpfilter 192.168.1.5 192.168.1.12
To delete client ranges previously defined, use these commands: system deltelnetfilter <first ip addr> [<last ip addr>] | LAN system delsnmpfilter <first ip addr> [<last ip addr>] | LAN system delhttpfilter <first ip addr> [<last ip addr>] | LAN system delsyslogfilter <first ip addr> [<last ip addr>] | LAN To list the range of allowed clients, use the command: system list
108
Dial Backup
The Dial Backup capability provides a backup asynchronous modem connection to the Internet when the default DSL link goes down. The modem connection is provided through the console port. In this case, the console port is used as a serial port and must be connected to an external modem. Note: The Dial Backup feature is effective using either V.90 or ISDN modems. Dial Backup is intended for customers with critical applications for which continuous Internet access is vital. If the DSL link for those applications goes down, the router can automatically switch their traffic to the asynchronous modem. Later, after determining that the DSL link is, once again, up and stable, the router automatically switches the modem traffic back to the DSL link. This feature may also be useful for a customer whose DSL line is not yet installed. The router can begin providing service through an asynchronous modem and later automatically switch to the DSL link when it becomes available. Dial Backup can be used with a VoDSL (voice over DSL) router. However, when data traffic is switched to the backup modem or restored to the DSL connection, all voice calls are terminated.
To set either restriction for an L2TP tunnel, use the command l2tp set wanif (page 369). On the command, you specify the remote name that the tunnel is restricted to and the tunnel name. To restrict the tunnel to the backup interface, specify the remote name that you created for the dialup parameters as described in Specifying the Dialup Parameters, page 110. To set a restriction for an IPSec tunnel, use the command ike ipsec set interface (page 379). The interface that you specify on the command is the remote interface that the tunnel is to be restricted to. To restrict the tunnel to the backup interface, specify the remote name that you created for the dialup parameters as described in Specifying the Dialup Parameters, page 110.
109
Special DB9 or DB25 connectors may be required. Special modem kit and/or connector packages are available from Efficient Networks. Configure the router software to use the Dial Backup feature. To begin Dial Backup configuration, you can select options using the web GUI or begin with the sample configuration file included on the CD as dsl/samples/backup.txt. Further configuration may require the CLI commands described in this section. Note: Because Dial Backup uses the console port, you cannot enter CLI commands using the console port while Dial Backup is enabled. While Dial Backup is enabled, you must access the command line via Telnet (see Telnet Session for Remote Access, page 16). The following is a general outline of the steps required to configure Dial Backup. These steps are detailed in the following sections. To configure Dial-Backup: 1. 2. 3. Check that the Dial Backup feature is installed in the router. To do so, enter the vers command and look for DIAL-BACKUP in the option list. For more information, see Software Option Keys, page 124. Define a remote profile for Dial Backup that specifies the ISP phone number and other dialup parameters. Specify the conditions that determine the status of the DSL link. Default values are provided for: Minimum stability period for the DSL link status signal Minimum retry period before DSL link restoration is attempted
Optionally, Dial Backup can actively test the status of the DSL link by pinging IP addresses. For this option, you must specify at least one IP address; default values are provided for: 4. 5. Ping interval, number of samples, and minimum success rate
Specify the modem parameters (if the default values are not appropriate). Enable Dial Backup by doing all of the following: Check that the remote profile created in step 2 is enabled (use the command remote list). Enter the command system backup enable. Enter the commands save and reboot.
Note: The router determines only at reboot whether its serial port is to be used for console output or for Dial Backup. If Dial Backup is enabled at reboot, then the serial port is assigned to Dial Backup and console output is not sent to the serial port; this cannot change until the next reboot.
110
The remote entry should also turn off authentication and specify a remote route. The following is an example of commands that define a Dial Backup remote profile named backup.
remote add backup # Define the interface as asynchronous and using the PPP protocol. remote setprefer async backup remote setprotocol ppp backup # Specify the primary phone number to be used when dialing out. This phone # number begins with 9 (to get an outside line), a comma (for a 2-second # pause), and finally the seven-digit local number. remote setphone async 1 9,5554218 backup # Specify the bit rate for the preceding phone number. # The bit rate can be 38400, 57600, 115200, or 230400. remote setspeed 115200 async 1 backup # Specify the alternative phone number to be used and its bit rate. remote setphone async 2 9,5554219 backup remote setspeed 115200 async 2 backup # Specify the name and password provided by the ISP. remote setoursysname GWBush backup remote setourpasswd Dubya backup # Turn off authentication. remote disauthen backup # Turn on Network Address Translation. remote setiptranslate on backup # Add a default route for the backup entry remote addiproute save 0.0.0.0 0.0.0.0 1 backup
111
By default, Dial Backup determines that the DSL link has failed if it detects No DSL link status signal. If the signal remains down for a minimum time (the stability period), the DSL link is assumed to be physically disconnected and down. Optionally, you may also specify one or more IP addresses to ping to determine that the link is down. This is discussed later under Addresses to Ping, page 113.
Stability Period
DSL link failure is indicated if the DSL link status signal remains down for a minimum time. This minimum time is the stability period that guards against frequent switching back and forth between the DSL link and the backup port. The default stability period is three minutes. To change the stability period, use this command:
system backup stability <minutes>
112
Addresses to Ping
Dial Backup can also actively determine whether the DSL link is up by pinging IP addresses. It does so only if you provide it with one or more IP addresses. You could choose to ping addresses that are vital to your application. The router pings these addresses at the interval you specify (default, every 5 seconds). It compares a specified number of samples (default, 6) against the specified minimum success rate (default, 50%). If the success rate is less than the minimum, the DSL link is assumed to be down. If you specify one or more addresses, the router pings those addresses to determine if the DSL link is up. You may request that the router ping any or all of these: One or more specific IP addresses (four decimals separated by periods) Your gateway address (GW) Your domain name server address (DNS).
The router determines your gateway and/or DNS address implicitly via a means such as DHCP, static configuration, PPP negotiation, etc. If you specify more than one address to ping, you may want to assign the addresses to groups. Each group can be assigned its own ping interval, number of samples, and success rate. For example, you might want the success rate for the DNS address to be at least 95%, while a success rate of 50% would be reasonable for a heavily used website. You can also disable and re-enable ping addresses by group. A group is identified by its number (0 through 65535). To add an address to the ping list, use this command:
system backup add <ipaddr> | GW | DNS [<group>]
After you enter a ping address, you can see the ping list using the command system list. For example, the addresses in this ping list are the gateway (GW) address and the domain name server (DNS) address:
IP Address(es)................... GW DNS
Note: If you clear the ping list of all addresses, pinging is not used to determine if the DSL link is down. Instead, the state of the DSL physical layer is the only criterion used to determine failure and restoration.
113
By default, the router pings the addresses every 5 seconds until it has pinged each address 6 times; it requires a minimum success rate of 50%. You may need to adjust these default values to fit your situation; for example, if pings are failing, you may want to lower the required success rate. To change these values, use these commands:
system backup pinginterval <seconds> [<group>] system backup pingsamples <samples> [<group>] system backup successrate <percentage> [<group>]
Note: To disable a group of ping addresses, specify 0 for any of its three values pinginterval, pingsamples, or success rate. The same ping interval, number of samples, and success rate apply to all addresses assigned to a group. (Any address not assigned to a group is considered to belong to group 0.) All groups are tested in parallel. As soon as any group fails its success rate test, the DSL link is assumed to have failed and the switchover to the backup is performed. During the ping test, every address in a group contributes to the current success rate of the group; as soon as the current success rate falls below the minimum success rate, the group has failed. For example, if the minimum success rate is 50% and the sample number is 6, the maximum sample size for a three-address group is 18 (6 times 3); thus, as soon as the group accumulates 10 failures (one more than 9 failures, which is 50% of 18), the group fails.
114
To change the modem settings from the defaults, specify which setting you want to change and the new string. To do so, use this command:
system modem reset | escape | init | offhook | dial | answer | hangup <string>
For example, the following command changes the string for the init setting:
system modem init ATS0=0Q0V1&C2&D3&K1X4&H1&I0S12=20
Init Setting The modem init string should set the following: DTR off Verbal yes Echo no Suppress results on Auto answer off Carrier detect off
Use HyperTerminal directly connected to the modem to determine the modem init string before connecting the modem to the router. Dial Setting The string for the dial setting can be either ATDT for tone dialing or ATDP for pulse dialing. The default is tone dialing. To select pulse dialing, use this command:
system modem dial ATDP
This command stops Dial Backup. However, temporarily disabling Dial Backup does not change the use of the console port (no console output is sent to the console port). To re-enable Dial Backup after it has been temporarily disabled, either reboot without a save or enter this command:
system backup enable
Note: You can change the setting of the Dial Backup enable switch at any time, but toggling the switch does not immediately change the use of the console port. The use of the console port is determined only at reboot. To disable Dial Backup across reboots and change the use of the console port, enter the following commands:
system backup disable save reboot
Assuming that the Dial Backup remote profile is enabled, you can re-enable the Dial Backup feature using the following commands:
115
VRRP Backup
When a router is defined as a static default gateway and no other dynamic routing protocol or router discovery protocol is used (such as RIP, page 83), the gateway becomes a critical link in the network. If that router fails, that critical link would be broken. It, therefore, may be appropriate to set up other routers as backups that can serve as the static default gateway if necessary. The Virtual Router Redundancy Protocol (VRRP), as defined in RFC 2338, allows other IP routers in a LAN to provide immediate and automatic backup to a failed IP router. VRRP is a protocol that defines how backup routers monitor the status of a master router and take over its function if it fails. The new master router adopts the IP and MAC address of the original master, so that the hosts configured with the single default gateway maintain their network connection. The following illustration shows two routers connecting a LAN to the Internet. By using VRRP, the backup router can take over as the gateway if the master router fails. Ethernet LAN VRRP Routers Master
Internet
Backup
Routers using VRRP send out advertisement packets at intervals to let the other VRRP routers on the LAN know that they are still up. The other VRRP routers realize that a router is down when no advertisement packets have been received for the minimum down interval. The VRRP router assigned the highest priority takes over for the failed router. When the failed router is restored, it can automatically preempt the backup router and resume its function in the network.
VRRP Configuration
To configure a LAN to use VRRP, you must enter configuration commands into every router that is to be provided with backup or that is to serve as backup to another router. Certain values must be the same between the master router and its backups; other values must differ (as discussed in the following sections). VRRP configuration requires these basic steps: 1. Define logical interfaces. 2. Define the ID of the Virtual Router (VRID).
116
3. Define the VRRP attributes of the Virtual Router. 4. Save the changes and either restart the VRRP interface or reboot the router.
IP Address
Every logical interface is assigned its own IP address, or range of addresses, that is unique on the LAN. The VRRP interface must be assigned the IP address that serves as the default static gateway for other devices on the LAN. For example, assume that the gateway IP address is 192.168.100.254. If the default logical interface (0:0) is to be the VRRP interface, it is assigned the gateway address. Another logical interface (0:1) is defined to be the management interface and is assigned another IP address.
eth ip addr 192.168.100.254 255.255.255.0 eth add 0:1 eth ip addr 192.168.254.253 255.255.255.0 0:1
Note: You must assign the same IP address to the VRRP interface in the master router and in every router that is to serve as its backup. For example, if the VRRP interface is assigned IP address 192.168.100.254 in router A, the VRRP interface in every backup router for router A must be assigned IP address 192.168.100.254.
RIP Processing
Routers using VRRP do not need RIP protocol processing to discover routes. (See RIP Controls, page 83.) You may, therefore, turn off RIP processing using these commands:
eth ip options txrip off eth ip options rxrip off
A VRID has these characteristics: Integer from 1 through 255; thus, a LAN can have up to 255 VRIDs.
117
Unique on the LAN, but can be reused on other LANs. The same VRID must be defined in all routers that make up the Virtual Router, that is, the original router and all routers that are to serve as its backups. For example, if VRID 7 is defined in router A, then VRID 7 must also be defined in all backup routers for router A.
To see the effect of these commands, specify the logical interface on an eth list command. For example, the defined VRID is listed in the following output:
# eth list 0:1 ETHERNET INFORMATION FOR <ETHERNET/0:1>, DOWN Send IP RIP to the LAN............... no Advertise me as default router..... yes Process IP RIP packets received...... no Receive default route by RIP....... yes IP address translation............... no IP filters defined................... no IP address/subnet mask............... 192.168.254.253/255.255.255.0 Management IP address/subnet mask.... 0.0.0.0/0.0.0.0 Virtual Router ID (vrid)............. 7 Static Ethernet routes defined....... none Virtual Ethernet routes defined...... none MTU.................................. default
Note: A logical interface does not become effective until you save your changes and either restart the logical interface or reboot the router. The VRRP interface also requires the definition of its VRRP record before it becomes effective. See Starting VRRP, page 120.
118
The command to clear the password is: eth vrrp clear password <vrid> [<port#>] Note: Our implementation does not validate the IP addresses in the advertisement packet or authenticate using an authentication header.
119
If the router is the master router for the IP address (it has priority 255), it always immediately preempts the backup router and resumes its function in the network. The preemption option cannot change this. However, if the router is a backup router for the IP address and it determines that a router with a lower priority is currently functioning as backup, the preemption option determines whether this router immediately preempts the router with lower priority or waits for the lower priority router to go away before becoming the active VRRP router.
The preemption setting may differ among the backup routers for a VRID. The preemption command is: eth vrrp set option <preempt | nopreempt> <vrid> [<port#>]
Starting VRRP
After you have defined the VRRP logical interface, defined a VRID, and defined an attribute record for the VRID, you are ready to start VRRP. To do so, you must both save your changes and either restart the VRRP interface or reboot the router. For example, these commands save all changes, restart the VRRP interface 0:1, and list the VRRP records:
# save # eth restart 0:1 # 04/16/2001-07:49:04:VRRP: VRRP 7 on Interface ETHERNET/0 now active eth vrrp list VRRP Records for Ethernet Port .... 0 VRRP Record...................... VRID 7, Priority 100, Interval Flags:preempt, No Authentication Interface: ETHERNET/0:1 VRRP Router active
After you start VRRP, you can use the eth vrrp list or eth list commands to monitor the status of the VRRP router.
To change the VRRP interface for a VRID, you clear the VRRP interface designation and then re-assign it. For example, to change the VRRP interface designation from 0:1 to 0:3 for VRID 7, use these commands:
#eth ip vrid 0 0:1 #eth ip vrid 7 0:3
120
If you wanted to remove VRRP entirely from the router, you would delete the VRID and also delete the extra logical interface you created for its use, with the command: eth delete <port#>:<logical#> Note: Remember, to make these changes permanent, you must save the changes before you restart or reboot.
Master Router
Internet
Backup Router
121
# A VRRP attribute record is defined for VRID 7. eth vrrp add 7 # # This router is the master router so it is given priority 255. eth vrrp set priority 255 7 # # This is a simple password to authenticate VRRP packets. eth vrrp set password abcdefgh 7 # # Use the default time interval (1 second) and preemption option (preempt). # # Save the changes and then reboot. save reboot
122
123
These options are usually ordered with the router. The options are controlled by the presence of a key file in flash memory or a bit set in the CMOS. Both values are checked; if either is set, the option is enabled.
For example, the following vers command output shows that the L2TP and encryption options are disabled, but all the other options are enabled. The IP Routing feature was enabled by a key.
Options: FRAME RELAY, SDSL, RFC1490, +IP ROUTING, IP FILTERING, WEB, ~L2TP, ~ENCRYPT, BRIDGE, IPX, CMMGMT
124
Also, if present, the RSE hardware option appears in the vers command output as the option HW-DES.
125
Encryption
Note: Encryption is a software option. The following section applies only to routers with the encryption option enabled. For more information, see Software Option Keys, page 124. To read about IPSec encryption, see page 149. Two variants of encrypted data links over PPP have been implemented: PPP DES (Data Encryption Standard) (RFC 1969) Diffie-Hellman
Encryption requires PPP. Caution: PPP DES and Diffie-Hellman encryption options may not be exported outside the United States or Canada.
Configuration Commands
To configure PPP DES encryption, add these commands to your standard configuration: remote setEncryption dese rx <key> <remoteName> remote setEncryption dese tx <key> <remoteName> Observe the following guidelines: PPP DES can only be configured using the Command Line Interface (CLI). The choice of keys should be carefully considered. Each key must have eight hexadecimal digits. Values that are considered cryptographically weak should be avoided. Consult a security expert for advice. Different keys may be used for different remote destinations. Use the console port to view error messages and progress. If you see Unknown protocol errors, the router receive key and sender Tx key don't match. For maximum security, Telnet and SNMP access should be disabled, and PPP CHAP authentication should be used by both ends.
Sample Configuration
Suppose that the routers SOHO (the local router) and HQ (the remote router) described in Sample Configurations, page 65 are to be configured to use PPP DES encryption. To add encryption to their configurations, you would enter the following commands:
126
Remember that the transmit key (tx) of SOHO is the receive key (rx) of HQ. Inversely, the receive key of SOHO is the transmit key of HQ. Dont forget to save the configuration and reboot the router (save and reboot commands).
Diffie-Hellman Encryption
With Diffie-Hellman encryption, each router has an encryption file that is associated with a public key providing 768-bit security. The predefined keys can be replaced by the user. By convention, the key files have the suffix num (e.g., dh96.num).
Configuration Commands
To configure Diffie-Hellman encryption, add this command to your standard configuration: remote setEncryption DESE_1_KEY | DESE_2_KEY [<fileName>] <remoteName> Observe the following guidelines: Specify DESE_1_KEY if the same key is to be used in both directions. Specify DESE_2_KEY if the keys are to be different. Using the same keys in both directions can significantly reduce the time needed to compute the DES keys from the Diffie-Hellman exchange. The optional file name on the command is the name of the file containing the Diffie-Hellman values. If a file is not specified, default values built into the routers kernel are automatically selected. The file format is described later. The routers receive key and sender Tx key must not match. Different keys and key files may be used for different remote destinations. For maximum security, Telnet and SNMP access should be disabled, and PPP CHAP should be used. Use the console port to view error messages and progress.
Sample Configuration
Suppose that the routers SOHO (the local router) and HQ (the remote router) described in Sample Configurations, page 65 are to be configured to use Diffie-Hellman encryption. Also, assume that the same key is to be used in both directions and that the values to be used to generate keys are in the file dh96.num. To add encryption to their configurations, you would enter the following commands:
127
We recommend that you consult an encryption expert to obtain cryptographically sound generator and modulus pairs. Default Modulus:
00000000: c9 b4 ed 33 ba 7f 00 9e - ce e0 83 5d a5 4c 19 25 00000010: e0 2d 99 44 e8 8d cd 16 - 02 0e 6c 26 6d 15 7c 95 00000020: 82 9a 8c 2b 19 d0 56 da - 9b 5b a9 cd cf fb 45 2b 00000030: c9 6a 3c 26 e5 b8 1a 25 - 07 b8 07 22 ed 15 8a 56 00000040: 8b f4 30 f2 28 fc 6b f1 - bf a4 3e 87 f0 be d6 1c 00000050: 33 92 b9 5e d1 b7 20 8c - 92 02 cb e5 26 45 02 1d
Default Generator:
00000000: 90 f0 09 78 cc 23 79 a8 - 6c 23 a8 65 e0 dc 0f 6d 00000010: fb a7 26 e8 63 0a 21 67 - 5a f8 0f 59 84 09 5c da 00000020: ef af af fc d2 5f 83 e2 - a7 27 05 34 17 94 1a 4f 00000030: b2 87 76 97 e7 48 43 db - 62 29 70 9e 7f eb 2c 6e 00000040: 5d 25 1d a1 65 f0 b4 e6 - 47 4d 25 23 0b 20 b9 93 00000050: 27 f0 56 12 5a 97 f6 c5 - 31 b6 19 fc 67 22 93 f5
128
IP Filtering
IP Filtering is a type of firewall used to control network traffic. The process involves filtering packets received by an interface and deciding whether to forward or to discard them. Filtering is performed for each interface; each Ethernet and WAN interface can have its own set of filters. Note: IP Filtering is a software option; use the vers command to check that it is installed in your router. When IP filtering is used, the router examines information for each IP packet, such as the source and destination addresses, ports, and protocols, and then screens (filters) the packets based on this information. If the packet matches the conditions of a filter, the router acts as directed by the filter, that is, it accepts, drops or rejects the packet. Note: To use IP filtering, IP routing must be enabled (see the command eth ip enable, page 270).
129
Filters operate at the interface level. Each interface can have up to four lists of filters associated with it: Input filters, Receive filters, Transmit filters, and Output filters. The following illustrates the filtering process. Packet arrives at interface Packet destined for router acting as host Input filters Packet destined for another interface Network Address Translation Transmit filters Receive filters Network Address Translation
Output filters
1. Input Filters
When a packet arrives at an interface, the router compares the packet to the list of input filters. The first filter that matches the packet determines whether the packet is accepted, dropped, or rejected. If no filter matches the packet, the packet is accepted. If the packet is accepted, the next step is Network Address Translation, if NAT is enabled for the input interface. For more information on Network Address Translation, see Network Address Translation (NAT), page 95.
2. Receive Filters
The router next compares the packet to the list of receive filters for this interface. Again, the first filter in the list that matches the packet determines whether the packet is accepted, dropped, or rejected. If no filter matches the packet, the packet is accepted. Receive filters are applied before the packet destination is determined by the routing table. The packet may be destined for the router itself and/or destined for output to another interface. Note: If Network Address Translation is disabled, the Receive filter list is checked immediately after the Input filter list. In this case, identical Input and Receive filters have the same effect (see the examples at the end of the IP Filtering section.)
3. Transmit Filters
If the packet is destined for another interface, the router compares the packet to the list of transmit filters for this interface. The first filter that matches the packet determines whether the packet is accepted, dropped, or rejected. If no filter matches the packet, the packet is accepted. If the packet is accepted, Network Address Translation is performed, if NAT is enabled for the output interface.
4. Output Filters
130
Finally, the router compares the packet to the list of output filters for this interface. The first filter that matches the packet determines whether the packet is accepted, dropped, or rejected. If no filter matches the packet, the packet is accepted. The packet, if accepted, is then sent out the interface. Note: If Network Address Translation is disabled, the Output filter list is checked immediately after the Transmit filter list. In this case, identical Transmit and Output filters have the same effect
Filter Actions
A filter action can be applied to a packet at each of the four filtering points (Input, Receive, Transmit, and Output). If, at that point, a given filter is the first filter in the list to match that packet, the action specified by that filter determines the fate of the packet. The possible filter actions are: Accept Drop Reject The router lets the packet proceed for further processing. The router discards the packet. The router sends an ICMP REJECT (Internet Control Management Protocol) to reject the packet.
Pass to IPSec Two actionsinipsec and outipsecpass the packet to IPSec for further processing. The inipsec action is for packets coming from the other IPSec gateway; it passes the packet to IPSec for decrypting. The outipsecaction is for packets coming from the local protected network; it passes the packet to IPSec so it can be encrypted and sent to the other IPSec gateway. Although filters are the mechanism by which packets are passed to IPSec, it is recommended that you use IKE, rather than your own filters, to manage your IP security (see IPSec (Internet Protocol Security), page 149).
IP Filter Commands
To define and manage IP filters on an Ethernet interface, use the command eth ip filter. To define and manage IP filters on the remote interface, use the command remote ipfilter. For more information on these commands, see eth ip filter, page 270 and remote ipfilter, page 300.
ICMP Redirect
IP filters of Input type are checked before the IP packet is redirected by ICMP. This could adversely affect local LANs that use ICMP redirect to dynamically learn IP routes. IP filters of Input type are checked before the IP packet is sent to the router itself as a host.
Filter Examples
Example 1: Input Filters Vs. Receive Filters
The following commands add a filter to the beginning of the Input filter list.
remote ipfilter insert input drop -p tcp -dp 23 internet save
131
When used, the input filter matches any packet for remote interface internet that has protocol TCP and destination port 23. The packets are checked before Network Address Translation, if any; any packets that match the filter are dropped. Thus, this filter stops any attempt by a host coming from the remote internet from sending an IP packet to the Telnet port. The router does not see the packet, and the packet is not forwarded. Consider, next, the following commands that add a filter identical to the above filter to the beginning of the Receive filter list:
remote ipfilter insert receive drop -p tcp -dp 23 internet save
In the following cases, the Receive filter has the same effect as the Input filter: If Network Address Translation is disabled. If Network Address Translation is enabled and the Telnet public port is mapped to the Telnet private port by a remote addserver command, such as the following:
remote addserver 10.0.1.1 tcp telnet internet
However, the Receive filter does not have the same effect as the Input filter in the following case: If Network Address Translation is enabled and another public port is mapped to the Telnet private port. For example, the following command maps the public port 2000 to the Telnet private port:
remote addserver 10.0.1.1 tcp 2000 2000 telnet internet
In this case, Network Address Translation would translate the packets with port 2000 to the Telnet port and the Receive filter would drop those packets. For more information, see Network Address Translation (NAT), page 95 and remote addserver, page 293.
The filter order is important; packets are compared to filters in the order that the filters appear in the filter list. Any Telnet packet that doesnt match the first filter is dropped by the second filter. Thus, command order is important because each of these commands appends its filter to the end of the list.
132
ipfilter flush transmit internet ipfilter flush receive internet filter flush input filter flush output filter flush transmit filter flush receive
# HTTP from LAN to WAN will be accepted remote ipfilter insert input accept -p tcp -sp 80 internet remote ipfilter insert output accept -p tcp -dp 80 internet # DNS from LAN to WAN will be accepted remote ipfilter insert input accept -p udp -sp 53 internet remote ipfilter insert output accept -p udp -dp 53 internet # FTP from LAN to WAN accepted remote ipfilter insert input accept -p tcp -sp 20:21 internet remote ipfilter insert output accept -p tcp -dp 20:21 internet # FTP WAN TO LAN accepted remote ipfilter insert input accept -p tcp -dp 20:21 internet remote ipfilter insert output accept -p tcp -sp 20:21 internet # L2TP remote ipfilter insert input accept -p udp -sp 1701 internet remote ipfilter insert output accept -p udp -dp 1701 internet # Deny anything not listed above remote ipfilter append input drop internet remote ipfilter append output drop internet # Watch the results remote ipfilter watch on internet save
133
# Allow ICMP ECHO REPLY, REQUEST to the WAN remote ipfilter insert output accept -p icmp -sp 0 internet remote ipfilter insert output accept -p icmp -sp 8 internet # Telnet from LAN to WAN will be accepted remote ipfilter insert input accept -p tcp -sp 23 internet remote ipfilter insert output accept -p tcp -dp 23 internet # SSL accepted remote ipfilter insert input accept -p tcp -sp 443 internet remote ipfilter insert output accept -p tcp -dp 443 internet # HTTP from LAN to WAN will be accepted remote ipfilter insert input accept -p tcp -sp 80 internet remote ipfilter insert output accept -p tcp -dp 80 internet # FTP from LAN to WAN will be accepted remote ipfilter insert input accept -p tcp -sp 20:21 internet remote ipfilter insert output accept -p tcp -dp 20:21 internet # DNS from LAN to WAN will be accepted remote ipfilter insert input accept -p udp -sp 53 internet remote ipfilter insert output accept -p udp -dp 53 internet # L2TP will be accepted remote ipfilter insert input accept -p udp -sp 1701 internet remote ipfilter insert output accept -p udp -dp 1701 internet # E-mail - SMTP and POP3 requests from LAN to WAN accepted remote ipfilter insert input accept -p tcp -sp 25 internet remote ipfilter insert output accept -p tcp -dp 25 internet remote ipfilter insert input accept -p tcp -sp 110 internet remote ipfilter insert output accept -p tcp -dp 110 internet # Drop all packets remote ipfilter append input drop internet remote ipfilter append output drop internet # Watch the results remote ipfilter watch on internet save
134
ip ip ip ip
input output transmit receive errors from -p icmp -sp -p icmp -sp -p icmp -sp -p icmp -sp the WAN 0 internet 3 internet 8 internet 11 internet
# Allow ICMP replies, requests, and remote ipfilter insert input accept remote ipfilter insert input accept remote ipfilter insert input accept remote ipfilter insert input accept
# Allow ICMP ECHO REPLY, REQUEST to the WAN remote ipfilter insert output accept -p icmp -sp 0 internet remote ipfilter insert output accept -p icmp -sp 8 internet # Telnet from LAN to WAN will be accepted remote ipfilter insert input accept -p tcp -sp 23 internet remote ipfilter insert output accept -p tcp -dp 23 internet # SSL accepted remote ipfilter insert input accept -p tcp -sp 443 internet remote ipfilter insert output accept -p tcp -dp 443 internet # HTTP from LAN to WAN will be accepted remote ipfilter insert input accept -p tcp -sp 80 internet remote ipfilter insert output accept -p tcp -dp 80 internet # FTP from LAN to WAN will be accepted remote ipfilter insert input accept -p tcp -sp 20:21 internet remote ipfilter insert output accept -p tcp -dp 20:21 internet # DNS from LAN to WAN will be accepted remote ipfilter insert input accept -p udp -sp 53 internet remote ipfilter insert output accept -p udp -dp 53 internet # L2TP will be accepted remote ipfilter insert input accept -p udp -sp 1701 internet remote ipfilter insert output accept -p udp -dp 1701 internet # E-mail - SMTP and POP3 requests from LAN to WAN accepted remote ipfilter insert input accept -p tcp -sp 25 internet remote ipfilter insert output accept -p tcp -dp 25 internet remote ipfilter insert input accept -p tcp -sp 110 internet remote ipfilter insert output accept -p tcp -dp 110 internet # Allow SSH from the WAN remote ipfilter insert input accept -p tcp -dp 22 internet remote ipfilter insert output accept -p tcp -sp 22 internet # Allow NETBIOS # Allow NETBIOS remote ipfilter remote ipfilter remote ipfilter remote ipfilter remote ipfilter # finger connections from specific sources on the WAN requests from our network insert input accept -p tcp -dp 137:139 internet insert input accept -p udp -dp 137:139 internet insert output accept -p tcp -sp 137:139 internet insert output accept -p tcp -dp 137:139 internet insert output accept -p udp -dp 137:139 internet
135
remote ipfilter insert output accept -p tcp -sp 1024:65535 -dp 79 internet # POP2 tcp/udp remote ipfilter insert output accept -p tcp -sp 1024:65535 -dp 109 internet # NNTP tcp remote ipfilter insert output accept -p tcp -sp 1024:65535 -dp 119 internet # IMAP2 tcp/udp remote ipfilter insert output accept -p tcp -sp 1024:65535 -dp 143 internet # certain other non-privileged ports to non-privileged ports remote ipfilter insert output accept -p tcp -sp 1024:65535 -dp 1024:65535 internet # Allow NTP, who, Kali, CuSeeMe out to the WAN # NTP remote ipfilter insert transmit accept -p udp -dp 123 internet remote ipfilter insert receive accept -p udp -sp 123 internet # who remote ipfilter insert input accept -p udp -sp 513 -dp 1024:65535 internet remote ipfilter insert output accept -p udp -dp 513 -sp 1024:65535 internet remote ipfilter insert input accept -b -p udp -sp 2213 -dp 1024:65535 internet remote ipfilter insert output accept -b -p udp -dp 2213 -sp 1024:65535 internet remote ipfilter insert input accept -p udp -sp 6666 -dp 1024:65535 internet remote ipfilter insert output accept -p udp -dp 6666 -sp 1024:65535 internet remote ipfilter insert input accept -p udp -sp 7648 -dp 7648 internet remote ipfilter insert output accept -p udp -dp 7648 -sp 7648 internet # RealAudio remote ipfilter insert input accept -p udp -dp 7070 internet remote ipfilter insert output accept -p udp -sp 7070 internet # traceroute remote ipfilter insert input accept -p udp -sp 1024:65535 -dp 33434:33500 internet remote ipfilter insert output accept -p udp -sp 1024:65535 -dp 33434:33500 internet ### Deny any other traffic remote ipfilter append input drop internet remote ipfilter append output drop internet # Turn on ip filter watch for debugging remote ipfilter watch on internet save
136
Advantages of Tunneling
L2TP (Layer 2 Tunneling Protocol) is used to forward a PPP link from a remote site to a corporate site across the Internet, thus creating virtual paths called tunnels. Because tunneling involves encapsulating data, packets can be transported across networks using different protocols. The advantages for tunneling the PPP protocol are listed below: Different network protocols such as NetBEUI, IPX, and Appletalk can be transported through the Internet using a tunnel. The protocol packets are encapsulated and routed across the network through the Internet. Tunnels provide a way to reduce costs and complexity associated with remote dial-up networking by using a local ISP: users connect to the remote site by dialing into their local ISP and letting the Internet handle the long-distance connections, thus avoiding long-distance phone charges. Tunneling PPP allows compression of data through the entire tunnel, which translates into greater throughput. By allowing encryption over the PPP link, L2TP contributes to more secure networks over the Internet. Remote users can access the company network, even if there is a company firewall (provided, of course, that tunnels can come through the firewall).
Note: This feature can interoperate with any vendor that supports L2TP - Draft II.
L2TP Concepts
This section defines the major L2TP concepts and illustrates them with L2TP client examples. It also describes the creation and destruction of tunnels and sessions.
137
Definitions
An L2TP tunnel is created between an L2TP client and an L2TP network server (LNS). The client and server control the tunnel using the L2TP protocol. L2TP Network Server (LNS) Point where the call is actually managed and terminated (e.g., within a corporate network). L2TP Access Concentrator (LAC) Physical hardware (such as a router) used for placing and receiving phone calls. Dial User The remote system or router that is either placing the call to the LAC or receiving the call from the LAC. The dial user does not actually dial in to the LNS or receive a call from the LNS, since this is a virtual connection. The dial user is one end of a PPP session. The LNS is the other end of the PPP session. L2TP Client The dial user and LAC combined in the same hardware device. In this case, the PPP session is between the LAC and the LNS. As shown in the following illustration, an L2TP client is used to tunnel a PPP session between a small office (our router) and a corporate office through the Internet.
Remote User
L2TP Client: Dial User+LAC (ISDN router)
Logical Link
PPP session running over the tunnel
Company
Company
LAN/server
PC
TUNNEL
LNS Router
Physical Link
IP traffic to the Internet PPP session ISDN line INTERNET
Physical Link
DSL/ATM traffic
138
Tunnels
Tunnels are virtual paths that exist between an L2TP client and an L2TP server. An L2TP server can communicate simultaneously with more than one L2TP client. An L2TP client can communicate simultaneously with more than one L2TP server. Some L2TP implementations including the one discussed in this section allow the same router to act as both an L2TP client and an L2TP server simultaneously, if so configured. Caution: Verify that the IP address of the other end of the tunnel is correctly routed through the right, local interface/remote and will not appear to be routed through the tunnel. An attempt to route the tunnel endpoint within itself will fail.
Sessions
Sessions can be thought of as switched virtual circuit calls carried within a tunnel and can only exist within tunnels. One session carries one call. This call is one PPP session. Multiple sessions can exist within a tunnel. The following briefly discusses how sessions are created and destroyed.
Session creation
Traffic destined to a remote entry (located at the end of the tunnel) initiates a tunnel session. When the L2TP client wishes to establish a session to an LNS, the L2TP client assumes the role of a LAC and sends control packets containing incoming call information to the LNS over the tunnel.
Session destruction
A tunnel session automatically times out after the data session stops. When instructed to destroy a session, the L2TP client closes any PPP session associated with that session. The L2TP client may also send control messages to the LNS indicating that the L2TP client wishes to end the PPP session. When the LNS wants to hang up the call, it sends control messages destroying the session.
Configuration
Preliminary Steps to Configure a Tunnel
The following logical steps should be considered before configuring a tunnel: 1. 2. 3. Decide if the router should act as an L2TP Client or LNS. Decide if one side or both sides of the connection should be allowed to initiate a tunnel. Create the L2TP Tunnel Entry with these characteristics: The host name of the L2TP client The host name of the L2TP network server A Tunnel CHAP secret (both sides of the connection must use the same secret)
139
4.
The IP address of the other party must be provided to the initiating side of the tunnel Type of flow control (pacing, sequence numbers, or none)
Create a remote entry for the PPP session. Associate the remote entry with the Tunnel.
Verification Steps
1. Verify that the IP address of the other end of the tunnel is correctly routed through the right, local interface/remote and will not appear to be routed through the tunnel. An attempt to route the tunnel endpoint within itself will fail. Try to establish IP connectivity (using the ping or tracert commands). a.Pinging from the L2TP client or LNS to the opposite tunnel endpoint should succeed (this tests the tunnel path). b.Pinging from a tunnel endpoint IP address to an IP address within the tunnel will probably fail due to the existence of the IP firewall.
2.
Configuration Commands
L2TP configuration commands are used to configure: Tunnels The PPP session
CHAP secret:
l2tp set CHAPSecret <secret> <TunnelName>
Tunnel authentication:
l2tp set authen on | off <TunnelName>
140
Other commands:
Commands are also available to delete a tunnel, close a tunnel, or set up advanced L2TP configuration features such as traffic performance fine-tuning (see L2TP Virtual Dial-Up Configuration Commands, page 363).
Sample Configurations
Two sample configurations are described in this section: A simple configuration. This example describes the information needed to configure one side of the tunnel (the client side). A complete configuration. This example describes the information needed to configure both sides of the tunnel (client and server sides).
Assumptions
141
In this example, the following information is assumed: The server side (the company) has an LNS router connected to the Internet. The client side has an existing route to the Internet with the remote Internet (refer to the following Note, if you need sample configuration commands). IP routing is enabled (refer to the following Note, if you need sample configuration commands).
Note: Below is an example of configuration commands that can be used to enable IP routing and establish a route to the Internet. remote remote remote remote remote remote remote eth ip eth ip add internet disauthen internet setoursysname name_isp_expects internet setourpass secret_isp_expects internet addiproute 0.0.0.0 0.0.0.0 1 internet setphone isdn 1 5551000 internet setphone isdn 2 5553000 internet enable address 192.168.254.254 255.255.255.0
Configuration Process
The following sets of questions, answers, and configuration commands specific to the L2TP tunnel and the PPP remote will assist you in configuring the client side router SOHO (also referred to as home router). Note that the server side is referred to as either company router or router at work.
L2TP tunnel answers. For our example, lets assume the answers to the above tunnel-specific questions are as follows: 1. 2. 3. 4. Home_Router Work_Router Shared_Secret 10.0.0.1
L2TP tunnel configuration commands. These commands would be used to set up the L2TP tunnel information for our example: l2tp add Work_Router l2tp set ourtunnel Home_Router Work_Router
142
l2tp set chapsecret Shared_Secret Work_Router l2tp set address 10.0.0.1 Work_Router
PPP remote answers. For our example, let us assume the answers to the above PPP remote-specific questions are as follows: 1. 2. 3. ppp_soho ppp_soho_secret We assume that this router will authenticate the router at work with the following information: a) the company routers name is: ppp_work b) the company routers PPP secret is: ppp_work_secret 4. We assume that the companys router will dynamically assign an IP address to the home router.
143
5.
172.16.0.0/255.240.0.0
PPP remote configuration commands. For our example, these commands would be used to set up the PPP remote information for tunneling to work: remote remote remote remote remote add ppp_work setlns Work_Router ppp_work setpasswd ppp_work_secret ppp_work setiptranslate on ppp_work addiproute 172.16.0.0 255.240.0.0 1 ppp_work
l2tp set oursysname ppp_soho Work_Router l2tp set ourpassword ppp_soho_secret Work_Router
Assumptions
IP Addresses
The LNS servers LAN IP address is 192.168.100.1 (LNSserver) with a mask of 255.255.255.0. The LNS has a WAN IP address of 192.168.110.1, which is used as the tunnel endpoint. The LNS connects to the remote internet. The L2TP Clients LAN IP address is 192.168.101.1 (soho) with a mask of 255.255.255.0. Additionally, 192.168.101.1 is also the tunnel endpoint within the L2TP client. The router soho connects to the remote isp.
Secret/password
A shared tunnel secret of tunnelsecret will be used.
PPP Authentication
The LNS will authenticate the client using PPP. The client will not try to authenticate the LNS using PPP. For PPP authentication, the L2TP client will be known as lacclient with a password of clientpassword.
Tunnel
Only the L2TP client (soho) will initiate the tunnel and make the connection. The tunnel is routed through the remote internet which is the default route. The LNS server never calls the L2TP client (soho). Figure 1
144
Remote User
PPP session running over the tunnel lacclient (see Note 1) lnsserver (see Note 3)
L2TP Client:
PC
soho router
(ISDN)
TUNNEL
tunnelAtHome (see Note 2) tunnelAtWork (see Note 2)
CO LAN
192.168.110.1
LAN: 192.168.100.0 IP traffic to the Internet LAN: 192.168.101.0 Frame Relay ATM traffic IP traffic to the Internet
INTERNET
Note 1: The CHAP secret is clientPassword. Note 2: The CHAP secret is tunnelSecret. Note 3: No CHAP secret is needed; the client does not authenticate the LNS server.
Configuration Process
The following sample scripts list the commands used to configure the routers soho (L2TP client), LNSserver (LNS), internet, and isp.
Define soho:
system system system system name soho passwd sohopasswd msg configured_12/15/98 securitytimer 60
145
Define internet:
system system system system name internet passwd internet msg configured_12/15/98 securitytimer 60
146
dhcp add 172.16.0.0 255.255.255.0 dhcp del 192.168.254.0 dhcp set addr 172.16.0.2 172.16.0.20
Define isp:
system system system system name isp passwd isppasswd msg configured_12/15/98 securitytimer 60
Enable IP routing:
eth ip enable eth ip addr 172.16.0.254 255.255.255.0
Disable DHCP:
dhcp disable all
147
Define LNSserver:
system system system system name lnsserver passwd serverpassword msg Script_for_LNS_called_HQ securitytimer 60
Enable IP routing:
eth ip enable eth ip addr 192.168.100.1 255.255.255.0
148
IPSec sessions are initiated through Security Associations (SAs), which allow peers to negotiate a common set of security attributes. In a nutshell, IPSec assures source authenticity, data integrity and confidentiality of IP packets, providing the level of security required by Virtual Private Networks (VPNs). IPSec can be used in conjunction with L2TP (see L2TP Tunneling Virtual Dial-Up, page 137). IPSec offers greater security than L2TP, but it does not support as many network protocols. However, bridged and lower layer protocol traffic may be transmitted across an IPSec network if packets are first encapsulated by L2TP, and then by IPSec. IPSec does not require modification of individual applications or devices for secure data transport. Although it does require global IP addresses for all peers, Network Address Translation (NAT) may be used with IPSec. (See Network Address Translation (NAT), page 95.)
149
Transport mode is used when the IPSec packet originates in the encrypting device. In transport mode, only the payload (data portion) of each IP packet is encapsulated and/or encrypted. An IPSec header is inserted between the IP header and the upper layer protocol header. The router should be configured for transport mode when a client is communicating directly with the router. For example, use transport mode when a remote user wants to access the HTML setup pages or Telnet into the router. It can also be used for L2TP over IPSec. The routers at either end of the L2TP tunnel do both the IPSec and L2TP encapsulations so the routers can use transport mode for communications.
Tunnel Mode:
Device
Transport Mode:
Device or router
Router
Router
150
The AH protocol can perform packet authentication. The AH header protocol defines authentication methods for both the packets outer IP header and its payload. Unlike ESP authentication, the message digest is inserted in front of the payload. The following figure shows the transformed IP packet after the ESP or AH protocol has been applied in tunnel mode. ESP Protocol: New IP Header ESP Header Original IP Header Rest of original IP packet (headers and data) Encrypted Authenticated AH Protocol: New IP Header AH Header Original IP Header Authenticated Rest of original IP packet (headers and data) ESP Trailer ESP Authentication
IKE Management
Internet Key Exchange (IKE) management makes encryption key exchange practical, even in large networks where there are many unknown intermediate links between sending and receiving nodes. Unlike protocols that allow only one key exchange per session, IKE can generate and transfer multiple keys between peers during a single tunnel session. Users may specify the duration for which keys are valid. This dynamic type of DiffieHellman key exchange greatly reduces the chances of a network attacker finding an entry into a tunnel. If you wish, you may also select Perfect Forward Secrecy (PFS) to increase the security of the key exchange. PFS ensures that the compromise of a single key permits access to only data protected by that particular key. However, PFS requires use of a Diffie-Hellman group for each rekey, adding overhead to the process and causing IKE to run more slowly. Thus, PFS is not always desirable. Because VPN users are likely to be using a variety of protocols, a common set of security attributes must be negotiated at the beginning of any tunnel session. Phase 1 IKE is responsible for negotiating these security attributes and establishing peer identities. A secure tunnel for the exchange of encryption keys is also created
151
during this phase. Phase 2 IKE then exchanges proposals for IPSec security attributes, generates the encryption keys and sets up IPSec Security Associations (SAs) for moving user data.
Phase 1 IKE:
Peer identities Router Proposals Router Secure tunnel Router Encryption keys? Router Security attributes? Router Who are you? Router
Phase 2 IKE:
IPSec Proposals Router Security attributes? Router
152
153
IKE Commands
The Internet Key Exchange (IKE) process consists of two phases. In phase 1, a moderately secure connection is established between the two security endpoints. This connection is used to exchange key and connection information for the final security association (SA), which is used to exchange user data. Use the following command to clear all IKE configuration information from the router. ike flush The other IKE commands relate to the four categories of information required to set up IKE in the router. 1. 2. 3. 4. IKE Peer commands establish the identity of the local and remote peers. IKE Proposal commands define the proposals exchanged during the Phase 1 exchange. IKE IPSec Proposal commands specify the parameters for the final SA. IKE IPSec Policy commands specify the filtering parameters for the final SA.
The following commands define the peer connection. ike peers set mode <MAIN | AGGRESSIVE> <PeerName> Sets the peer connection to either main or aggressive mode. Main mode is used when the IP addresses of both ends are known. Aggressive mode is used when the address of one end can change, as with a typical modem or DSL connection. For a main mode connection, set only the IP address and the secret: ike peers set address <IPaddress> <PeerName> Sets the IP address of the other endpoint. In a main mode configuration, the other endpoint is constant. ike peers set secret <secret> <PeerName> Sets the shared secret for the peer. The secret must be identical for both ends. It can be up to 256 characters long; do not use spaces or non-printable characters. For an aggressive mode connection, you must set the IP address and secret and several more options. ike peers set address <IPaddress> <PeerName>
154
Sets the IP address of the other endpoint. One end, the gateway, has a fixed IP address. The other end, the client, has a changing address. When configuring the client, set the peer IP address to the gateways fixed address. When configuring the gateway for aggressive mode, set the IP address to 0.0.0.0. ike peers set secret <secret> <PeerName> Sets the shared secret for the peer. The secret must be identical for both ends.It can be up to 256 characters long; do not use spaces or non-printable characters. ike peers set localid <AggressiveModeID> <PeerName> Sets the local ID. This must match the peer ID on the other end. ike peers set localidtype <IPADDR | DOMAINNAME | EMAIL> <PeerName> Sets the type of the local ID (IP address, domain name, or e-mail address). This must match the peer ID type on the other end. ike peers set peerid <AggressiveModeID> <PeerName> Sets the peer ID. This must match the local ID on the other end. ike peers set peeridtype <IPADDR | DOMAINNAME | EMAIL> <PeerName> Sets the type of the peer ID (IP address, domain name, or e-mail address).This must match the local ID type on the other end.
The following commands specify the contents of the proposals exchanged. ike proposals set session_auth <PRESHARE> <ProposalName> Proposes the session authentication; preshared key is currently the only option. ike proposals set encryption <DES | 3DES> <ProposalName> Proposes the encryption method used, as follows: DES 3DES Encryption using a 56-bit key. Encryption using three 56-bit keys, thus, producing 168-bit encryption.
ike proposals set message_auth <NONE | MD5 | SHA1> <ProposalName> Proposes the message authentication performed. It can propose no message authentication or authentication using the hash algorithm Message Digest 5 (MD5) or Secure Hash Algorithm-1 (SHA1).
155
ike proposals set dh_group <NONE | 1 | 2 > <ProposalName> Proposes the Diffie-Hellman (DH) key generation group used (no group or group 1 or 2). ike proposals set lifetime <seconds> <ProposalName> Proposes the length of time (in seconds) before the Phase 1 SA expires; the recommended value is 86400 (24 hours). When the time limit expires, IKE renegotiates the connection.
The followings proposals set commands specify the contents of the proposals exchanged. Note: The next three commands (set espenc, set espauth, and set ahauth) determine the encapsulation method (AH or ESP) used and the authentication and/or encryption requested by the proposal. You cannot request both AH and ESP encapsulation in the same proposal. (It is possible for a connection to use two proposals, one that requests AH and the other that requests ESP.) In any one proposal, you can request any one of the following: AH authentication ESP encryption ESP authentication ESP encryption and authentication ike ipsec proposals set espenc <DES | 3DES | NULL | NONE> <ProposalName> Determines whether ESP encryption is requested and, if it is requested, the encryption method used. DES 3DES Use ESP encapsulation and 56-bit encryption Use ESP encapsulation and 168-bit encryption (if 3DES is enabled in the router; see Software Option Keys, page 124.) No encryption, but use ESP encapsulation. Headers are inserted as though the data was encrypted. This allows verication of the source, but sends the data in the clear, increasing throughput. No encryption and no ESP encapsulation. (If you select this option, the encapsulation method must be requested by a set espauth or set ahauth command.)
NULL
NONE
ike ipsec proposals set espauth <MD5 | SHA1 | NONE> <ProposalName> Determines whether ESP message authentication is requested and, if it is requested, the hash algorithm used. MD5 SHA1 Use ESP encapsulation and authenticate using hash algorithm Message Digest 5. Use ESP encapsulation and authenticate using hash algorithm Secure Hash Algorithm-1.
156
NONE
No ESP encapsulation and no ESP message authentication. (If you select this option, the encapsulation method must be requested by a set espenc or set ahauth command.)
ike ipsec proposals set ahauth <MD5 | SHA1 | NONE> <ProposalName> Determines whether AH message authentication is requested and, if it is requested, the hash algorithm used. Note: The proposal cannot request both AH encapsulation and ESP encapsulation. MD5 SHA1 NONE Use AH encapsulation and authenticate using hash algorithm Message Digest 5. Use AH encapsulation and authenticate using hash algorithm Secure Hash Algorithm-1. No AH encapsulation and no AH message authentication. (If you select this option, the encapsulation method must be requested by a set espenc or set espauth command.)
ike ipsec proposals set ipcomp <NONE | LZS> <ProposalName> Proposes either no compression or LZS compression. ike ipsec proposals set lifetime <seconds> <ProposalName> Proposes the length of time (in seconds) before the IPSec SA expires; the recommended value is 86400 (24 hours). When the time limit expires, IKE renegotiates the connection. ike ipsec proposals set lifedata <kbytes> <ProposalName> Proposes the maximum number of kilobytes for the IPSec SA; 0 means unlimited. After the maximum data is transferred, IKE renegotiates the connection. By limiting the amount of data that can be transferred, you reduce the likelihood of the key being broken.
ike ipsec policies enable <PolicyName> Indicates that the specification of this IPSec policy is complete and enables use of the policy. ike ipsec policies disable <PolicyName> Disables an IPSec policy. The following commands define the filtering parameters for the policy. ike ipsec policies set peer <PeerName> <PolicyName> Specifies an IKE peer that may be used for the connection. (The peer must have been defined by IKE peer commands.)
157
ike ipsec policies set mode <TUNNEL | TRANSPORT> <PolicyName> Specifies the encapsulation mode (tunnel or transport) that may be used for the connection. The default is tunnel mode. ike ipsec policies set proposal <ProposalName> <PolicyName> Specifies an IKE IPSec proposal that may be used for the connection. (It must have been defined by IKE IPSec proposal commands.) The policy may allow more than one value for the proposal parameter. For example, two set proposal commands could specify two proposals, either of which could be used by the connection. ike ipsec policies set pfs <none | 1 | 2 > <PolicyName> Sets the Perfect Forward Secrecy negotiation and specifies the Diffie-Hellman group used for each rekey (none or group 1 or 2). Perfect Forward Secrecy increases the security of the key exchange; compromise of a single key permits access to only the data protected by that particular key. However, the additional encryption slows the IKE process so it is not always desirable. ike ipsec policies set source <IPaddress> <IPmask> <PolicyName> Requires that the data come from the specified source IP address and mask. ike ipsec policies set dest <IPaddress> <IPmask> <PolicyName> Requires that the data be intended for the specified destination IP address and mask. ike ipsec policies set translate on | off <PolicyName> Determines whether the router applies NAT (network address translation) before the packets are encrypted by IPSec. If translate is set to on, the packets are sent using the host routers public IP address. The remote must have IP address translation enabled (see NAT on page 95). The address that NAT translates to should be the source or destination address for the policy (use the set source or set dest commands). ike ipsec policies set protocol <ProtocolNumber | TCP | UDP | *> <PolicyName> Requires a specific protocol that must be used or allows any protocol (*). ike ipsec policies set sourceport <PortNumber | TELNET | HTTP | SMTP | TFTP | *> <PolicyName> Requires a specific source port for the data or allows any source port (*) (Because port numbers are TCP and UDP specific, a port filter is effective only when the protocol filter is TCP or UDP.) ike ipsec policies set destport <PortNumber | TELNET | HTTP | SMTP | TFTP | *> <PolicyName> Requires a specific destination port for the data or allows any destination port (*). (Because port numbers are TCP and UDP specific, a port filter is effective only when the protocol filter is TCP or UDP.) ike ipsec policies set interface <interface> <PolicyName> Requires a specific interface that must be used or allows all interfaces (all). The policy is only used when the specified interface is connected. The specified interface must be the interface to the IKE peer.
158
The configuration sets up a secure connection between the two routers across a public network, thus, the routers are identified by their public IP addresses on the ike peers commands. The packets that are transmitted through this secure connection are from devices in the home office and branch office networks. These networks use private addresses, and thus the packets contain private IP addresses. The ike ipsec policies commands specify these private source and destination addresses. This is the file for the home office router:
# Home office example using IKE # Home router private network addresses are 192.168.16.X # Home router public address is 192.168.17.200 # Branch router private network addresses are 192.168.19.X # Branch router public address is 192.168.18.201
# Describe the branch office peer # IKE main mode is used because the branch office has a fixed IP address # (192.168.18.201). The shared secret is ThisIsASecret12345;) ike peers add branch_peer ike peers set mode main branch_peer ike peers set address 192.168.18.201 branch_peer ike peers set secret ThisIsASecret12345;) branch_peer
159
# MD5 authentication # Diffie-Hellman group 2 key exchange # 24-hour timeout # Unlimited data ike proposals add branch_proposal ike proposals set encryption des branch_proposal ike proposals set message_auth md5 branch_proposal ike proposals set dh_group 2 branch_proposal ike proposals set lifetime 86400 branch_proposal
# Describe the desired IPSec connection # Triple-DES encryption # SHA1 authentication # 30-minute timeout # Unlimited data ike ipsec proposals add branch_ipsec_prop ike ipsec proposals set espenc 3des branch_ipsec_prop ike ipsec proposals set espauth sha1 branch_ipsec_prop ike ipsec proposals set lifetime 1800 branch_ipsec_prop ike ipsec proposals set lifedata 0 branch_ipsec_prop
# Describe the packets to be encrypted # All packets from network 192.168.19.0/24 to network 192.168.16.0/24 ike ipsec policies add branch_policy ike ipsec policies set source 192.168.16.0 255.255.255.0 branch_policy ike ipsec policies set dest 192.168.19.0 255.255.255.0 branch_policy ike ipsec policies set peer branch_peer branch_policy ike ipsec policies set proposal branch_ipsec_prop branch_policy
160
# Describe the home office peer # IKE main mode is used because the home office has a fixed IP address # (192.168.17.200). The shared secret is ThisIsASecret12345;) ike peers add home_peer ike peers set mode main home_peer ike peers set address 192.168.17.200 home_peer ike peers set secret ThisIsASecret12345;) home_peer
# Describe the home office IKE phase 1 connection # DES encryption # MD5 authentication # Diffie-Hellman group 2 key exchange # 24-hour timeout # Unlimited data ike proposals add home_proposal ike proposals set encryption des home_proposal ike proposals set message_auth md5 home_proposal ike proposals set dh_group 2 home_proposal ike proposals set lifetime 86400 home_proposal
# Describe the desired IPSec connection # Triple-DES encryption # SHA1 authentication # 30-minute timeout # Unlimited data ike ipsec proposals add home_ipsec_prop ike ipsec proposals set espenc 3des home_ipsec_prop ike ipsec proposals set espauth sha1 home_ipsec_prop ike ipsec proposals set lifetime 1800 home_ipsec_prop ike ipsec proposals set lifedata 0 home_ipsec_prop
# Describe the packets to be encrypted # All packets from network 192.168.16.0/24 to network 192.168.19.0/24 ike ipsec policies add home_policy ike ipsec policies set source 192.168.19.0 255.255.255.0 home_policy ike ipsec policies set dest 192.168.16.0 255.255.255.0 home_policy ike ipsec policies set peer home_peer home_policy ike ipsec policies set proposal home_ipsec_prop home_policy
161
save reboot
To change the main mode configuration to an aggressive mode configuration, you only need to change the ike peers commands. All the other IKE commands remain the same. Change the mode to aggressive and change the address of the router that has no fixed address to 0.0.0.0, and specify either its e-mail address or domain name. Note: Remember to save and reboot each router after entering the configuration changes. Change the ike peers commands in the home office router configuration to the following:
#Describe the branch office peer #IKE aggressive mode is required because the branch office does not have #a fixed IP address. The shared secret is ThisIsASecret12345;) ike peers add branch_peer ike peers set mode aggressive branch_peer ike peers set address 0.0.0.0 branch_peer ike peers set secret ThisIsASecret12345;) branch_peer ike peers set peeridtype domainname branch_peer ike peers set peerid branchoffice.big.com branch_peer ike peers set localidtype ipaddr branch_peer ike peers set localid 192.168.17.200 branch_peer
Change the ike peers commands in the branch office router configuration to the following:
#Describe the home office peer #IKE aggressive mode is required because the branch office does not have #a fixed IP address. The shared secret is ThisIsASecret12345;) ike peers add home_peer ike peers set mode aggressive home_peer ike peers set address 192.168.17.200 home_peer ike peers set secret ThisIsASecret12345;) home_peer ike peers set peeridtype ipaddr home_peer ike peers set peerid 192.168.17.200 home_peer
162
ike peers set localidtype domainname home_peer ike peers set localid branchoffice.big.com home_peer
IPSec Commands
The following commands allow you to define an IPSec connection without IKE. Note: If you define a tunnel using IPSec commands, the keys will remain static. This could pose a security risk and is not recommended. Use of IKE for key management is recommended. ipsec flush ipsec add <SAname> ipsec del <SAname> ipsec list [<SAname>] ipsec enable <SAname> ipsec disable <SAname> Clears all IPSec definitions. Defines an SA name. Deletes an existing SA. Lists one or all SA entries. Enables a defined SA entry. Disables a defined SA entry.
The following commands define parameters for the specified Security Association (SA). ipsec set mode <TUNNEL | TRANSPORT> <SAname> Requests the encapsulation mode (tunnel or transport) for the SA. The default is tunnel mode. ipsec set direction <INBOUND | OUTBOUND> <SAname> Defines the direction of the SA. ipsec set gateway <IPaddress> <SAname> Defines the IP address of the gateway. ipsec set encryption <NULL | DES-CBC | 3DES> <SAname> Selects no encryption, DES (56-bit) encryption or 3DES (168-bit) encryption. ipsec set authentication <SHA1 | MD5> <SAname> Selects authentication using either SHA-1 (Secure Hashing Algorithm 1) or MD5 (Message Digest 5) ipsec set enckey <key> <SAname> Specifies the encryption key (in hexadecimal, 64 bits for DES or 192 bits for 3DES). ipsec set authkey <key> <SAname> Specifies the authentication key (hexadecimal). ipsec set ident <ident> <SAname>
163
Specifies the identifier (SPID) for the IPSec tunnel. It must match the SPID at the other end of the tunnel, that is, the tx SPID on this end must match the rx SPID on the other end. ipsec set service <ESP | AH | BOTH> <SAname> Selects the authentication and/or encryption services used: AH authentication, ESP encryption, or both ESP encryption and ESP authentication (encryption applied first and then authentication). ipsec set compression <NONE | LZS> <SAname> Selects either LZS compression or no compression.
164
SNMP Support
SNMP (Simple Network Management Protocol), a member of the TCP/IP protocol suite, was designed to provide network management interoperability among different vendors management applications and equipment. SNMP provides for the exchange of messages between a management client and a management agent. The messages contain requests to get or set variables that exist in network nodes, thus allowing a management client to obtain statistics, set configuration parameters and monitor events. These variables (or objects) are defined in Management Information Bases (MIBs), some of which are general or standard SNMP-defined bases. Other bases, such as Enterprise Specific MIBs are defined by different vendors for specific hardware. The router provides SNMP agent support and support for standard as well as Enterprise Specific MIBs. SNMP is also used internally for configuration of the router. The active SNMP agent within the router accepts SNMP requests for status, statistics, and configuration updates. Communication with the SNMP agent occurs over the LAN or WAN connection. The supported MIBs and a description of their contents are listed in the following table: MIB II Bridge MIB Ethernet MIB IP Forwarding MIB PPP MIB For LCP Enterprise MIB for conguration Internet-standard MIB contains only essential elements such as system, interface, addressing, protocol (e.g., IP) and SNMP objects State/statistics (including spanning tree states) within bridging system State/statistics of Ethernet port (e.g., collisions) State of routing tables (updates MIB II) State/statistics for each PPP link Router-specic objects for conguration purposes
Any management application using SNMP over UDP/IP has access to the local SNMP agent. SNMP network management tools vary but often have features to display network maps of SNMP nodes, poll nodes at intervals,
165
trigger alarms on thresholds, graph or list node statistic counters, view and edit individual MIB variables, and print reports. An example of useful information that can be obtained from a remote SNMP client would be the current status of the routers WAN link and Ethernet interfaces, including protocol (PPP, CSMA-CD), line speed, maximum frame (transmission unit) size, physical address, operating status, or packet traffic rates.
TFTP Server
The TFTPD (Trivial File Transfer Protocol Daemon) program is installed on your PC as part of the DSL Tools software. TFTPD waits for incoming TFTP requests from TFTP clients. It can put a file on your computers hard disk or get one from it. Because there is no security built into TFTPD, it is important to specify a root directory where all accessible files are located. When a file is requested, it must be at or below the level of this root directory on your directory tree or the request is denied. If a TFTP client attempts to put a file on your PC, the file must already exist for writing. The Options menu of the TFTPD program allows the user to configure additional parameters, such as the number of retries and the time between retries. The root directory can also be specified from the Options menu. The DOS command line usage for TFTPD is:
166
TFTPD rootdirectory The TFTPD operational parameters are kept in file ROUTER.INI in the form: rootdir=rootdirectory retries=maxtries timeout=timeout TFTPD is automatically called by BootP and Configuration Manager.
BootP Service
This section first discusses what BootP is and then describes the BootP service available from the router.
BootP Concepts
BootP refers to the Bootstrap Protocol. In general, BootP requests have these purposes: To obtain an IP address to use. To obtain a TFTP server address and file information to continue the booting up process.
For example, a diskless workstation could use a BootP request to get an IP address for itself, the TFTP server address where it is to get the kernel it is to load and run, and the file name of that kernel. A BootP server waits for incoming BootP broadcasts from BootP clients. The server looks up the MAC addresses of the incoming BootP request in its database. If the MAC address is found, the server normally responds to the requestor with an IP address. It may also respond with boot information, that is, the IP address of a TFTP server, and the name of a file.
167
Syslog Client
The router can act as a Syslog client, automatically sending system event messages to one or more Unix Syslog servers. (For example, if you request an IP filter watch, the messages are sent to the Syslog servers; see ETH IP FILTER, on page 270.) Messages generated by the router and sent to a Syslog server are sent to facility local0 with priority notice. To send messages to Syslog servers, the router must know: The Syslog port number, and The IP address(es) of the Syslog servers.
To disable, re-enable, or redefine the Syslog port, use the command system syslogPort (page 259). The router can learn the IP addresses of Syslog servers in two ways: Via DHCP. The router can, under certain circumstances, send out a DHCP message and learn the IP address(es) of Syslog servers. For more information, see DHCP Client Requests, on page 85. By explicit configuration. To configure the IP address of a Syslog server, use the command system addSyslogServer (page 235).
You can limit the Syslog server addresses that the router learns through DHCP. To do so, set a filter for valid Syslog server addresses using the command system addSyslogFilter (page 234).
168
The next section describes the purpose and functions of the boot code. The section following it, Manual Boot Mode, on page 170, describes a menu of manual boot options. Note: For routers with a reset button, see Recovering Kernels for Routers with a Reset Button, on page 181.
The boot code communicates to the application it launches (usually, the kernel) information about the hardware capabilities of the router model, including the amount of RAM, the flash memory available for the file system,
169
ports (Ethernet, xDSL, etc.), the CPU type, and clock speed. It continues to provide basic I/O services to the launched application, including the erasure and programming of flash memory.
The router enters manual boot mode if either the kernel is not found in flash memory or a Bootp load from the network fails. Note: If the router has configuration (dip) switches on its back panel, you can select manual boot mode by setting switch 6 down and rebooting or powering up the router. To return to automatic boot mode, set switch 6 up and reboot by selecting menu option 1, 2, 3, or 4. In manual boot mode, the router displays this menu of options:
1. 2. 3. 4. 5. 6. 7. 8. Retry start-up Boot from Flash memory Boot from network Boot from specific file Configure boot system Set date and time Set console baud rate Start extended diagnostics
Enter selection:
170
Once you have installed router software on a network TFTP server, you can have the router boot across the LAN. Option 3 requests a manual boot from the network. It uses the network boot parameters you have defined using option 5. If you have not defined network boot parameters, the router attempts to locate a BOOTP or RARP server on the network. BOOTP can be used to supply an IP address, a TFTP server IP address, and a file name. RARP can obtain an IP address, if it knows the MAC address. The router assumes that the RARP server is also capable of performing the duties of a TFTP server and so the router requests the file KERNEL.F2K (or the filename assigned when permanent network boot parameters are set.)
If a BOOTP or RARP server exists and is properly configured with the routers MAC address, the router boots from the network. If the boot from the network is unsuccessful, the router returns to manual boot mode.
1.
Select options 2, 3, and 4 to set the three boot parameters (boot IP address, TFTP boot server address, and router software file name on the server). To reset any parameter, press enter following the prompt. The boot IP address is the router LAN IP address used during the boot procedure. This address may differ from the LAN IP address that the router is ultimately assigned. This address is different so that a system can be booted from one subnetwork and then moved to its operational network, if necessary.
171
The TFTP boot server address is the LAN IP address of the boot server (4 decimals separated by periods). Note: Once you have set a TFTP server address, it is assigned to the router software TFTP facility. This server address is then used whenever a server address is not explicitly specified, including when the copy command is in the form: copy tftp:filename kernel.f2k The router software file name must be in the format: yyyyyyyy.yyy (similar to the DOS filename format). 2. Set the boot procedure order. You can specify whether the router boots from flash memory first, from a network TFTP server first, or never automatically reboots. a. Select step 1 under Configure Boot System, option 5. b. To boot from flash memory first, select option 1; To boot from the network first, select option 2. If you select option 3, the router will always go into manual boot mode; that is, you must always select the boot procedure to be performed. 3. Select option 4 to Boot through the IP gateway. In this procedure, the router on the local LAN can boot from a boot server that is not connected directly. Instead, the path to the boot server can include other networks (including the WAN, if adequate routers exist). The gateway must be located on the local LAN and be reachable by the local router. (Model 5950 only). On the model 5950, you can boot from either of two files in flash memory. This can be used to run a test kernel and back up the previous version. Thus, if you select option 5, you see this prompt:
Enter the file name you want to boot from [kernel.f2k]:
4.
Enter the file name after the prompt (for example, test.bin).
172
Select option 8 to run extended diagnostics. Boot diagnostics are only available on routers with the MC68EN360 processor. These diagnostics run automatically when you power up or reboot the router. You may want to run extended diagnostics if you suspect a hardware problem. When you select option 8, the following menu is displayed:
[1] [2] [3] [4] [5] [6] [7] [8] [9] [a] [b] [-] [+] [.] [#] [/] DRAM test Parity test POST firmware CRC test Real-Time Clock chip test Timers and Interrupts test Multi-port UART (internal loopback) test Multi-port HDLC (internal loopback) test SCC2 External Loopback test SCC3 External Loopback test SCC4 External Loopback test Ethernet Transceiver (internal loopback) test Deselect all tests Select all tests Run selected tests Enter debugger Exit extended diagnostics (reboot)
Enter the number of each test that you would like to run, or select all tests (+). Then enter . (period) to begin diagnostic testing. The debugging mode (option #) is available for use primarily when you encounter a serious problem, in consultation with customer support services.
173
The error patterns are listed in the following table. (Any other pattern of flashing LEDs indicates an internal error. Should this occur, return the router to the factory for repair or replacement.) VOICE or LAN Fatal Error Off Blinking green Boot ASIC Load error or CPM failure Timer failure or Bad FCS DRAM failure or Interrupt failure SCC failure or Manufacturing information error CPU step failure or Ethernet loop failure Wait stuck in the boot menu; kernel le could be missing. The router is issuing BootP requests (10-second blink).
Blinking Off green Blinking Blinking green green Off Off Off
Blinking Off amber Fast blink Off green Blinking Off green
174
Blinking Off green Blinking Off green Blinking Blinking green green Off Off Off Off
DRAM failure Interrupt failure SCC failure CPU step failure Ethernet loop failure Wait stuck in the boot menu; kernel le could be missing. The router is issuing BootP requests (10-second blink).
Blinking Off amber Blinking Off amber Fast blink Off green Blinking Off green
175
Upgrade Instructions
Read the following steps very carefully before you perform an upgrade: 1. Warning: Before performing this procedure, make sure that you can successfully boot from the network using the manual boot procedure option 3 or 4. Refer to the section Option 3: Boot from Network, on page 170. Copy the router software file KERNEL.F2K (or KERNEL.FPL for an IDSL router) to a directory where it can be accessed by a TFTP server. The TFTP server must be on the same LAN as the target router; i.e., there must not be a router or gateway between the target system and the TFTP server. If the TFTP sever is not on the same network as the target router, enter the gateway from the boot menu as described in the previous section.
2.
176
3. 4.
Log into the Command Line Interface. Enter the reboot command to synchronize the file system and reboot the router. Because the kernel is no longer stored in flash memory, the router tries to boot from the network. If you have never set permanent boot parameters, the router attempts to locate a BOOTP or RARP server. If the router successfully reboots from the server, go to step 7. Select option 4 to boot router software from the TFTP server using temporary network boot parameters. You are prompted for: the routers boot LAN IP address, the TFTP servers IP address, the load address, and the filename of the routers kernel saved on the server.
5.
6.
Note that the LAN IP address is the proper address to use during the network boot and this may differ from the IP address ultimately assigned to the router. Enter the temporary network boot parameters (hit the return key for the load address). If all entered information is valid, the router boots from the network. An example follows:
Enter selection: 4 Enter my IP address: 128.1.210.65 Enter server IP address: 128.1.210.70 Enter load address [80100]: Enter file name: kernel.f2k
Alternatively, select option 5 to set permanent network boot parameters and then boot from the network using option 3. You would use this option if you wish to boot from the network for a period of time before copying the software to flash memory. 7. 8. After the boot is complete, verify that the kernel is running successfully. When you are satisfied that the new kernel is performing as expected, copy the kernel into flash memory in the router by typing the two following commands:
copy tftp@xxx.xxx.xxx.xxx:sfilename kernel.f2k sync
where xxx.xxx.xxx.xxx is the TFTP server IP address, SFILENAME is the server filename of the kernel, and KERNEL.F2K is the name of the file loaded from flash memory by the boot procedure. If you do not specify the server address, a permanent or more recent override TFTP server address will be used, if you have previously defined one. Enter the sync command to commit the changes to flash memory. Warning: After the kernel is copied, do not power down the router until you have issued either a sync or reboot command to reboot the router. Otherwise, the file will not be written to flash memory. 9. After successfully copying the kernel to the router, reset configuration switch 2 or 6 to the up position (if the router has configuration switches). Then reboot the router from flash memory with the reboot command. If you have altered the boot procedure order in any way, reset to boot from flash memory first. Verify the software revision number with the vers command.
177
The system is now ready to be re-configured, if necessary. The configuration files are unchanged by the upgrade process.
178
179
d.
Recreate the configuration files either by re-entering the information or by restoring them from a TFTP server. Re-install the operational software by entering the command:
copy tftp@xxx.xxx.xxx.xxx:kernel.f2k kernel.f2k
This assumes that TCP/IP routing is enabled and that an IP address has been assigned to the Ethernet interface.
180
Note: This IP address needs to belong to the same subnet as your PC and not be used by another device. For a simple configuration, the IP address 192.168.254.254 will work if your PC already received an IP address from the router when it was still functioning.
181
5. 6. 7.
In the BootP Setting dialog box, click OK. Configuration Manager writes the above settings to a file called BOOTDBASE.TXT and calls the Bootp server. Power off the router. Insert a a small pen or pointed object into the small reset switch (unlabeled hole) on the back panel of the router (to the right of the Ethernet hub connector). With the object still inserted in the reset switch, power up the router. Wait until all the LED lights flash (about 10 seconds). Once this is accomplished, the BootP server should receive a BootP request and start the TFTPD server. The TFTPD server will send the kernel to the router. Restart Configuration Manager and try to connect to the router. Using the following instructions, you will attempt to write a new kernel to the flash system.
8. 9.
10. From the Configuration Managers Main Menu, select Tools and Upgrade/Backup. 11. Click Firmware and the Upgrade button. 12. Select a kernel file and click OK. 13. Wait until the file is copied, and click Yes to reboot the rooter.
182
One-time scripts are useful to execute the complete configuration process from a default (unconfigured) state. The following steps describe how to proceed in order to create and execute a one-time script from the Quick Start application. Create the script on your PC using Notepad or another text editor. The command syntax can be found in the Command Line Reference manual or enter ? on the router command line (assuming you have access to the command line with the console or with Telnet). Select the Tools | Execute Script menu item and choose the script file you just prepared. When you click OK, the script file is loaded to the router (under the name AUTOEXEC.BAT) and the router is restarted, thus executing the script.
Alternatively, you can manually transfer the script file from your PC to the router using the following method: Start the TFTP server on your PC and set the root directory where the script file is located. Use the following command to copy the script file to the router file system: copy tftp@ <PC_IP_address>:<PC_file> <router_file> To process the commands in the script file, you can either reboot your router (if the script file was copied under the name AUTOEXEC.BAT onto the router) or use the command execute <filename>.
Note: If present, the file AUTOEXEC.BAT is renamed AUTOEXEC.OLD before it is executed, so that it is only run once. If you clear the router configuration with the Reset Defaults button of the Upgrade/Backup tool or the reboot default command, the AUTOEXEC.OLD is renamed back to AUTOEXEC.BAT and re-run after the boot up, thus restoring your configuration. Caution: The only limitation on commands in a script file is as follows: Do not include the commands rename autoexec.old autoexec.bat and reboot in the same one-time script file (copied to the router under the name AUTOEXEC.BAT). This will result in an endless loop of starting the router, executing the script, restarting the router, re-executing the script. The rename autoexec.old autoexec.bat command is useful if you need the script to execute on every startup. The reboot command is useful to apply changes and have them take effect (almost) immediately.
183
Chapter 7. Troubleshooting
Software problems usually occur when the routers software configuration contains incomplete or incorrect information. This chapter discusses: Diagnostic tools that are available to help identify and solve problems that may occur with your router Symptoms of software configuration problems Actions for you to take System messages
Diagnostic Tools
This section describes three diagnostic tools available to you: The LEDs on the front panel of your router. The History Log that lists the routers activity. The ping command that can verify IP connectivity.
Using LEDs
The specific pattern of LEDs on your router model are described in the User Reference Guide that came with the router. Certain hardware problems can be diagnosed and solved by checking the LEDs. For the LED patterns that indicate fatal boot errors, see Identifying Fatal Boot Failures, on page 173.
The following table summarizes the normal LED sequence in the left column (five consecutive states) from Power On to Ready State. The right column suggests problems reflected by an abnormal LED state (no progression to the next state).
184
Chapter 7. Troubleshooting
Normal LED Sequence PWR - green TEST - amber LINK or WAN - off All lights flash
Problem If the LED sequence stops at this stage: A hardware problem has been detected. Contact Technical Support.
1 sec
State 3
PWR - green TEST - green LINK or WAN - off PWR - green TEST - green LINK or WAN amber (no signal), blinking amber (signal), blinking green (training) PWR - green TEST - green LINK or WAN - green
5 sec
1. Check that the DIP switches are all up. 2. Check that the correct software was loaded. 1. Check your DSL cable. 2. Check the physical connection from your router to the DSLAM (Central Ofce). 3. Possible problem with DSLAM card.
5 to 10 sec
State 4
State 5
Ready State
If the normal heartbeat of the TEST LED stops, it indicates that the router is locked up and you need to cycle power to reset it. To read about SDSL router LEDS, see SDSL Line Activation, on page 342.
History Log
The History Log utility is a troubleshooting tool which displays the routers activity. It can be accessed from a terminal emulation session (including Configuration Manager) or from Telnet. To see message explanations, refer to the System Messages section, page 199.
Chapter 7. Troubleshooting
185
1. 2. 3.
Click Connect and then Remote System. Enter the routers IP address. Click Connect.
When you exit Telnet, you automatically stop any logging programs running in that session. Note: History Log is preserved across reboots, but not across power outages or power down.
Ping Command
You can verify IP connectivity to the router by running a ping command. You will probably find a ping utility bundled with your TCP/IP stack. In Microsoft Windows, the command is called PING.EXE and can be found in your Windows directory. The ping command provided with the Command Line Inerface is discussed on page 217. Note: Before using the ping command to troubleshoot, make sure that the PWR, TEST, and LINK lights are green, indicating the ready state.
186
Chapter 7. Troubleshooting
Try to ping the IP address of your router. If you get a response, proceed directly to step 3. If you dont get a response, the problem lies between your PC and router: Check the cables. Check the hub. Make sure that your PC and the local router are in the same IP subnetwork.
3.
Try to ping the DNS server. Write down the results and call your Network Service Provider.
If the factory configuration has a problem: Compare the router configuration with your router order. Verify that the model number is correct (the number is displayed during the boot procedure). The model number and serial number are also displayed on the main window of Configuration Manager.
Chapter 7. Troubleshooting
187
It then gives trouble-shooting advice for: Telephony services (if you have a VoDSL router) L2TP tunnels Dial Backup
Connection Problems
If you cannot connect your PC to the target router for configuration: For a LAN connection, verify that the routers IP address matches the IP address previously stored into the routers configuration. You must have previously set the routers Ethernet LAN IP address and subnet mask, saved the Ethernet configuration changes, and rebooted the router for the new IP address to take effect. Check that your LAN cable is pinned correctly and each pin end is securely plugged in. Note: If you are using a straight-through cable, the colors for pins 1, 2, 3, and 6 should match on both connectors. If you are using a crossover cable, the colors for pins 1, 2, 3, and 6 on one connector should match respectively 3, 6, 1, and 2 on the other connector. Make sure the PC and target router are on the same IP subnetwork or the target router is reachable through a router on your LAN. They can, however, be on different networks if IP routing is off. Check Network TCP/IP properties under Windows 95 and the control panel of the TCP/IP driver installed under Windows 3.1. Check if the LAN LED on the routers front panel blinks when pinged. Check your Ethernet board IRQ settings: the PCs table may have become confused. If so, reboot your PC.
188
Chapter 7. Troubleshooting
1. 2. 3. 4. 5. 6.
Move switches 5 and 6 down. Type login <newpasswd>. Password checking is overridden. Move switches 5 and 6 up. Complete any configuration update that caused the prompt for login. Change your login password to a new password. Store the configuration and reboot the router.
Note: If you do not reset switches 5 and 6 to the up position and then reboot, the router is placed in maintenance mode. Set switches 5 and 6 up and turn the power off and then on again.
TCP/IP Routing
Check that Ethernet LAN TCP/IP Routing has been enabled (eth list command, page 280). The IP addresses of the local and remote networks belong to different IP subnetworks. Make sure that there is an existing route to the remote network. Make sure that there is a route back from the remote network. There must be a source WAN IP address defined if you are using NAT. Check that, if required, the source and remote WAN IP addresses are on the same subnetwork Reboot if you have made any IP address or control or protocol option changes.
Chapter 7. Troubleshooting
189
Check that the IP address of the station/network connected to the LAN beyond the remote router is correct, as well as the associated subnet mask. If the remote router WAN IP address and subnet mask are required, check that they have been specified correctly. Check that a default route has been specified, if needed. Be sure to reboot if IP addresses or control or protocol option changes have been made. Check that you are using an Ethernet cable. Check that IP routing is enabled at both ends. The IP address must be within the valid range for the subnet. Verify that the IP and gateway addresses are correct on the PC. Windows 95 may remember MAC addresses: if you have changed MAC addresses, reboot the router and the PC. In Windows 3.1., check that the TCP driver is installed correctly. Ping (ping command) your PCs IP address from the PC. Successful pinging results let you know that the TCP driver is working properly. If you have changed an IP address to map to a different MAC device, and ping or IP fails, reboot your PC. Use the iproutes command (page 215) to verify which routers name is the default gateway (this cannot be 0.0.0.0).
IPX Routing
Check that IPX routing has been enabled and that the remote end is enabled for IPX routing. Validate that the IPX WAN network number matches the remote routers WAN network number. Check that IPX SAPs correctly identify the servers and applications on the remote network and have valid network numbers, node numbers, etc. Check that every SAP has a router to its internal network. Check that the IPX routes (network numbers, hops, and ticks) seeded into the routing table for network segments and servers beyond the remote router are correct. Validate that the IPX WAN network number matches the remote routers WAN network number. Check that the IPX routes (network numbers, hops, and ticks) seeded into the routing table for network segments and servers beyond the remote router are correct. Check that IPX SAPs correctly identify the servers and applications on the remote network and have valid network numbers, node numbers, etc. Be sure to reboot if IPX addresses, routes, SAPs or control has been changed. If the router fails to negotiate IPX: Make sure that at least one WAN number is not equal to zero at one end of the link. The server must have an IPX route to the remote LAN. The Novell server needs to have burst mode turned on.
190
Chapter 7. Troubleshooting
For Novell 3.12 and later: Client needs VLM.EXE, net.cfg: large Internet packets=ON, Pburst=5
If you cant see the server SAPs: Check the frame types using the eth list command (page 280) and ensure that they are the same on both routers. Check that the Ethernet cable is correctly plugged in. Make sure that the Novell server is up.
Chapter 7. Troubleshooting
191
If you get a call treatment tone (tritone or 3-stage tone, Voice LED is amber), check the following: Voice PVC is not set in the router or is incorrect. WAN link is down (WAN or LINK LED should be solid green when link is up). DSLAM is not provisioned for the second PVC. Voice gateway is not connected or provisioned (Jetstream and Tollbridge gateways). ATM network is down between the DSLAM and voice gateway.
If you hear clicking during heavy data downloads, check that the DSLAM supports quality of service (QoS) and that the ATM switch has the voice PVC provisioned for vRT and the data at a lower priority. You may also be able to reduce or eliminate clicking by adjusting the jitter buffer (see Adjusting the Jitter Buffer, on page 193.) The Port Monitor GUI program can show you the voice PVC and the last event message. Use the Web GUI to verify the VPI/VCI or DLCI numbers for the data and voice connections. Also check loop start (standard phone set) or ground start. These values must match your Network Service Providers values.
For standalone phone verification. (This is for lab or bench verification only.) dsp init noabort dsp cas x dsp ploop x-y dsp init Starts DSP for this test. Connects and rings port x. Connects port x to port y. Reinitializes after testing.
To test a 7461 router, (4-port IAD over ADSL) and disable the failover pots interface type, enter these commands:
dmt dsp dsp dsp dsp to 3600 failover 1 ploop 2-3 tritone off ring 2
192
Chapter 7. Troubleshooting
The first command sets the timeout timer to the maximum (see ADSL DMT Router Debug Commands, on page 206). The other commands disable failover, connect ports 2 and 3, disable the gateway down message so you can hear loopbacked voice, and ring port 3. After port 2 and 3 are connected, you can pass audio between the phones. Enter reboot to reset everything after the test. For ATM routers: atom voicepvc atom voicepvc <x*y> remote setpvc <x*y> <remote> For Frame Relay routers: frame voice frame voice <x> frame stats Displays the voice DLCI. Changes the voice DLCI to the specified number x. Shows LMI statistics. (For a frame stats example, see page 334.) Displays the voice PVC. (0*39 is the default.) Changes the voice PVC to the specified x*y. Changes the PVC for data (usually 0*38).
For a Tollbridge gateway: voice ip cpe voice ip gateway Displays the local IP address, as set by the gateway. Displays the voice gateway IP address, as set by the gateway.
For a Jetstream gateway: voice l2stats voice l2clear Shows AAL2 statistics for control messages. Resets the AAL2 statistic counters to 0.
For an ATM standards-based gateway: voice profile See Changing Your ATM Standard Voice Profile, on page 23.
The following commands allow you to trace all signaling cells sent and received and all encoding changes for voice ports. voice lestrace 1 voice lestrace 0 voice lestrace Enables trace messages to the console. Disables trace messages to the console. Displays trace messages.
To see the CRC and line errors for SDSL, enter: sdsl stats For an sdsl stats example, see page 345.
Chapter 7. Troubleshooting
To display the current jitter buffer, enter the dsp jitter command without its parameter. For example:
# dsp jitter Jitter Buffer: 15 ms usage: dsp jitter <milliseconds 0-60>
Note: Before changing the jitter buffer size, hang up any active phones and close all data transfers. Use this command if you hear clicks or distortion. Increase the buffer size until the problem is corrected. However, do not set the buffer unnecessarily large because that would introduce unnecessary latency and voice delay. The jitter buffer should be set to the best estimate of the effective worst-case jitter in the voice-packet arrival time from the voice gateway. Be aware of the granularity of the setting: for G.711 voice compression, only integer multiples of 5.5 ms can be realized; for G.726, only integer multiples of 11 ms can be realized. Thus, the following table illustrates the difference between the value you specify and the actual holding time for G.711 and G.726. The numbers in parentheses are the number of voice frames held in the jitter buffer. Value Specified 0-5 6-11 12-16 17-22 23-28 29-33 34-39 40-44 45-50 51-55 56-60 Actual (G.711) 5.5 (1) 11 (2) 16.5 (3) 22 (4) 27.5 (5) 33 (6) 38.5 (7) 44 (8) 49.5 (9) 55 (10) 60.5 (11) Actual (G.726) 11 (1) 11(1) 22 (2) 22 (2) 33 (3) 33 (3) 44 (4) 44 (4) 55 (5) 55 (5) 66 (6)
194
Chapter 7. Troubleshooting
l2tp add tunnelAtWork l2tp set chapsecret tunnelsecret tunnelAtWork l2tp set ourtunnelname tunnelAtHome tunnelAtWork l2tp set address 192.168.110.1 tunnelAtWork
Enter these commands at the LNS end (corporate site) for each teleworker:
# Define a remote named lacclient for the tunnel remote del lacclient remote add lacclient remote setpass clientpassword lacclient remote setLAC tunnelAtHome lacclient remote setauthen chap lacclient remote addiproute 192.168.101.0 255.255.255.0 1 lacclient # Define a tunnel named tunnelAtHome. l2tp del tunnelAtHome l2tp add tunnelAtHome l2tp set chapsecret tunnelsecret tunnelAtHome l2tp set ourtunnelname tunnelAtWork tunnelAtHome
2.
If this fails, enter the command traceroute to display the route and then fix the problem. It could be that your service provider or a firewall blocks the ping (port 15xx and 15xx need to be open). Or your company router might need a route defined back to the LNS-defined network. Have someone monitor the LNS router to see if your tunnel call is coming in. Look for password errors or lack of "call from" messages. For example:
4/04/2001-07:48:06:PPP: call from <Chuck> accepted via CHAP on L2TP/2001
3.
4.
To bring up a tunnel, use the command l2tp call tunnelname, or ping an address on the tunneled network. For the example above, you would enter:
ping 192.168.101.1
5.
If the tunnel starts, but you see password errors, fix them and then either restart the remote or reboot the router.
Chapter 7. Troubleshooting
195
1. 2.
Open a Telnet connection to the LNS router and enter the command system log start to see the console messages. After a tunneling attempt, look for console messages like:
04/04/2001-07:48:06:PPP: call from <Chuck> accepted via CHAP on L2TP/2001 04/04/2001-07:48:06:DOD: link to Chuck over L2TP/2001 is now up 04/04/2001-07:48:36:L2TP: Closing tunnel-2 to <Chucks_Tunnel> - NORMAL CLOSE/0
If messages like these are not present, a firewall may be blocking the call. 3. Check your routing table on the LNS.
--> --> --> --> --> --> --> --> --> Gateway 172.17.1.200 0.0.0.0 0.0.0.0 Chuck jeff 0.0.0.0 0.0.0.0 0.0.0.0 Interface ETHERNET/0 ETHERNET/0 ETHERNET/0 MLPPORT/50 [down] [none] [none] [none] Hops 1 NW 1 NW 0 ME 1 FW 1 FW 0 ME 0 ME 0 NW Flags FW PRM RP1 RP2 FW DIR PRM RP2 PRM DOD PRV PRM DOD PRV
# iproutes IP route / Mask 0.0.0.0 /00000000 172.17.1.0 /ffffff00 172.17.1.5 /ffffffff 172.17.19.2 /ffffffff 172.17.19.7 /ffffffff 224.0.0.18 /ffffffff 224.0.0.122 /ffffffff 255.255.255.255/ffffffff
PRM
Each L2TP client should have a line in this table. In this example, the L2TP clients are jeff and Chuck. Note that Chuck's tunnel is up and jeff is down. 4. If the route table appears correct, ping the client L2TP address. For example:
ping 172.17.19.7
5.
You can call the client router with the l2tp call command, but you need to set an IP address for the client first in the LNS using the command l2tp set address <ipAddr> <TunnelName>. For example:
l2tp set address 192.168.53.225 jeffs_tunnel remote restart jeff
Use the iproutes command to check the new entry in the route table:
192.168.53.225 /ffffffff --> 172.17.1.200 ETHERNET/0 1 FW PRM PRV
196
Chapter 7. Troubleshooting
Now issue the l2tp call command to see if there are password errors. For example:
# l2tp call jeffs_tunnel 04/06/2001-14:07:05:L2TP: tunnel-1 to <jeffs_Tunnel> opened
6.
Use a traceroute command to the client WAN address to check that your company routers can access the public address of the client router.
# traceroute 192.168.53.225 1: 172.17.1.200 2: 172.17.1.100 3: 12.39.98.101 4: 12.124.40.65 5: 12.123.13.170 6: 12.122.5.150 7: 12.123.13.65 8: 12.123.221.2 9: 207.88.240.113 10: 64.220.0.17 11: 64.0.0.98 12: 198.68.76.55 13: 205.158.11.26 14: reply from 192.168.53.225: bytes=56 (data), time=54 ms traceroute: packets sent 14, packets received 14
7. 8. 9.
If you have another tunnel, ping that address to check that the company LAN is ok. This worked so, something is wrong with Jeff's configuration. Telnet to the box to check his settings. Do a save and reboot on all routers to be saved. Enter the command l2tp list. The following shows the display for an active tunnel:
INFORMATION FOR <jeffs_Tunnel> type................................. L2TPClient (LAC-will not dial out)/LNS All Incoming Calls Tunneled here..... no CHAP challenge issued................ yes hidden AVPs used..................... yes sequencing/pacing.................... sequencing sequencing/pacing is............... required sequencing/pacing negotiation...... rfc compliant window size for sequencing/pacing.. 20 ip address........................... 192.168.53.225 tunnel timeout in seconds............ default (60) Our host name........................ efficient Our tunnel name...................... jeffs_Tunnel
Chapter 7. Troubleshooting
197
current state...................... ESTABLISHED LOCAL TUNNEL ID.................... 2 REMOTE TUNNEL ID................... 2 remote vendor...................... Efficient 5871 IDSL Router(120-5871-001/2) remote firmware.................... 0 remote ip address.................. 192.168.53.225 LAC SESSION serial number.......... 1 current state.................... ESTABLISHED LOCAL CALL ID.................... 1 local window size.............. 20 sequencing/pacing.............. SEQUENCING sequencing/pacing is......... required REMOTE CALL ID................... 1 remote window size............. 0
Operational Stability
If pings are failing, lower the success rate. For example, the following command lowers the success rate to 25%: system backup successrate 25
198
Chapter 7. Troubleshooting
Or, eliminate pinging as a failure criteria; use the DSL physical layer is the only failure criteria. To do so, enter this command: system backup delete all all Note that a Dial Backup session on the modem should time out after the PPP timer expires. When the Dial Backup retry timer expires the modem is disconnected even if there is traffic on the modem.
Debugging Procedures
When Dial Backup is enabled, the console port cannot be used to view log messages. So, to see messages, Telnet to the unit and enter the command: system log start Use the Windows GUI Port Monitor to display the line status. Other useful commands for monitoring Dial Backup status include: ifs ipRoutes Shows status of all interfaces. Shows current routes in IP routing table.
system list Shows ping attempts and success rates. To temporarily stop Dial Backup, use these commands: remote disable <remoteName> Stops modem dialing (specify the Dial Backup remote entry). system backup disable Turns off Dial Backup.
System Messages
System messages are displayed on the terminal and sent to a log file (if you have opened one). The messages listed in this section are time-stamped informational and error messages. The messages are in the following format:
dd+hh:mm:ss:nn sysfunc: message
date in xx/xx/xx format as specied during router initialization time in military format (hours:minutes:seconds:hundredths of seconds) software function message
Time-Stamped Messages
Chapter 7. Troubleshooting
199
Authorization failed
Explanation: PAP cannot be negotiated.
Can't obtain an IP address from <router/user>: one is needed in single user mode
Informative message.
Data Mode
Explanation: The connection is established and operational.
200
Chapter 7. Troubleshooting
Idle
Explanation: Data is not being transmitted.
PPP: Peer not negotiating <IP | BNCP | IPX | CCP> right now
Explanation: One end of the network is not negotiating the same protocol as the other end.
Chapter 7. Troubleshooting
201
Explanation: The remote end has used an invalid password during CHAP or PAP security authentication.
Startup failed
Explanation: The ATM modem could not synchronize with the remote end. Call Technical Support.
TelnetD
Explanation: Connection accepted. A remote configuration session has been established.
202
Chapter 7. Troubleshooting
Debugging Commands
The following commands may be available for debugging purposes. Please use them with caution because they are not fully supported.
Chapter 7. Troubleshooting
203
system supporttrace Dumps all tables. If you capture and send this output to Technical Support, it can be useful in debugging problems. For more information, see SYSTEM SUPPORTTRACE, on page 253. The information dumped includes the history log and information about the version, memory, processes, the file system, general system information, Ethernet, DHCP, Voice, remote database, interfaces, bridging, the ARP table, IP routes, IPX routes, IPX SAPs, L2TP tunnels, and IP filters.
In this case, an ATM VPI*VCI is found for which there is no remote defined. 1 is the number of the VPI as found in the ATM stream. 2 is the number of the VCI as found in the ATM stream. The discovered number may be used as the VPI*VCI value in the remote, for determining whether communications are possible. atom echoPVC <vpi number>*<vci number> Enables an echo PVC (use atom echo 0*21). This is configured automatically and can be disabled with atom echo 0*0. The echoPVC will echo back any ATM cell received on the PVC exactly as received. This is useful when an administrative service wishes to ensure ATM connectivity but cannot use ATM OAM F5 cells to achieve this function. atom dumpunknowncells [on | off] Without its parameter, the command indicates whether unknown cell tracing is on or off. Set to on, the trace looks at the content of an ATM cell. It will not affect normal operation performance. atom pls <on | off> Changes payload scrambling. atom empty <ATMF | ITU> Changes type of ATM empty cell sent or expected. It is useful if ATM sync delineation errors when combined with atom stats command.
204
Chapter 7. Troubleshooting
password.html Change administrative password. newpass.html strings.html time.html reboot.html default.html factory.html Password redirection page String table for the tools module Set router clock. Reboot the router. Reboot the router, restoring to defaults. Reboot the router, erasing all configuration information.
Input Signal Level Input DC Offset Signal Attenuation (Cald at 1168 Kbs) Noise Margin Timing Recovery Control Bit-Pump Status Bit-Pump Present Self Test Read Register Big-Pump Configuration Stage Number AAGC
Chapter 7. Troubleshooting
205
sdsl bts felm Displays Far-End Signal Attenuation. It gives an estimate of the length of the loop. Output example: SDSL: FELM: 63 [0x3f] sdsl bts nmr Displays noise margin. Large values are symptoms of a bad or excessively lengthy loop. Output example: SDSL: NMR: 224 [0xe0] sdsl states trace [<all>] Turns on trace of line changes. To turn off the trace, append all to the command. Example:
# sdsl states trace SDSL State Trace [00000001]: states => s # sdsl states trace all SDSL State Trace [00000000]: off
sdsl huh
dmt link <DEFAULT | T1_413 | G_DMT | G_LITE | MULTIMODE> Sets the link type. It is used to force the CPE into ANSI (T1.413), G_DMT, or G_LITE mode. DEFAULT and MULTIMODE are the same. The link type survives reboots.
206
Chapter 7. Troubleshooting
Prints the log file. Shows the modem status. Displays the speed of the link. Displays the code version of line driver. The following is an output example :
Version: FW: dmt-nt.bin -- 28 May 100 10:05 [249176] ATU-R: 255 [0xff] ATU-C: Not Available 3.6.70
ADSL modem timer commands: The timer is started when the modem tries to activate and is stopped after a successful activation, or when it expires, whichever comes first. This stuck condition increments the retry counter. If this "stuck" condition occurs the allowed number of retries (consecutive, or not), the modem is reset (and the retry count reset to 0.) dmt retries <n> Sets number of activation failures before the modem is reset (1 - 10000). The default is 10. dmt to <sec> Sets timeout timer (30 to 3600 seconds). The default is 45 seconds.
The timeout changes take effect immediately and are not saved to flash memory. Save your changes if you want to keep them after the next power cycle.
atom cellrx <on | off>Traces ATM cells received. atom tx <on | off> atom stats <n> Traces ATM cells sent. Prints the ATM statistics every n seconds. It shows good and bad cells and frames.
Chapter 7. Troubleshooting
207
Prints a message to the console if a packet to or from this remote is dropped or rejected.
To determine how to contact Technical Support, see the User Reference Guide and Customer Release Notes that came with your router or refer to the web site www.efficient.com.
208
Chapter 7. Troubleshooting
DHCP commands L2TP commands Bridge filtering commands PPPoE commands IPSec commands (ike and ipsec)
Command Conventions
The Command Line Interface (CLI) follows these conventions: Command line length may be up to 120 characters long. The Command Line Interface is not case-sensitive except for passwords and router names. All parameters are positional; i.e., each keyword/parameter must be entered in the correct order, as shown in the command format in this manual.
The command formats shown in this manual follow these conventions: Items that appear in bold type must be typed exactly as they appear.However, commands can be shortened to just those characters necessary to make the command unique. Items that appear in italics are placeholders representing specific information that you supply. Parameters enclosed in the characters < and > must be entered. Parameters enclosed in the characters [ and ] are optional.
209
Sample command responses are shown in this chapter. In many cases, only the command prompt # is returned. If you have not entered the correct parameters, the syntax of the command is displayed.
? OR HELP
To see the available top-level commands, enter ? or help. To see the subcommands for a top-level command, enter the top-level command followed by a ?. To see the syntax of a subcommand, enter the subcommand followed by a ?. Note: If the first parameter for a command is a character string, the ? will be taken as the character string if entered in that position. ? or help Examples:
# ? Top-level commands: ? help filter logout reboot mem copy dir rename execute sync msfs date time iproutes arp pxsaps bi eth save key remote ping traceroute dhcp l2tp ipsec ike dmt # time ? Usage: time HH:MM:SS
version exit ps delete format ifs ipifs ipxroutes system erase call tcp pppoe atom
Status Commands
The commands in this section are online action and status commands. They allow you to perform the following functions: log into and log out of configuration update mode display the routers configuration, the version and level numbers list running tasks, memory, and communication interfaces connect to a remote router to test the line list IP routes, IPX routes and SAPs, and root bridge save the new configuration image reboot the system
210
ARP DELETE
Deletes the IP address of the entry in the ARP table. arp delete <ipaddr> | all ipaddr all Example: IP address in the format of 4 decimals separated by periods. Deletes all existing arp table entries
arp delete 128.1.2.0
ARP LIST
Lists Address Resolution Protocol (ARP) table entries in an IP routing environment. ARP is a tool used to find the appropriate MAC addresses of devices based on the destination IP addresses. arp list <ipaddr> <InterfaceName> <InterfaceUnit> ipaddr InterfaceName InterfaceUnit Example: IP address associated with a MAC address for a device on the local interface in the format of 4 decimals separated by periods. MAC address on the local network For an Ethernet interface, this can be a 1 or 0. For a DSL interface, this is a VPN number.
arp list
Response:
IP Addr 192.84.210.148 Mac Address 00:05:02:00:80:A8 Interface ETHERNET/0
BI
Lists the root bridge, and indicates whether the router is learning, listening, or forwarding. bi Response:
# bi GROUP 0Our ID=8000+00206f0249fc Root ID=8000+00206f0249fc Port ETHERNET/0 00+00 FORWARDING
211
BI LIST
Lists the contents of the bridge table. Each MAC address in the table is listed with its corresponding bridge port as learned by the bridge function. The line also shows the number of seconds elapsed since the last packet was received by the MAC address followed by flags. Possible flags include: P FLD US A FWD BC MC . bi list Example:
# bi list BRIDGE GROUP 0: 00206F024C34: 0180C2000000: FFFFFFFFFFFF: 02206F02E70D: ETHERNET/0 00C04F2E1AEB: ETHERNET/0 0060081BD761: ETHERNET/0
Permanent (This entry is not aged out of the table.) Flood This entry is for the target router. Accept Forward Broadcast Multicast
MC BC MC
CALL
Dials a remote router. This command can be used to test the ISDN link or L2TP secession and the configuration settings for the remote router. call <remoteName> Response:
# Request Queued
DATE
Displays or changes the current date on the routers clock. To change the current time, use the command time (page 224). Automatic SNTP requests are generated if the system needs to get the time. You can specify an SNTP server using the command sntp server (page 223) and a UTC offset with the command sntp offset (page 221). To see the current date and time on the router clock, enter date with no parameters. date <mm/dd/yy>
212
mm dd yy Example:
Month (1 - 12). Day of the month (1 - 31). Year (1-4 digits, indicating a year from 1968 through 2034). Thus, 1/1/4 is January 1, 2004, 1/1/33 is January 1, 2033, and 1/1/78 is January 1, 1978.
# date 5/2/1 Time set to UTC-420, 5/2/2001 at 15:52:49 Time adjusted for (-) 0 days 11 hours 49 minutes 34 seconds
ERASE
The erase command erases the entire routers configuration or parts of it from FLASH memory. You will need to completely reconfigure any part of the configuration that you erase. Note: An erase command does not take effect until after a reboot without a save command Note: There is a time lag between the response issued by the erase command and the time that the data is actually deleted from FLASH memory. Issue a sync command after an erase command before powering off the router. This commits the changes to FLASH memory. erase all | keys | dod | sys | eth | filter | ipsec | ike | atom | sdsl | idsl | frame | dhcp | atm25 | l2tp | sntp Examples:
erase erase all
Same as erase all. Erases the entire router configuration from FLASH memory, including settings for the system, Ethernet LAN, DSL line, DHCP, and remote router database. Erases the ATM configuration settings. Erases the DHCP configuration settings from FLASH memory. To clear all DHCP information without erasing FLASH memory, use the command dhcp clear all records (page 354). Erases the current state of the remote router database. Erases the configuration settings for the Ethernet LAN from FLASH memory. Erases the current bridging filtering database from FLASH memory.When you issue this command you must reboot (without a save). Erases the software option keys from FLASH memory. Erases the name, message, and authentication password system settings from FLASH memory.
213
EXIT
Has the same function as logout, but will disconnect you from a Telnet session. exit
IFS
Lists the communication interfaces installed in the router and the status of the interfaces. ifs Example:
ifs Interface Speed ETHERNET/0 10.0mb SHDSL/0 384kb ATM-VOICE/1 384kb BACKUP/0 57kb CONSOLE/0 9600 b VOX-STRM/0 0 b In % 0%/0% 50%/50% 45%/45% 0%/0% 0%/0% Out % Protocol 0%/0% (Ethernet) 50%/50% (ATM) 0%/0% (ATM) 0%/0% (AHDLC/PPP) 0%/0% (TTY) (CLEAR) State OPENED OFF OFF OPENED OFF OFF Connection
to backup
WAN layer 2 virtual circuit Dial Backup modem Voice over DSL Serial port Streaming voice control channel
In% Out%
Downstream and upstream percentages. The first percentage is an instantaneous value taken every second. The second percentage is the weighted average over 5 seconds using the formula: current avg = (4 * old average + instant value)/5
Protocol
Protocol in use, such as frame relay (FR), asynchronous PPP (AHDLC/PPP), and serial (TTY).
214
State
Current state of the interface. OFF STANDBY OPENED CONNECTED Down Being negotiated. Physical interface operational. Logical interface operational.
IPIFS
Lists the IP interface. ipifs Response:
ATM_VC/1 ETHERNET/0 192.168.254.1 (FFFFFF00) dest 192.168.254.2 sub 192.168.254.0 net 192.168.254.0 (FFFFFF00) P-2-P 192.84.210.12 (FFFFFF00) dest 0.0.0.0 sub 192.84.210.0 net 192.84.210.0 (FFFFFF00) BROADCAST mtu 1500
IPROUTES
Lists the current entries in the IP routing table. iproutes Response:
# iproutes IP route 0.0.0.0 192.84.210.0 192.84.210.12 192.168.254.0 192.168.254.1 192.168.254.2 224.0.0.9 255.255.255.255 Where: / Mask --> --> --> --> --> --> --> --> --> Gateway 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 HQ HQ 0.0.0.0 0.0.0.0 Interface [none] ETHERNET/0 ETHERNET/0 [none] ATM_VC/1 ATM_VC/1 [none] [none] Hops Flags 0 1 0 0 0 1 0 0 NW NW ME NW ME FW ME NW PRIV FW DIR PERM PRIV DIR PRIV PERM
/ffffffff /ffffff00 /ffffffff /ffffff00 /ffffffff /ffffffff /ffffffff /ffffffff NW PERM DOD FW DIR ME
Network Permanent (static) Initiate link dial-up Forward Direct This router
IPXROUTES
Lists the current entries in the IPX routing table.
215
ipxroutes Response:
# ipxroutes Network 00001001: 00000456: Gateway HQ (DIRECT) STATIC DOD FORWARD DIRECT Interface [down] ETHERNET/0 Static route Initiate link dial-up Hops 1 0 Ticks 4 1 Flags STATIC FORWARD DOD FORWARD
where:
IPXSAPS
Lists the current services in the IPX SAPs table. ipxsaps
Response:
# ipxsaps Service Name SERV312_FP Type 4 Node number Network Skt 000000000001:00001001:045 Hops 1
LOGOUT
Logs out to reinstate administrative security after you have completed changing the routers configuration. logout
MEM
The mem command report the amount of ram installed in the router. mem
Response:
# mem Small buffers used.......18 Large buffers used.......41 Buffer descriptors used..59 Number of waiters s/l....0/0 (7% of 256 used) (16% of 256 used) (7% of 768 used)
512 9
1024 8
2048 7
216
Free
MLP SUMMARY
Lists the status of the protocols negotiated for an active remote connection. The following are the most common protocols: MLP (Multilink Procedure) IPNCP (IP routing Network Protocol) CCP (Compression Control Protocol) BNCP (Bridging Network Protocol) IPXCP (IPX Network Protocol)
Open indicates that the protocol is in ready state. Stopped means that the protocol is defined, but did not successfully negotiate with the remote end. No message means that the link is not active. mlp summary Example:
mlp summary
PING
Sends an echo message, available within the TCP/IP protocol suite. The echo message is sent to a remote node and returned; the echo tests connectivity to the remote node. It is particularly useful for locating connection problems on a network. The remote node can be specified by IP address or by domain name. If a domain name is specified, the address of the domain is requested from the domain name server (DNS). A status message is issued for each echo message sent. Note: You cannot ping your own LAN address; you can ping your own WAN address. To fit the echo message into one ATM cell in routing mode, set the length of user data down to 0 bytes (-s 0 or -l 0). Note: To terminate the ping before it ends, press control-c. ping [-c count] [-i <wait>] [- s | -l <size>)] [-I <srceaddr>] <ipaddr> | <domainname> -c count -i wait -s size Number of packets sent (from 1 to 2000000000). The default is 5 packets. Wait period between packets in seconds (from 1 to 10). The default is 1 second. Packet data length in bytes (from 0 to 1648). The default is 56 bytes.
217
-l size -I srcaddr
Same as -s size. Source IP address contained in the echo message (4 decimals separated by periods). Use this option to force packets into a tunnel or to force use of the management address as the source address. Remote node to which the echo message is sent. It can be specified by its domain name or by its IP address (4 decimals separated by periods).
The command attempts a DNS (domain name server) lookup to find the address of the domain. If the DNS server address is not known, it returns the following message:
ping: unknown host www.yahoo.com
If the DNS lookup is successful, the ping sends five packets, one second apart, with a packet length of 56 bytes.
ping: ping: ping: ping: ping: ping: reply from 216.32.74.52: bytes=56 (data), reply from 216.32.74.52: bytes=56 (data), reply from 216.32.74.52: bytes=56 (data), reply from 216.32.74.52: bytes=56 (data), reply from 216.32.74.52: bytes=56 (data), packets sent 5, packets received 5 icmp_seq=1, icmp_seq=2, icmp_seq=3, icmp_seq=4, icmp_seq=5, time=86 time=81 time=82 time=84 time=82 ms ms ms ms ms
The following command requests 2 echo messages sent 7 seconds apart with a packet length of 34 bytes. The messages are sent to IP address 192.168.254.2.
# ping -c 2 -i 7 -s 34 192.168.254.2 ping: reply from 192.168.254.2: bytes=34 (data), time<5 ms ping: reply from 192.168.254.2: bytes=34 (data), time<5 ms ping: packets sent 2, packets received 2
The following command sends packets with the source IP address 192.168.254.254 to the IP address 192.4.210.122. Default values are used for the other options.
ping -I 192.168.254.254 192.4.210.122
The following command uses management address 192.168.1.2 as the source address when pinging destination address 192.168.100.100.
ping -I 192.168.1.2 192.168.100.100
PS
Lists all of the tasks (processes) running in the system and the status of the tasks. ps Response:
# ps
218
TID: 1:IDLE 3:MSFS_SYNC 4:SYSTEM LOGGER 5:LL_PPP 6:NL_IP 7:TL_IP_UDP 8:TL_IP_TCP 9:IP_RIP 10:TELNETD 11:DUM 12:ATM25 13:SNMPD 14:BOOTP 15:CMD
NAME
FL 02 03 03 03 03 03 03 03 03 03 03 03 03 01
P 7 6 5 5 5 3 3 4 5 5 1 5 5 6
BOTTOM 1208f0 1224a0 122cd0 126750 126fe0 127460 1278c0 128120 128550 12b580 12c0a0 124b60 12e3d0 12cba0
CURRENT SIZE 121008 2032 122ba8 2032 1233d8 2032 126e58 2032 1272e0 1000 127768 1000| 127fd0 2032 128420 1000 128838 1000 12bc88 2032 12c790 2032 125a70 4080 12e6c0 1000 12d9f8 4080
task ID field name of the task flag field number from 1 to 7 with the highest priority equal to 1 address of the task stack current stack pointer stack size in bytes
REBOOT
This command causes a reboot of the system. Caution: A reboot erases any configuration changes that have not been saved. Remember to enter a save command before the reboot command. Certain configuration settings require a reboot before the setting becomes effective, including: A change from IP routing to bridging or the reverse. The addition of IKE filters IPX changes
Other configuration changes become effective following either a reboot or a restart of the Ethernet or remote interface. These changes include: System settings Ethernet IP address TCP/IP routing Remote router default bridging destination TCP/IP route addresses SAPs and bridging Adding a new remote entry to the remote database.
219
A reboot also ensures that all file system updates are completed. There is a time lag between the entry of a save command and the safe storage of the data in FLASH memory. If the power goes off before the data is stored in memory, the data can be lost. Always reboot before powering off the router. Or, use the sync command (page 229) to commit file changes to memory. reboot [<option>] option default If no option is specified, the router is rebooted using the existing configuration file. This option deletes the system configuration file and restores the router to its original defaults (before any configuration was entered). Note: The word default must be fully spelled out. factory This option deletes all files except AUTOEXEC.OLD if it exists. AUTOEXEC.OLD is renamed AUTOEXEC.BAT; it is re-executed by the reboot. This option also resets the non-volatile RAM; thus deleting the IP address of the router and the TFTP server during the boot process and also forcing the router to boot from FLASH instead of from the network.
SAVE
The save command saves the entire routers configuration or parts of it to FLASH memory. The keyword in the command determines what is saved. Note: There is a time lag between the response issued by the save command and the time when the data is actually stored in FLASH memory. Issue a sync command after a save command before powering off the router. This commits the changes to FLASH memory.
save all | keys | dod | sys | eth | filter | ipsec | ike | atom | sdsl | idsl | frame | dhcp | atm25 | l2tp | sntp Examples:
save save all
Same as save all. Saves the configuration settings for the system, Ethernet LAN, DSL line, and remote router database into FLASH memory. Saves the ATM configuration settings. Saves the DHCP configuration settings into FLASH memory. Saves the current state of the remote router database. Saves the configuration settings for the Ethernet LAN into FLASH memory. Saves the bridging filtering database to FLASH memory. A reboot must be executed to load the database for active use. Saves the name, message, and authentication password system settings into FLASH memory.
save atom save dhcp save dod save eth save filter
save sys
220
SNTP ACTIVE
Displays the active SNTP server, that is, the server that last responded to an SNTP request. To see a list of SNTP servers or change the servers in the list, use the command sntp server. To display or change the preferred SNTP server, use the command sntp prefServer. sntp active Example:
# sntp active Active SNTP server is 1 (192.6.38.127)
SNTP DISABLE
Disables SNTP requests. To enable SNTP requests, use the command sntp enable (page 221). sntp disable Example:
# sntp enable Current offset from UTC is 0 minutes Use <system sntp offset> to set time zone
SNTP ENABLE
Enables SNTP requests. To disable SNTP requests, use the command sntp disable (page 221). sntp enable Example:
# sntp enable Current offset from UTC is 0 minutes Use <system sntp offset> to set time zone
SNTP OFFSET
Specifies the SNTP offset from the Universal Time Coordinate (UTC). The offset is specified in minutes. A positive offset is an offset to the east of the Greenwich meridian; a negative offset is to the west of the Greenwich meridian. To see the current offset, specify sntp offset with no parameter.
221
Note: To make a change permanent, you must save the change before you restart or reboot. sntp offset [<minutes>] minutes Example:
# sntp offset Current offset from UTC is 0 minutes usage: sntp offset <Minutes from UTC> (offset is negative for west, positive for east of Greenwich meridian) # sntp offset -360
Number of minutes east or west of the Greenwich meridian. A positive number is east; a negative number is west.
SNTP PREFSERVER
Displays or changes the preferred SNTP server. (The preferred server is the server that should be attempted first when a request is made.) To specify a server preference, specify the number of the preferred server within the SNTP server list. To see the SNTP server list, enter sntp server. To see the current preferred SNTP server, enter sntp prefServer with no parameter. To see the active SNTP server (that is, the server that last responded to an SNTP request), use the command sntp active. Note: To make a change permanent, you must save the change before you reboot. sntp prefServer [<number>] number Example:
# sntp server Current server (1) Current server (2) Current server (3) Current server (4) Current server (5) Usage: sntp server IP addr: 192.6.38.127 IP addr: 192.5.41.40 IP addr: 192.6.38.127 IP addr: 209.81.9.7 IP addr: 129.7.1.66 <IP address>|default [server number]
Number of a server within the SNTP server list. To see the server numbers, enter sntp server.
# sntp prefserver The preferred SNTP server is 1 (192.6.38.127) # sntp prefserver 3 Preferred SNTP server is set to 3 (192.6.38.127)
SNTP REQUEST
Requests the time from an SNTP server. (SNTP is the Simple Network Time Protocol defined by RFC 1769.) Note: A request is performed only if SNTP is enabled (see sntp enable, page 221). 222 Chapter 8. Command Reference
To specify the IP address of an SNTP server, use the command sntp server. sntp request Example:
# sntp request SNTP is currently disabled # sntp enable # sntp request Time server IP address not set, use "sntp server w.x.y.z" # sntp server Current server (1) IP addr = 0.0.0.0 usage: sntp server <IP address>|default [server number] # sntp server 12.101.4.1 # sntp request Time set to UTC-480, 5/7/2001 at 17:29:25.245 Time adjusted for (-) 0 days 1 hours 0 minutes 0 seconds
SNTP SERVER
Displays or changes the SNTP server list. To see the current SNTP server list, specify sntp server with no parameter. To specify the default server list, specify sntp server default. To add a server to the list, specify sntp server with the server IP address and a new number for the entry. To change the address of a server, specify sntp server with the server IP address and the existing entry number. To remove a server from the list, specify sntp server 0.0.0.0 and the number of the server to be removed.
Note: To make a change permanent, you must save the change before you reboot. sntp server <IPaddress> | default [<number>] IPaddress default number IP address of an SNTP server (4 decimals separated by periods). (To remove a server, specify 0.0.0.0 as the IP address.) Requests the default server list (see the example below). Number of the server in the list. If that server number is already in the list, the IP address is changed; otherwise, a new entry is added to the list. If you omit a number, the IP address of the active server is changed.
Example:
# sntp server default Current server (1) IP Current server (2) IP Current server (3) IP Current server (4) IP Current server (5) IP addr: addr: addr: addr: addr: 192.5.41.40 192.6.38.127 209.81.9.7 129.7.1.66 192.168.254.2
223
TCP STATS
Displays the TCP statistics and open connections. tcp stats Example:
tcp stats
TIME
Displays or changes the current time on the routers clock. To change the current date, use the command date (page 212). Automatic SNTP requests are generated if the system needs to get the time. You can specify an SNTP server using the command sntp server (page 223) and a UTC offset with the command sntp offset (page 221). To see the current date and time on the router clock, enter time with no parameters. time <hh:mm:ss> hh mm ss Example:
# time BootTime: Current time: 5/18/2001 at 11:57:12 5/18/2001 at 12:00:01
# time 1:01:01 Time set to UTC-420, 5/18/2001 at 1:01:01.074 Time adjusted for (-) 0 days 11 hours 49 minutes 34 seconds
TRACEROUTE
Traces the route taken by packets sent from the local router to the specified IP address or domain name. A packet is sent for each hop in the route. The output lists the IP addresses of the hops that returned packets. Unless the -n option is specified, traceroute also attempts to look up the name of each gateway in the route. If the DNS lookup is successful, the name is included in the output message. Note: To terminate the traceroute before it completes, press control-c. traceroute [-c count] [-i <wait>] [- s | -l <size>)] [-I <srceaddr>] [-n] <ipaddr> | <domainname>
224
Number of packets sent (from 1 to 255). The default is 30 packets. Wait period between packets in seconds (from 1 to 2000000000). The default is 1 second. Packet data length in bytes (from 0 to 1648). The default is 56 bytes. Same as -s size. Source IP address contained in the echo message (4 decimals separated by periods). Use this option to force packets into a tunnel or to force use of the management address as the source address. Eliminates the DNS lookup for each hop. Only the IP address of the hop is listed in the output message. The end of the route, specified by a domain name or IP address (4 decimals separated by periods).
The following two commands trace the same route. The first specifies the domain name; the second specifies the IP address.
# traceroute www.yahoo.com # traceroute 204.71.200.68
Both commands send up to thirty packets with a wait period of one second and a packet length of 56 bytes. The following is an example of the command output:
1: 2: 3: 4: 5: 6: 7: 8: 10: 11: 12: 13: traceroute: 172.17.20.122 l2tp-router.flowpoint.com 172.17.20.1 checkpoint.flowpoint.com 12.39.98.136 csco2.efficient.com 12.124.40.65 12.123.13.166 gbr5-p56.sffca.ip.att.net 12.122.5.142 gbr3-p100.sffca.ip.att.net 12.122.5.253 gbr2-p60.sffca.ip.att.net 12.123.13.61 gar1-p370.sffca.ip.att.net 206.132.150.250 206.132.254.37 ge0-0-1000M.hr8.SNV.gblx.net 206.178.103.62 baslr-ge3-0-hr8.snv.yahoo.com reply from 204.71.200.68: bytes=56 (data), time=18 ms packets set 13, packets received 12
For a faster route trace, specify the -n option to eliminate the domain name lookup.
# traceroute -n 204.71.200.68 1: 172.17.20.122 2: 172.17.20.1 3: 12.39.98.136 4: 12.124.40.65 5: 12.123.13.166 6: 12.122.5.142 7: 12.122.5.253 8: 12.123.13.61 10: 206.132.150.250 11: 206.132.254.37 12: 206.178.103.62 13: reply from 204.71.200.68: bytes=56 (data), time=79 ms
225
VERS
Displays the software version level, source, software options, and amount of elapsed time that the router has been running. All software options are listed. If the option has a + prefix, the option was enabled using a key. If the option has a ~ prefix, the option is disabled in this router. For more information, see Software Option Keys, on page 124. vers Example:
# vers Efficient 5851 SDSL [ATM] Router FlowPoint-2000 BOOT/POST V5.3.0 (19-Mar-99 15:25) Software version v4.0.0 built Mon Apr 17 09:30:26 PDT 2000 Maximum users: unlimited Options: SDSL, RFC1483, IP ROUTING, IP FILTERING, WEB, +IPSEC, +3DES, L2TP, ENCRYPT, BRIDGE, IPX Up for 79 days 19 hours 57 minutes (started 9/8/2000 at 17:11)
The router file system is DOS-compatible, and the file system commands are similar to the DOS commands of the same name.
COPY
Copies a file from the source to the destination. This command allows you to update the router software level or to write configuration files to a TFTP server Issue a sync command after a copy command to commit the changes to FLASH memory. Caution: No warning message is issued if you copy over an existing file. copy <srcfile> <dstfile> srcle Filename of the source le to be copied.It can be either the name of a local file or a file accessed remotely via a TFTP server. A local filename is in the format: name.ext. 226 Chapter 8. Command Reference
A remotely accessed filename is specified as: tftp@serveraddr:filename.ext. The TFTP server address is optional. If the TFTP server address is not specified, the address used is either the one from which the router booted or the one permanently configured in the boot system. To force use of a specific source address when copying a file from a TFTP server, use this format: tftp@serveraddr-sourceaddr:filename.ext dstle Examples: The following command copies the le KERNELNW on TFTP server 128.1.210.66 to the local le KERNEL.F2K.
# copy tftp@128.1.210.66:kernelnw kernel.f2k Copying... 421888 bytes copied
The following command uses the source address 192.168.1.2 when copying the le KERNELNW on TFTP server 192.168.100.100 to the local le KERNEL.F2K.
copy tftp@192.168.100.100-192.168.1.2:kernelnw kernel.f2k
DELETE
Removes a file from the file system. delete <filename> filename Example: Name of the file to be deleted. The filename is in the format xxxxxxxx.xxx.
delete kernel.f2k
Response:
kernel.f2k deleted.
DIR
Displays the directory of the file system. The size of each file is listed in bytes. dir Example:
dir
EXECUTE
This command loads batch files of configuration commands into the router. This allows for customization and simpler installation of the router. A script file can contain commands, comments (lines introduced by the # or ; characters), and blank lines.
227
There are two kinds of script files: A one-time script that is executed on startup (only once). A group of commands that can be executed at any time from the Command Line Interface with the execute <filename> command.
One-time scripts are useful to execute the complete configuration process from a default (unconfigured) state. execute <filename> lename Example: Name of the le to be executed.
execute script1
FORMAT DISK
Erases and reformats the router file system. This command should only be used when the file system is unusable. If the router does not execute the POST test and software boot successfully, and the result of the dir command indicates the file system is corrupted, you may wish to reformat the disk, reboot the router, and recopy the router software. format disk Example:
format disk
Response:
NEWFS: erasing disk... NEWFS: fs is 381k and will have 762 sectors NEWFS: 128 directory slots in 8 sectors NEWFS: 747 fat entries in 3 sectors NEWFS: writing boot block...done. NEWFS: writing fat tables...done. NEWFS: writing directory...done. Filesystem formatted!
MSFS
Checks the structure of the file system. This command performs a function similar to the DOS chkdsk command. The router analyzes the File Allocation Table (FAT) and produces a file system status report. Warning: When you specify fix, make sure that no other operation is being performed on the configuration files at the same time by Configuration Manager or by another user. msfs [fix] x If x is specied, errors are corrected in the FAT. This option should only be used when an msfs command results in a recommendation to apply the x option.
228
Example:
msfs
Response:
Filesystem 0, size=825k: Checking filesystem... Checking file entries... SYSTEM CNF ... 2304 bytes .. ok. ATM25 DAT ... 20 bytes .. ok. DHCP DAT ... 1536 bytes .. ok. KERNEL F2K ... 257014 bytes .. ok. IDL_7 AIC ... 14828 bytes .. ok. ASIC AIC ... 14828 bytes .. ok. FILTER DAT ... 1284 bytes .. ok. 1097 fat(s) used, 0 fat(s) unused, 0 fat(s) unref, 534 fat(s) free 561664 bytes used by files, 9728 bytes by tables, 273408 bytes free
RENAME
Renames a file in the file system. rename <oldName> <newName> oldName newName Example: Existing name of the le. The lename is in the format xxxxxxxx.xxx. New name of the le. The lename is in the format xxxxxxxx.xxx.
rename ether.dat oldeth.dat
Response:
ether.dat renamed to oldeth.dat
SYNC
Commits the changes made to the file system to FLASH memory. sync Example:
sync
Response:
Syncing file systems...done.
Warning:
229
SYSTEM Commands
All commands in this section begin with the word system. The commands set basic router configuration information, such as the following: name of the router optional system message authentication password security authentication protocol management security system administration password IP address translation NAT configuration host mapping WAN-to-WAN forwarding filters Dial Backup configuration SNTP parameters
SYSTEM ?
Lists the supported keywords. To see the syntax for a command, enter the command followed by a ?. system ? Example:
# sys ? System commands: ? passwd list log addServer supportTrace httpport delTelnetFilter addHTTPFilter delSyslogFilter blockNetBIOSDefault securityTimer moveIPRoutingTable
msg authen admin addHostMapping delServer telnetport syslogport addSNMPFilter delHTTPFilter wan2wanforwarding addUDPrelay addIPRoutingTable
name community history delHostMapping bootpServer snmpport addTelnetFilter delSNMPFilter addSyslogFilter OneWANdialup delUDPrelay delIPRoutingTable
230
SYSTEM ADDBOOTPSERVER
Adds an address to the BootP server list. (The BootP server list is also the DHCP relay list.) While the BootP server list has at least one address, the router disables its own DHCP server and, instead, forwards all DHCP/BootP requests to all servers in the list. It forwards every reply received from any of the servers in the list to the appropriate LAN. To read about BootP service, see page 167. Addresses can also be added to the list using the dhcp addrelay command (page 352). To remove an address from the list, use the dhcp delrelay command (page 355). To see the current BootP server address, enter the command dhcp addrelay or system addBootPServer with no parameters. To remove a BootPserver address, use the command dhcp delrelay or system delBootPServer (page 242). system addbootpServer <ipaddr> ipaddr Example:
# system addbootpServer 128.1.210.64 # system addbootpServer BOOTP/DHCP Server address: 128.1.210.64
SYSTEM ADDHOSTMAPPING
This command is used to remap a range of local-LAN IP addresses to a range of public IP addresses on a systemwide basis. These local addresses are mapped one-to-one to the public addresses. Note: The range of public IP addresses is defined by <first public addr> only. The rest of the range is computed automatically (from <first public addr> to <first public addr> + number of addresses remapped - 1) inclusive. system addHostMapping <first private addr> <second private addr> <first public addr> rst private addr second private addr rst public addr First IP address in the range of IP addresses to be remapped, in the format of 4 decimals separated by periods. Last address in the range of IP addresses to be remapped, in the format of 4 decimals separated by periods. Denes the range of public IP addresses, in the format of 4 decimals separated by periods. The rest of the range is computed automatically. Example:
system addHostMapping 192.168.207.40 192.168.207.49 10.1.1.7
231
SYSTEM ADDHTTPFILTER
This command can block all devices except those within the defined IP address range from using the HTTP protocol (for example, to browse the Web). This command can block devices on the WAN from accessing the Web browser. This validation feature is off by default. Note 1: This command does not require a reboot and is effective immediately. Note 2: To list the range of allowed clients, use the command system list when you are logged in with read and write permission (be sure to log in with password). To delete addresses from the HTTP filter, use the command system delHTTPfilter (page 243). For more information, see Controlling Remote Management, on page 107. system addHTTPFilter <first ip addr> [<last ip addr>] | LAN rst ip addr last ip addr LAN Example: First IP address of the range. Last IP address of the range. May be omitted if the range contains only one IP address. Local Ethernet LAN.
system addHTTPFilter 192.168.1.5 192.168.1.12
SYSTEM ADDIPROUTINGTABLE
Defines a new virtual routing table. Once defined, you can add routes to the table using the commands eth ip bindRoute (page 266) and remote bindIPVirtualRoute (page 293). The command specifies the name of the new routing table and the range of IP addresses that reference the table for their routing. When the router receives a packet, the source address of the packet determines which routing table is used. For example, if the range of addresses for the virtual routing table ROSA includes address 192.168.25.25, then every packet with the source address 192.168.25.25 is routed using virtual routing table ROSA. If the source address of a packet is not within the address ranges for any virtual routing table, the default routing table is referenced to route the packet. For more information, see Virtual Routing Tables, on page 80. If an IP routing table has been defined, you can see its range of addresses using the command system list. system addIPRoutingTable <first ip addr> [<last ip addr>] <tablename> first ip addr last ip addr First IP address of the range (4 decimals separated by periods). Last IP address of the range (4 decimals separated by periods). This parameter may be omitted if the range contains only one IP address. The specified address range may not overlap the address range defined for any other virtual routing table. Name of the virtual routing table to which the addresses are assigned (character string).
tablename
232
Example: The following command defines a virtual routing table named ROSA (if it does not already exist) and assigns it the IP address range 192.168.1.5 through 192.168.1.12.
system addIPRoutingTable 192.168.1.5 192.168.1.12 ROSA
After routing table ROSA has been defined, the following line appears in the output for the command system list:
192.168.1.5 through 192.168.1.12 uses IP Routing Table <ROSA>
SYSTEM ADDSERVER
This Network Address Translation (NAT) command is used to configure a local IP address as the selected server on the LAN (FTP, SMTP, etc.) for the global configuration. To learn more, see Network Address Translation (NAT), on page 95. Multiple system addserver, remote addserver (page 293), and eth ip addserver (page 265) commands can designate different servers for different protocols, ports, and interfaces. When a request is received, the router searches the server list for the appropriate server. The order of search for a server is discussed in Server Request Hierarchy, on page 98. To delete a server designation, use the command system delserver (page 244). system addServer <action> <protocol> <first port> [<last port> [<first private port>]] action One of the following command actions: ipaddr Selects the host with this IP address as server (4 decimals separated by periods). discard Discards the incoming server request. me Sends the incoming server request to the local router, regardless of its IP address. Protocol used by the selected server. protocolid Numeric protocol ID. tcp TCP only. udp UDP only. all All protocols. First or only port as seen by the remote end. Port used by the selected server portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port. dns DNS port (Domain Name Server). ftp FTP port (File Transfer Protocol). h323 H.323 port. http HTTP port (Hypertext Transfer Protocol used on the Internet). login rlogin port (port 513). rsh Remote Shell port. smtp SMTP port (Simple Mail Transfer Protocol). snmp SNMP port (Simple Network Management Protocol). t120 T.120 port. telnet Telnet port. tftp TFTP port (Trivial File Transfer Protocol). all All ports. Optional last port in the range of ports as seen by the remote end for the server on the LAN.
protocol
first port
last port
233
first private port If specified, this is a port remapping of the incoming request from the remote end. Example:
system addServer 192.168.1.5 tcp smtp
SYSTEM ADDSNMPFILTER
This command is used to validate SNMP clients by defining a range of IP addresses that are allowed to access the router via SNMP. This validation feature is off by default. Note 1: This command does not require a reboot and is effective immediately. Note 2: To list the range of allowed clients, use the command system list when you are logged in with read and write permission (be sure to log in with password). To delete addresses from the SNMP filter, use the command system delSNMPfilter (page 244). For more information, see Controlling Remote Management, on page 107. system addSNMPFilter <first ip addr> [<last ip addr>] | LAN
First IP address of the client range. Last IP address of the client range. May be omitted if the range contains only one IP address. Local Ethernet LAN.
system addSNMPFilter 192.168.1.5 192.168.1.12
SYSTEM ADDSYSLOGFILTER
Limits the Syslog server addresses that may be returned by DHCP. By default, this validation feature is off. The Syslog filter can comprise one or more ranges of IP addresses that DHCP may return for Syslog servers. To delete addresses from the Syslog filter, use the command system delsyslogfilter (page 245). This command does not affect the Syslog server addresses that you specify explicitly. For more information on the router as Syslog client, see page 168. Note: This command does not require a reboot and is effective immediately. Note 2: To list the range of allowed clients, use the command system list when you are logged in with read and write permission (be sure to log in with password). system addSyslogFilter <firstipaddr> [<last ip addr>] | LAN first ip addr last ip addr First IP address of the valid server range. Last IP address of the valid server range. May be omitted if the range contains only one IP address.
234
LAN Example:
Limits the valid Syslog servers to those on the local Ethernet LAN.
SYSTEM ADDSYSLOGSERVER
Adds an address to the list of Syslog servers. The router sends system event messages to all Syslog servers in the list, unless the Syslog port has been disabled. For more information about the router as Syslog client, see page 168. To see the server addresses, use the command system list. To remove a Syslog server address from the list, use the command system delSyslogServer (page 245). Note: The new server address becomes effective after you save and reboot. system addSyslogServer <ipaddr> ipaddr Example:
system addSyslogServer 192.168.1.5
IP address to be added to the Syslog server address list (4 decimals separated by periods).
SYSTEM ADDTELNETFILTER
This command is used to validate Telnet clients by defining a range of IP addresses that are allowed to access the router via Telnet. This validation feature is off by default. For more information, see Controlling Remote Management, on page 107. Note 1: This command does not require a reboot and is effective immediately. Note 2: To list the range of allowed clients, use the command system list when you are logged in with read and write permission (log in with password). To delete addresses from the Telnet filter, use the command system delTelnetfilter (page 245). system addTelnetFilter <first ip addr> [<last ip addr>] | LAN first ip addr last ip addr LAN Example:
system addTelnetFilter 192.168.1.5 192.168.1.12
First IP address of the client range. Last IP address of the client range. May be omitted if the range contains only one IP address. Local Ethernet LAN.
235
SYSTEM ADDUDPRELAY
This command is used to create a UDP port range for packet forwarding. You can specify a port range from 0 to 65535; however, 137 to 139 are reserved for NetBIOS ports. Overlap of UDP ports is not allowed. system addUDPrelay <ipaddr> <first port>|all [<last port>] ipaddr rst port all last port Example: IP address of the server to which the UDP packet will be forwarded. First port in the UDP port range to be created. Incorporates all the available UDP ports in the new range. Last port in the UDP port range to be created.
system addUDPrelay 192.168.1.5 all
SYSTEM ADMIN
Sets the administration password that is used to control write access to the target router configuration. system admin <password> password Example: Write-enable login password.
system admin adx1lp
SYSTEM AUTHEN
Forces the target router authentication protocol that is used for security negotiation with the remote routers when the local side authentication is set. You should not need to issue this command as the best security possible is provided with the none default. To see the current authentication override (none, pap, or chap), enter the command system authen with no parameters. To read about PAP/CHAP authentication, see page 25. system authen none | pap | chap none pap chap The authentication protocol is negotiated, with the minimum best security level as defined for each remote router in the database. Negotiation begins with PAP (instead of CHAP) for those entries that have PAP in the remote database and only when the call is initiated locally. Overrides all the remote database entries with CHAP, that is, only CHAP is performed.
Example:
# system authen chap
236
IP address to be added to the list (four decimals separated by periods). Gateway address. The router determines the actual gateway address. Domain Name Server address. The router determines the actual DNS address. Optional number of a group to which the address is assigned (integer, 0 through 65535). The default is group 0.
The following command adds the gateway address to group 1 of the addresses to be pinged.
system backup add GW 1
To see the addresses in the current list, use the command system list. For more information about Dial Backup, see page 109. system backup delete <ipaddr> | GW | DNS | all [<group> | all ] ipaddr GW DNS IP address to be deleted from the list (four decimals separated by periods). Gateway address. The router determines the actual gateway address and deletes it. Domain Name Server address. The router determines the actual DNS address and deletes it.
237
Requests deletion of all addresses in the group. Optional number of a group from which the specified address or all addresses are deleted (integer, 0 through 65535). The default is group 0. Specifies all groups, including group 0.
To re-enable the Dial Backup option, use the system backup enable command. For more information about Dial Backup, see page 109. system backup disable
238
Note: Dial Backup cannot be enabled unless the remote containing its dialup parameters is also enabled. (Check this using the command remote list). To see the current setting of the Dial Backup switch, use the system list command. To disable Dial Backup, use the system backup disable command. For more information about Dial Backup, see page 109. system backup enable
Number of seconds in the ping interval for the group (integer). The default is 5 seconds. Optional number of a group (integer, 0 thru 65535). The default is group 0.
239
Number of times the addresses in the group are pinged (integer). The default is 6. Optional number of a group (integer, 0 through 65535). The default is group 0.
The following command changes the number of ping samples to 10 for addresses in group 0.
system backup pingsamples 10
Number of minutes in the retry period (integer). The default is 30; the minimum is 2.
The following command changes the retry period to 2 minutes because the minimum is 2 minutes.
system backup retry 1
240
SYSTEM BLOCKNETBIOSDEFAULT
The router can block all NetBIOS and NetBUI requests from being sent over the WAN. This command sets the default value used when a remote router entry is defined. The command remote blockNetBIOS (page 294) can change the NetBIOS setting for a specic remote router. To see the current NetBIOS default, use the command system list.
system blockNetBIOSDefault yes | no yes no Sets the default to block all NetBIOS and NetBUI requests. Sets the default to not block NetBIOS and NetBUI requests.
Example:
system blockNetBIOSdefault yes
241
SYSTEM COMMUNITY
Enhances SNMP security by allowing the user to change the SNMP community name from its default value of public to a different value. Refer to Controlling Remote Management, on page 107. Note: The command system community (with no value) will display the current community name. system community [<SNMP community name>] SNMP community name Example 1: Example 2: String of up to 40 characters.
SYSTEM DEFAULTMODEM
Lists the default modem settings. The modem settings are for the backup V.90 modem connected to the console port. To change the modem settings, use the system modem command (page 249). For more information on the Dial Backup option, see page 164. system defaultmodem
SYSTEM DELBOOTPSERVER
Removes an address from the BootP server list. (The BootP server list is also the DHCP relay list.) To remove all addresses from the list, use system delbootpserver all. Addresses can also be removed from the list using the dhcp delrelay command (page 355). To add an address to the list, use the dhcp addrelay command (page 352). system delbootpServer <ipaddr> | all ipaddr all Examples:
system delbootpServer 128.1.210.64 system delbootpServer all
IP address of the server (4 decimals separated by periods). Removes all addresses from the BootP server list.
SYSTEM DELHOSTMAPPING
Undoes an IP address/host translation (remapping) range that was previously established with the command remote addHostMapping on a per-systemwide basis.
242
system delHostMapping <first private addr> <second private addr> <first public addr> rst private addr second private addr rst public addr First IP address in the range of IP address, in the format of 4 decimals separated by periods. Last address in the range of IP address, in the format of 4 decimals separated by periods. Denes the range of public IP addresses, in the format of 4 decimals separated by periods. The rest of the range is computed automatically. Example:
system delHostMapping 192.168.207.40 192.168.207.49 10.1.1.7
SYSTEM DELHTTPFILTER
Deletes an address filter created by the system addHTTPFilter command. To see the address range of the filter, use the command system list. system delHTTPFilter <first ip addr> [<last ip addr>] | LAN first ip addr last ip addr LAN Example:
system delHTTPFilter 192.168.1.5 192.168.1.12
First IP address of the range. Last IP address of the range. May be omitted if the range contains only one IP address. Local Ethernet LAN.
SYSTEM DELIPROUTINGTABLE
Deletes a range of addresses that reference a virtual routing table or deletes the entire virtual routing table. To list the virtual routing tables, use the iproutes command (page 215). For more information, see Virtual Routing Tables, on page 80. system delIPRoutingTable ALL | <first ip addr> [<last ip addr>] <tablename> ALL first ip addr last ip addr tablename Examples: Deletes two IP addresses from the address range that references routing table ROSA:
system delIPRoutingTable 192.168.1.5 192.168.1.6 ROSA
Deletes the virtual routing table. Both the table definition and all routes in the table are deleted. First IP address of the range to be deleted (4 decimals separated by periods). Last IP address of the range to be deleted (4 decimals separated by periods). This parameter may be omitted if the range contains only one IP address. Name of the virtual routing table (character string).
243
SYSTEM DELSERVER
Deletes an entry created by the system addServer command (page 233). system delServer <action> <protocol> <first port> [<last port> [<first private port>]] action One of the following command actions: ipaddr Selects the host with this IP address as server (4 decimals separated by periods). discard Discards the incoming server request. me Sends the incoming server request to the local router, regardless of its IP address. Protocol used by the selected server. protocolid Numeric protocol ID. tcp TCP only. udp UDP only. all All protocols. First or only port as seen by the remote end. Port used by the selected server portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port. dns DNS port (Domain Name Server). ftp FTP port (File Transfer Protocol). h323 H.323 port. http HTTP port (Hypertext Transfer Protocol used on the Internet). login rlogin port (port 513). rsh Remote Shell port. smtp SMTP port (Simple Mail Transfer Protocol). snmp SNMP port (Simple Network Management Protocol). t120 T.120 port. telnet Telnet port. tftp TFTP port (Trivial File Transfer Protocol). all All ports. Optional last port in the range of ports as seen by the remote end for the server on the LAN.
protocol
first port
last port
first private port If specified, this is a port remapping of the incoming request from the remote end. Example:
system delServer 192.168.1.5 tcp smtp
SYSTEM DELSNMPFILTER
Deletes the client range previously defined by the command system addsnmpfilter. Note 1: This command does not require a reboot and is effective immediately. Note 2: To list the range of allowed clients, use the command system list when you are logged in with read and write permission (be sure to log in with password). system delSNMPFilter <first ip addr> [<last ip addr>] | LAN 244 Chapter 8. Command Reference
First IP address of the client range. Last IP address of the client range; may be omitted if the range contains only one IP address. Local Ethernet LAN.
system delsnmpfilter 192.168.1.5 192.168.1.12
SYSTEM DELSYSLOGFILTER
Deletes the Syslog address filter.To see the address range of the filter, use the command system list. To define a new Syslog address filter, use the command system addSyslogFilter (page 234). Note: This command does not require a reboot; it takes effect immediately. system delSyslogFilter <firstipaddr> <lastipaddr> | LAN first ip addr last ip addr LAN Example:
system delSyslogFilter 192.168.1.5 192.168.1.12
First IP address of the range. Last IP address of the range. May be omitted if the range contains only one IP address. Local Ethernet LAN.
SYSTEM DELSYSLOGSERVER
Removes an address from the list of Syslog servers. To see the server addresses, use the command system list. To specify a new Syslog server address, use the command system addSyslogServer (page 235). Note: This command does not require a reboot; it takes effect immediately. system delSyslogServer <ipaddr> ipaddr Example:
system delSyslogServer 192.168.1.5
SYSTEM DELTELNETFILTER
Deletes the client range previously defined by the command system addTelnetFilter. Note 1: This command does not require a reboot and is effective immediately. Note 2: To list the range of allowed clients, use the command system list when logged in with read and write permission (be sure to log in with password).
245
system delTelnetFilter <first ip addr> [<last ip addr>] | LAN rst ip addr last ip addr LAN Example: First IP address in the client range. Last IP address in the client range; may be omitted if the range contains only one IP address. Local Ethernet LAN.
system deltelnetfilter 192.168.1.5 192.168.1.12
SYSTEM DELUDPRELAY
Deletes the port range that was previously enabled by the command system addUDPrelay. system delUDPrelay <ipaddr> <first port>| all [<last port>] ipaddr rst port all last port Example: IP address of the server. First port in the UDP port range to be deleted. Deletes all existing UDP ports. Last port in the UDP port range to be deleted.
system delUDPrelay 192.168.1.5 all
SYSTEM HISTORY
Displays the routers most recent console log. system history Example:
# system history Begin System History. POST summary: successful Initializing the system RAM ..... done Hardware "IDSL" successfully initialized -- ID: 3000 Today is Tuesday May 15, 2001; the time is 10:40:30 My MAC address is: 00:20:6F:0B:67:A1 Reason for this reset: power up Trying to boot from flash memory loading ....................................................................don e. Verifying CRC (77D79D92)..........................................done.
246
Efficient Networks, Inc. SS5871 (P/N 120-5871-001), Rev 34-06 (S/N 747425) Now 2769k free before buffers Interfaces detected LAN: Ethernet (10BASET HUB) WAN: IDSL
SpeedStream 5871 IDSL Router (120-5871-001/2) v5.0.0 Copyright (c) 1999-2000 Efficient Networks, Inc. All Rights Reserved INIT: buffer pool is 1371632 bytes ETHERNET/0 interface started, MAC=00:20:6F:0B:67:A1 05/15/2001-10:40:38:ETH: Obtaining an IP address for ETHERNET/0:3 with DHCP SpeedStream 5871 IDSL Router (120-5871-001/2) v5.0.0 Ready Login: Login: ***** Logged in successfully! # system history End System History. #
SYSTEM HTTPPORT
This command manages HTTP port access. It can: Disable HTTP for this router (sets the HTTP port to 0). Request the default HTTP port (80). This re-enables HTTP after it is disabled. Redefine the HTTP port.
Note: This command requires a save and reboot to take effect. To see the current setting, use the command system list. For more information, see Controlling Remote Management, on page 107. system httpPort default | disabled | <port> default disabled port Examples:
system httpport default system httpport disabled system httpport 3333
Restores the port value to the default value 80 and re-enables the port. Disables the HTTP port. Defines a new HTTP port number. Use this option to restrict remote access.
SYSTEM LIST
Lists the system settings for the target router. Chapter 8. Command Reference 247
system name (page 250) system authen (page 236) system wan2wanforwarding (page 261) system blockNetBIOSdefault (page 241) dhcp addrelay (page 352) system telnetPort (page 260) system addtelnetfilter (page 235) system SNMPPort (page 252) system addSNMPfilter (page 234) system httpPort (page 247) system addHTTPfilter (page 232) system SyslogPort (page 259) system addSyslogFilter (page 234) system addSyslogServer (page 235) system msg (page 250) system securityTimer (page 252) system oneWANdialup (page 251) system backup (page 251) system backup retry (page 240) system backup stability (page 240) system list
Example:
# system list GENERAL INFORMATION FOR <SOHO> System started on................... Authentication override............. WAN to WAN Forwarding............... Block NetBIOS Default............... BOOTP/DHCP Server address........... Telnet Port......................... Telnet Clients...................... SNMP Port........................... SNMP Clients........................ HTTP Port........................... HTTP Clients........................ Syslog Port.........................
9/8/2000 at 13:29 none no no none default (23) all default (161) all default (80) all default (514)
248
Allowed Syslog Servers.............. Default Syslog Servers.............. System message: Security timer...................... One WAN Dial Up..................... Backup.............................. Retry Interval In Minutes......... Stability Interval In Minutes.....
SYSTEM LOG
Allows logging of the routers activity in a Telnet session. system log start | stop | status start Example: stop Example: status Example: Used to monitor router activity at all times.
system log start
Used to nd out if other users (yourself included) are using this utility.
system log status
SYSTEM MODEM
Changes the selected modem setting. The modem settings are for the backup asynchronous modem connected to the console port. For more information on the Dial Backup option, see page 164. system modem reset | escape | init | offhook | dial | answer | hangup <string> dial <string> Examples: The following command changes the string for the init setting:
system modem init ATS0=0Q0V1&C2&D3&K1X4&H1&I0S12=20
The two possible strings for the dial setting are ATDT for tone dialing or ATDP for pulse dialing. The default is tone dialing. New setting for the option selected by the first parameter
249
SYSTEM MOVEIPROUTINGTABLE
Moves a range of IP addresses to another virtual routing table. The command first looks at the address ranges defined for other virtual routing tables, searching for the addresses to be moved. If it finds addresses to be moved, it deletes them from the address ranges for the other virtual routing tables. The command then adds the specified address range to the virtual routing table named on the command. To list the routes in the virtual routing tables, use the iproutes command (page 215) or the remote listiproutes command (page 305). For more information, see Virtual Routing Tables, on page 80. system moveIPRoutingTable <first ip addr> [<last ip addr>] <tablename> first ip addr last ip addr tablename Example: Suppose you want all packets with source addresses in the range 192.168.254.11 through 192.168.254.20 to be routed using virtual routing table MIGUEL. Addresses in that range may already be assigned to other virtual routing tables. Therefore, to delete the addresses from any other virtual routing tables and assign the address range to MIGUEL, you enter this command:
system moveIPRoutingTable 192.168.254.11 192.168.254.20 MIGUEL
First IP address of the range to be moved (4 decimals separated by periods). Last IP address of the range to be moved (4 decimals separated by periods). This parameter may be omitted if the range contains only one IP address. Name of the virtual routing table to be assigned the address range (character string). The virtual routing table may be new or it may already exist.
SYSTEM MSG
Sets or changes the message saved in the local router you are configuring. To see the current message, enter system msg with no parameters or use the command system list. system msg <message> message Example:
# system msg Configured _on_10/21/98 # system msg System message: Configured _on_10/21/98
Message (up to 255 characters). Space characters are not allowed; use underscore characters instead. If you do not enter a message, the current message is displayed.
SYSTEM NAME
Sets or changes the name of the local router being configured. To see the current router name, enter system name with no parameters.
250
You must assign a name to the local router. This name is sent to a remote router during PAP/CHAP authentication. system name [<name>] name Name of the target router (character string). Note: The system name is case-sensitive and may be no more than 50 characters. Space characters are not allowed within the name; you may use underscore characters instead. (The system name is a word when exchanged with PAP/CHAP.) If you do not enter a name, the current name of the router is displayed. If you type anything after system name, the characters will be taken as the new name. Example:
# system name Router1 # system name System name: <Router1>
SYSTEM ONEWANDIALUP
This command can force the router to have no more than one remote connection active at a time. (Multiple links to the same remote are allowed.) To see the current setting, use the command system list and check the One WAN Dial Up line. This command is useful when security concerns dictate that the router have only one connection active at a time. For example, if set to on, the router cannot connect to both the Internet and another location (such as your company) at the same time. A connection is only generated when data is forwarded to the remote router (dial-on-demand); Permanent links cannot be automatically generated. The command allows multiple connections to the SAME location and supports the PPP Multi-Link protocol. To do so, at system startup time, the router examines each remote entry. If if finds only one remote enabled, it leaves the remote enabled. If it finds more than one remote enabled, it disables every entry that does not have a protocol of PPP or PPPLLC. It sets the minimum number of active links (remote minLink) to 0 (zero) on the enabled entries; if the command did not perform this function, connections to multiple destinations would not be possible (since the link to the destination with minLink=non-zero would be active). This system oneWANdialup command complements the system wan2wanforwarding command (page 261). That command allows multiple connections to different locations to be active at the same time but stops traffic from passing from one WAN connection to another. system oneWANdialup on | off on off Example:
system oneWANdialup on
Enables only one active connection at a time to a remote entry. Disables system oneWANdialup, allowing WAN connections to multiple locations.
251
SYSTEM PASSWD
Sets the system authentication password for the target router that is used when the router connects to other routers or is challenged by them. This password is a default password used for all remote sites unless a unique password is explicitly defined for connecting to a remote router with the remote setOurPasswd command. system passwd <password> password Authentication password of the target router. Note: The password is case-sensitive and should be no more than 40 characters. Example:
system passwd chwgn1
SYSTEM SECURITYTIMER
This command allows the user to change the 10-minute default security timer to another value. The router automatically logs out a Telnet or console user out of privileged mode when no typing has occurred for the length of time set for the security timer. Note: To disable the security timer, set its value to 0. To see the current security timer value, use the command system list. system securityTimer <minutes> minutes Example: Timer length in minutes. To disable the automatic logout, set the value to 0.
system securityTimer 15
SYSTEM SNMPPORT
This command manages SNMP port access. It can: Disable SNMP for this router (sets the SNMP port to 0). Request the default SNMP port (161). This re-enables SNMP after it is disabled. Redefine the SNMP port.
Note: This command requires a save and reboot to take effect. To see the current setting, use the command system list. For more information, see Controlling Remote Management, on page 107. system snmpport default | disabled | <port> default disabled Restores the port value to the default value 161 and re-enables the port. Disables remote SNMP management.
252
port Examples:
Defines a new SNMP port number. Use this option to restrict remote access.
SYSTEM SUPPORTTRACE
Lets you capture to a file all the configuration data that Technical Support may need to investigate configuration problems. This exhaustive list command incorporates the following commands: system history vers mem system list eth list dhcp list (if DHCP is enabled) remote list ifs bi (if bridging is enabled) ipifs iproutes ipxroutes system supporttrace Example:
# system supporttrace === HISTORY === End System History. === VERSION === Efficient 7851 SDSL [CM/FR] (120-7851-034) Router Efficient-5000 BOOT/POST V7.0.101 (19-Apr-01 16:57) Software version v5.X.Y(irislin).0 built Mon May 7 17:42:01 PDT 2001 Maximum users: unlimited Options: FRAME RELAY, ASYNC, SDSL, VOICE-TOLLBRIDGE, RFC1483, IP ROUTING, IP FILTERING, WEB, HW-DES, IPSEC, 3DES, L2TP, ENCRYPT, BRIDGE, IPX, CMMGMT, DIAL-BACKUP, VRRP
253
Up for 0 days 20 hours 53 minutes (started 5/17/2001 at 17:49) === MEMORY === Amount of RAM installed.. 4096 Kbytes Small buffers used....... 25 (3% of 656 used) Large buffers used....... 161 (23% of 700 used) Buffer descriptors used.. 186 (10% of 1695 used) Number of waiters s/l.... 0/0 Table memory allocation statistics: Sizes 8 16 32 64 128 Used 7 132 28 90 2 Free 1 1 2 2 1 Sizes Used Free 2048 19 0 4096 9 1 8192 1 0
256 13 2
512 7 1
1024 5 1
Total in use: 105080, total free: 968952 (6488 + 962464) === PROCESSES === TID: NAME 1:IDLE 24:SENDSIG 3:MSFS_SYNC 4:SYSTEM LOGGER 5:LL_PPP 6:NL_IP 7:TL_IP_UDP 8:TL_IP_TCP 9:TELNETD 10:IKE 11:BOOTP 12:DUM 13:SDSL 14:CALLCTRL 15:DSP 16:SNMPD 17:CAS 18:HAPI 19:HTTPD 20:DNS 21:SNTP 22:CMD 25:IP_RIP
FL P BOTTOM CURRENT SIZE 02 7 2f6974 2f7880 4080 04 3 30ec84 30f368 2032 03 6 2f8a04 2f9100 2032 03 5 2fc874 2fcf70 2032 03 5 2fb844 2fc738 4080 03 5 2fddf4 2fe4f0 2032 03 3 2fe674 2fed78 2032 03 3 2feed4 2ff5d8 2032 03 5 2ff734 2ffe18 2032 03 4 301504 301be8 2000 03 5 303fd4 3046c0 2032 03 5 302964 303850 4080 03 5 304d34 3053d8 2032 03 3 306624 306d18 2032 03 3 306e34 307520 2032 03 5 3055a4 3064a8 4080 03 3 3076d4 307dc0 2032 04 2 307ff4 308ed8 4096 03 5 3090a4 309f58 4080 03 5 30a204 30b0b0 4000 03 4 30e454 30eb38 2000 01 6 30cf54 30db58 4080 03 4 310a94 311190 2032
=== FILE SYSTEM === Filesystem 0, size=1714k : Checking filesystem... Checking file entries... KERNEL IRI ... 684629 bytes ASIC AIC ... 50847 bytes KEYFILE DAT ... 768 bytes SYSTEM CNF ... 2304 bytes FRAME DAT ... 0 bytes ATOM DAT ... 0 bytes DHCP DAT ... 1280 bytes SDSL DAT ... 28 bytes
.. .. .. .. .. .. .. ..
254
41DB833E GAN ... 192 bytes .. ok. 2BC5A0B4 GAN ... 192 bytes .. ok. 2BC5A0B4 DHV ... 960 bytes .. ok. DSP DAT ... 28 bytes .. ok. USER BAT ... 462 bytes .. ok. 41DB833E DHV ... 960 bytes .. ok. EF2E6B8F GAN ... 192 bytes .. ok. 35B2A0B5 GAN ... 192 bytes .. ok. 35B2A0B5 DHV ... 960 bytes .. ok. EF2E6B8F DHV ... 960 bytes .. ok. 2D4E5524 GAN ... 192 bytes .. ok. 2D4E5524 DHV ... 960 bytes .. ok. FILTER DAT ... 1284 bytes .. ok. KERNEL F2K ... 684629 bytes .. ok. 2807 fat(s) used, 590 fat(s) free 0 fat(s) unused, 0 fat(s) unreferenced, 2 fat(s) reserved 1437184 bytes used by files, 14848 bytes by tables, 302080 bytes free
=== SYSTEM === GENERAL INFORMATION FOR <> System started on.................... Authentication override.............. WAN to WAN Forwarding................ Block NetBIOS Default................ BOOTP/DHCP Server address............ Telnet Port.......................... Telnet Clients....................... SNMP Port............................ SNMP Clients......................... HTTP Port............................ HTTP Clients......................... Syslog Port.......................... Allowed Syslog Servers............... Default Syslog Servers............... System message: Security timer....................... One WAN Dial Up...................... Backup............................... enabled) Retry Interval In Minutes.......... Stability Interval In Minutes...... MODEM STRINGS: Reset: ATZ Escape: +++ Init: ATS0=0Q0V1&C1&D0X4S12=20 Off-Hook: ATH1 Dial: ATDT Answer: ATA Hangup: ATH0
5/17/2001 at 17:49 none yes no none default (23) all default (161) all default (80) all default (514) all none 10 minutes no no (no valid remote profile is 30 3
=== ETHERNET === GLOBAL BRIDGING/ROUTING SETTINGS: Bridging enabled..................... Exchange spanning tree with dest... Bridge only PPPoE with dest........ IP Routing enabled...................
no yes no yes
255
Multicast forwarding enabled....... Firewall filter enabled ........... Directed Broadcasts Allowed........ RIP Multicast address.............. VRRP Multicast address............. IPX Routing enabled..................
ETHERNET INFORMATION FOR <ETHERNET/0> Hardware MAC address................. 00:20:6F:09:0C:25 Send IP RIP to the LAN............... rip-1 compatible Advertise me as default router..... yes Process IP RIP packets received...... rip-1 compatible Receive default route by RIP....... yes IP address translation............... no IP filters defined................... yes IP address/subnet mask............... 192.168.254.254/255.255.255.0 Management IP address/subnet mask.... 0.0.0.0/0.0.0.0 Static Ethernet routes defined....... none Virtual Ethernet routes defined...... none IPX External network number.......... 00000000 IPX Frame type....................... 802.2 MTU.................................. default
=== DHCP === BOOTP/DHCP Relay address ..... none bootp tftpserver ............. none bootp file ................... n/a Subnet 192.168.254.0, enabled When DHCP servers are active . Mask ......................... first ip address ............. last ip address .............. lease ........................ bootp ........................ bootp server ................. bootp file ................... Client IP 192.168.254.2 17:50:53 State enabled
stop 255.255.255.0 192.168.254.2 192.168.254.20 default not allowed none n/a Expires Jun 24 2001
=== VOICE === VOICE DLCI is 22 Port Pkts from Network/Dsp 1 0/ 0 2 0/ 0 3 0/ 0 4 0/ 0 5 0/ 0 6 0/ 0 7 198/ 570 8 0/ 0
VoiceRate G711 uLaw G711 uLaw G711 uLaw G711 uLaw G711 uLaw G711 uLaw G711 uLaw G711 uLaw
ChannelID 0 0 0 0 0 0 0 0
=== REMOTE DATABASE === INFORMATION FOR <configuredForCMPPlay> Status............................... enabled Interface in use..................... FR
256
Protocol in use...................... Routing Data Link Connection Id (DLCI)....... IP address translation............... IP filters defined................... Send/Receive Multicast............... Block NetBIOS Packets................ Source IP address/subnet mask........ Remote IP address/subnet mask........ Management IP address/subnet mask.... Send IP RIP to this dest............. Send IP default route if known..... Receive IP RIP from this dest........ Receive IP default route by RIP.... Keep this IP destination private..... Total IP remote routes............... 0.0.0.0/0.0.0.0/1 IPX network number................... Use IPX RIP/SAP (negotiate with PPP): Total IPX remote routes.............. Total IPX SAPs....................... Bridging enabled..................... Exchange spanning tree with dest... Bridge only PPPoE with dest........ mtu..................................
RFC1483 (SNAP) - MAC Encapsulated 528 on yes off off 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 no no no no yes 1 00000000 yes 0 0 no yes no 1500
=== INTERFACES === Interface Speed Connection ETHERNET/0 10.0mb FR/0 784kb FR-VOICE/1 784kb CONSOLE/0 57kb FR-VC/2 784kb configuredForCMPPlay
Out % Protocol 0%/0% 0%/0% 0%/0% 0%/0% 0%/0% (Ethernet) (HDLC/FR) (CLEAR) (TTY) (FR)
to
=== PPP === === BRIDGING === Bridging is disabled Bridging is disabled === ARP TABLE === IP Addr 224.0.0.9 172.17.32.1
=== IP ROUTES === IP route / Mask 0.0.0.0 RP1 RP2 172.17.32.0 PRM PRV 172.17.32.132 192.168.254.0 RP1 RP2
--> Gateway
Interface
/ffffffff --> configuredForCMPPlay FR-VC/2 0 ME /ffffff00 --> 0.0.0.0 ETHERNET/0 1 NW FW DIR PRM
257
0 0 0 0
ME ME ME NW PRM
=== IP IFS === FR-VC/2 172.17.32.132 (FFFFFF00) dest 0.0.0.0 sub 172.17.32.0 net 172.17.0.0 (FFFF0000) BROADCAST mtu 1500 mru 4096 MAC address in use 02:20:6F:09:0C:25 DHCP - lease good until Jul 24 2137 0:17:23 ETHERNET/0 192.168.254.254 (FFFFFF00) dest 0.0.0.0 sub 192.168.254.0 net 192.168.254.0 (FFFFFF00) BROADCAST mtu 1500 mru 1500 MAC address in use 00:20:6F:09:0C:25 === IPX ROUTES === No IPX sessions are active. === IPX SAPS === No IPX sessions are active. === L2TP TUNNELS === === IP FILTERS === Begin IPFilters for configuredForCMPPlay # watching for dropped/rejected packets is OFF # Begin rules for input list remote ipfilter flush input configuredForCMPPlay remote ipfilter insert 0 input accept -c 0 -p 50 -da 172.17.32.132 (IKE Global Filter) configuredForCMPPlay remote ipfilter insert 1 input accept -c 0 -p 51 -da 172.17.32.132 (IKE Global Filter) configuredForCMPPlay remote ipfilter insert 2 input accept -c 0 -p udp -sp 500 -da 172.17.32.132 -dp 500 (IKE Global Filter) configuredForCMPPlay # End rules for input list # Begin rules for receive list remote ipfilter flush receive configuredForCMPPlay # End rules for receive list # Begin rules for transmit list remote ipfilter flush transmit configuredForCMPPlay remote ipfilter insert 0 transmit accept -c 0 -p udp -sa 172.17.32.132 -sp 500 -dp 500 (IKE Global Filter) configuredForCMPPlay remote ipfilter insert 1 transmit accept -c 0 -p 50 -sa 172.17.32.132 (IKE Global Filter) configuredForCMPPlay remote ipfilter insert 2 transmit accept -c 0 -p 51 -sa 172.17.32.132 (IKE Global Filter) configuredForCMPPlay # End rules for transmit list # Begin rules for output list remote ipfilter flush output configuredForCMPPlay remote ipfilter insert 0 output accept -c 0 -p udp -sa 172.17.32.132 -sp 500 -dp 500 (IKE Global Filter) configuredForCMPPlay # End rules for output list End IPFilters for configuredForCMPPlay
258
Begin IPFilters for (ETHERNET/0) # watching for dropped/rejected packets is OFF # Begin rules for input list eth ip filter flush input 0 eth ip filter insert 0 input accept -c 0 -p 50 -da 192.168.254.254 (IKE Global Filter) 0 eth ip filter insert 1 input accept -c 0 -p 51 -da 192.168.254.254 (IKE Global Filter) 0 eth ip filter insert 2 input accept -c 0 -p udp -sp 500 -da 192.168.254.254 -dp 500 (IKE Global Filter) 0 # End rules for input list # Begin rules for receive list eth ip filter flush receive 0 # End rules for receive list # Begin rules for transmit list eth ip filter flush transmit 0 eth ip filter insert 0 transmit 500 -dp 500 (IKE Global Filter) eth ip filter insert 1 transmit Global Filter) 0 eth ip filter insert 2 transmit Global Filter) 0 # End rules for transmit list
accept -c 0 -p udp -sa 192.168.254.254 -sp 0 accept -c 0 -p 50 -sa 192.168.254.254 (IKE accept -c 0 -p 51 -sa 192.168.254.254 (IKE
# Begin rules for output list eth ip filter flush output 0 eth ip filter insert 0 output accept -c 0 -p udp -sa 192.168.254.254 -sp 500 -dp 500 (IKE Global Filter) 0 # End rules for output list End IPFilters for (ETHERNET/0)
=== IKE === There are no There are no There are no There are no
SYSTEM SYSLOGPORT
This command manages Syslog port access. It can: Disable Syslog for this router (sets the Syslog port to 0). Request the default Syslog port (514). This re-enables Syslog after it is disabled.
259
Note: This command requires a save and reboot to take effect. To see the current setting, use the command system list. For more information on configuring the router as a Syslog client, see page 168. For more information on restricting port access, see Controlling Remote Management, on page 107. system syslogport default | disabled | <port> default disabled port Examples:
system syslogport default system syslogport disabled system syslogport 3333
Restores the port value to the default value 514 and re-enables the port. Disables the Syslog port. Defines a new Syslog port number. Use this option to restrict remote access.
SYSTEM TELNETPORT
The router has a built-in Telnet server. This command can: Disable the Telnet server (sets the TCP port to 0). Request the default TCP port (23). This re-enables the Telnet server after it is disabled. Specify which routers TCP port is to receive a Telnet connection.
Note: This command requires a save and reboot to take effect. To see the current setting, use the command system list. system telnetport default | disabled | <port> default disabled port Requests the default port value (23). Disables the Telnet server. The router will not accept any incoming TCP request. Port number of the Ethernet LAN. It is recommended that this number be > 2048 if not 0 (disabled) or 23 (default).
system telnetport default system telnetport disabled system telnetport 3333
Examples:
260
SYSTEM WAN2WANFORWARDING
Allows the user to manage WAN-to-WAN forwarding of data from one WAN link to another. For example, an employee uses the router at home to access both a company network and the Internet at the same time. To prevent the passing of company information to the Internet, WAN-to-WAN forwarding should be disabled. To see the current setting for WAN to WAN forwarding, use the command system list. This system wan2wanforwarding command complements the system oneWANdialup command (page 251). That command allows you to limit WAN connections to just one remote location at a time. system wan2wanforwarding on | off on off Example: Allows data to be forwarded from one WAN link to another WAN link. Stops data from being forwarded from one WAN link to another WAN link.
system wan2wanforwarding on
261
Note: In general, these commands require a save and reboot before they take effect. However, changes made to IP filters and to virtual routing tables take effect immediately; the changes are lost, though, if they are not saved before the next reboot.
ETH ?
Lists the supported keywords. eth ? Example:
# eth ? Ethernet commands: ? br list add ip mtu delete ipx
# eth ip ? eth ip sub-commands ? addr options enable firewall directedBcast delroute defgateway unbindRoute filter
ETH ADD
Adds a logical interface onto an Ethernet port so that the router can provide service to multiple IP subnets. The eth add command defines the port number and logical interface number. You should then use an eth ip addr command to define the IP subnet that uses the logical interface. For more information, see IP Subnets, on page 79. A logical interface 0 always exists for Ethernet port 0 (and for port 1 in a dual-port router); logical interface 0 cannot be deleted.
262
Once defined, routes and filters can be created for the new logical interface using the other eth commands in this section. To list the currently defined logical interfaces, use the eth list command (page 280). To remove a logical interface, use an eth delete command (page 263). Note: This command requires a save and reboot before it takes effect. eth add <port#>:<logical#> port# logical# Example: Ethernet interface (0 for a single-port router; 0 or 1 for a dual-port router). New logical interface number. It cannot be 0 because logical interface 0 always exists.
eth add 0:1
ETH DELETE
Deletes a logical interface from an Ethernet port. For more information, see IP Subnets, on page 79 When you delete a logical interface, all information defined for that interface, such as routes and filters, is deleted automatically. To list all currently defined logical interfaces, use the eth list command (page 280). Note: Logical interface 0 cannot be deleted. Note: This command takes effect immediately; however, if the change is not saved before the next reboot, the deletion is lost and the deleted interface reappears after the reboot. eth delete <port#>:<logical#> port# logical# Example: Ethernet interface (0 for a single-port router; 0 or 1 for a dual-port router). Logical interface number. (It cannot be 0.)
eth delete 0:1
ETH IP ADDHOSTMAPPING
Remaps a range of local LAN IP addresses to a range of public IP addresses on a per-interface basis. These local addresses are mapped one-to-one to the public addresses. For more information, see Host Remapping, on page 99. Note: The range of public IP addresses is dened by <rst public addr> only. The rest of the range is computed automatically (from <rst public addr> to <rst public addr> + number of addresses remapped - 1) inclusive. eth ip addHostMapping <first private addr> <second private addr> <first public addr> <interface> first private addr First IP address in the range of IP address (4 decimals separated by periods).
second private addr Last address in the range of IP address (4 decimals separated by periods). first public addr Denes the range of public IP addresses (4 decimals separated by periods). The rest of the range is computed automatically.
263
interface
Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
eth ip addHostMapping 192.168.207.40 192.168.207.49 10.0.20.11 1
ETH IP ADDR
Defines the IP address and subnet mask for an Ethernet port or logical interface. eth ip addr <ipaddr> <ipnetmask> [<interface>] ipaddr ipnetmask interface Ethernet LAN IP address (4 decimals separated by periods.) IP network mask (4 decimals separated by periods.) Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Examples: The following command sets the IP address and subnet mask for the default Ethernet interface (0:0).
eth ip addr 192.168.1.254 255.255.255.0
The following command sets the IP address and subnet mask for logical interface 1 on Ethernet port 0.
eth ip addr 10.0.27.1 255.255.255.0 0:1
ETH IP ADDROUTE
Adds a route to the default routing table for the Ethernet interface. This command is needed only if the system does not support RIP (see RIP Controls, on page 83 and the eth ip options command, on page 276). Note: This command requires a save and reboot before it takes effect. eth ip addRoute <ipaddr> <ipnetmask> <gateway> <hops> [<interface>] ipaddr Ethernet LAN IP address (4 decimals separated by periods).
264
IP network mask (4 decimals separated by periods). IP address (4 decimals separated by periods). Number of routers through which the packet must go to get to its destination. Ethernet interface through which the packet is sent out. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1).
Examples: The following command adds a route to the default routing table for the default Ethernet interface (0:0).
eth ip addRoute 10.1.2.0 255.255.255.0 192.168.1.17 1
The following command adds a route to the default routing table for logical interface 1 on Ethernet port 0.
eth ip addRoute 10.1.3.0 255.255.255.0 10.0.27.20 1 0:1
ETH IP ADDSERVER
This Network Address Translation (NAT) command adds a servers IP address (on the LAN) associated with this interface for a particular protocol. For more information, see Network Address Translation (NAT), on page 95. To delete a server designation, use the command eth ip delserver (page 268). eth ip addServer <action> <protocol> <first port> [<last port> [<first private port>]] <interface> action One of the following command actions: ipaddr Selects the host with this IP address as server (4 decimals separated by periods). discard Discards the incoming server request. me Sends the incoming server request to the local router, regardless of its IP address. Protocol used by the selected server. protocolid Numeric protocol ID. tcp TCP only. udp UDP only. all All protocols. First or only port as seen by the Ethernet interface. Port used by the selected server portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port. ftp FTP port. h323 H.323 port. http HTTP port. smtp SMTP port. sntp SNTP port. t120 T.120 port telnet Telnet port. tftp TFTP port.
protocol
first port
265
All ports.
Optional last port in the range of ports as seen by the Ethernet interface for the server on the LAN.
first private port If specified, this is a port remapping of the incoming request from the Ethernet interface. interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Example:
eth ip addServer 192.168.1.5 tcp smtp 1 eth ip addServer 192.168.1.10 tcp 9000 9000 telnet 0
ETH IP BINDROUTE
Adds an Ethernet route to the named IP virtual routing table. Duplicate routes are not allowed within a routing table. However, identical routes may be added to different routing tables. For example, the same route may be added to a virtual routing table and to the default routing table. To list the routes, use the iproutes command, page 215. To remove an Ethernet route from a virtual routing table, use the eth ip unbindRoute command, page 277. Note: A route change in an IP virtual routing table takes effect immediately. However, the change is lost if it is not saved before the next reboot. eth ip bindRoute <ipaddr> <ipnetmask> <hops> [<gateway>] <tablename> [<interface>] ipaddr ipnetmask hops gateway tablename interface Ethernet LAN IP address (4 decimals separated by periods). IP network mask (4 decimals separated by periods). Number of routers through which the packet must go to get to its destination. IP address of the gateway (4 decimals separated by periods). IP virtual routing table to which the route is added. Ethernet interface through which the packet is sent out. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Example:
266
The following commands add a route for IP address 10.1.2.0/255.255.255.0 to four routing tables: ROSA, MIGUEL, FRANCISCO, and the default routing table. The first two routes are for Ethernet interface 0:1 and use gateway 192.168.252.9; the second two are for the default Ethernet interface (0:0) and, therefore, specify another gateway (192.168.252.7).
eth ip bindRoute 10.1.3.0 255.255.255.0 1 192.168.252.9 ROSA 0:1 eth ip bindRoute 10.1.3.0 255.255.255.0 1 192.168.252.9 MIGUEL 0:1 eth ip bindRoute 10.1.3.0 255.255.255.0 1 192.168.252.7 FRANCISCO eth ip addRoute 10.1.3.0 255.255.255.0 1 192.168.252.7
ETH IP DEFGATEWAY
Assigns an Ethernet default gateway for packets whose destination address does not have a route defined. This setting is most useful when IP routing is not enabled, in which case the system acts as an IP host (i.e., an end system, as opposed to an IP router). Note: This command requires a save and reboot before it takes effect. Note: The following command is recommended instead of the eth ip defgateway command. It sends packets for all IP addresses to the specified gateway: eth ip addRoute 0.0.0.0 255.255.255.0 <gateway> 1 eth ip defgateway <ipaddr> [<interface>] ipaddr interface Ethernet LAN IP address (4 decimals separated by periods). Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Example:
eth ip defgateway 192.168.1.1
ETH IP DELHOSTMAPPING
Undoes an IP address/ host translation (remapping) range that was previously established with the command eth ip addHostMapping on a per-interface basis (page 263). For more information, see Host Remapping, on page 99. eth ip delHostMapping <rst private addr> <second private addr> <rst public addr> <interface> first private addr First IP address in the range of IP address (4 decimals separated by periods).
second private addr Last address in the range of IP address (4 decimals separated by periods). first public addr Denes the range of public IP addresses (4 decimals separated by periods). The rest of the range is computed automatically.
267
interface
Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
eth ip delHostMapping 192.168.207.40 192.168.207.49 10.0.20.11 1
ETH IP DELROUTE
Removes a route from the default routing table that was added using the eth ip addroute command. The route to be deleted is identified by its IP address and mask and its Ethernet interface. To see the remaining routes, use the iproutes command (page 215). Note: This command requires a save and reboot before it takes effect. eth ip delRoute <ipaddr> <ipnetmask> [<interface>] ipaddr ipnetmask interface Ethernet LAN IP address (4 decimals separated by periods). IP network mask (4 decimals separated by periods). Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Examples: The following command deletes the route for IP address 10.9.2.0/255.255.255.0 for the default Ethernet interface (0:0).
eth ip delRoute 10.9.2.0 255.255.255.0
The following command deletes the route for IP address 10.1.3.0/255.255.255.0 for the Ethernet interface 0:1.
eth ip delRoute 10.1.3.0 255.255.255.0 0:1
ETH IP DELSERVER
Deletes an entry created by the eth ip addServer command (page 265). eth ip delServer <action> <protocol> <first port> [<last port> [<first private port>]] <interface>
268
action
One of the following command actions: ipaddr Selects the host with this IP address as server (4 decimals separated by periods). discard Discards the incoming server request. me Sends the incoming server request to the local router, regardless of its IP address. Protocol used by the selected server. protocolid Numeric protocol ID. tcp TCP only. udp UDP only. all All protocols. First or only port as seen by the Ethernet interface. Port used by the selected server portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port. ftp FTP port. h323 H.323 port. http HTTP port. smtp SMTP port. sntp SNTP port. t120 T.120 port telnet Telnet port. tftp TFTP port. all All ports. Optional last port in the range of ports as seen by the Ethernet interface for the server on the LAN.
protocol
first port
last port
first private port If specified, this is a port remapping of the incoming request from the Ethernet interface. interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Example:
eth ip delServer 192.168.1.5 tcp ftp 0
ETH IP DIRECTEDBCAST
Enables or disables the forwarding of broadcast packets directed to a specific network prefix. When forwarding is disabled, the router silently discards all packets broadcast to a subnet. The default is off; thus, by default, all network prefix-directed broadcast packets are discarded. This applies to all broadcast interfaces, including all Ethernet interfaces. A network prefix-directed broadcast address is the broadcast address to a particular network. For example, if a networks IP address is 192.168.254.254 and its mask is 255.255.255.0, its network prefix-directed broadcast addresses are 192.168.254.0 and 192.168.254.255. This feature is independent of the IP firewall and IP filtering features. However, it does require that IP routing be enabled (see eth ip enable, page 270). To see the current settings for IP routing and directed broadcasts, use the command eth list, page 280.
269
eth ip directedBcast on | off on off Example: Enables the forwarding of packets broadcast to a subnet. Disables the forwarding of packets broadcast to a subnet. The default setting is off.
eth ip directedBcast on
ETH IP DISABLE
Disables IP routing across the Ethernet LAN. This commands acts as a master switch allowing you to disable all IP routing for testing or control purposes. Note: This command requires a save and reboot before it is effective. eth ip disable Example:
eth ip disable
ETH IP ENABLE
Enables IP routing across the Ethernet LAN. This command acts as a master switch allowing you to re-enable all IP routing. Note: This command requires a save and reboot before it is effective. eth ip enable Example:
eth ip enable
ETH IP FILTER
Manages the IP filters for the Ethernet interface(s). The filters are used to screen IP packets. Each Ethernet interface can have its own set of filters. The intended interface is designated at the end of the filter command. If the router has two physical Ethernet interfaces (an Ethernet hub router), the interface is designated by its port number (0 or 1). If logical interfaces have been defined to provide service to multiple IP subnets, the logical interface number is also specified (port #:<logical #, for example, 0:1). Each interface can have filter lists that are applied at up to four points in the process: Input, Receive, Transmit, and Output. For more information on how and when the filter types are applied, refer to IP Filtering, on page 129. Note: IP filters take effect immediately upon entry. They can even affect the current connection that you are using to enter commands. Unlike other configuration changes, you do not need to save and reboot or restart. eth ip filter <command> <type> <action> [<parameters>] [<interface>] The following commands are provided for managing IP filters for an Ethernet interface: 270 Chapter 8. Command Reference
eth ip filter append [<line number>] <type> <action> [<parameters>] [<interface>] Appends a filter to the list of filters for this <type> and <interface>. The filter is specified by the <action> and optional <parameters>. If no line number is specified, the filter is appended to the end of the list; otherwise, it is appended after the specified line. For example, append 0 appends the filter after line 0. Filters are used in the order they appear in their list. eth ip filter insert [<line number>] <type> <action> <parameters> [<interface>] Inserts a filter in the list of filters for this <type> and <interface>. The filter is specified by the <action> and optional <parameters>. If no line number is specified, the filter is inserted at the beginning of the list; otherwise, it is inserted before the specified line. For example, insert 0 inserts the filter before line 0 so it is the first filter in the list. Filters are used in the order they appear in their list. eth ip filter delete <type> <action> <parameters> [<interface>] Deletes the first filter that matches the filter specified on the command. eth ip filter flush [<first line> [<last line>]] <type> [<interface>] Deletes a range of filters from the list for this <type> and <interface>. If no line numbers are specified, all filters in the list are deleted. If only the first line number is specified, all filters from that line to the end are deleted. To see the current filter list, use the eth ip filter list command. Filters are used in the order they appear in their list. eth ip filter clear [<first line> [<last line>]] [<type>] <clear arg> [<interface>] Resets the counters for the specified filters. A filter has a counter if the -c parameter was specified when the filter was defined. You can specify the filters whose counters are to be reset by their line number range and type (input, output, or forward). If no type is specified, the counters for all filters for the interface are reset. If no line numbers are specified, the counters for all filters for that type and interface are reset. If only the first line number is specified, all counters for filters from that line to the end of the list are reset. To see the line numbers and counters, use the eth ip filter list command. eth ip filter check <type> <parameters> [<interface>] Checks the action that would be taken if a packet with the specified parameters was compared with the list of filters defined for the specified type and interface. For example, the command eth ip filter check input -p TCP 1 would check what action (accept, drop, reject, inipsec, outipsec) would be taken for a TCP packet after it was compared with the list of input filters defined for port 1. eth ip filter list <type> [<interface>] Lists all filters of the specified <type> defined for the specified <interface>.
271
eth ip filter watch <on | off> [-q | -v] [<interface>] Turns on or turns off the console watch for the interface. If the watch is on, a message is printed to the console serial port when a packet is dropped or rejected. (The message is also sent to any Syslog servers; see Syslog Client, on page 168.) However, if the parameter -q (quiet) was specified for a filter, no message is printed when that filter matches a packet. If the parameter -v (verbose) was specified for a filter, a message is printed whenever that filter matches a packet, regardless of the filter action. To see the messages, Telnet to the router and enter system log start. The watch does not continue after a reboot; to resume the watch after a reboot, you must enter the eth ip filter watch on command again. The lter type species at which point the lter is compared to the IP packet (see the illustration under Filters and Interfaces, on page 129): input receive transmit output When the packet enters the interface, before any network address translation is performed. When the packet enters the interface, after any network address translation, but before routing table processing. After routing table processing, before any network address translation before the packet is sent out. After routing and network address translation, just before the packet is sent out.
If the packet matches the lter, the specied action is performed: accept drop reject inipsec The packet is allowed to proceed for further processing. The packet is discarded, without sending an ICMP (Internet Control Management Protocol) error message. The packet is discarded and an ICMP error message is returned to the sender. The packet is passed to IPSec for decrypting. The filter is intended to match packets coming from the other IPSec gateway. Although filters are the mechanism by which packets are passed to IPSec, it is recommended that you use IKE to manage your IP Security (see IPSec (Internet Protocol Security), on page 149). The packet is passed to IPSec so it can be encrypted and sent to the other IPSec gateway. The filter is intended to match packets coming from the local protected network. Although filters are the mechanism by which packets are passed to IPSec, it is recommended that you use IKE to manage your IP Security (see IPSec (Internet Protocol Security), on page 149).
outipsec
The following parameters specify the characteristics that an IP packet must have in order to match the lter. A lter can require any or all of these characteristics. -p <protocol> | TCP | UDP | ICMP The packet must have the specified protocol. If no protocol is specified, the filter matches every protocol. -sa <first source ip addr>[:<last source ip addr>] The packet must have a source IP address within the specified address range. If only one address is specified, the packet must have that source IP address. If no source IP address is specified, the filter matches any address in the range 0.0.0.0:255.255.255.255.
272
-sm <source ip mask> The filter uses the specified mask when comparing the <first source ip addr>...<last source ip addr> with the source IP address in the IP packet. If no source mask is specified, the mask used is 255.255.255.255. -sp <ICMP type> | <first source port>[:<last source port>] The packet must have a source port that matches the specified ICMP type or that is within the specified port range. If only one port is specified, the packet must have that source port. If no source port is specified, the filter matches any source port in the range 0:0xffff. -da <first dest ip addr>[:<last dest ip addr>] The packet must have a destination IP address within the specified address range. If only one address is specified, the packet must have that destination IP address. If no destination IP address is specified, the filter matches any address in the range 0.0.0.0:255.255.255.255. -dm <dest ip mask> The filter uses the specified mask when comparing the <first dest ip addr>...<last dest ip addr> with the destination IP address in the IP packet. If no destination mask is specified, the mask used is 255.255.255.255. -dp <ICMP type> | <first dest port>[:<last dest port>] The packet must have a destination port that matches the specified ICMP type or that is within the specified port range. If only one port is specified, the packet must have that destination port. If no destination port is specified, the filter matches any destination port in the range 0:0xffff. -tcp syn | ack | noflag | rst If the IP packet is a TCP packet, the filter matches the packet only if the packet flag settings are as specified. If no -tcp option is specified for the filter, flag settings are not checked. Note: You may specify more than one -tcp option for the IP filter. The syn, ack, and noflag settings work together as follows: - Specify -tcp syn if the TCP SYN flag must be set. - Specify -tcp ack if the TCP ACK flag must be set. - Specify -tcp noflag if neither the SYN flag nor the ACK flag can be set. For example, for the IP filter to match the initiation of a TCP connection, specify -tcp syn. The filter will match TCP packets that have the TCP SYN flag set but not the TCP ACK flag set. For the filter to match the response to initiation of a TCP connection, specify -tcp syn and -tcp ack. The filter will match only TCP packets with both the TCP SYN and TCP ACK flags set. The -tcp rst setting is independent of the others; if you specify -tcp rst for the filter, the filter matches every TCP packet with the TCP RESET flag set, regardless of the other flag settings. For example, for the filter to match packets for established connections, you would specify both -tcp rst and -tcp ack so that the filter is applied to every TCP packet that has either the RESET flag or the ACK flag set. The following parameters request additional filter options. -b This option requests that this filter be compared twice with each packet. The first time the source filter information is matched against the source information in the IP packet and the destination filter information is matched against the destination information in the IP packet. The second time the source filter information is matched against the destination information in the IP packet and the destination filter information is matched against the source information in the IP packet. -c <count of times rule used> This option requests a counter for this filter. If specified, a count is kept of how many IP packets have
273
matched this filter since the router was rebooted. To see the current count for a filter, use the eth ip filter list command. To clear a counter, use the eth ip filter clear command. -ipsec <IPSec record name> Use this option when the action specified is inipsec or outipsec. It specifies the IPSec Security Association that uses the filter. -q or -v Specify one of these options to determine when watch messages are sent for this filter. The messages are sent to the console serial port (and to any Syslog servers; see page 168). If neither -q or -v are specified for the filter, and an eth ip filter watch on command is entered for the interface, a message is sent each time this filter causes a packet to be dropped or rejected. If -q (quiet) is specified, no messages are printed for this filter, even if the filter causes a packet to be dropped or rejected. If -v (verbose) is specified, a message is printed every time this filter matches a packet, regardless of the filter action. The optional interface determines which Ethernet interface the lter applies to. If the router has only one Ethernet interface, <interface> may be omitted. If the router has two physical Ethernet interfaces (that is, a dual-port router), you must specify the port by its number (0 or 1). If logical interfaces have been defined for the physical Ethernet interface, the port number and the logical interface number are specified (<port #>:<logical #>, for example, 0:1). Examples: This command clears all filters from the Input filter list for Ethernet interface 0. Use this command as the first command in a list of commands starting a new Input filter list.
eth ip filter flush input 0
These commands prevent the forwarding of all IP traffic. If you put these filters at the end of the filter lists, they will stop all packets that have not matched filters earlier in the lists.
eth ip filter append receive drop eth ip filter append transmit drop
ETH IP FIREWALL
The router supports IP Internet Firewall Filtering to prevent unauthorized access to your system and network resources from the Internet. This filter discards packets received from the WAN that have a source IP address recognized as a local LAN address. This command sets Ethernet Firewall Filtering on or off and allows you to list the active state. Note 1: This command requires a save and reboot before it takes effect. Note 2: To perform Firewall Filtering, IP routing must be enabled. For more information, see Internet Firewall Filtering, on page 82.
274
eth ip firewall on | off | list on off list Example: Sets rewall ltering on. IP routing must also be enabled for ltering to be performed. Sets rewall ltering off. Lists the current status of rewall ltering.
# eth ip firewall list The Internet firewall filter is currently on. 0 offending packets were filtered out.
ETH IP MGMT
This command assigns to an Ethernet interface an IP address which is to be used for management purposes only and not for IP address translation. This management IP address is generally a private network address used solely by the ISP. The management IP address is separate from the IP address used for IP address translation. The IP address used for address translation is generally a public IP address valid on the Internet. It is set by the eth ip addr command (page 264). Note: The management address is not effective until after the next save and reboot. Note: To use the management address as the source address for a ping, you must specify it using the -I option on the ping command (page 217). For example, to use management address 192.168.1.2 when pinging destination address 192.168.100.100, specify:
ping -I 192.168.1.2 192.168.100.100
Note: To use the management address as the source address for a copy, you must specify both the source and destination addresses on the copy command (page 226). To list the current management address for the Ethernet interface, if any, use the eth list command (page 280). To set a management address for the WAN interface, see remote setMgmtIpAddr (page 314). eth ip mgmt <ipaddr> <ipnetmask> [<interface>] ipaddr ipnetmask interface IP address (4 decimals separated by periods). IP subnet mask (4 decimals separated by periods). Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Example:
# eth ip mgmt 10.0.0.2 255.255.255.0 0:1 # save
275
# reboot
ETH IP OPTIONS
Turns on or turns off an IP option for the specified Ethernet interface. The IP options include: Options to transmit or receive RIP-1 and/or RIP/2 packets. (See RIP Controls, on page 83.) Option to advertise this router as the default router. Option to enable forwarding of IP multicast traffic.
Note: This command requires a save and reboot before it takes effect. eth ip options <option> on | off [<interface>] option Must be one of the following: rxrip Receive and process IP RIP-1 compatible and RIP-2 broadcast packets from the Ethernet LAN. Also receive and process RIP-2 packets that are multicast as defined by the eth ip ripmulticast command. Set this option if the local router is to discover route information from the Ethernet LAN. The default is on. Receive and process RIP-1 packets only. Receive and process RIP-2 packets only. Receive the default route address from the Ethernet LAN. The default is on. This option is useful if you do not want to configure your router with a default route. Transmit RIP-1 compatible broadcast packets and RIP-2 multicast packets over the Ethernet LAN. The default is on. Transmit broadcast RIP-1 packets only. Transmit multicast RIP-2 packets only. Advertise this router as the default router over the Ethernet LAN (provided it has a default route). The default is on. Set this to off if another router on the local LAN is the default router. Enables this Ethernet interface to forward IP multicast traffic. Note: If any remote has multicast forwarding enabled, multicast forwarding is enabled on all Ethernet interfaces automatically. However, you can disable forwarding for a specific interface using this command. interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Example:
276
ETH IP RIPMULTICAST
Changes the multicast address for RIP-1 compatible and RIP-2 packets. The default address is 224.0.0.9. For more information, see RIP Controls, on page 83. eth ip ripmulticast <ipaddr> ipaddr Example: IP address of the remote network or station (4 decimals separated by periods).
eth ip ripmulticast 239.192.0.9
ETH IP TRANSLATE
This command is used to control Network Address Translation on a per-interface basis. It allows several PCs to share a single IP address to the Internet. To read more about Network Address Translation (NAT), see page 95. eth ip translate on | off <interface> on | off interface Indicates whether Network Address Translation is on or off for this Ethernet interface. Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Example: This command enables Network Address Translation for port 0.
eth ip translate on 0
This command disables Network Address Translation for logical interface 0:1
eth ip translate off 0:1
ETH IP UNBINDROUTE
Removes an Ethernet route from the named IP virtual routing table. To list the routes, use the iproutes command, page 215. To add an Ethernet route to a virtual routing table, use the eth ip bindRoute command. Note: A route change in an IP virtual routing table takes effect immediately. However, the change is lost if it is not saved before the next reboot.
277
eth ip unbindRoute <ipaddr> <tablename> [<interface>] ipaddr tablename interface Ethernet LAN IP address (4 decimals separated by periods). IP virtual routing table from which the route is removed. Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Example: The following commands remove Ethernet routes from virtual routing table ROSA. The first deleted route is for IP address 10.1.2.0 and the default Ethernet interface (0:0). The second deleted route is for IP address 10.1.3.0 and the logical Ethernet interface 0:1.
eth ip unbindRoute 10.1.2.0 ROSA eth ip unbindRoute 10.1.3.0 ROSA 0:1
ETH IP VRID
Assigns a virtual router ID (VRID) to an Ethernet interface. The same VRID must be assigned to the master router and its backup routers. For more information, see VRRP Backup, on page 116. This command designates the interface as the VRRP interface for the router. You must use another logical Ethernet interface as the management interface for the router. To create a new logical Ethernet interface, use the command eth add (page 262) and then assign it an IP address with an eth ip addr command (page 264). Note: The assignment takes effect after you save the change and restart the interface or reboot the router. After you assign the VRID, you specify its attributes with the eth vrrp commands (see page 282). If you delete the VRID (eth vrrp delete), the VRRP interface designation is cleared. You can also clear the VRRP interface designation by entering the eth ip vrid command with 0 as the VRID. eth ip vrid <vrid> [<interface>] vrid Virtual router ID (integer, 1-255). If you specify 0 as the VRID, the Ethernet interface is no longer the VRRP interface. interface Ethernet interface. The default Ethernet interface is 0:0. To specify a logical interface other than 0:0, specify both the port number (0 or 1) and the logical interface number using the format <port #>:<logical #> (for example, 0:1). Examples: This command assigns VRID 7 to the logical Ethernet interface 0:1.
278
This command clears the VRRP interface designation from interface 0:1.
eth ip vrid 0 0:1
This command assigns VRID 1 to the default logical Ethernet interface 0:0.
eth ip vrid 1
279
Example:
ETH LIST
Lists information about the Ethernet interfaces including the status of bridging and routing, IP protocol controls, and IP address and subnet mask. eth list [<interface>] interface Ethernet interface for which information is listed. If the parameter is omitted, information is listed for all Ethernet interfaces in the router. For a dual-port router, you may specify the port number (0 or 1). If logical interfaces are defined, you may specify a port and logical interface number (<port #>:<logical interface #>, such as 0:1). Example:
# eth list GLOBAL BRIDGING/ROUTING SETTINGS: Bridging enabled..................... Exchange spanning tree with dest... IP Routing enabled................... Multicast forwarding enabled....... Firewall filter enabled............ Directed Broadcasts Allowed........ RIP Multicast address.............. IPX Routing enabled..................
ETHERNET INFORMATION FOR <ETHERNET/0> Hardware MAC address................. 00:20:6F:02:98:04 Send IP RIP to the LAN................. no Advertise me as default router..... yes Process IP RIP packets received...... no Receive default route by RIP....... yes IP filters defined................... no IP address/subnet mask............... 192.168.0.101/255.255.255.0 Static Ethernet routes defined....... 1 IP address/subnet mask............. 0.0.0.0/0.0.0.0 IP gateway/metric.................. 192.168.0.252/1 Virtual Ethernet routes defined...... none IPX External network number.......... 00000000 IPX Frame type....................... 802.2
280
MTU.................................. default
ETH MTU
Sets the maximum transfer unit for the Ethernet interface. The default is 1500 bytes. You can set the MTU size to less than 1500 bytes, but you cannot set the MTU to greater than 1500 bytes, even if you specify a larger value on an eth mtu command. (RFC 1042 recommends 1500 bytes as the maximum MTU for an Ethernet network.) To see the current MTU size for an interface that has IP enabled, use the ipifs command (page 215). eth mtu <size> [<interface>] size interface Maximum number of bytes that can be transferred as a unit. Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface. If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specified. To specify a logical interface other than logical interface 0, specify both the port number and the logical interface number (<port #>:<logical #>, for example, 0:1). Example: The following command decreases the MTU size for Ethernet interface 0:1 to 1400 bytes.
eth mtu 1400 0:1
ETH RESTART
Stops and restarts a logical Ethernet interface. To read about logical Ethernet interfaces, see page 79. Certain configuration changes for a logical Ethernet interface become effective only after the logical interface is restarted or the router is rebooted. Remember to save the changes before the restart or reboot. Note: Use restart instead of reboot whenever possible. A restart does not affect other interfaces, allowing their traffic to continue. For example, using restart, you can add an IP route without killing voice traffic. To restart an remote interface, use remote restart (page 307). eth restart <interface> interface Example: The following command restarts logical Ethernet interface 0:1.
eth restart 0:1
Logical Ethernet interface. Specify both the port number and the logical interface number using the format <port #>:<logical #> (for example, 0:1).
281
ETH START
Starts a stopped logical Ethernet interface. To read about logical Ethernet interfaces, see page 79. A logical Ethernet interface is stopped using the command eth stop (page 282). To stop and immediately restart a logical Ethernet interface, use the command eth restart (page 281). eth start <interface> interface Example: The following command starts logical Ethernet interface 0:1.
eth start 0:1
Logical Ethernet interface. Specify both the port number and the logical interface number using the format <port #>:<logical #> (for example, 0:1).
ETH STOP
Stops a logical Ethernet interface. To read about logical Ethernet interfaces, see page 79. Note: To keep certain configuration changes, you must enter a save command before stopping the logical interface. The stopped interface is disabled until it is started again. To start a logical Ethernet interface, use the command eth start (page 282). To stop and immediately restart a logical Ethernet interface, use the command eth restart (page 281). eth stop <interface> interface Example: The following command stops logical Ethernet interface 0:1.
eth stop 0:1
Logical Ethernet interface. Specify both the port number and the logical interface number using the format <port #>:<logical #> (for example, 0:1).
282
vrid port#
Virtual router ID (integer, 1-255). It is defined by an eth ip vrid command (page 278). Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be omitted if the router has only one port. If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified.
Examples: This command defines an attribute record for VRID 7 for the default port 0.
eth vrrp add 7
283
Use this command to disable VRRP. To re-instate a deleted VRID, you need to redefine both the VRID and the VRRP attribute record.. For example, the following commands disable VRID 7 and then re-enable it for the logical interface 0:0:
# # # # eth vrrp delete 7 eth ip vrid 7 eth vrrp add 7 04/16/2001-08:36:06:VRRP: VRRP 7 on Interface ETHERNET/0 now active
When removing a VRRP configuration from a router, you would delete both the VRRP attribute record and the extra logical interface. To do so, use the commands eth vrrp delete and eth delete (page 263). Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the interface or reboot the router. eth vrrp delete <vrid> [<port#>] vrid port# Virtual router ID (integer, 1-255). Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be omitted if the router has only one port. If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified. Example: This command deletes the attribute record for VRID 7 for the default port 0.
eth vrrp delete 7
284
To read more about VRRP Backup, see page 116. The preemption setting may differ among the backup routers for a VRID. Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the interface or reboot the router. eth vrrp set option preempt | nopreempt <vrid> [<port#>] preempt nopreempt vrid Preempt immediately. Do not preempt a router with lower priority. Virtual router ID of the VRRP attribute record (integer, 1-255). The attribute record was created by the command eth vrrp add (page 282).
285
port#
Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be omitted if the router has only one port. If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified.
Example: This command specifies no preemption for VRID 7 using default port 0.
eth vrrp set option nopreempt 7
286
The priority for the master router must be the maximum, 255; the priority for each backup router must be less than 255. The priority values must differ for each router that uses the same VRID. For example, the master router for VRID 7 must have priority 255 while the first backup router for VRID 7 could have the default priority 100 and a second backup router for VRID 7 could have priority 50. Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the interface or reboot the router. eth vrrp set priority <priority> <vrid> [<port#>] priority vrid Priority value (integer, 1-255). The priority for the master router must be 255; the priority for each backup router must be less than 255. Virtual router ID of the VRRP attribute record (integer, 1-255). The attribute record was created by the command eth vrrp add (page 282). Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be omitted if the router has only one port. If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified. Examples: This command specifies the maximum priority for the master router for VRID 7 using default port 0.
eth vrrp set priority 255 7
port#
This command defines priority 50 for a backup router for VRID 7 using port 1.
eth vrrp set priority 50 7 1
287
Note: The time interval must be the same for every router in the Virtual Router, that is, for every router in the LAN with the same VRID. For example, if a VRRP interface in routers A, B, and C has the VRID 7, routers A, B, and C must all specify the same time interval for VRID 7. Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the interface or reboot the router. eth vrrp set timeinterval <seconds> <vrid> [<port#>] seconds vrid port# Time interval value in seconds (integer). Virtual router ID of the VRRP attribute record (integer, 1-255). The attribute record was created by the command eth vrrp add (page 282). Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be omitted if the router has only one port. If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified. Example: This command specifies two seconds as time interval for VRID 7 using default port 0.
eth vrrp set timeinterval 2 7
288
REMOTE Commands
The commands in this section begin with the word remote. The commands allow you to add, delete, and modify remote routers to which the target router can connect. Remote router information that can be configured includes: PVC numbers Security authentication protocols and passwords WAN IP/ IPX addresses IP routes IPX routes and SAPS Remote bridging addresses and bridging control Host mapping
REMOTE ?
Lists the supported keywords. (The list varies depending on the router model.) remote ?
st
Example:
# remote ? Sub-commands for remote: ? help del delete enable disable stop restart enaAuthen disAuthen setOurPasswd delOurPasswd delOurSysName listPhones setL2TPClient setProtocol setATMnsap setPhone setBod setMaxLine addHostMapping delServer setPPPOptions setCompression setRmtIpAddr bindIPVirtualRoute listIproutes delIpxroute delIpxsap listBridge delBridge delATMnsap delPhone addCaller setMinLine delHostMapping setIPTranslate ipfilter stats addIproute unbindIPVirtualRoute setIpxaddr listIpxroutes listIpxsaps setBrOptions enaBridge
add list start setAuthen setPasswd setOurSysName setLNS setPVC setATMTraffic setBWThresh delCaller setTimer addServer setIPslavePPP blockNetBIOS statsclear delIproute setIpOptions addIpxroute addIpxsap setIpxOptions addBridge disBridge
289
setmtu
REMOTE ADD
Adds a remote router entry into the remote router database. remote add <remoteName> remoteName Example: Name of the remote router (character string). The name is case-sensitive.
remote add HQ
REMOTE ADDBRIDGE
Defines the remote router entry as the default bridging destination for outbound bridging. The command can define either the default bridging destination for all MAC addresses or the default bridging destination for a specific MAC address. When you specify a MAC address on this command, a permanent entry for that address is created in the bridging table. Thereafter, packets that contain that MAC address are bridged using the specified remote router entry. (To see the entries in the bridging table, use the bi list command.) Note: Bridging using the specified remote is effective only after it has been enabled using the remote enabridge command (page 300). To see the current bridge settings for a remote, use the remote listbridge command (page 305). To remove the default designation from a remote, use the remote delbridge command (page 295). If IP and IPX routing are disabled, all packets, with an unknown destination, are bridged to the default bridging destination. If IP and/or IPX routing is enabled, bridging occurs only for packets that are not routed. remote addbridge * | <MAC_addr> <remoteName> * MAC_addr remoteName Example:
remote addbridge 01:08:03:0A:0B:0C HQ
All MAC addresses. MAC address (six bytes, specified as six hexadecimals, separated by colons). Name of the remote router (character string). The name is case-sensitive.
REMOTE ADDHOSTMAPPING
Remaps a range of local LAN IP addresses to a range of public IP addresses on a per-remote-router basis. These local addresses are mapped one-to-one to the public addresses. Note: The range of public IP addresses is defined by <first public addr> only. The rest of the range is computed automatically (from <first public addr> to <first public addr> + number of addresses remapped - 1) inclusive. remote addHostMapping <first private addr><second private addr><first public addr><remoteName>
290
First IP address in the range of local IP address to be remapped, in the format of 4 decimals separated by periods. Last address in the range of local IP address to be remapped, in the format of 4 decimals separated by periods. Denes the range of public IP addresses, in the format of 4 decimals separated by periods. The rest of the range is computed automatically.
remoteName Example:
REMOTE ADDIPROUTE
Adds an IP address route to a network or station on the LAN connected beyond the remote router. The route is added to the default routing table. The local routers routing table must be seeded statically to access networks and stations beyond this remote router. After the connection is established, standard RIP update packets can dynamically add routes to the routing table. Setting this address is not required if the local router never connects to the remote router and the remote router supports RIP. Note: Changes to the default routing table require a save and a remote restart or reboot before they take effect. remote addIpRoute <ipaddr> <ipnetmask> <hops> [<ipgateway>] <remoteName> ipaddr ipnetmask hops ipgateway IP address of the remote network or station (4 decimals separated by periods). IP network mask of the remote network or station (4 decimals separated by periods). Perceived cost to reach the remote network or station by this route (number between 1 and 15). Address of a router on the remote LAN (4 decimals separated by periods). Enter a gateway only if you are configuring a MER interface. Check with your system administrator for details. Name of the remote router (character string).
remoteName Examples:
The first two addresses in the list represent subnetworks, the third is a class B network, the fourth is a host, and the fifth address is the default route. The fifth command adds the default route when the WAN interface is a pointto-point interface; the sixth command adds the default route when the WAN interface is a broadcast interface.
remote addIpRoute 10.1.210.64 255.255.255.192 1 HQ remote addIpRoute 10.1.210.032 255.255.255.224 1 HQ remote addIpRoute 172.17.0.0 255.255.0.0 2 HQ remote addIpRoute 10.1.210.072 255.255.255.255 1 HQ remote addIpRoute 0.0.0.0 0.0.0.0 1 HQ remote addIproute 0.0.0.0 0.0.0.0 1 172.16.10.1 HQ
291
REMOTE ADDIPXROUTE
Adds an IPX route for a network or station on the LAN network connected beyond the remote router. The target routers routing information table must be seeded statically to access networks and stations beyond this remote router. After the connection is established, standard RIP update packets will dynamically add to the routing table. (Setting this address is not required if a target router never connects to the remote router and the remote router supports RIP.) Note: A reboot command must be performed on the target router for the addition of a static route to take effect. remote addIpxRoute <ipxNe#> <metric> <ticks> <remoteName> ipxNe# metric ticks remoteName Example: IPX network number represented by 8 hexadecimal characters. Number of routers through which the packet must go to get to the network/station. Number in 1/8 seconds which is the estimated time delay in reaching the remote network or station. Name of the remote router (character string).
remote addIpxRoute 456 1 4 HQ
REMOTE ADDIPXSAP
Adds an IPX SAP to the server information table for a service on the LAN network connected beyond the remote router. The target routers SAP table must be seeded statically to access services beyond this remote router. After the connection is established, standard SAP broadcast packets will dynamically add to the table. Note: A reboot must be performed on the target router for the addition of a SAP to take effect. remote addIpxSap <servicename> <ipxNet > <ipxNode> <socket> <type> <hops> <remoteName> servicename ipxNet ipxNode socket type hops remoteName Example: Name of server. IPX network number represented by 8 hexadecimal characters. IPX node address represented by 12 hexadecimal characters. Socket address of the destination process within the destination node. The processes include services such as le and print servers. Number representing the type of server. Number of routers through which the packet must go to get to the network/station. Name of the remote router (character string).
remote addIpxSap Fileserver 010a020b 0108030a0b0c 451 HQ
292
REMOTE ADDSERVER
This Network Address Translation (NAT) command is used to add a servers IP address (on the LAN) associated with this remote router for a particular protocol. To learn more, see Network Address Translation (NAT), on page 95. Multiple system addserver (page 233) and remote addserver commands can designate different servers for different protocols, ports, and interfaces. When a request is received, the router searches the server list for the appropriate server. The order of search for a server is discussed in Server Request Hierarchy, on page 98. To delete a server designation, use the command remote delserver (page 298). remote addServer <action> <protocol> <first port> [<last port> [<first private port>]] <remoteName> action One of the following command actions: ipaddr Selects the host with this IP address as server (4 decimals separated by periods). discard Discards the incoming server request. me Sends the incoming server request to the local router, regardless of its IP address. Protocol used by the selected server. protocolid Numeric protocol ID. tcp TCP only. udp UDP only. all All protocols. First or only port as seen by the remote end. Port used by the selected server portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port. ftp FTP port. h323 H.323 port. http HTTP port. smtp SMTP port. sntp SNTP port. t120 T.120 port telnet Telnet port. tftp TFTP port. all All ports. Optional last port in the range of ports as seen by the remote end for the server on the LAN.
protocol
first port
last port
first private port If specified, this is a port remapping of the incoming request from the remote end. remoteName Example:
remote addServer 192.168.1.5 tcp smtp remote addServer 192.168.1.10 tcp 9000 9000 telnet router2
REMOTE BINDIPVIRTUALROUTE
Adds a remote route to the named IP virtual routing table. To list the remote routes, use the remote listIProutes command, page 305. To remove a route from a virtual routing table, use the remote unbindIPVirtualRoute command, page 324.
293
Note: A route change in an IP virtual routing table takes effect immediately. However, the change is lost if it is not saved before the next remote restart or reboot. remote bindIPVirtualRoute <ipaddr> <ipnetmask> <hops> [<ipgateway>] <tableName> <remoteName> ipaddr ipnetmask hops ipgateway tableName remoteName Example: The following command adds a route to virtual routing table FRANCISCO. The route is to IP address 10.1.2.0/255.255.255.0 and goes through remote router HQ.
remote bindIPVirtualRoute 10.1.2.0 255.255.255.0 1 francisco HQ
IP address of the remote network or station (4 decimals separated by periods). IP network mask of the remote network or station (4 decimals separated by periods). Perceived cost in reaching the remote network or station by this route (number between 1 and 15). Address of a router on the remote LAN (4 decimals separated by periods). Enter a gateway only if you are configuring a MER interface. IP virtual routing table to which the route is added. Name of the remote router (character string).
REMOTE BLOCKNETBIOS
This command turns on or turns off a filter that blocks all NetBIOS packets over this WAN connection. remote blockNetBIOS on|off <remoteName>
REMOTE DEL
Deletes a remote router entry from the remote router database. remote del <remoteName> remoteName Example: Name of the remote router (character string).
remote del HQ
REMOTE DELATMNSAP
This command deletes an ATM mapping set by the remote setATMnsap command (page 307). remote delATMNasp ATMF | E164 partial | full <nsap> <remoteName>
294
REMOTE DELBRIDGE
Removes the designation of the remote router entry as the default bridging destination. (Default bridging destinations are defined using the remote addbridge command, page 290.) To see the bridge settings for a remote entry, use the remote listbridge command (page 305). To remove a designation as the default bridging destination for a specific MAC address, specify that address on the command. The entry is then removed from the bridging table. To see the entries in the bridging table, use the bi list command (page 212). remote delbridge * | <MAC_addr> <remoteName> * MAC_addr remoteName Example:
remote delbridge 01:08:03:0A:0B:0C HQ
All MAC addresses. MAC address (six bytes, specified as six hexadecimals, separated by colons). Name of the remote router (character string). The name is case-sensitive.
REMOTE DELENCRYPTION
Deletes encryption files associated with a remote router. remote delEncryption <remoteName> remoteName Example: Name of the remote router (character string).
remote delEncryption HQ
REMOTE DELHOSTMAPPING
Undoes an IP address/host translation (remapping) range that was previously established with the command remote addhostmapping on a per-remote-router basis. remote delHostMapping <first private addr> <second private addr> <first public addr> <remoteName> rst private addr second private addr rst public addr First IP address in the range of IP address, in the format of 4 decimals separated by periods. Last address in the range of IP address, in the format of 4 decimals separated by periods. Denes the range of public IP addresses, in the format of 4 decimals separated by periods. The rest of the range is computed automatically. Name of the remote router (character string).
remote delHostMapping 192.168.207.40 192.168.207.49 10.0.20.11 HQ
remoteName Example:
295
REMOTE DELIPROUTE
Deletes an IP address route for a network or station on the LAN connected beyond the remote router. The route is deleted from the default routing table. Note: Changes to the default routing table require a save and remote restart or reboot before they take effect. remote delIpRoute <ipaddr> <remoteName> ipaddr remoteName Example: IP address of the remote network or station (4 decimals separated by periods). Name of the remote router (character string).
remote delIpRoute 10.1.2.0 HQ
REMOTE DELIPXROUTE
Deletes an IPX address for a network on the LAN connected beyond the remote router. Note: The reboot command must be issued on the target router for a deleted static route to take effect. remote delIpxroute <ipxNet> <remoteName> ipxNet remoteName Example: IPX network number represented by 8 hexadecimal characters. Name of the remote router (character string).
remote delIpxRoute 010a020b HQ
REMOTE DELIPXSAP
Deletes an IPX service on the LAN network connected beyond the remote router. Note: The reboot command must be issued on the target router for a deleted service to take effect. remote delIpxSap <servicename> <remoteName> servicename remoteName Example: Name of server Name of the remote router (character string).
remote delIpxSap Fileserver HQ
296
REMOTE DELOURPASSWD
Removes the unique CHAP or PAP authentication password entries established by the command remote setOurPasswd. remote delOurPasswd <remoteName> remoteName Example: Name of the remote router (character string).
remote delOurPasswd HQ
REMOTE DELOURSYSNAME
Removes the unique CHAP or PAP authentication system name entries established by the command remote setOurSysName. remote delOurSysName <remoteName> remoteName Example: Name of the remote router (character string).
remote delOurSysName HQ
REMOTE DELPHONE
Deletes a phone number that was specified by the command remote setPhone (page 316). remote delPhone async | isdn 1 | 2 <phone#> <remoteName> async isdn 1 2 phone# remoteName Example:
remote delphone async 1 9,3801100 backup remote delphone async 2 9,3801101 backup
Asynchronous connection ISDN connection Primary phone number or first ISDN channel Alternative phone number or second ISDN channel. Decimal number representing the exact digits to be dialed. Digits, the asterisk, and the # characters are accepted; use a comma to specify a 2-second pause. Name of the remote entry (character string).
297
REMOTE DELSERVER
Deletes an entry created by the remote addServer command (page 293). remote delServer <action> <protocol> <first port> [<last port> [<first private port>]] action One of the following command actions: ipaddr Selects the host with this IP address as server (4 decimals separated by periods). discard Discards the incoming server request. me Sends the incoming server request to the local router, regardless of its IP address. Protocol used by the selected server. protocolid Numeric protocol ID. tcp TCP only. udp UDP only. all All protocols. First or only port as seen by the remote end. Port used by the selected server portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port. ftp FTP port. h323 H.323 port. http HTTP port. smtp SMTP port. sntp SNTP port. t120 T.120 port telnet Telnet port. tftp TFTP port. all All ports. Optional last port in the range of ports as seen by the remote end for the server on the LAN.
protocol
first port
last port
first private port If specified, this is a port remapping of the incoming request from the remote end. Example:
remote delServer 192.168.1.5 tcp ftp router1
REMOTE DISABLE
Disables the remote. The remote remains disabled even after a reboot. To enable the remote, you must enter the command remote enable (page 299). Note: You may enter and save information and settings for a disabled remote entry. However, the remote entry cannot be used until it is enabled. Note: If the remote is currently active when the remote is disabled, the active session is not stopped. To stop the active session, use the remote stop command (page 324). remote disable <remoteName> remoteName Name of the remote router (character string).
298
Example:
remote disable HQ
REMOTE DISAUTHEN
This command is intended for situations where third-party routers cannot be authenticated; the target router will not attempt to authenticate the remote router. remote disAuthen <remoteName> remoteName Example: Name of the remote router (character string).
remote disAuthen HQ
REMOTE DISBRIDGE
Disables bridging from the target router to the remote router. Note: This command requires rebooting the target system for the change to take effect. remote disBridge <remoteName> remoteName Example: Name of the remote router (character string).
remote disBridge HQ
REMOTE ENAAUTHEN
With this command the target router will try to negotiate authentication as defined in the remote router's database. remote enaAuthen <remoteName> remoteName Example: Name of the remote router (character string).
remote enaAuthen HQ
REMOTE ENABLE
Enables use of an entry in the remote router database. Although the command makes it possible to use the remote entry, it does not start an active session for the remote. Note: The entry remains enabled across reboots. The entry remains enabled until it is disabled by a remote disable command (page 298). remote enable <remoteName>
299
remoteName Example:
REMOTE ENABRIDGE
Enables bridging from the target router to the remote router. This command requires rebooting the target system for the change to take effect. remote enaBridge <remoteName> remoteName Example: Name of the remote router (character string).
remote enaBridge HQ
REMOTE IPFILTER
This command manages the IP filters on the WAN interface. The filters screen IP packets at the interface level. You can define filters for any entry in the remote router database. To see the names of the remote entries, use the command remote list. A remote entry can have up to four lists of filters; the list types are Input, Receive, Transmit, and Output. For more information on how these filter types are applied, refer to IP Filtering, on page 129. Note: IP filters take effect immediately upon entry. They can even affect the current connection that you are using to enter commands. Unlike other configuration changes, you do not need to save and restart or reboot. remote ipfilter <command> <type> <action> <parameters> <remoteName> The following commands are provided for managing IP filters for the WAN interface: remote ipfilter append [<line number>] <type> <action> [<parameters>] <remoteName> Appends a filter to the list of filters for this <type> (Input, Receive, Transmit, or Output) for this remote entry. If no line number is specified, the filter is appended to the end of the list; otherwise, it is appended after the specified line. For example, append 0 appends the filter after line 0. Filters are used in the order they appear in their list. remote ipfilter insert <type> <action> <parameters> <remoteName> Inserts a filter in the list of filters for this <type> (Input, Receive, Transmit, or Output) for this remote entry. If no line number is specified, the filter is inserted at the beginning of the list; otherwise, it is inserted before the specified line. For example, insert 0 inserts the filter before line 0 so it is the first filter in the list. Filters are used in the order they appear in their list. remote ipfilter delete <type> <action> <parameters> <remoteName> Deletes the first filter that matches the filter specified on the command. 300 Chapter 8. Command Reference
remote ipfilter flush [<first line> [<last line>]] <type> <remoteName> Deletes a range of filters of this <type> (Input, Receive, Transmit, or Output) for this remote entry. If no line numbers are specified, all filters in the list are deleted. If only the first line number is specified, all filters from that line to the end are deleted. To see the current filter list, use the remote ipfilter list command. Filters are used in the order they appear in their list. remote ipfilter clear [<first line> [<last line>]] [<type>] <clear arg> <remoteName> Resets the counters for the specified filters. A filter has a counter if the -c parameter was specified for the filter. You can specify the filters whose counters are to be reset by their line number range and type (input, receive, transmit, or output). If no type is specified, the counters for all filters for the interface are reset. If no line numbers are specified, the counters for all filters for that type and interface are reset. If only the first line number is specified, all counters for filters from that line to the end are reset. To see the filter lists and counters, use the remote ipfilter list command. remote ipfilter check <type> <parameters> <remoteName> Checks the action that would be taken if a packet with the specified parameters was compared with the list of filters defined for the specified type and remote entry. For example, the command
remote ipfilter check input -p TCP branch1
would check what action (accept, drop, reject, inipsec, outipsec) would be taken for a TCP packet after it was compared with the list of input filters defined for remote entry branch1. remote ipfilter list <type> <remoteName> Lists all filters of the specified <type> (input, receive, transmit, or output) for this remote entry. remote ipfilter watch <on | off> [-q | -v] <remoteName> Turns on or turns off the console watch for this remote router entry. If the watch is on, a message is printed to the console serial port when a packet is dropped or rejected. (The message is also sent to any Syslog servers; see Syslog Client, on page 168.) However, if the parameter -q (quiet) was specified for a filter, no message is printed when that filter matches a packet. If the parameter -v (verbose) was specified for a filter, a message is printed whenever that filter matches a packet, regardless of the filter action. To see the messages, Telnet to the router and enter system log start. The watch does not continue after a restart or reboot; to resume the watch, you must enter the remote ipfilter watch on command again. The lter type species at which point the lter is compared to the IP packet (see the illustration under Filters and Interfaces, on page 129): input receive transmit When the packet enters the interface, before any network address translation is performed. When the packet enters the interface, after any network address translation, but before routing table processing. After routing table processing, before any network address translation before the packet is sent out.
301
output
After routing and network address translation, just before the packet is sent out.
If the packet matches the lter, the specied action is performed: accept drop reject inipsec The packet is allowed to proceed for further processing. The packet is discarded, without sending an ICMP (Internet Control Management Protocol) error message. The packet is discarded and an ICMP error message is returned to the sender. The packet is passed to IPSec for decrypting. The filter is intended to match packets coming from the other IPSec gateway. Although filters are the mechanism by which packets are passed to IPSec, it is recommended that you use IKE, rather than your own filters, to manage your IP Security (see IPSec (Internet Protocol Security), on page 149). The packet is passed to IPSec so it can be encrypted and sent to the other IPSec gateway. The filter is intended to match packets coming from the local protected network. Although filters are the mechanism by which packets are passed to IPSec, it is recommended that you use IKE to manage your IP Security (see IPSec (Internet Protocol Security), on page 149).
outipsec
The following parameters specify the characteristics that an IP packet must have in order to match the lter. A lter can require any or all of these characteristics. -p <protocol> | TCP | UDP | ICMP The packet must have the specified protocol. If no protocol is specified, the filter matches every protocol. -sa <first source ip addr>[:<last source ip addr>] The packet must have a source IP address within the specified address range. If only one address is specified, the packet must have that source IP address. If no source IP address is specified, the filter matches any address in the range 0.0.0.0:255.255.255.255. -sm <source ip mask> The filter uses the specified mask when comparing the <first source ip addr>...<last source ip addr> with the source IP address in the IP packet. If no source mask is specified, the mask used is 255.255.255.255. -sp <ICMP type> | <first source port>[:<last source port>] The packet must have a source port that matches the specified ICMP type or that is within the specified port range. If only one port is specified, the packet must have that source port. If no source port is specified, the filter matches any source port in the range 0:0xffff. -da <first dest ip addr>[:<last dest ip addr>] The packet must have a destination IP address within the specified address range. If only one address is specified, the packet must have that destination IP address. If no destination IP address is specified, the filter matches any address in the range 0.0.0.0:255.255.255.255. -dm <dest ip mask> The filter uses the specified mask when comparing the <first dest ip addr>...<last dest ip addr> with the destination IP address in the IP packet. If no destination mask is specified, the mask used is 255.255.255.255. -dp <ICMP type> | <first dest port>[:<last dest port>] The packet must have a destination port that matches the specified ICMP type or that is within the specified port range. If only one port is specified, the packet must have that destination port. If no destination port is specified, the filter matches any destination port in the range 0:0xffff.
302
-tcp syn|ack|noflag If the IP packet is a TCP packet, the filter matches the packet only if the packet flag settings are as specified. If no -tcp option is specified for the filter, flag settings are not checked. Note: You may specify more than one -tcp option for the IP filter. The syn, ack, and noflag settings work together as follows: - Specify -tcp syn if the TCP SYN flag must be set. - Specify -tcp ack if the TCP ACK flag must be set. - Specify -tcp noflag if neither the SYN flag nor the ACK flag can be set. For example, for the IP filter to match the initiation of a TCP connection, specify -tcp syn. The filter will match TCP packets that have the TCP SYN flag set but not the TCP ACK flag set. For the filter to match the response to initiation of a TCP connection, specify -tcp syn and -tcp ack. The filter will match only TCP packets with both the TCP SYN and TCP ACK flags set. The -tcp rst setting is independent of the others; if you specify -tcp rst for the filter, the filter matches every TCP packet with the TCP RESET flag set, regardless of the other flag settings. For example, for the filter to match packets for established connections, you would specify both -tcp rst and -tcp ack so that the filter is applied to every TCP packet that has either the RESET flag or the ACK flag set. The following parameters request additional filter options. -b This option requests that this filter be compared twice with each packet.The first time the source filter information is matched against the source information in the IP packet and the destination filter information is matched against the destination information in the IP packet. The second time the source filter information is matched against the destination information in the IP packet and the destination filter information is matched against the source information in the IP packet. -c <count of times rule used> This option requests a counter for this filter. If specified, a count is kept of how many IP packets have matched this filter since the router was restarted or rebooted.To see the current count for a filter, use the remote ipfilter list command. To clear a counter, use the remote ipfilter clear command. -ipsec <IPSec record name> Use this option when the action specified is inipsec or outipsec. It specifies the IPSec Security Association that uses the filter. -q or -v Specify one of these options to determine when watch messages are sent for this filter. The messages are sent to the console serial port (and to any Syslog servers; see page 168). If neither -q or -v are specified for the filter, and an remote ipfilter watch on command is entered for the interface, a message is sent each time this filter causes a packet to be dropped or rejected. If -q (quiet) is specified, no messages are printed for this filter, even if it causes a packet to be dropped or rejected. If -v (verbose) is specified, a message is printed every time this filter matches a packet, regardless of the filter action. The remote name specifies the entry in the remote router database that the command applies to. To see the remote names, use the command remote list. Examples: Chapter 8. Command Reference 303
This command deletes all IP filters of type Receive for the remote interface internet.
remote ipfilter flush receive internet
The following two commands have the same effect: they deny all IP traffic for the remote interface internet from the specified destination addresses. The addresses can be specified as 192.168.0.0 masked with 255.255.0.0 or as the range 192.168.0.0 through 192.168.255.255.
remote ipfilter append receive drop -da 192.168.0.0 -dm 255.255.0.0 internet remote ipfilter append receive drop -da 192.168.0.0:192.168.255.255 internet
This command lists all IP filters of type Input for the remote interface internet.
remote ipfilter list input internet
REMOTE LIST
Lists the remote router entry (or all the entries) in the remote router database. The result is a complete display of the current configuration settings for the remote router(s), except for the authentication password/secret. remote list [<remoteName>] remoteName Name of the remote router to be listed (character string).If you omit the name, all remote router entries are listed.
Example:
# rem list internet INFORMATION FOR <internet> Status............................... Our System Name when dialing out..... Our Password used when dialing out... Protocol in use...................... ATM traffic shaping.................. Authentication....................... Authentication level required........ Use periodic LCP pings............... Connection Identifier (VPI*VCI)...... IP address translation............... IP filters defined................... Send/Receive Multicast............... Block NetBIOS Packets................ Compression Negotiation.............. IP slave mode (PPP).................. Try to reacquire IP addr (PPP)....... Source IP address/subnet mask........ Remote IP address/subnet mask........ Send IP RIP to this dest............. Send IP default route if known..... Receive IP RIP from this dest........ Receive IP default route by RIP.... Keep this IP destination private..... Total IP remote routes............... 10.0.0.0/255.255.0.0/1 IPX network number................... Use IPX RIP/SAP (negotiate with PPP):
enabled no PPP no disabled PAP yes 0*38 off no off off off no yes 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 no no no no yes 1 00000000 yes
304
Total IPX remote routes.............. Total IPX SAPs....................... Bridging enabled..................... Exchange spanning tree with dest... TX Encryption........................ RX Encryption........................ mtu..................................
REMOTE LISTBRIDGE
Lists the current bridge settings for the specified remote router entry. remote listBridge <remoteName> remoteName Example:
# remote listbridge BRIDGING INFORMATION FOR <internet> Bridging enabled.................... yes Exchange spanning tree with dest... no Bridge only PPPoE with dest........ no BRIDGING INFORMATION FOR <efficient> Bridging enabled.................... Exchange spanning tree with dest... Bridge only PPPoE with dest........ Mac addresses that dial remote.....
Name of the remote router (character string). If a name is omitted, the bridge settings for all remote router entries are listed.
no no no none
REMOTE LISTIPROUTES
Lists IP information for a remote router or, if the router name is omitted, for all routers in the remote router database. The IP information includes all network or station IP addresses defined for the LAN connected beyond the remote router. This command lists all routes defined for the remote router, including those defined in the default routing table and in any virtual routing tables. remote listIpRoutes [remoteName] remoteName Example: Example: The following command lists routing information for remote router HQ. It lists five routes that use HQ, the first four are in the default routing table and the fifth is in virtual routing table FRANCISCO.
# remote listIproutes HQ IP INFORMATION FOR <HQ>
305
Send IP RIP to this dest............. no Send IP default route if known..... no Receive IP RIP from this dest........ rip-1 compatible Receive IP default route by RIP.... no Keep this IP destination private..... yes Total IP remote routes............... 5 192.168.210.0/255.255.255.0/1 10.0.0.0/255.0.0.0/1 172.16.0.0/255.240.0.0/1 192.168.0.0/255.255.0.0/1 10.1.2.0/255.255.255.0/1 through <FRANCISCO>
REMOTE LISTIPXROUTES
Lists all network IPX route addresses defined for the LAN connected beyond the remote router. The network number, hop count, and ticks are displayed. If the remote name is not specified, a list of IPX routes is displayed for each remote router in the database. remote listIpxroutes [remoteName] remoteName Example: Name of the remote router (character string).
remote listIpxroutes HQ
Response:
IPX ROUTE INFORMATION FOR <HQ> Total IPX remote routes ...............1 00001001/1/4
REMOTE LISTIPXSAPS
Lists all services defined for the LAN connected beyond the remote router. Each service includes the server name, network number, node number, socket number, server type, and hop count. If the remote name is not specified, a list of IPX SAPs is displayed for each remote router in the database. remote listIpxsaps [remoteName] remoteName Example: Name of the remote router (character string.)
remote listIpxsaps HQ
Response:
IPX SAP INFORMATION FOR <HQ> Total IPX SAPs ................... 1 SERV312_FP 00001001 00:00:00:00:00:01 0451 0004 1 IPX SAP INFORMATION FOR <ISP> Total IPX SAPs ................... 0 SERV312_FP 00001001 00:00:00:00:00:01 0451 0004 1
306
REMOTE LISTPHONES
Lists the PVC numbers available for connecting to the remote router. remote listPhones <remoteName> remoteName Example: Name of the remote router (character string).
remote listPhones HQ
Response:
PHONE NUMBER(s) FOR <HQ> Connection Identifier (VPI*VCI)...... 0*38
Note: If the remote name is not specified, a list of phone numbers is displayed for each remote router in the database.
REMOTE RESTART
Stops the current active session and starts a new active session for a remote. Certain configuration changes for a remote become effective only after the remote is restarted or the router is rebooted. Remember to save the changes before the restart or reboot. Note: Use restart instead of reboot whenever possible. A restart does not affect other interfaces, allowing their traffic to continue. For example, using restart, you can add an IP route without killing voice traffic. To restart an Ethernet interface, use eth restart (page 281). remote restart <remoteName> remoteName Example: The following command restarts the active session for remote HQ.
remote restart HQ
REMOTE SETATMNSAP
RFC1577 (Classical IP over ATM) specifies a mechanism to map an ATM Name (called an NSAP) to a PVC. NSAP's are normally not needed, but if they are used, they have a syntax defined by using either the ATM or E164 encodings. By convention, octets 2-7 contain a unique identifier for the router, such as a MAC address. In the command remote setATMnsap, the complete 20 octets of the NSAP are specified. If Partial mode is selected, the router substitutes the MAC address of the router for octets 2-7. In Full mode, no change is made to the NSAP. To see an ATM NSAP that has been set, use the remote list command.
307
remote setATMNSAP ATMF|E164 partial | full <nsap> <remoteName> ATMF E164 partial full <nsap> ATM forum encoding ITU E164 encoding. The MAC address of the router is substituted for octets 2-7 of the NSAP. No change is made to the specified NSAP. NSAP specified as 40 hex digits or 20 octets (2-digit pairs separated by colons).
# remote list INFORMATION FOR <co> Status............................................. enabled Our Password used when dialing out... no Protocol in use............................. PPP ATM NSAP................................ ATM Forum / Partial value 11:22:33:44:55:66:77:88:99:AA:BB:CC:DD:EE:FF:10:11:12:13
REMOTE SETAUTHEN
Sets the authentication protocol used communicate with the remote router. The authentication protocol is the minimum security level that the target router must use with the remote router; this level is verified during security negotiation. The router will always attempt to negotiate the highest level of security possible (CHAP). The router will not accept a negotiated security level less than this minimum authentication method. The parameter in the remote router database is used for the local side of the authentication process; this is the minimum security level used by the target router when it challenges or authenticates the remote router. remote setAuthen <protocol> <remoteName> protocol remoteName Example: chap, pap, or none. The default is pap. Name of the remote router (character string). remote setAuthen pap HQ
REMOTE SETBOD
Sets the bandwidth on demand (BOD) management option for a DOD (dial on demand) connection, that is, a connection where the link goes up and down. These links include those for ISDN, L2TP tunnels, IPSec tunnels, and dial backup. The bandwidth on demand management option can be set to apply to incoming, outgoing, or both incoming and outgoing traffic. The bandwidth threshold set by the remote setBWthresh command (page 309) applies to the direction of traffic set by this command. 308 Chapter 8. Command Reference
Incoming traffic, outgoing traffic, or both. The default is both. Name of the remote router (character string).
REMOTE SETBROPTIONS
Sets controls on bridging for the remote router entry. To see the current bridging settings for remote router entries, use the remote listbridge command (page 305). Warning: Do not change the stp setting without approval from your system administrator. remote setBrOptions <option> on | off <remoteName> option stp Set this option to on to use the Spanning Tree Protocol (STP). The default is on. STP is used to detect bridging loops. Set this option to off only if the bridging peers do not support the Spanning Tree Protocol or if you are certain that no bridging loops could exist. When STP is disabled on an interface, any STP packets received on that interface are ignored. Note: The Spanning Tree Protocol adds a 40-second delay each time the ADSL or ATM link comes up while the interface determines if there is a bridging loop. pppoeOnly Set this option to on to limit this remote router entry to bridging PPPoE traffic only. If the option is set to off, then the entry can bridge any traffic, including PPPoE traffic. The default is off. remoteName Examples: The following command requests the spanning tree protocol for remote router HQ.
remote setBrOptions stp on HQ
The following command configures remote router PPPoEbridge as the remote through which only PPPoE traffic is bridged.
remote setBrOptions pppoeonly on PPPoEbridge
REMOTE SETBWTHRESH
Sets the bandwidth threshold for a DOD (dial on demand) connection, that is, a connection where the link goes up and down. These links include those for ISDN, L2TP tunnels, IPSec tunnels, and dial backup.
309
The threshold is used in bandwidth on demand management. Initially, a call is activated on one B-channel. When bandwidth utilization reaches the bandwidth threshold, the second B-channel is activated. (The additional channel is available if the maximum links was set to 2 by a remote setmaxline command, page 313.) Both channel are utilized until the bandwidth utilization drops below the threshold. The default is 0% utilization, in which case, both channels are always used for data transmission. If you wish, you can have the bandwidth threshold apply only to incoming or outgoing traffic; see the remote setBOD command (page 308). remote setBWthresh <threshold> <remoteName> threshold remoteName Example:
remote setBWthresh 75 HQ
Percentage of bandwidth utilization (0 through 100). The default is 0, in which case, whenever data transmission occurs, the maximum number of links is allocated. Name of the remote router (character string).
REMOTE SETCOMPRESSION
Enables or disables negotiation of the Stac LZS compression of the payload (RFC 1974). The CCP (Compression Control Protocol, RFC 1962) negotiates and handles any compression between the local router and the remote router. The default setting is off because LZS compression has a negative effect with high bit rates (greater than 768 Kb/ s). To see the current setting for payload compression, enter remote list and check the Compression Negotiationline. If desired, you can follow the negotiation of the Stac LZS compression within CCP using the debug command mlp debug ccp. remote setCompression on | off <remoteName> on off remoteName Example:
remote setCompression on HQ
Enables compression negotiation between the local and the remote router if both routers are set to perform compression and if they both share a common compression protocol. Disables compression negotiation. The default is off. Name of the remote router (character string).
310
remote setEncryption DESE RX|TX <key> <remoteName> RX TX key remoteName Example: Receive key Transmit key Key in the format of an eight-hexadecimal number. Name of the remote router (character string).
remote setEncryption dese tx 1111111111111111 HQ remote setEncryption dese rx 2222222222222222 HQ
Species that the same key is used in both directions Species that the keys are different Name of the le containing the Dife-Hellman values. If the le is not specied, default values built into the routers kernel are automatically selected. Name of the remote router (character string).
remote setEncryption DESE_1_KEY dh96.num HQ
REMOTE SETIPOPTIONS
Turns on or turns off the selected IP option for the WAN interface. To select IP options for the Ethernet interface, use the command eth ip options (page 276). Several RIP options are available. RIP is a protocol used for exchanging IP routing information among routers. The RIP options allow you to set IP routing information protocol controls over a point-to-point WAN. For more information, see RIP Controls, on page 83. remote setipoptions <option> on|off <remoteName> option rxrip Specify one of the following options: Receive and process IP RIP-1 compatible packets and RIP-2 broadcast packets from the remote site. Also receive and process RIP-2 multicast packets. Set this option if the local router is to discover route information from other sites connected to the remote router. This is useful for hierarchical organizations. If you are connecting to another company or an Internet Service Provider, you may wish to set this option off. The default is off.
311
Receive and process RIP-1 packets only. Receive and process RIP-2 packets only. Receive default IP route address. When this option is set on, the local router receives the remote sites default IP route. The default is off. Transmit IP RIP-1 compatible broadcast packets and RIP-2 multicast packets to the remote site. When this option is set on, the local router sends routing information packets to the remote site. The default is off. Transmit broadcast RIP-1 packets only. Transmit multicast RIP-2 packets only. Transmit the local routers default IP route. When this option is set to on, the local router sends the default route to the remote site. The default is off. Keep IP routes private. Used to prevent advertisement of this route to other sites by the remote router. Used as a security mechanism when the remote site is outside your company (an Internet Service Provider, for example), or whenever you want to keep the identity of the site private. The default is on. Allows the remote router to forward IP multicast traffic.
multicast
LANconfig Accept LAN configuration information. Indicates that this PPP remote can receive IPCP information for dynamically reconfiguring the Ethernet interface. lcpecho remoteName Example:
remote setipoptions private on HQ
REMOTE SETIPSLAVEPPP
Sets the IP Slave PPP mode. If the slave mode is yes, the router accepts the IP address that the remote end informs the router that it has; the router disregards any IP address specified in its own configuration. If the mode is no, the router tries to use the address in its configuration. Normally there is no need to change the default (no) value of this option. However, in certain situations where the router is managed by another party, (as part of a managed service), you could set this value to yes to ensure that the central management site always specifies the IP address of the router. remote setIPSlavePPP yes | no <remoteName> yes | no remoteName Example:
remote setipslaveppp yes branchremote
Slave mode setting. The default is no. Name of the remote router (character string).
312
REMOTE SETIPTRANSLATE
This command is used to control Network Address Translation on a per remote router basis. It allows several PCs to share a single IP address to the Internet. The remote router must assign the source WAN IP address to the routers local WAN port. This command requires that you define a Source WAN IP Address with the command: remote setSrcIpAddr remote setIPTranslate on|off <remoteName> remoteName Example: Name of the remote router (character string).
remote setIPTranslate on HQ
REMOTE SETIPXADDR
Sets the IPX network number for the remote WAN connection. For more information about IPX configuration, see IPX Routing Concepts, on page 408. remote setIpxaddr <ipxNet> <remote> ipxNet remoteName Example:
remote setIpxaddr 789 HQ
IPX network number represented by 8 hexadecimal characters. Name of the remote router (character string).
REMOTE SETIPXOPTIONS
Turns on or turns off the IPX option RIPSAP for the remote WAN connection. remote setIpxOptions ripsap on | off <remoteName> on | off remoteName Example:
remote setIpxOptions ripsap on HQ
Sets the option on or off. Name of the remote router (character string).
REMOTE SETMAXLINE
Sets the maximum links (1 or 2) for a DOD (dial on demand) connection, that is, a connection where the link goes up and down. These links include those for ISDN, L2TP tunnels, IPSec tunnels, and dial backup.
313
If you set the maximum links to 2, bandwidth on demand management determines their actual usage; see the remote setBWthresh command (page 309). remote setMaxLine 1 | 2 <remoteName> 1|2 remoteName Example:
remote setMaxLine 2 HQ
Maximum number of links to be used for the connection (1 or 2). The default is 1. Name of the remote router (character string).
REMOTE SETMGMTIPADDR
This command assigns to the remote router entry an IP address which is to be used for management purposes only and not for IP address translation. This management IP address is generally a private network address used solely by the ISP. The management IP address is separate from the IP address used for IP address translation. The IP address used for address translation is generally a public IP address valid on the Internet. It is set by the remote setSrcIpAddr command (page 322). Note: The management address is not effective until after the next save and remote restart or reboot. Note: To use the management address as the source address for a ping, you must specify it using the -I option on the ping command (page 217). For example, to use management address 192.168.1.2 when pinging destination address 192.168.100.100, specify:
ping -I 192.168.1.2 192.168.100.100
Note: To use the management address as the source address for a copy, you must specify both the source and destination addresses on the copy command (page 226). To list the current management address for the remote router, if any, use the remote list command (page 304). To set a management address for an Ethernet interface, see eth ip mgmt (page 275). remote setMgmtIpAddr <ipaddr> <mask> <remoteName> ipaddr mask remoteName Example:
remote setMgmtIpAddr 10.0.0.3 255.255.255.0 internet
IP address (4 decimals separated by periods). IP subnet mask (4 decimals separated by periods). Name of the remote router (character string).
REMOTE SETMINLINE
This command is used for dial-up connections and other connections that behave like dial-up connections, such as L2TP and PPPoE sessions. The command sets the minimum number of channels to be continually allocated to the connection. The default is 0, in which case a channel is allocated only when needed.
314
For example, if your service provider charges by the hour, you might prefer the minlines default value (0) so that a channel is allocated only when needed. However, if you are not charged by the hour, then having a channel allocated continually would save you the 2-3 second wait time required for each channel re-allocation. remote setMinLine <minlines> <remoteName> minlines remoteName Examples: The following command keeps a channel allocated for the session even when there is no traffic.
remote setMinLine 1 PPPoEuser
Minimum number of channels to be continually allocated for the connection (0, 1, or 2). If you specify 0, a channel is allocated for the connection only when needed. The default is 0. Name of the remote router (character string).
The following commands set up a timeout period so that, if there is no traffic for 10 minutes (600 seconds), the channel is deallocated.
remote setMinLine 0 PPPoEuser remote settimer 600 PPPoEuser
REMOTE SETMTU
Sets the maximum transfer unit for the remote interface. To see the current MTU size for an active remote that is doing IP routing, use the ipifs command (page 215). To change the MTU for an Ethernet interface, use the command eth mtu (page 281). If the protocol in use is PPP, you can see the MRU and MTU sizes using the command mlp show. The MRU is the maximum receive unit. Other information in the mlp show output includes the maxtu (the maximum packet size that can be sent; it is based on the peers MRU size), the ourmru (the maximum PPP packet size that can be received if multilink is not running), and ourmrru (the maximum PPP packet size that can be received if multilink is running). remote setmtu <size> <remoteName> size remoteName Example: The following command decreases the MTU size for remote interface HQ to 1400 bytes.
remote setmtu 1400 HQ
Maximum number of bytes that can be transferred as a unit. Name of the remote router (character string).
REMOTE SETOURPASSWD
Sets a unique CHAP or PAP authentication password for the local router that is used for authentication when the local router connects to the specified remote router. This password overrides the password set in the system passwd command. A common use is to set a password assigned to you by Internet Service Providers.
315
remote setOurPasswd <password> <remoteName> password Authentication password of the local router for use in connecting to the remote router. Note: The password is case-sensitive and its maximum length is 39 characters. remoteName Example: Name of the remote router (character string).
remote setOurPasswd s1dpxl7 HQ
REMOTE SETOURSYSNAME
Sets a unique CHAP or PAP authentication system name for the local router that is used for authentication when the local router connects to the specified remote router. This system name overrides the system name set in the system name command. A common use is to set a password assigned to you by Internet Service Providers. remote setOurSysName <name> <remoteName> name System name of the target router. Note: The system name is case-sensitive and may be no more than 255 characters. remoteName Example: Name of the remote router (character string).
remote setOurSysName s1dpxl7 HQ
REMOTE SETPASSWD
Sets the CHAP or PAP authentication password that is used when the remote router establishes a connection or is challenged by the target router. remote setPasswd <password> <remoteName> password remoteName Example: Authentication password of the remote router. Note that the password is case-sensitive and its maximum length is 40 characters. Name of the remote router (character string).
remote setPasswd s2dpxl7 HQ
REMOTE SETPHONE
Specifies the phone number to be used for the dial on demand (DOD) connection, that is, a connection where the link goes up and down. These links include those for ISDN, L2TP tunnels, IPSec tunnels, and dial backup.
316
For dial backup, the phone number is used when dialing out using the backup V.90 modem connected to the console port. You may specify both a primary number and an alternative phone number. For more information on the Dial Backup option, see page 164. remote setPhone async | isdn 1 | 2 <phone#> <remoteName> async isdn 1 2 phone# Asynchronous connection ISDN connection Primary phone number or first ISDN channel Alternative phone number or second ISDN channel. Decimal number representing the exact digits to be dialed. Digits, the asterisk, and the # characters are accepted; use a comma to specify a 2-second pause. Name of the remote entry (character string).
remoteName Example:
The following is an example of phone numbers and bit rates for an asynchronous interface used for Dial Backup.
# The phone number begins with 9 (to get an outside line), a comma (for a 2-second # pause), and finally the 7-digit local number. remote setphone async 1 9,3801100 backup remote setspeed 115200 async 1 backup # Specifies the alternative phone number to be used and its bit rate. remote setphone async 2 9,3801101 backup remote setspeed 115200 async 2 backup
The following is an example of a command specifying two ISDN phone numbers, 555-2000 and 555-4000.
remote setphone async 1 5552000&5554000 backup
REMOTE SETPPPOPTIONS
Turns on or turns off a PPP option. The default settings vary with the option. To see the current settings of the PPP options, use the command remote list (page 304). remote setPPPoptions <option> on | off <remoteName> option Option to be turned on or turned off. compression ipSlaveMode lcpecho Van Jacobson compression of TCP/IP headers (RFC 1144), also known as IPCP compression. Always accept peer proposal for our WAN IP address. Use periodic echo (if permanent interface or PPPoE).
317
Try to reacquire the IP address. Turn this option off if the router should always request a new IP address when the PPP session is terminated. Use IPX RIP/SAP protocols.
Desired setting for the option. Name of the remote entry (character string).
The following command forces the router to always request a new IP address whenever the PPP session is terminated. (This could be useful if the other PPP system does not completely support IP address negotiation.)
remote setPPPoptions reacqIPAddr off HQ
REMOTE SETPPPRETRYTIMER
Turns on or turns off the PPP retry timer for a remote. The default is off (0). The PPP retry timer is useful in a network where several routers are connected to the same PPP server. If the link to the PPP server goes down, all PPP sessions on the connected routers go down. Then, when the link comes back up, all routers attempt reconnection at the same time and this could crash the PPP server. To solve this problem, turn on the PPP retry timer for each remote. Then, when the link comes back up, each router waits a random time before attempting reconnection. To see the current setting of the retry timer for a remote, use the remote list command and check the output line:
Retry Timer (PPP) ...................... 0
Note: A change is effective immediately; save the change if it is to persist across restarts and reboots. remote setPPPRetryTimer <timerValue> <remoteName> timerValue Timer setting. To turn off the retry timer, specify 0; this is the default value. To turn on the retry timer, specify a value from 1 to 60. The value is the maximum number of seconds before the router attempts reconnection. For example, if you enter 60, the router waits from 1 to 60 seconds before attempting reconnection. remoteName Example:
remote setPPPRetryTimer 60 HQ
REMOTE SETPREFER
Changes the interface for the remote entry. Normally, a new remote profile defaults to the type of the WAN port present in the router: FR for Frame-Relay WANs (IDSL and some SDSL routers) or HSD for all ATM routers.
318
Use this command when defining the remote profile for Dial Backup. Dial Backup uses the console port as a serial port connected to an asynchronous modem; its interface must be asynchronous (see Specifying the Dialup Parameters, on page 110). To see the current setting for a remote profile, use the remote list command and check the Interface in use line. Changing the interface preference changes the lines presented in the display; phone numbers are displayed only for asynchronous. See the example below. remote setPrefer < async | fr | hsd > <remoteName> async fr hsd remoteName Example: The information displayed by a remote list command changes depending on the interface preference. The following example shows how the information displayed changes from asynchronous to frame relay:
# remote setprefer fr backup # remote list backup INFORMATION FOR <backup> Status............................... enabled Our System Name when dialing out..... gwbush Our Password used when dialing out... yes Interface in use..................... FR Protocol in use...................... PPP Authentication....................... disabled Authentication level required........ PAP Use periodic LCP pings............... yes . . . (subsequent lines same as for async) . . . # remote setPrefer async backup # remote list backup INFORMATION FOR <backup> Status............................... enabled Our System Name when dialing out..... gwbush Our Password used when dialing out... yes Disconnect timeout (in seconds)...... 60 Min/max channels..................... 0/1 Interface in use..................... ASYNC Protocol in use...................... PPP Authentication....................... disabled Authentication level required........ PAP Bandwidth management criteria........ both Use periodic LCP pings............... yes 1. ASYNC telephone number, speed 115200 9,5554218 2. ASYNC telephone number, speed 115200 9,5554219 1. HSD telephone number, speed auto 2. HSD telephone number, speed auto Dial Back.............................off Request PPP Call Back.................no
Asynchronous. This preference allows you to specify phone numbers and bit rates in the remote profile. Frame Relay. High-Speed Data. Use this option for ATM virtual circuits; in this case, phone numbers take the form <VPI>*<VCI>. Name of the remote router (character string).
319
REMOTE SETPROTOCOL
Sets the link protocol for the remote router. Note: The link protocol and encapsulation option must match those at the other end of the connection (the settings in the DSLAM). The encapsulation options are described in Encapsulation Options, on page 29. Protocol configuration is described in Protocols to be Used, on page 35. remote setProtocol PPP | PPPLLC | RFC1483 | RFC1483MER | FRF8 | RAWIP <remoteName> PPP PPLLC RFC1483 RFC1483MER FRF8 RAWIP remoteName Example:
remote setProtocol ppp fp1
PPP protocol with VC multiplexing encapsulation. PPP protocol with LLC SNAP encapsulation (used with frame relay internetworking units). RFC 1483 protocol. RFC 1483MER (MAC Encapsulated Routing) protocol. This protocol implements ATM to frame relay as defined in the Frame Relay Forum FRF.8 Interworking Agreement. RawIP protocol. Name of the remote router (character string).
REMOTE SETPVC
Specifies the PVC number for connecting to the remote router. remote setPVC <vpi number>*<vci number> <remoteName> vpi number vci number remoteName Example: Virtual Path ID number that identies the link formed by the virtual path. Virtual Circuit ID number that identies a channel within a virtual path in a DSL/ATM environment. Name of the remote router (character string).
remote setPVC 0*38 HQ
320
REMOTE SETRMTIPADDR
Sets the WAN IP address for the remote router. This address is required only if the remote router does not support IP address negotiation under PPP (i.e., numbered mode is required, and the remote router cannot specify a WAN IP address for use during the negotiation process). remote setRmtIpAddr <ipaddr> <mask> <remoteName> ipaddr mask remoteName Example: IP address of the remote router, in the format of 4 decimals separated by periods. IP network mask of the remote router, in the format of 4 decimals separated by periods. Name of the remote router (character string).
remote setRmtIpAddr 128.1.210.65 255.255.255.192 HQ
REMOTE SETSPEED
Specifies the speed to be used when dialing out using the backup V.90 modem connected to the console port. Specify a speed for each phone number you provide (primary and alternative). For more information specifying phone numbers for the Dial Backup feature, see Specifying the Dialup Parameters, on page 110. remote setSpeed <bitrate> | default async 1 | 2 <remoteName> bitrate default 1 2 remoteName Example:
# Specifies the primary phone number and its bit rate. remote setphone async 1 9,5551288 backup remote setspeed 115200 async 1 backup # Specifies the alternative phone number to be used and its bit rate. remote setphone async 2 9,5551289 backup remote setspeed 115200 async 2 backup
Bit rate to be used for the phone number. Possible speeds are 38400, 57600, 115200, or 230400. Use the default speed. Primary phone number. Alternative phone number. Name of the remote entry (character string).
321
REMOTE SETSRCIPADDR
Sets the IP address for the target WAN connection to the remote router. You may set this address when the remote router requires the target and the remote WAN IP addresses to be on the same subnetwork. Another instance is to force numbered mode and to prevent the remote router from changing the target WAN IP address through IPCP address negotiation. The target WAN IP address defaults to the Ethernet LAN IP address. remote setSrcIpAddr <ipaddr> <mask> <remoteName> ipaddr mask remoteName Example: Target IP address of the WAN connection to the remote router, in the format of 4 decimals separated by periods. IP network mask, in the format of 4 decimals separated by periods. Name of the remote router (character string).
remote setSrcIpAddr 128.1.210.151 255.255.255.192 HQ
REMOTE SETTIMER
This command is used for dial-up connections and other connections that behave like dial-up connections, such as L2TP and PPPoE sessions. The command sets the length of the timeout period before disconnection. When the connection has had no traffic for the timeout period, the channel is deallocated. A channel is reallocated when it is needed. A timeout period is desirable if your service provider charges by the hour. However, the connection has to wait a few seconds each time a channel is re-allocated. Note: The timeout period set by this command is not effective if a remote setMinLines command has changed the minlines value from its default (0) to 1 or 2. remote setTimer <seconds> <remoteName> seconds remoteName Example: The following commands set up a timeout period so that, if there is no traffic for 10 minutes (600 seconds), the channel is deallocated.
remote setMinLine 0 PPPoEuser remote settimer 600 PPPoEuser
Number of seconds in the timeout period. The default is 60. Name of the remote router (character string).
REMOTE START
If the remote is not currently active, this command attempts to start an active session. Note: A reboot ends the active session; to start a session after the reboot, you must enter another remote start command.
322
To stop an active session for the remote, use the command remote stop (page 324). To stop and immediately restart a session for the remote, use the command remote restart (page 307). remote start <remoteName> remoteName Example: The following command starts remote interface HQ.
remote start HQ
REMOTE STATS
Shows the current status of the connection to the remote router, including the bandwidth and data transfer rate. remote stats [<remoteName>] remoteName Example: Name of the remote router (character string).
remote stats HQ
Response:
STATISTICS FOR <HQ>: Current state ....................... Current output bandwidth ............. Current input bandwidth .............. Current bandwidth allocated .......... On port ATM_VC/1 ..................... Total connect time ................... Total bytes out ...................... Total bytes in ....................... STATISTICS FOR <internet>: Current state ........................ Current output bandwidth ............. Current input bandwidth\ ............. Current bandwidth allocated .......... Total connect time ................... Total bytes out ...................... Total bytes in ....................... currently connected 0 bps 0 bps 25600000 bps 0+01:02:36 (0%/0% of 25600000 bps) 0+01:11:48 15896 0
where: Current state: Bandwidth state: connected, not connected, currently connecting, currently attempting to connect, currently closing, out of service, or not known. idle, increasing, decreasing, decreasing hold, unknown, or idle.
323
REMOTE STATSCLEAR
Allows the user to reset the statistics counter for a given remote router. remote statsclear <remoteName> remoteName Example: Name of the remote router (character string).
remote statsclear HQ
REMOTE STOP
If the remote is active, this command stops the active session. Note: To keep certain configuration changes, you must enter a save command before stopping the remote interface. The stop command does not disable the remote entry so another session can be started for the remote.To start an active session for the remote, use the command remote start (page 322). To stop and immediately restart a session for a remote, use the command remote restart (page 307). remote stop <remoteName> remoteName Example: The following command stops the active session for remote HQ.
remote stop HQ
REMOTE UNBINDIPVIRTUALROUTE
Removes a remote route from the named IP virtual routing table. To list the remote routes, use the remote listIProutes command, page 305. To add a remote route, use the remote bindIPVirtualRoute command, page 293. Note: A route change in an IP virtual routing table takes effect immediately. However, the change is lost if it is not saved before the next remote restart or reboot. remote unbindIPVirtualRoute <ipaddr> <tablename> <remoteName> ipaddr tablename remoteName Example: IP address of the remote network or station (4 decimals separated by periods). IP virtual routing table from which the route is removed (character string). Name of the remote router (character string).
324
The following command removes a route from virtual routing table FRANCISCO. The route removed is for IP address 10.1.2.0 and remote router HQ.
remote unbindIPVirtualRoute 10.1.2.0 FRANCISCO HQ
HDSL (High-speed Digital Subscriber Line) commandsSee page 336. IDSL (ISDN Digital Subscriber Line) commandsSee page 339.) SDSL (Symmetric Digital Subscriber Line) commandsSee page 342. G.shdsl commands See page 346.
325
ADSL Commands
Use the following commands to manage the ADSL (Asymmetric Digital Subscriber Line) link for an ADSL router.
ADSL ?
Lists the supported keywords. adsl ? Response:
ADSL commands: ? restart stats speed
ADSL RESTART
Resynchronizes the modem with the CO (Central Office) equipment. adsl restart
Response:
# 12/02/1997-12:47:46:ADSL: Idle 12/02/1997-12:47:46:ADSL: Startup initiated 12/02/1997-12:47:48:ADSL: Startup training in progress 12/02/1997-12:47:54:ADSL: Modem started successfully 12/02/1997-12:47:54:ADSL: Near Avg SQ #: 44 dB [ 3] 12/02/1997-12:47:54:ADSL: Far Avg SQ #: 44 dB [ 3] 12/02/1997-12:47:54:ADSL: Downstream rate: 6272 Kb/s, Upstream rate: 1088 Kb/s 12/02/1997-12:47:54:DOD: connecting to internet @ 0*38 over ATM_VC/1 12/02/1997-12:47:56:ADSL: Data Mode DUM: BR CHG ATM_VC/1 - to internet now forwarding
ADSL SPEED
Displays the current downstream and upstream rates.The actual speed is set by the DSLAM. adsl speed Example:
adsl speed
Response:
downstream rate: 6272 Kb/s, upstream rate: 1088 Kb/s
326
ADSL STATS
Shows the current error status for the ADSL connection. adsl stats [clear] clear Example: Option used to reset the counters.
adsl stats
Response:
ASDL Statistics: Out of frame errors ..... HEC errors received ..... CRC errors received ..... FEBE errors received .... Remote Out-of-frame ....... Remote HEC errors ......... 0 0 0 0 0 0
327
ATM Commands
Use the following commands to manage the ATM-25 (Asynchronous Transfer Mode) link for an ATM router. atm pcr atm speed remote setatmtraffic atm save Sets the upstream data rate in cells per second (pcr) or kilobits per second (speed). Allocates bandwidth among remotes. Saves the ATM settings.
Commands available to help debug ATM problems are listed on page 204 and page 207.
ATM ?
Lists the supported keywords. atm ? Example:
atm ?
Response:
ATM commands: ? pcr save speed
ATM PCR
Sets the speed of the ATM link in cells per second. The default upstream speed is 768 cells/second. Generally, your Network Service Provider should provide you with your speed value. If your service provider states your speed value in kilobits per second, enter the value using the command atm speed (page 329). Note: The speed value you enter may not be the actual upstream speed you get. When the command changes the processor clocks, only certain discrete values are allowed. The speed you get is the allowed speed value that is equal to or the next lower value to the value you entered (see the example below). atm pcr [cells/seconds] cells/second Examples: The following command requests the current speed.
# atm pcr ATM Upstream Rate: 326 Kb/sec or 768 cells/sec
Upstream speed in cells/seconds as provided by your service provider (integer, 294 through 18867). If you omit this value, a message states the current upstream speed.
328
The following command requests a speed of 1200 cells/second. However, 1200 is not one of the discrete speed values allowed, so the next lower value, 1179 cells/second, is set, as indicated by the message.
# atm pcr 1200 ATM Upstream Rate: 500 Kb/sec or 1179 cells/sec
ATM SAVE
Saves the ATM configuration settings. atm save Example:
atm save
ATM SPEED
Sets the speed of the ATM link in kilobits per second. The default upstream speed is 326 Kb/s. Generally, your Network Service Provider should provide you with your speed value. If your service provider states your speed value in cells per second, enter the value using the command atm pcr (page 328). Note: The speed value you enter may not be the actual upstream speed you get. When the command changes the processor clocks, only certain discrete values are allowed. The speed you get is the allowed speed value that is equal to or the next lower value to the value you entered (see the example below). atm speed [Kb/s] Kb/s Examples: The following command requests the current speed.
# atm speed ATM Upstream Rate: 326 Kb/sec or 768 cells/sec
Upstream speed in kilobits/second as provided by your service provider (integer, 125 three 8000). If you omit this value, a message states the current upstream speed.
The following command requests a speed of 512 kilobits/second. However, 512 is not one of the discrete speed values allowed, so the next lower value, 500 kilobits/second, is set, as indicated by the message.
# atm speed 512 ATM Upstream Rate: 500 Kb/sec or 1179 cells/sec
REMOTE SETATMTRAFFIC
Sets ATM traffic-shaping on a remote router. ATM traffic-shaping allows the user to set the average rate at which cells are sent, that is, the Sustained Cell Rate (SCR), to a value lower than the ATM link speed, the Peak Cell Rate (PCR).
329
ATM traffic-shaping should be used to allocate bandwidth whenever more than one remote router is defined. Enter a remote setATMTraffic command for each remote. For example, if you have five remotes, enter five commands to allocate the bandwidth. If no ATM traffic values are set, ATM traffic for the remote is shaped using UBR (unspecified bit rate). If a CBR (constant bit rate) is required, then specify 1 as the Maximum Burst Size (MBS). If a VBR (Variable Bit Rate) is required, specify a value greater than 1 as the Maximum Burst Size (MBS). To disable ATM traffic-shaping, use the command remote setATMTraffic 0 0 <remoteName> remote setATMTraffic <scr> <mbs> <remoteName> scr mbs Sustained Cell Rate (cells per second). Maximum Burst Size (cells). For a constant bit rate (CBR), specify 1; for a variable bit rate (VBR), specify a value greater than 1. Name of the remote router (character string).
remoteName Examples:
Assuming that the ATM link speed (upstream) is 200 Kb/s 471 cells/s and an average upstream data rate of 20 Kbps (47 cells/s) is desired, you would issue the following command:
remote setATMtraffic 47 31 HQ
330
DMT Commands
These commands manage the ADSL DMT (Discrete MultiTone) router. To see additional DMT debug commands, see ADSL DMT Router Debug Commands, on page 206.
DMT LINK
Selects the link type for the ADSL DMT router. The link type survives reboots. Normally, the CO and CPE negotiate the link type to be used. Use the dmt link command when you do not want the CO and CPE to negotiate the link type, but instead want to specify the type of data link required. Caution: This command forces the CPE into the specified mode. It is not for normal use. dmt link DEFAULT | T1_413 | G_DMT | G_LITE | MULTIMODE DEFAULT T1_413 G_DMT G_LITE MULTIMODE Default value. The CO and CPE negotiate the link type used. ANSI standard T1.413 G.dmt standard ITU G.Lite standard The CO and CPE negotiate the link type used.
DMT MODE
The dmt mode command can request one of three modes: ANSI, no_Trellis_ANSI, and UAWG. UAWG mode is becoming obsolete. No Trellis encoding for T1.413 ANSI ADSL is only needed where auto-negotiation is not supported for Trellis. dmt mode ansi | no_trellis_ansi | uawg
331
ETH BR ENABLE
Enables bridging in a Dual-Ethernet environment. This command requires rebooting the router for the change to take effect. eth br enable Example:
eth br enable
ETH BR DISABLE
Disables bridging in a Dual-Ethernet environment. Note: This command requires rebooting the router for the change to take effect. eth br disable Example:
eth br disable
ETH BR OPTIONS
Sets controls on bridging for the Ethernet interface To see the current bridge settings for the Ethernet interface, use the eth list command. Warning: Do not change the stp setting without approval from your system administrator. eth br options <option> on | off [<port#>]
332
option
stp Set this option to on to use the Spanning Tree Protocol (STP). The default is on. STP is used to detect bridging loops. Set this option to off only if the bridging peers do not support the Spanning Tree Protocol or if you are certain that no bridging loops could exist. When STP is disabled on an interface, any STP packets received on that interface are ignored. Note: The Spanning Tree Protocol adds a 40-second delay each time the ADSL or ATM link comes up while the interface determines if there is a bridging loop. pppoeOnly Set this option to on to limit this Ethernet port to bridging PPPoE traffic only. If the option is set to off, then the port can bridge any traffic, including PPPoE traffic. The default is off.
port# Examples:
The following command turns off the spanning tree protocol for Ethernet port 0.
eth br options stp off
The following command configures Ethernet port 1 so that only PPPoE traffic is bridged through it.
eth br options pppoeonly on 1
333
Frame Commands
FRAME ?
Lists the frame commands.
frame ? Example:
# frame ? Frame Commands: ? cmpPlay
help voice
lmi
FRAME CMPPLAY
Selects activation in routing or bridge mode. The default is routing mode. This command is applicable only when the router is configured using Copper Mountain Plug & Play (see Bridge or Router?, on page 49). frame cmPPlay < route | bridge > route bridge Example:
frame cmpplay bridge
FRAME LMI
Turns frame LMI either on or off.
FRAME STATS
Displays frame relay statistics.
334
Although it is not an end-to-end loopback test, the command output does show counters for data sent and received as well as LMI events. frame stats Example:
# frame stats FR/0 Frame Relay Statistics ANSI LMI: Protocol Errors........................ Unknown Msg Recv....................... T391 Timeouts.......................... PVC Status Changes..................... StatusEnq Sent......................... Status Recv............................ StatusEnq Recv......................... Unconfigured DLCIs recv in Status Msgs. LMI Stats for DLCI................. LMI State.......................... Status State Changes............... Active to Not Active Changes....... Not Active to Active Changes....... Data Packets In.................... Data Packets Out................... Data Packets Out Queued............ Data Packets Out (dropped Q Full).. Voice Cells In..................... Voice Cells In (with errors)....... Voice Cells Out.................... LMI Stats for DLCI................. LMI State.......................... Status State Changes............... Active to Not Active Changes....... Not Active to Active Changes....... Data Packets In.................... Data Packets Out................... Data Packets Out Queued............ Data Packets Out (dropped Q Full).. Voice Cells In..................... Voice Cells In (with errors)....... Voice Cells Out....................
0 0 0 0 0 0 0 0 22 UNKNOWN 0 0 0 0 0 0 0 0 0 0 16 UNKNOWN 0 0 0 0 0 0 0 0 0 0
FRAME VOICE
Displays the voice DLCI for voice routers.
335
HDSL Commands
Use the following commands to manage the HDSL (High-Speed Digital Subscriber Line) link for an HDSL router.
Auto-speed sequence Auto-speed starts with the lower speed (384) and then tries to activate for 30 seconds. If no activation takes place, it attempts the next higher speed. The time intervals between activation may change if the modems dont activate as expected. Following is a correct activation output.
03/09/1998-17:11:59:HDSL: Deactivated 03/09/1998-17:12:22:HDSL: CPE is Activating at 384 Kb/s 03/09/1998-17:13:00:HDSL: Deactivated 03/09/1998-17:13:01:HDSL: CPE is Activating at 1168 Kb/s 03/09/1998-17:13:32:HDSL: Deactivated 03/09/1998-17:13:32:HDSL: CPE is Activating at 1168 Kb/s 03/09/1998-17:14:11:HDSL: Deactivated 03/09/1998-17:14:12:HDSL: CPE is Activating at 384 Kb/s 03/09/1998-17:14:51:HDSL: Activated 03/09/1998-17:14:53:FRAMER: The framer is synchronized
336
HDSL ?
Lists the supported keywords. hdsl ? Example:
hdsl ?
Response:
HDSL commands: ? save help speed terminal
HDSL SAVE
Saves the HDSL-related changes across restarts and reboots. hdsl save Example:
hdsl save
HDSL SPEED
Manages the line speed for the HDSL interface, as follows CO end: Sets the speed manually on the Central Office (CO) end only. CPE end: The router on the Customer Premises End (CPE) is always in auto-speed mode: it uses an auto-speed algorithm to attempt to match the CO speed. The command hdsl speed noauto is used to override auto-speed. Note 1: The command hdsl speed (with no option) displays the current speed if the modem has activated successfully. Note 2: hdsl speed noauto should be followed by the command hdsl save to be persistent across restarts and reboots. Note 3: During auto-speed search, use the command hdsl speed <speed> to stop the search and restart it at the speed you just entered. hdsl speed [384 | 1168 | noauto] 384 1168 noauto Default speed for the CO. Authorized non-default speeds for the CO in Mbps. Used to override auto-speed on the CPE.
337
Example:
HDSL TERMINAL
The router is by default configured as the Customer Premises Equipment (CPE). Use this command if you intend to configure the router as the Central Office equipment (CO). hdsl terminal cpe defines the CPE end (default configuration) hdsl terminal co defines the CO end. hdsl terminal displays the current settings. hdsl terminal [cpe|co] co Example: This option lets you dene the router as the CO.
hdsl terminal
Response:
Customer Premises
Example:
hdsl terminal co
338
IDSL Commands
An IDSL (ISDN Digital Subscriber Line) delivers a maximum symmetric 144 Kbps of bandwidth. The IDSL bandwidth is composed of two 64 Kbps B channels, plus one 16 Kbps D channel. Your speed setting indicates the channels that you are using. When using Frame Relay: Your IDSL switch setting indicates your committed bandwidth (FR64, FR128, or FR144). The IDSL router can support several DLCI virtual circuits over a Frame-Relay IDSL link. However, a typical connection to the Internet requires only one DLCI. The DLCI number must match the DLCI of the remote end.
This section describes the following commands used to manage your IDSL router: idsl list idsl save idsl set switch idsl set speed remote setdlci remote setprotocol Lists the current Frame Relay switch type (FR64, FR128, or FR144). Saves the IDSL changes. Changes the Frame Relay switch type. Changes the IDSL speed (64, 128, or 144). Specifies the DLCI for the remote router entry. Selects the link protocol for the remote router entry (PPP, Frame Relay, or MER).
IDSL LIST
Lists the current switch type. To change the switch type, use the idsl set switch command. idsl list Example:
# idsl list Switch type is FR128
IDSL SAVE
Saves IDSL-related changes across restarts and reboots. Changes that are not saved are discarded. idsl save Example:
# idsl save
339
The IDSL bandwidth is composed of two 64 Kbps B channels, plus one 16 Kbps D channel. Your speed setting indicates the channels that you are using. idsl set speed 64 | 128 | 144 64 128 144 Example:
# idsl set speed 144
64 Kbps (one channel) 128 Kbps (two channels) 144 Kbps (three channels)
Link speed of 64 Kbps Link speed of 128 Kbps Link speed of 144 Kbps
REMOTE SETDLCI
This command sets the DLCI for the remote router entry. The DLCI (Data Link Connection Identifier) is an address identifying a logical connection in a Frame Relay environment. The DLCI is generally provided by the Network Service Provider. The IDSL router can support several DLCI virtual circuits over a Frame-Relay IDSL link. However, a typical connection to the Internet requires only one DLCI. The DLCI number must match the DLCI of the remote end. remote setDLCI <dlcinumber> <remoteName> dlcinumber remoteName Example: Frame Relay number identifying the data-link connection. Name of the remote router (character string).
remote setDLCI 16 HQ
340
REMOTE SETPROTOCOL
This IDSL-specific command is used to select the appropriate link protocol for your IDSL connection. Your Network Service Provider will tell you which link protocol to use. remote setProtocol PPP | FR | MER <remoteName> PPP FR MER remoteName Example: PPP protocol with no encapsulation. RFC 1490 protocol (Multiprotocol encapsulation over Frame Relay). RFC 1490 protocol with MAC Encapsulated Routing. Name of the remote router (character string).
remote setProtocol FR HQ
341
SDSL Commands
The commands in this section manage the Symmetric Digital Subscriber Line (SDSL) link for an SDSL router. sdsl preact sdsl speed sdsl stats Disables or re-enables autobaud pre-activation. Displays and sets the line speed. Displays and clears SDSL statistics.
342
03/09/1998-17:15:19:DOD: connecting to co @ 0*38 over ATM-VC/1 03/09/1998-17:15:35:DOD: link to co over ATM-VC/1 is now up 03/09/1998-17:15:57:SDSL: Line Rate at last activation saved
Autobaud pre-activation
The previous section showed an example in which auto-speed detection attempted several speeds, before settling on the best speed for the connection. In some cases, this process can require substantial time. The autobaud feature, if available for your router and DSLAM, can shorten the connection set-up time by determining the probable optimal speed before the connection begins. If the autobaud feature is available and selected, its pre-activation phase automatically determines the maximum speed that can be supported by a specific loop. It probes the channel and characterizes the line to allow the connection to begin at a speed closer to the optimal speed. Later, after activation, the autobaud feature checks the line quality to determine the optimal speed. If the autobaud feature is used, the auto-speed detection described in the previous section is not performed; however, you may still set the speed manually with an sdsl speed command if you wish. A command is available to turn off autobaud pre-activation (sdsl preact off, page 344). A message is sent before line activation indicating whether autobaud pre-activation was used. The following example shows the message sent when pre-activation is available and the response to the sdsl speed command:
08/16/2000-16:11:06:SDSL: Using preactivation-determined rate of 2320 Kb/s 08/16/2000-16:11:06:SDSL: CPE is Activating at 2320 Kb/s 08/16/2000-16:11:20:SDSL: Activated at 2320 Kb/s 08/16/2000-16:11:20:FRAMER: The framer is synchronized # sdsl speed SDSL Current Speed (CO-controlled): 2320 Kb/s
The next example shows the message sent when pre-activation is not available:
08/16/2000-16:13:28:SDSL: Preactivation unavailable, using rate of 2320 Kb/s 08/16/2000-16:13:28:SDSL: CPE is Activating at 2320 Kb/s 08/16/2000-16:13:41:SDSL: Activated at 2320 Kb/s 08/16/2000-16:13:42:FRAMER: The framer is synchronized
SDSL ?
Lists the supported keywords for the sdsl command. sdsl ? Example:
# sdsl ? SDSL commands: ? save
help stats
speed terminal
343
SDSL PREACT
Displays and/or changes the autobaud pre-activation status. The default status is on. However, to be effective, autobaud pre-activation must also be enabled at the Central Office (CO) end of the connection. Note: Remember to enter an sdsl save or save command to save SDSL changes across restarts and reboots. To determine the current pre-activation status, enter sdsl preact. For more information on the autobaud feature, see Autobaud pre-activation, on page 343. sdsl preact [on | off] on off Enables pre-activation at the customer premises (CPE) end. (To be effective, pre-activation must also be enabled at the CO end.) Disables pre-activation.
Example: The first command displays the current pre-activation status. The second command disables pre-activation.
# sdsl preact Preactivation enabled # sdsl preact off Preactivation disabled
SDSL SAVE
Saves SDSL configuration changes across restarts and reboots. sdsl save Example:
sdsl save
SDSL SPEED
Manages the speed of the SDSL line. At the Central Office (CO) end, the command sets the speed manually only. At the Customer Premises Equipment (CPE) end, the command can: Display the current speed setting and list the available speeds (sdsl speed) Manually set the speed (sdsl speed <speed>) Override auto-speed detection (sdsl speed noauto)
344
Note: Remember to enter an sdsl save or save command to save SDSL changes across restarts and reboots. sdsl speed [<speed> | noauto] speed Speed in kbps. To see the speeds available for the model type, enter sdsl speed. If the auto-speed search is in progress, this command stops the search and sets the line speed as specified on the command. Overrides auto-speed detection. If auto-speed detection is disabled, the Link light on the front panel is amber when the line tries to activate. (Auto-speed detection is reinstated if you enter an sdsl speed <speed> command.) Example: The example shows three commands: 1. Displays the current line speed, indicates that the line speed is set by auto-speed detection [AUTO], and lists the available speed options. 2. Requests a line speed of 1152 Kb/s. 3. Shows that the line speed has been changed to 1151 Kb/s and that auto-speed detection is no longer in effect (the [AUTO] indicator is not displayed).
# sdsl speed SDSL Current Speed: [AUTO] 768 Kb/s usage: sdsl speed <value in Kb/s> [ 192 384 768 1152 1536 ] | noauto # sdsl speed 1152 # sdsl speed SDSL Current Speed: 1152 Kb/s usage: sdsl speed <value in Kb/s> [ 192 384 768 1152 1536 ] | noauto
noauto
SDSL STATS
Displays SDSL frame statistics. It can also clear the SDSL statistic counters. sdsl stats [clear] clear Example:
# sdsl stats FRAMER Statistics: Framer Interrupts...... Out of frame errors.... HEC errors received.... CRC errors received.... FEBE errors received... Remote Out-of-frame.... Remote HEC errors......
2118 1 16 3 2 16 0
SDSL TERMINAL
Displays and/or changes the routers status as CO or CPE.
345
The router is, by default, configured as Customer Premises Equipment (CPE). Use this command if you intend to configure the router as Central Office equipment (CO). To determine the current CO/CPE setting, enter sdsl terminal. sdsl terminal [cpe | co] cpe co Example:
# sdsl terminal Customer Premises # sdsl terminal co Central Office
Defines the router as the customer premises (CPE) equipment. Defines the router as the central office (CO) equipment.
SHDSL Commands
The commands in this section manage the WAN link for a G.shdsl router. shdsl annex shdsl list shdsl margin Selects annex A or annex B. Lists G.shdsl configuration. Changes the acceptable noise margin.
shdsl rateMode Selects adaptive or fixed rate mode. shdsl restart shdsl save shdsl speed shdsl stats shdsl terminal shdsl ver Restarts the G.shdsl WAN interface. Saves SHDSL configuration changes. Displays and sets the line speed. Displays or clears G.shdsl statistics. Redefines the router as CO (Central Office) equipment. Displays the G.shdsl version level.
SHDSL ?
Lists the supported keywords for the shdsl command. shdsl ? | help Example:
# shdsl ? SHDSL commands: ? restart ver
346
margin
save
list
SHDSL ANNEX
Selects annex A or annex B of the G.shdsl standard. The annex used depends on the DSLAM the router is to connect to. In general, annex B is used in Europe and annex A is used in the rest of the world. To see the current annex selection, enter shdsl annex without a parameter. shdsl annex [ A | B] Example:
# shdsl annex Annex A # shdsl annex B
SHDSL LIST
Lists the current configuration of the G.shdsl interface. shdsl list Example:
# shdsl list G.SHDSL INTERFACE CONFIGURATION: Terminal ..................... GTI SHDSL version ............ Requested speed .............. Actual speed ................. Startup margin ............... Rate mode .................... Annex ........................
SHDSL MARGIN
Specifies the acceptable noise margin in decibels. If the connection is unstable, you may need to increase the margin. To see the current noise margin, enter shdsl margin without a parameter. shdsl margin [ dB ] dB Example:
# shdsl margin Margin = 6 # shdsl margin 7
347
SHDSL RATEMODE
Selects adaptive or fixed rate mode. The default is adaptive rate mode. To see the current rate mode, enter shdsl rateMode without a parameter. shdsl rateMode [ Adaptive | Fixed] Example:
# shdsl ratemode Adaptive # shdsl ratemode fixed
SHDSL RESTART
Restarts the G.shdsl WAN interface. (Unlike a reboot, a restart does not discard unsaved changes.) Note: The WAN interface is restarted automatically when you change the speed (shdsl speed) or change the CO or CPE designation (shdsl terminal). shdsl restart
SHDSL SAVE
Saves SHDSL configuration changes across restarts and reboots. (To save SHDSL changes and all other configuration changes, use the command save.) shdsl save Example:
shdsl save
SHDSL SPEED
Manages the speed of the SHDSL line. Note: By default, it is assumed that the router is Customer Premises Equipment (CPE) and the line speed desired is the maximum allowed by the central office (CO). This command can: Display the current requested speed and actual speed (shdsl speed with no parameter). If the actual speed shown is 0 (zero), the line is down. Manually set the speed (shdsl speed <speed>) (You might request a lower speed to improve stability.) Note: A speed change automatically restarts the G.shdsl WAN interface. Remember to save the speed change if you want it to persist across reboots.
348
Select auto-speed detection (shdsl speed auto). You should then restart the WAN interface with the command shdsl restart. shdsl speed [<speed> | auto]
Requested speed in kbps. The possible speeds range from 72 kbps to 2312 kbps in increments of 64 kbps. If you specify a value between steps, the speed is set to the next lower step. Selects auto-speed detection. Enter the command shdsl restart to carry out this change.
# shdsl speed Requested speed: 2312 Kb/s Actual speed: 2312 Kb/s # shdsl speed 1096
SHDSL STATS
Displays SHDSL statistics. The statistics are kept for 24 hours and then cleared. You can also manually clear the statistics with the clear option. Statistics kept include: line signal quality (SQ), loss of sync word (LOSW), far end bit error (FEBE), and loop attenuation (Loop Attn). shdsl stats [ clear ] clear Example:
# shdsl stats SHDSL 24hr statistics displayed in time period of 15 minutes: System up: 0 days 2 hours 9 minutes Line up: 0 days 2 hours 9 minutes Line SQ: 38 38 38 40 40 39 39 39 40 CRC Errors: 2 0 0 0 0 0 0 0 0 LOSW Errors: 0 0 0 0 0 0 0 0 0 FEBE Errors: 0 0 0 0 0 0 0 0 0 Loop Attn: -2 -2 -2 -2 -2 -2 -2 -2 -2 # shdsl stats clear # shdsl stats SHDSL 24hr statistics displayed in time period of 15 minutes: System up: Line up: Line SQ: CRC Errors: LOSW Errors: FEBE Errors: Loop Attn: 0 days 2 hours 9 minutes 0 days 0 hours 0 minutes 40 0 0 0 0
349
SHDSL TERMINAL
Displays and/or changes the routers designation as CO (Central Office) or CPE (Customer Premises Equipment). By default, the router is assumed to be CPE. Use this command if you intend to use the router as CO. To determine the current CO/CPE setting, enter shdsl terminal without a parameter. shdsl terminal [ cpe | co] cpe co Example:
# shdsl terminal We are in CPE mode Usage: shdsl terminal [co|cpe] # shdsl terminal co
Defines the router as the customer premises (CPE) equipment. Defines the router as the central office (CO) equipment.
SHDSL VER
Displays the G.shdsl version level of the modem firmware. shdsl ver Example:
# shdsl ver GTI SHDSL Version R1.2
DHCP Commands
The following DHCP (Dynamic Host Configuration Protocol) commands allow you to: Enable and disable subnetworks and client leases. Add subnetworks and client leases. Set the lease time. Change client leases manually. Set option values globally, for a subnetwork, or for a client lease. Enable/disable BootP. Use BootP to specify the boot server. Define option types.
To read about DHCP concepts and the DHCP configuration process, see DHCP (Dynamic Host Configuration Protocol), on page 85.
350
DHCP ?
Lists the supported keywords. dhcp ? Response:
Sub-commands for dhcp ? list enable del help bootp add delrelay set clear addrelay disable
DHCP ADD
Provides one of three types of DHCP definitions: subnetwork, client lease, or option type. To delete any of these DHCP definitions, use the command dhcp del (page 355). Defines a subnetwork: dhcp add <net> <mask> net mask Example:
dhcp add 192.168.254.0.255.255.255.0
IP address of the subnetwork lease (4 decimals separated by periods). IP network mask (4 decimals separated by periods).
Defines an option type: dhcp add <code> <min> <max> <type> code min max type Example: User-defined code (128 - 254, or a keyword). Minimum number of values. Maximum number of values. Byte | word | long | longint | binary | ipaddress | string
351
The code, 128, allows IP addresses, the server has a minimum of one, up to a maximum of four, IP addresses, and the type is ipaddress).
DHCP ADDRELAY
Adds an address to the DHCP relay list. (This list is also the BootP server list.) To see the current server address, use the command dhcp addrelay with no parameters. While the relay list contains at least one address, the DHCP server in the router is disabled, and the router forwards all DHCP requests and BootP requests to all servers in the relay list. (A DHCP request is issued whenever a device attempts to acquire an IP address). It forwards every reply received from any of the servers in the relay list to the appropriate LAN. To remove an address from the list, use the dhcp delRelay command (page 355). For further discussion, see Configuring BootP/DHCP Relays, on page 92. dhcp addRelay <ipaddr> ipaddr Example:
# dhcp addrelay 128.1.210.64 # dhcp addrelay BOOTP/DHCP Server address: 128.1.210.64
352
ipaddr Example:
Examples:
353
Example:
Examples:
354
DHCP DEL
Deletes a subnetwork lease, a specific client lease, or a code. dhcp del <net |<ipaddr>|<code> net ipaddr code Example 1: IP address of the subnetwork lease in the format of 4 decimals separated by periods. IP address of the client lease in the format of 4 decimals separated by periods. User-dened code (number between 128 to 254 or a keyword).
dhcp del 192.168.254.0
Example 3:
DHCP DELRELAY
Removes an address from the DHCP relay list. (This list is also the BootP server list.) To remove all addresses from the list, use dhcp delRelay all. If you remove all addresses from the DHCP relay list, the DHCP server is re-enabled and resumes processing DHCP requests and also BootP requests (if BootP processing is enabled). To add an address to the list, use the dhcp addRelay command (page 352). For further discussion, see Configuring BootP/DHCP Relays, on page 92. dhcp delRelay <ipaddr> | all ipaddr all Examples:
dhcp delrelay 128.1.210.64 dhcp delrelay all
IP address to be removed from the list (4 decimals separated by periods). Removes all addresses from the list.
DHCP DISABLE
Disables a subnetwork or a client lease. dhcp disable all | <net> | <ipaddr>
355
Disables all subnets. IP address of the subnetwork lease in the format of 4 decimals separated by periods. IP address of the client lease in the format of 4 decimals separated by periods.
dhcp disable 192.168.254.0 dhcp disable 192.168.254.17
DHCP ENABLE
Enables a subnetwork or a client lease. dhcp enable all | <net>|<ipaddr> all net ipaddr Examples: Enables all subnets. IP address of the subnetwork lease in the format of 4 decimals separated by periods. IP address of the client lease in the format of 4 decimals separated by periods.
dhcp enable 192.168.254.0 dhcp enable 192.168.254.17
DHCP LIST
Lists global, subnetwork, and client lease information. dhcp list | <net>|<ipaddr> net ipaddr IP address of the subnetwork lease in the format of 4 decimals separated by periods. IP address of the client lease in the format of 4 decimals separated by periods.
356
bootp...................... not allowed bootp server............... none bootp file................. GATEWAY (3)192.168.254.254 client 192.168.254.2, Ena, jo-computer, Expired client 192.168.254.3, Ena, Jo, 1999/5/16 11:31:33
Example 3: The following command lists information for the subnetwork 192.168.254.0:
#dhcp list 192.168.254.0 Subnet 192.168.254.0, Enabled Mask 255.255.255.0 first ip address 192.168.254.2 last ip address 192.168.254.253 lease Default bootp not allowed bootp server none bootp file GATEWAY (3) 192.168.254.254 client 192.168.254.2, Ena, Jo-computer, Expired client 192.168.254.3, Ena, Jo, 1998/5/16 11:31:33
Example 1: The following command lists all available options (predefined and user-defined):
357
#dhcp list definedoptions code TIMEOFFSET (2), 1 occurrence, type LONG code GATEWAY (3), 1 to 63 occurrences, type IPADDRESS code TIMESERVER (4), 1 to 63 occurrences, type IPADDRESS code NAMESERVER (5), 1 to 63 occurrences, type IPADDRESS code DOMAINNAMESERVER code SUBNETMASK (1), 1 occurrence, type IPADDRESS-RESERVED (6), 1 to 63 occurrences, type IPADDRESS code LOGSERVER (7), 1 to 63 occurrences, type IPADDRESS code COOKIESERVER (8), 1 to 63 occurrences, type IPADDRESS code LPRSERVER (9), 1 to 63 occurrences, type IPADDRESS code IMPRESSSERVER (10), 1 to 63 occurrences, type IPADDRESS code RESOURCELOCATION (11), 1 to 63 occurrences, type IPADDRESS code HOSTNAME (12), 1 to 255 characters, type STRING code BOOTFILESIZE (13), 1 occurrence, type WORD code MERITDUMPFILE (14), 1 to 255 characters, type STRING code DOMAINNAME (15), 1 to 255 characters, type STRING code SWAPSERVER (16), 1 occurrence, type IPADDRESS code ROOTPATH (17), 1 to 255 characters, type STRING code EXTENSIONSPATH (18), 1 to 255 characters, type STRING code IPFORWARDING (19), 1 occurrence, type BINARY code NONCALSOURCERTE (20), 1 occurrence, type BINARY code POLICYFILTER (21), 1 to 31 occurrences, type IPADDRESS code MAXDGMREASSEMBLY (22), 1 occurrence, type WORD code DEFAULTIPTTL (23), 1 occurrence, type BYTE code PATHMTUAGETMOUT (24), 1 occurrence, type LONGINT code PATHMTUPLATEAUTBL (25), 1 to 127 occurrences, type WORD code INTERFACEMTU (26), 1 occurrence, type WORD code ALLSUBNETSLOCAL (27), 1 occurrence, type BINARY code BROADCASTADDRESS (28), 1 occurrence, type IPADDRESScode PERFORMMASKDSCVR (29), 1 occurrence, type BINARY code MASKSUPPLIER (30), 1 occurrence, type BINARY code PERFORMRTRDSCVR (31), 1 occurrence, type BINARY code RTRSOLICITADDR (32), 1 occurrence, type IPADDRESS code STATICROUTE (33), 1 to 31 occurrences, type IPADDRESS code TRAILERENCAP (34), 1 occurrence, type BINARY code ARPCACHETIMEOUT (35), 1 occurrence, type LONGINT code ETHERNETENCAP (36), 1 occurrence, type BINARY code TCPDEFAULTTTL (37), 1 occurrence, type BYTE code TCPKEEPALIVEINTVL (38), 1 occurrence, type LONGINT code TCPKEEPALIVEGARBG (39), 1 occurrence, type BINARY code NETINFOSVCDOMAIN (40), 1 to 255 characters, type STRING code NETINFOSERVERS (41), 1 occurrence, type IPADDRESS code NETTIMEPROTOSRVRS (42), 1 occurrence, type IPADDRESS code VENDORSPECIFIC (43), 1 to 255 occurrences, type BYTE code WINSSERVER (44), 1 to 63 occurrences, type IPADDRESS code NETBIOSTCPDGMDIST (45), 1 to 63 occurrences, type IPADDRESS code NETBIOSTCPNODETYP (46), 1 occurrence, type BYTE code NETBIOSTCPSCOPE (47), 1 to 255 characters, type STRING code XWSFONTSERVER (48), 1 to 63 occurrences, type IPADDRESS code XWSDISPLAYMANAGER (49), 1 to 63 occurrences, type IPADDRESS code REQUESTEDIPADDR (50), 1 occurrence, type IPADDRESS-RESERVED code IPADDRLEASETIME (51), 1 occurrence, type LONGINT-RESERVED code OPTIONOVERLOAD (52), 1 occurrence, type BYTE-RESERVED code MESSAGETYPE (53), 1 occurrence, type BYTE-RESERVED code SERVERIDENTIFIER (54), 1 occurrence, type IPADDRESS-RESERVED code PARAMREQUESTLIST (55), 1 to 255 occurrences, type BYTE-RESERVED code MESSAGE (56), 1 to 255 characters, type STRING-RESERVED code MAXDHCPMSGSIZE (57), 1 occurrence, type WORD-RESERVED code RENEWALTIME (58), 1 occurrence, type LONGINT
358
code code code code code code code code code code code code code code code code code code
REBINDTIME (59), 1 occurrence, type LONGINT CLASSIDENTIFIER (60), 1 to 255 occurrences, type BYTE CLIENTIDENTIFIER (61), 2 to 255 occurrences, type BYTE NOTDEFINED62 (62), 1 to 255 occurrences, type BYTE NOTDEFINED63 (63), 1 to 255 occurrences, type BYTE NISDOMAIN (64), 1 to 255 characters, type STRING NISSERVERS (65), 1 to 63 occurrences, type IPADDRESS TFTPSERVERNAME (66), 4 to 255 characters, type STRING BOOTFILENAME (67), 1 to 255 characters, type STRING MOBILEIPHOMEAGNT (68), 0 to 63 occurrences, type IPADDRESS SMTPSERVERS (69), 1 to 63 occurrences, type IPADDRESS POP3SERVERS (70), 1 to 63 occurrences, type IPADDRESS NNTPSERVERS (71), 1 to 63 occurrences, type IPADDRESS WWWSERVERS (72), 1 to 63 occurrences, type IPADDRESS FINGERSERVERS (73), 1 to 63 occurrences, type IPADDRESS IRCSERVERS (74), 1 to 63 occurrences, type IPADDRESS STREETTALKSERVERS (75), 1 to 63 occurrences, type IPADDRESS STREETTALKDASRVRS (76), 1 to 63 occurrences, type IPADDRESS
Example 2: The following command lists options starting with the string ga:
#dhcp list definedoptions ga code, number of values, type of value code GATEWAY (3), occurrence 1, type IPADDRESS
Response:
Default lease time ......... 168 hours
359
360
dhcp set mask <net> <mask> net mask Example: IP address of the subnetwork lease in the format of 4 decimals separated by periods. IP network mask, in the format of 4 decimals separated by periods.
dhcp set mask 192.168.254.0 255.255.255.0
Example:
value
Example 1:
361
Example 2:
This command sets the value for the gateway option associated with the subnetwork.
dhcp set valueoption gateway 192.168.254.0 192.168.254.254
Example 3:
This command sets a value for the winserver option associated with a specic client.
dhcp set valueoption 192.168.254.251 winserver 192.168.254.7
Example 4:
This command sets a static route (option 33) to IP address 192.168.253.253 through router 192.168.254.254. (No mask is specified.)
dhcp set valueoption 33 192.168.254.254 192.168.253.253
362
Restrict a tunnel so it can be established only with a specific remote interface (l2tp set wanif).
Note: Two remote commands specic to L2TP are included in this section.
L2TP ?
Lists the supported keywords. l2tp ? Response:
L2tp Sub-commands: ? add forward list call close del set
L2TP ADD
Creates a tunnel entry. l2tp add <TunnelName> TunnelName Example: Name of the tunnel (character string). The name is case sensitive.
l2tp add PacingAtWork
L2TP CALL
This command is primarily used for debugging purposes and it establishes a tunnel without creating a session.
363
l2tp call <TunnelName> TunnelName Example: Name of the tunnel (character string). The name is case sensitive.
l2tp call PacingAtWork
L2TP CLOSE
Closes an L2TP tunnel and/or session. l2tp close <L2TP unit number>|-n<TunnelName>|-t<tunnelid>|-s<serialnum>|-c<callid> L2TP unit number -n TunnelName -t tunnelid -s serialnum -c callid Name of the tunnel (character string). The name is case sensitive. Local tunnel id. Serial number of the call within the tunnel. ID of the local call for the session.
L2TP DEL
Deletes a tunnel entry. l2tp del <TunnelName> TunnelName Example: Name of the tunnel (character string). The name is case-sensitive.
l2tp del PacingAtWork
L2TP FORWARD
The router can be congured to forward all incoming calls to an LNS without answering the incoming call. This feature is normally used when the router is acting as a LAC or both a LAC and LNS. Note: Only one tunnel entry can have this option set. l2tp forward all | none <TunnelName> all Forward all incoming calls through the tunnel to an LNS
364
No incoming calls are allowed to be forwarded through the tunnel to an LNS Name of the tunnel (character string). The name is case-sensitive.
l2tp forward PacingAtWork
L2TP LIST
Provides a complete display of the current conguration settings for tunnel(s), except for the authentication password/secret. l2tp list |<TunnelName>| TunnelName Example: Name of the tunnel (character string). The name is case sensitive.
l2tp list PacingAtWork
# l2tp list INFORMATION FOR <pacingAtWork> type ........................... All Incoming Calls Tunneled here . CHAP challenge issued .......... hidden AVPs used ............... sequencing/pacing .............. sequencing/pacing is ......... window size for sequencing/pacing ip address ..................... Our host name .................. ACTIVE TUNNEL .................. current state ................ LOCAL TUNNEL ID .............. REMOTE TUNNEL ID ............. remote firmware .............. remote ip address ............ LAC SESSION serial number ... current state .............. LOCAL CALL ID .............. local window size ........ sequencing/pacing ........ sequencing/pacing is ... REMOTE CALL ID ............. remote window size .......
L2TPClient (LAC-will not dial)/LNS no yes yes window pacing required 10 10.0.0.1 pacingAtHome UNKNOWN CLOSED 1 0 0 10.0.0.1 0 CLOSED 1 10 WINDOW PACING required 0 0
365
Caution: If the IP address of the remote tunnel is part of a subnet that is also reached through the tunnel, a routing table entry for this address must be explicitly added. Normally, this routing entry will be added to remote entry, which has the default route. Note 1: When a remote router tries to create a tunnel, the remote routers IP address is not authenticated . Note 2: If this command is not used, then <ipaddr> defaults to 0.0.0.0, and this end cannot initiate the tunnel. l2tp set address <ipaddr> <TunnelName> ipaddr TunnelName Example: IP address of the remote LAC or LNS. Name of the tunnel (character string). The name is case-sensitive.
l2tp set address 192.168.100.1 PacingAtWork
366
367
368
l2tp set remoteName <name> <TunnelName> name TunnelName Example: Host name of the remote tunnel. This is the fully qualied domain name of the remote host. Name of the tunnel (character string). The name is case-sensitive.
l2tp set remoteName isp PacingAtWork
369
TunnelName Examples:
This command restricts the tunnel named OfficeTunnel to the remote interface named officertr.
l2tp set wanif officertr OfficeTunnel
This command clears the remote interface restriction for the tunnel named OfficeTunnel.
l2tp set wanif - OfficeTunnel
This command restricts the tunnel named OfficeTunnel to the physical interface ETHERNET/1.
l2tp set wanif ETHERNET/1 OfficeTunnel
TunnelName Example:
REMOTE SETL2TPCLIENT
With this command, this remote is the path to the L2TP client and accepts tunnel calls. Use this command if your router acts as an LNS. You must also specify PPP authentication and IP routes for this remote. remote setl2tpclient <TunnelName><remoteName>
370
TunnelName
Name of the tunnel (character string) associated with the remote LAC. The name is casesensitive.
remoteName Example:
Name of the remote entry (character string). The name is case sensitive.
remote setl2tpclient PacingAtWork Router2
REMOTE SETLNS
With this command, this remote is the path to the LNS, and it will forward the incoming call (which matches this remote entry) through the tunnel named <TunnelName> if your router is the client. Note: The remote entry must also have appropriate information such as PPP authentication, IP routing, IPX routing, bridging, or Caller ID. remote setLNS <TunnelName><remoteName> TunnelName RemoteName Example: Name of the tunnel (character string). The name is case-sensitive. Name of the remote entry (character string).
remote setLNS PacingAtWork lnsServer
371
Up to 40 deny and 40 allow filters can be activated from the filter database.
FILTER BR ?
Lists the supported keywords. filter br ? Response:
Bridge filter commands: ? add use list del
FILTER BR ADD
Adds a bridging filter to the filtering database. The filter can allow or deny the forwarding of packets based on the contents of the packets. The command specifies the position within the packet that is checked and the data that must appear in that location in order for the packet to match this filter. filter br add [pos] [data] allow | deny pos data Example: This filter prevents forwarding of RARP packets across the bridge. The data at byte offset 12 in each packet is checked and, if the data is hex 8035, the packet is denied forwarding.
filter br add 12 8035 deny
Byte offset within a packet; number from 0-127. Hexadecimal number up to 6 bytes.
FILTER BR DEL
Deletes a bridging filter from the filtering database. The parameters on the command identify the filter to be deleted.
372
filter br del [pos] [data] allow | deny pos data Example: This command deletes the filter which denies the forwarding of packets that have the hex value 8035 at byte offset 12.
filter br del 12 8035 deny
Byte offset within a packet; number from 0-127. Hexadecimal number up to 6 bytes.
FILTER BR LIST
Lists the bridging filters in the filtering database. filter br list Example:
filter br list
Response:
Allow Filter: Deny Filter: pos:12, len=2, <80><35>
FILTER BR USE
Sets the mode of filtering to either deny, allow, or none. filter br use none | deny | allow Example:
filter br use allow
373
PPPoE Commands
This section contains the commands that are specific to PPPoE (PPP over Ethernet). To learn more about PPPoE configuration and management, see page 103. The commands in this section are: remote setPPPoEservice pppoe close pppoe list Used when configuring a PPPoE client entry. Ends a PPPoE session. Lists information about PPPoE sessions.
REMOTE SETPPPOESERVICE
Defines the remote router entry as a PPPoE remote entry. It also specifies the service to which PPPoE users connect through this remote entry. Note: Enter this command immediately after the remote add command that defines the remote router entry. remote setPPPoEservice <service> | * | - <remoteName> service Name of the PPPoE service to which this remote connects PPPoE users. The service provider defines the name of its service. The name is case-sensitive. Specify * if the remote can be used to connect to any PPPoE service. Specify - to clear the setting. remoteName Example: The following commands define the remote router used to connect to the PPPoE service DialUpPPP.net. Note that the remote setPPPoEservice command is entered immediately after the remote add command.
remote add PPPoEremote remote setPPPoEservice DialUpPPP.net PPPoEremote
PPPOE CLOSE
Closes a currently active PPPoE session. To see the currently active PPPoE sessions, enter pppoe list. pppoe close <ifsnumber> ifsnumber Session to be closed. Specify the PPPoE/Ifs number for the session as shown in the ifs or pppoe list command output.
Example:
374
The first command lists information about a PPPoE session, including its Ifs number (1); the second command closes that session.
# pppoe list PPPoE Client Session ...... PPPoE/Ifs number..... Access Concentrator.. Peer MAC Address .... Session ID .......... State ............... Flags ............... # pppoe close 1 DialUpPPP.net 1 15021109931568-efficient 00:10:67:00:66:E2 2 2 1
PPPOE LIST
Lists information about the currently active PPPoE sessions. pppoe list Output Fields: PPPoE Client Session . . . . . Service name. PPPoE/Ifs number. . . . . Number identifying the session. It is used on the pppoe close command. Access Concentrator . . . Identification of the access concentrator to which the session is connected. Peer MAC Address. . . . MAC address to which the session is connected. Session ID. . . . . . . . . . . Identification of the session by the access concentrator. The service provider needs this ID to find the access concentrator log for the session. State . . . . . . . . . . . . . . . Internal value indicating the state of the session: 0 Initial state. 1 Session has finished. 2 Session has been established and can send and receive user data. 3 Reserved. 4 Session is attempting to discover an access concentrator to provide the requested service. 5 Reserved. 6 Session has selected an access concentrator to provide the service and is waiting for it to set up the session. Flags . . . . . . . . . . . . . . . Internal flag. Currently, the only defined value is 1, indicating that this is a client PPPoE session. Example:
# pppoe list PPPoE Client Session ...... PPPoE/Ifs number..... Access Concentrator.. Peer MAC Address .... Session ID .......... DialUpPPP.net 1 15021109931568-efficient 00:10:67:00:66:E2 2
375
IKE COMMIT
Determines whether the IKE commit bit is set. By default, the commit bit is not set (off). To see the current setting, enter ike commit with no parameter. If packets are not being processed correctly across an IPSec tunnel, try ike commit on so that the commit bit is set. Setting the commit bit makes sure that no IPSec traffic arrives at the router before the router is ready for it. For more information about IKE, see IPSec (Internet Protocol Security), on page 149. ike commit [ on | off | help] on off help Example: Commit bit is set. Commit bit is not set. The default value is off. Displays help message.
ike commit on
IKE FLUSH
Clears all IKE configuration information from the router. For more information about IKE, see IPSec (Internet Protocol Security), on page 149. ike flush
Example:
376
377
Protocol: * Source port: * Destination port: * Tunnel mode Peer: my_aggressive_peer (0.0.0.0) Proposals: myproposal
Name of the IPsec policy to which the destination port parameter value is added. To see the policy names, use the ike ipsec policies list command.
ike ipsec policies set destport * mypolicy ike ipsec policies set destport http webpolicy
378
PolicyName Examples:
This command requires that, when the remote interface backup comes up, IKE is enabled for packets described by policy corporate. The specified interface (backup) must be the interface to the IKE peer.
ike ipsec policies set interface backup corporate
This command specifies that IKE is enabled for packets described by policy mypolicy regardless of the interface the peer is on.
ike ipsec policies set interface all mypolicy
379
380
ProposalName Name of an IKE proposal. To see the IKE proposal names, use the ike proposals list command. PolicyName Example: Name of the IPsec policy to which the proposal parameter value is added. To see the policy names, use the ike ipsec policies list command.
ike ipsec policies set proposal myproposal mypolicy
Name of the IPsec policy to which the protocol parameter value is added. To see the policy names, use the ike ipsec policies list command.
ike ipsec policies set protocol * mypolicy ike ipsec policies set protocol tcp webpolicy
381
PortNumber Source port whose data is allowed by the policy. The port can be specified by one of TELNET the listed names or by its number. To allow data through for any source port, specify an HTTP asterisk (*). SMTP TFTP * PolicyName Examples: Name of the IPsec policy to which the source port parameter value is added. To see the policy names, use the ike ipsec policies list command.
ike ipsec policies set sourceport * mypolicy ike ipsec policies set sourceport http webpolicy
Sets the translate option on or off. If translate is set to on, translation is applied before encryption, and the packets are sent using the host routers public IP address. Name of the IPsec policy to which the source port parameter value is added. To see the policy names, use the ike ipsec policies list command.
382
eth ip addr 10.0.0.1 255.255.255.0 0:99 # # Next, enable NAT for the virtual interface and route traffic to the # the corporate backbone (192.168.0.0/16) through the virtual interface. eth ip translate on 0:99 eth ip addroute 192.168.0.0 255.255.0.0 10.0.0.0.1 0:99
# # # #
Later, when you set up the IKE tunnel, include these commands when defining a policy. (The policy name is corporate.) The source address must be the virtual interface address. The destination address must be the corporate backbone address.
# ike ipsec policies set source 10.0.0.1 255.255.255.255 corporate # ike ipsec policies set dest 192.168.0.0 255.255.0.0 corporate # ike ipsec policies set translate on corporate
383
# ike ipsec proposals list IKE IPSEC PROPOSALS: myproposal ESP encryption: 3DES ESP authentication: SHA1 IPComp: None Lifetime 600 Lifedata 50000
384
encapsulation method must be requested by a set espenc or set ahauth command.) ProposalName Example: Name of the IPsec proposal to which the ESP authentication parameter is added. To see the proposal names in use, use the ike ipsec proposals list command.
NULL
385
386
PeerName Example:
Name of the IKE peer to be deleted. To see the peer names in use, use the ike peers list command.
ike peers delete my_aggressive_peer
387
Example:
388
PeerName Example:
Name of the IKE peer whose mode is specified. To see the peer names, use the ike peers list command.
ike peers set mode aggressive my_aggressive_peer
389
Secret (up to 256 characters; do not use spaces or non-printable characters). Name of the IKE peer whose secret is specified. To see the peer names, use the ike peers list command.
ike peers set secret confidential_hushhush my_aggressive_peer
390
Example:
391
Example:
IPSec Commands
The following commands allow you to define an IPSec connection without IKE. To read about IPSec Security, see IPSec (Internet Protocol Security), on page 149. Note: If you define a tunnel using IPSec commands, the keys will remain static. This could pose a security risk and is not recommended. Use of IKE for key management is recommended.
IPSEC ADD
Defines an IPSec security association (SA) name. ipsec add <SAname> SAname Example: Name for the new IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
ipsec add show_rx
392
IPSEC DEL
Deletes an existing IPSec security association (SA) name. ipsec del <SAname> SAname Example: Name for the IPSec SA to be deleted.To see the IPSec SA names in use, use the ipsec list command.
ipsec del show_rx
IPSEC DISABLE
Disables a defined IPSec SA entry. ipsec disable <SAname> SAname Example: Name for the IPSec SA to be disabled.To see the IPSec SA names in use, use the ipsec list command.
ipsec disable show_rx
IPSEC ENABLE
Enables a defined IPSec SA entry, indicating it is complete and ready to be used. The command can also re-enable a disabled SA entry. ipsec enable <SAname> SAname Example: Name for the IPSec SA to be enabled.To see the IPSec SA names in use, use the ipsec list command.
ipsec enable show_rx
IPSEC FLUSH
Clears all IPSec definitions. ipsec flush
IPSEC LIST
Lists one or all IPSec SA entries. ipsec list [<SAname>] SAname Example:
# ipsec list IPSec security associations:
393
show_rx Gateway: 207.135.89.233 Inbound Tunnel BOTH 3DES key=111111111122222222223333333333444444444455555555 SHA1 key=aaaaaaaaaabbbbbbbbbbccccccccccdddddddddd (20) No compression id =424242 seq=1, bitmap=ffffffff show_tx Gateway: 207.135.89.233 Outbound Tunnel BOTH 3DES key=012345678901234567890123456789012345678901234567 SHA1 key=abcdefabcdefabcdefabcdefabcdefabcdefabcd (20) No compression id =123456 seq=6734
394
SAname Example:
Name of the IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
ipsec set authkey aaaaaaaaaabbbbbbbbbbccccccccccdddddddddd show_rx
395
NULL
Use no encryption.
DES-CBC Use DES (56-bit) encryption. 3DES SAname Example: Use 3DES (168-bit) encryption. Name of the IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
ipsec set encryption 3des show_rx
396
One of the following: AH AH authentication. ESP ESP encryption. BOTH Both ESP encryption and authentication. SAname Example: Name of the IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
ipsec set service both show_rx
397
If you are connecting to more than one remote router: Fill out one set of information for each remote router in the Remote Routers section of the worksheet. If you are setting up both ends of the network: Use a mirror image of the information listed in your target router worksheet to configure the router on the other end of the WAN link. Note: You may want to review the Sample Configurations, on page 65.
398
Security Remotes Password Bridging On/Off TCP/IP Route Address If NAT is enabled: To enable NAT -andYou may need to enter a Source WAN Port Address If NAT is OFF: You may need to enter a Source WAN Port Address TCP/IP Routing (Internet Firewall) IPX Routing Store Reboot
..............................................
IP and IPX Routing eth ip enable eth ip rewall <on | off> eth ipx disable save reboot .............................................. ..............................................
399
Security Remotes Password Bridging On/Off IPX Routes Add IPX SAPs Add
400
Your Settings
system admin <password> Remote Routers remote add <remoteName> remote setProtocol PPP <remoteName> remote setPVC <vpi number>*<vci number> <remoteName> remote setDLCI <number> <remoteName> remote setAuthen <protocol> <remoteName> remote setOurPasswd <password> <remoteName> remote enaBridge <remoteName> IP and IPX Routing eth ip disable eth ipx disable save reboot
Security Remotes Password Bridging On/Off IP Routing IPX Routing Store Reboot
401
Your Settings
Change Login New Entry Link Protocol/PVCa (for ATM routers) Link Protocol /DLCIb (for Frame Relay Routers) Bridging On/Off TCP/IP Route Address If NAT is enabled: To enable NAT -andYou must enter a Source WAN Port Address If NAT is OFF: You may need to enter a Source WAN Port Address TCP/IP Routing (Internet Firewall) IPX Routing Store Reboot
system admin < password> Remote Routers remote add <remoteName> remote setProtocol RFC1483 <remoteName> remote setPVC <vpi number> * <vci number> <remoteName> remote setProtocol FR <remoteName> remote setDLCI <number><remoteName> remote disBridge <remoteName> remote addiproute <ipnet> <ipnetmask> <hops> <remoteName> remote setIpTranslate on <remoteName> remote setSrcIpAddr <ipaddr> <ipnetmask> <remoteName>
...............................................
IP and IPX Routing eth ip enable eth ip rewall <on | off> eth ipx disable save reboot ............................................... ...............................................
a Enter this information if you are using RFC 1483 in an ATM environment. b Enter this information if you are using RFC 1490 in a Frame-Relay environment.
402
Your Settings
eth ipx addr <ipxnet> [>port#>] eth ipx frame <type> system admin <password> Remote Routers remote add <remoteName> remote setProtocol RFC1483 <remoteName> remote setPVC <vpi number>*<vci number> <remoteName> remote setProtocol FR <remoteName> remote setDLCI <number><remoteName> remote disBridge <remoteName> remote addIpxroute <ipxNet> <metric> <ticks> <remoteName> remote addIpxsap <servicename> <ipxNet> <ipxNode> <socket> <type> <hops> <remoteName> remote setIpxaddr <ipxNet> <remoteName> IP and IPX Routing eth ip disable eth ip rewall <on | off > eth ipx enable save reboot
.............................................. ..............................................
a Enter this information if you are using RFC 1483 in an ATM environment. b Enter this information if you are using RFC 1490 in a Frame-Relay environment.
403
Your Settings
New Entry Link Protocol/PVCa (for ATM routers) Link Protocol /DLCIb
(for Frame Relay Routers)
remote add <remoteName> remote setProtocol RFC1483 <remoteName> remote setPVC <vpi number>*<vci number> <remoteName> remote setProtocol FR <remoteName> remote setDLCI <number><remoteName> remote enaBridge <remoteName> IP and IPX Routing eth ip disable eth ipx disable save reboot
............................................... ...............................................
a Enter this information if you are using RFC 1483 in an ATM environment. b Enter this information if you are using RFC 1490 in a Frame-Relay environment.
404
Your Settings
system admin <password> Remote Routers remote add <remoteName> remote setProtocol RFC1483MER <remoteName>
remote setPVC <vpi number>*<vci number> <remoteName>
Link Protocol /DLCIb (for Frame Relay Routers) Bridging On/Off TCP/IP Route Address If NAT is enabled: To enable NAT,enter: and enter a Source WAN Port Address If NAT is not enabled: You may need to enter a Source WAN Port Address TCP/IP Routing (Internet Firewall) IPX Routing Store Reboot
a b c d
remote setProtocol MER <remoteName> remote setDLCI <number><remoteName> remote disBridge < remoteName> remote addIproute <ipnet> <ipnetmask> <ipgateway> <hops> <remoteName> remote setIpTranslate on <remoteName> remote setSrcIpAddr <ipaddr> <ipnetmask> <remoteName> c remote setSrcIpAddr <ipaddr> <ipnetmask> <remoteName> d
...................................................
...................................................
IP and IPX Routing eth ip enable eth ip rewall <on | off> eth ipx disable save reboot ................................................... ...................................................
Enter this information if you are using RFC 1483 in an ATM environment. Enter this information if you are using RFC 1490 in a Frame-Relay environment. The mask is the mask of the remote network. The mask is the mask of the remote network.
405
Your Settings
system admin <password> Remote Routers remote add <remoteName> remote setProtocol FRF8 <remoteName> remote setPVC <vpi number>*<vci number> <remoteName> remote disBridge <remoteName> remoteaddIproute <ipnet> <ipnetmask> <hops><remoteName> remote setIpTranslate on <remoteName> remote setSrcIpAddr <ipaddr> <mask> <remoteName> a
Bridging On/Off TCP/IP Route Address If NAT is enabled: To enable NAT -ANDYou must enter a Source WAN Port Addr If NAT is not enabled: You may need to enter a Source WAN Port Addr TCP/IP Routing (Internet Firewall) IPX Routing Store Reboot
...............................................
IP and IPX Routing eth ip enable eth ip rewall <on | off> eth ipx disable save reboot ............................................... ...............................................
a The mask is the mask of the remote network b The mask is the mask of the remote network
406
Your Settings
eth ip addroute <ipaddr> <ipnetmask> <gateway> <hops> [<port#>] DHCP Settings dhcp add [<net> <mask> | <ipaddr> | <code> <min> <max> <type> dhcp set addresses <rst ipaddr> <last ipaddr> dhcp set valueoption domainname <domainname> dhcp set valueoption domainnameserver <ipaddr> dhcp set valueoption winsserver <ipaddr> save reboot
407
Static Seeding: When IPX traffic is destined for network segments and servers beyond the remote router, the target routers routing information table must be statically seeded. Static seeding ensures that the target router connects to the appropriate remote router. After the link is established, RIP broadcast packets will dynamically add to the target routers routing table. Seeding the routing table is not necessary for target routers that never connect; they will discover remote networks beyond the calling router as soon as RIP updates arrive (provided the remote router supports RIP). However, for watchdog spoofing to work, you will need to define the remote IPX routes for network segments and servers.
The following section, Step 1: Collect Your Network Information for the Target (Local) Router, on page 409, provides a configuration diagram and a command table to assist you with the configuration of the target router. Step 2: Review your Settings, on page 410 lists the commands used to review the IPX configuration and provides a configuration example.
408
Step 1: Collect Your Network Information for the Target (Local) Router
The remote side of the WAN link has all of the file and print services. Enter the needed network information in the blank boxes of the diagram. Then match the boxes numbers with the numbers in the Command Table below to configure the target router for IPX.
1 2
Enable IPX routing External Network # (Local Wire address) Ex: 123
Server Name
IPX Frame Type Ex: 802.2 Server Type Ex: 4 System Name of remote router Ex: ipx_server SAP info
6
Node # Ex: 00:00:00:00:00:01 Novell Client Workstation Novell Client Workstation Novell Client Workstation
IPX router
(Target Router) Name: "ipx_client"
ISDN or DSL
IPX Router
(Remote Router) Name: "ipx_server"
7 8
9
Command Table
These commands are used to configure the Target (client-side) router (ipx_client). Log in with the password admin.
Ref #
1 2 3 4 5 6 7 8 9
Comments
Enable IPX Routing Set the local wire address Set the Frame Type Add a connection name Set the WAN network # (common to both sides) Add a le server (SAP) Add a route to the server Save your settings Reboot for changes to take effect
409
> eth list ETHERNET INFORMATION FOR <ETHERNET/0> Hardware MAC address................. 00:20:6F:02:4C:35 Bridging enabled..................... no IP Routing enabled................... no Firewall filter enabled ........... yes Process IP RIP packets received.... yes Send IP RIP to the LAN............. yes Advertise me as the default router. Yes Receive default route using RIP.... yes IP address/subnet mask............... 192.84.210.123/255.255.255.0 IP static default gateway............ none IPX Routing enabled.................. yes External network number............ 00000123 Frame type......................... 802.2 > remote list INFORMATION FOR <ipx_server > Status............................... enabled Protocol in use.................... PPP Authentication....................... enabled Authentication level required........ PAP IP address translation............... on Compression Negotiation.............. off Source IP address/subnet mask........ 0.0.0.0/0.0.0.0 Remote IP address/subnet mask........ 0.0.0.0/0.0.0.0 Send IP RIP to this dest............. no Receive IP RIP from this dest........ no Send IP default route if known....... no Receive IP default route using RIP... no Keep this IP destination private..... yes Total IP remote routes............... 0 IPX network number................... 00000456 Total IPX remote routes.............. 1 00002002/1/4 Total IPX SAPs....................... 1 SERVER2 00002002 00:00:00:00:00:01 0451 0004 1 Bridging enabled..................... no Exchange spanning tree with dest... no Mac addresses bridged.............. none
1 2
eth ipx addr <ipxnet> [port#] Ex: eth ipx addr 123
3 4
eth ipx frame [802.2 | 802.3 | DIX] Ex: eth ipx frame 802.2
remote setipxaddr <ipxnet> <remoteName> [port#] Ex: remote setipxaddr 456 ipx_server
remote addipxroute <ipxnet> <ticks> <remoteName> Ex: remote addipxroute 2002 1 4 ipx_server
remote addipxsap <servername> <Internal IPX net #> <IPX node address> <socket> <server type> <hops> <remoteName> Ex: remote addipxsap SERVER2 2002 0:00:00:00:00:01 451 4 2 ipx_server
410
Command Index
Symbols
?, 210 dhcp addRelay, 352 dhcp bootp allow, 352 dhcp bootp disallow, 352 dhcp bootp file, 353 dhcp bootp tftpServer, 353 dhcp clear addresses, 353 dhcp clear all records, 354 dhcp clear expire, 354 dhcp clear valueOption, 354 dhcp del, 355 dhcp delRelay, 355 dhcp disable, 355 dhcp enable, 356 dhcp list, 356 dhcp list definedOptions, 357 dhcp list lease, 359 dhcp set addresses, 359 dhcp set expire, 360 dhcp set lease, 360 dhcp set mask, 360 dhcp set otherServer, 361 dhcp set valueOption, 361 dir, 227 dmt, 206 dmt link, 331 dmt log, 207 dmt mode, 331 dmt ms, 207 dmt retries, 207 dmt speed, 207 dmt to, 207 dmt vers, 207 dod, 203 dsp, 192 dsp ecode, 24 dsp fail, 192 dsp jitter, 193 dsp provision, 192 dsp tritone, 192 dsp vpinfo, 24, 192 dsp vr, 24
A
adsl ?, 326 adsl restart, 326 adsl speed, 326 adsl stats, 327 arp delete, 211 arp list, 211 atm ?, 328 atm pcr, 328 atm reset, 204 atm save, 329 atm speed, 329 atom cellrx, 207 atom dumpUnknownCells, 204 atom echoPVC, 204 atom empty, 204 atom findPVC, 204 atom nma, 205 atom pls, 204 atom print, 207 atom promisc, 207 atom rx, 207 atom stats, 207 atom tx, 207 atom voice, 193
B
bi, 211 bi list, 212
C
call, 212 copy, 226
D
date, 212 delete, 227 dhcp ?, 351
411
E
erase, 213 eth ?, 262 eth add, 262 eth br disable, 332 eth br enable, 332 eth br options, 332 eth delete, 263 eth ip addHostMapping, 263 eth ip addr, 264 eth ip addRoute, 264 eth ip addServer, 265 eth ip bindRoute, 266 eth ip defGateway, 267 eth ip delHostMapping, 267 eth ip delRoute, 268 eth ip delServer, 268 eth ip directedBcast, 269 eth ip disable, 270 eth ip enable, 270 eth ip filter, 270 eth ip firewall, 274 eth ip mgmt, 275 eth ip options, 276 eth ip ripMulticast, 277 eth ip translate, 277 eth ip unbindRoute, 277 eth ip vrid, 278 eth ipx addr, 279 eth ipx disable, 279 eth ipx enable, 279 eth ipx frame, 280 eth list, 280 eth mtu, 281 eth restart, 281 eth start, 282 eth stop, 282 eth vrrp add, 282 eth vrrp clear password, 283 eth vrrp delete, 283 eth vrrp list, 284 eth vrrp set multicast, 285 eth vrrp set option, 285 eth vrrp set password, 286 eth vrrp set priority, 286 eth vrrp set timeinterval, 287
F
filter br ?, 372 filter br add, 372 filter br del, 372 filter br list, 373 filter br use, 373 format disk, 228 frame, 334 frame cmPPlay, 334 frame lmi, 334 frame stats, 334 frame voice, 193, 335
H
hdsl ?, 337 hdsl save, 337 hdsl speed, 337 hdsl terminal, 338 help, 210
I
idsl list, 339 idsl save, 339 idsl set speed, 339 idsl set switch, 340 ifs, 214 ike commit, 376 ike flush, 376 ike ipsec policies add, 376 ike ipsec policies delete, 377 ike ipsec policies disable, 377 ike ipsec policies enable, 377 ike ipsec policies list, 377 ike ipsec policies set dest, 378 ike ipsec policies set destport, 378 ike ipsec policies set interface, 379 ike ipsec policies set mode, 379 ike ipsec policies set peer, 380 ike ipsec policies set pfs, 380 ike ipsec policies set proposal, 380 ike ipsec policies set protocol, 381
412
ike ipsec policies set source, 381 ike ipsec policies set sourceport, 381 ike ipsec policies set translate, 382 ike ipsec proposals add, 383 ike ipsec proposals delete, 383 ike ipsec proposals list, 383 ike ipsec proposals set AHauth, 384 ike ipsec proposals set ESPauth, 384 ike ipsec proposals set ESPenc, 385 ike ipsec proposals set IPcomp, 385 ike ipsec proposals set lifedata, 386 ike ipsec proposals set lifetime, 386 ike peers add, 386 ike peers delete, 386 ike peers list, 387 ike peers set address, 387 ike peers set localID, 388 ike peers set localIDtype, 388 ike peers set mode, 388 ike peers set peerID, 389 ike peers set peerIDtype, 389 ike peers set secret, 389 ike proposals add, 390 ike proposals delete, 390 ike proposals list, 390 ike proposals set dh_group, 391 ike proposals set encryption, 391 ike proposals set lifetime, 391 ike proposals set message_auth, 392 ike proposals set session_auth, 392 ike start, 208 ike stop, 208 ipdebug, 203 ipifs, 215 ipRoutes, 215 ipsec add, 392 ipsec del, 393 ipsec disable, 393 ipsec enable, 393 ipsec flush, 393 ipsec list, 393 ipsec set authentication, 394 ipsec set authKey, 394 ipsec set compression, 395 ipsec set direction, 395 ipsec set encKey, 395
ipsec set encryption, 395 ipsec set gateway, 396 ipsec set ident, 396 ipsec set mode, 396 ipsec set service, 396 ipxRoutes, 215 ipxSaps, 216
K
key add, 125
L
l2tp ?, 363 l2tp add, 363 l2tp call, 363 l2tp close, 367 l2tp del, 364 l2tp forward, 364 l2tp list, 365 l2tp set address, 365 l2tp set authen, 366 l2tp set chapSecret, 366 l2tp set dialout, 367 l2tp set hiddenAVP, 367 l2tp set ourAddress, 367 l2tp set ourPassword, 367 l2tp set ourSysName, 368 l2tp set ourTunnelName, 368 l2tp set remoteName, 368 l2tp set type, 369 l2tp set wanif, 369 l2tp set window, 370 logout, 216
M
mem, 216 mlp, 203 mlp show, 315 mlp summary, 217 msfs, 228
P
ping, 217 pppoe close, 374
413
R
reboot, 219 remote ?, 289 remote add, 290 remote addBridge, 290 remote addHostMapping, 290 remote addIpRoute, 291 remote addIpxRoute, 292 remote addIpxSap, 292 remote addServer, 293 remote bindIPVirtualRoute, 293 remote blockNetBios, 294 remote del, 294 remote delATMnsap, 294 remote delBridge, 295 remote delEncryption, 295 remote delHostMapping, 295 remote delIpRoute, 296 remote delIpxRoute, 296 remote delIpxSap, 296 remote delOurPasswd, 297 remote delOurSysName, 297 remote delPhone, 297 remote delServer, 298 remote disable, 298 remote disAuthen, 299 remote disBridge, 299 remote enaAuthen, 299 remote enable, 299 remote enaBridge, 300 remote ipFilter, 300 remote list, 304 remote listBridge, 305 remote listIpRoutes, 305 remote listIpxRoutes, 306 remote listIpxSaps, 306 remote listPhones, 307 remote restart, 307 remote setATMnsap, 307 remote setATMtraffic, 329 remote setAuthen, 308 remote setBOD, 308
remote setBrOptions, 309 remote setBWthresh, 309 remote setCompression, 310 remote setDLCI, 340 remote setEncryption (Diffie-Hellman), 311 remote setEncryption (PPP DES), 310 remote setIpOptions, 311 remote setIpSlavePPP, 312 remote setIPTranslate, 313 remote setIpxAddr, 313 remote setIPXoptions, 313 remote setL2tpClient, 370 remote setLNS, 371 remote setmaxline, 313 remote setMgmtIpAddr, 313, 314 remote setMinLine, 314 remote setmtu, 315 remote setOurPasswd, 315 remote setOurSysName, 316 remote setPasswd, 316 remote setPhone, 316 remote setPPPoEservice, 374 remote setPPPoptions, 317 remote setPPPRetryTimer, 318 remote setPrefer, 318 remote setProtocol, 320 remote setProtocol (for IDSL), 341 remote setPVC, 320 remote setpvc, 193 remote setRmtIpAddr, 321 remote setSpeed, 321 remote setSrcIpAddr, 322 remote setTimer, 322 remote start, 322 remote stats, 323 remote statsClear, 324 remote stop, 324 remote unbindIPVirtualRoute, 324 rename, 229
S
save, 220 sdsl ?, 343 sdsl btstat, 205 sdsl huh, 206
414
sdsl preact, 344 sdsl save, 344 sdsl speed, 344 sdsl states trace, 206 sdsl stats, 345 sdsl terminal, 345 shdsl ?, 346 shdsl list, 347 shdsl margin, 347 shdsl rateMode, 348 shdsl restart, 348 shdsl save, 348 shdsl speed, 348 shdsl stats, 349 shdsl terminal, 347, 350 shdsl ver, 350 sntp active, 221 sntp disable, 221 sntp enable, 221 sntp offset, 221 sntp prefserver, 222 sntp request, 222 sntp server, 223 sync, 229 system ?, 230 system addBootpServer, 231 system addHostMapping, 231 system addHTTPfilter, 232 system addIpRoutingTable, 232 system addServer, 233 system addSNMPfilter, 232, 234 system addSysLogFilter, 234 system addSyslogServer, 235 system addTelnetFilter, 235 system addUdpRelay, 236 system admin, 236 system authen, 236 system backup add, 237 system backup delete, 237 system backup disable, 238 system backup enable, 238 system backup pinginterval, 239 system backup pingsamples, 239 system backup retry, 240 system backup stability, 240 system backup successrate, 241
system blockNetBIOSDefault, 241 system community, 242 system defaultmodem, 242 system delBootpServer, 242 system delHostMapping, 242 system delHTTPfilter, 243 system delIpRoutingTable, 243 system delServer, 244 system delSNMPfilter, 244 system delSysLogFilter, 245 system delSysLogServer, 245 system delTelnetFilter, 245 system delUdpRelay, 246 system history, 246 system httpPort, 247 system httpport, 247 system list, 247 system log, 249 system modem, 249 system moveIpRoutingTable, 250 system msg, 250 system name, 250 system oneWanDialup, 251 system passwd, 252 system securityTimer, 252 system snmpPort, 252 system supportTrace, 253 system syslogPort, 259 system telnetPort, 260 system wan2wanForwarding, 261
T
tcp stats, 224 time, 224 traceroute, 224
V
vers, 226 voice ip, 193 voice l2clear, 193 voice l2stats, 193 voice lestrace, 193 voice profile, 24 voice refreshcas, 24
415
Topic Index
Numerics
3DES encryption, 150 IKE proposal command, 156 7461 router, 192 manual boot mode (for models with a reset button), 181 manual boot mode (for models with configuration switches), 170 options, 169 boot failures, 173 boot options baud rate for console, 172 booting from the network, 171 extended diagnostics, 173 manual boot mode, 170 time and date, 172 BootP service, 167 bridge filtering, 20, 81 commands, 372 bridging bridge-only units, 20 configuration information (for dualEthernet router), 47 configuration information (with RFC 1483), 43 configuration table (with PPP), 55 configuration table (with RFC 1483/RFC 1490), 58 general information, 19 test, 63 bridging loops Ethernet interface, 333 remote router entry, 309 bridging options Ethernet interface, 332 remote router entry, 309 broadcast packets, filtering, 82 built-in firewall filters, 129
A
address translation, 95 ADPCM voice encoding, 23 ADSL DMT router commands, 331 debug commands, 206 ADSL modem timer commands, 207 AH IPSec protocol, 149, 150 alaw encoding, 24 ASIC.AIC file, 181 ATM configuration commands, 328 debug commands, 204 tracing commands, 207 authentication, 25 ESP message, 156, 157, 384 ESP protocol, 150 IKE, 153 IKE message, 155 IKE session, 155 levels, 27 passwords, 27 Authentication Header protocol, 149 autobaud pre-activation, 343
B
backing up configuration files, 179 backup router for a static default gateway, 116 backup V.90 modem capability, 109 batch file execution, 183 baud rate for terminal emulation program, 172 binding a virtual route for a remote interface, 293 for an Ethernet interface, 266 BLES, 23 boot code definition, 169
C
CAS refresh signaling, 24 CCP, 310 CHAP, 25 clearing the configuration, 213 CLI, 209 clock setting command, 224
416
date command, 212 manual boot mode option, 172 command index, 411 command line access, 14 Command Line Interface conventions, 209 commands debugging See also Command Index, 203 communication interface status command, 214 compression IKE IP compression command, 385 IPCP compression, 317 IPSec compression command, 395 Stac LZS payload compression, 310 Van Jacobson compression of TCP/IP headers, 317 voice compression, 23 configuration examples dual-Ethernet router with IP, 77 IKE aggressive mode, 162 IKE main mode, 159 PPP with IP and IPX, 65 RFC 1483 with IP and Bridging, 72 VRRP, 121 configuration files, backup/restore, 179 configuration information Dual-Ethernet router, 47 FRF8 + IP, 46 PPP + IP, 36, 38, 40 RFC 1483 + bridging, 43 RFC 1483 + IP, 41 RFC 1483 + IPX, 42 RFC 1483MER + IP, 44 RFC 1490 + IP, 38, 41, 42, 43 RFC 1490 + IPX, 42 RFC 1490MER + IP, 44 configuration tables dual-Ethernet router +IP routing, 62 FRF8 + IP routing, 60 mixed network protocols, 61 PPP + bridging, 55 PPP + IPX routing, 54 RFC 1483/RFC 1490 + bridging, 58 RFC 1483/RFC 1490 + IP routing, 56 RFC 1483/RFC1 490 + IPX routing, 57
RFC 1483MER/RFC 1490MER + IP routing, 59 configuredforCMPPlay remote, 49 console baud rate, 172 contacting technical support, 208 conventions for commands, 209 Copper Mountain Plug & Play, 48
D
date setting command, 212 manual boot mode option, 172 debugging commands, 203 DES encryption, 150 DH. See Diffie-Hellman DHCP, 85 BootP management, 91 clearing, 93 commands, 350 concepts, 85 configuration, 85 relays, 92 TFTP server, 91 diagnostics, 173 dial backup, 109 troubleshooting, 194 Diffie-Hellman encryption, 127 for IKE key exchange, 151 for IKE Perfect Forward Secrecy, 380 group used for IKE key exchange, 156 directed broadcast filtering, 82 DLCI for an IDSL Frame Relay connection, 340 dmt commands, 206, 331 DNS, 37 DHCP address request, 85 server, 233 dod command, 203 Domain Name Service, 37 dual-Ethernet router, 47 commands, 332 sample configuration, 77
E
Encapsulated Security Payload, 149
417
encapsulation methods, IPSec, 150 encapsulation modes, IPSec, 149 encapsulation options, 29 encoding digital audio, 24 encryption Diffie-Hellman, 127 ESP protocol for IPSec, 150 hardware option, 125 PPP DES, 126 PPP DES (RFC 1969), 126 erasing the configuration, 213 error messages, 199 ESP IPSec protocol, 149 Ethernet commands, 332 Ethernet configuration commands, 262 Ethernet IP address assignment, 264 Ethernet subnets, 79 export restriction, 150 extended diagnostics, 173
FRF8, 46
G
G.Lite DMT link type, 331 G.shdsl commands, 346 G_DMT mode setting, 206 G_LITE mode setting, 206 GUI debug commands, 205
H
H.323 protocol, 100 hardware diagnostics, 173 header compression, 317 history log, 185 host mapping, 99 HSD interface, 318 HTTP access control, 107 HTTP port access, 247 HW-DES, 125 HyperTerminal, 15
F
fail over pots interface, 192 fatal boot failures, 173 feature activation keys, 124 file system commands, 226 files, 32 filters bridge filtering, 81 IKE policies, 157 Internet firewall filtering, 82 IP filtering option, 129 Ethernet interface command, 270 WAN interface command, 300 firewall IP filtering, 129 IP Internet firewall filtering, 82 scripts maximum security, 132 medium security, 133 minimum security, 134 flash memory recovery procedures, 180 FPGA file, 181 Frame commands, 334 frame relay debug commands, 207 Frame relay statistics command, 334
I
IAD, 22 IDSL router commands, 339 IKE command formats, 376 commit bit, 376 debug commands, 208 IPSec policy commands, 157 IPSec proposal commands, 156 peer commands, 154 proposal commands, 155 proposal exchange, 153 protocol, 149 IKE configuration examples aggressive mode, 162 main mode, 159 Integrated Access Device, 22 interface status command, 214 Internet Key Exchange protocol, 149 IP address assignment, 264 IP address recovery, 182 IP filtering, 129 debug commands, 207 Ethernet interface command, 270
418
WAN interface command, 300 IP firewall configuration, 82 IP interface list command, 215 IP RIP packets, 83 IP routing configuration information (for dualEthernet router), 47 configuration information (with FRF8), 46 configuration information (with RFC 1483), 41 configuration information (with RFC 1483MER), 44 configuration information (with RFC 1490), 38, 41, 42, 43 configuration information (with RFC 1490MER), 44 configuration table (with FRF8), 60 configuration table (with MAC Encapsulated Routing), 59 configuration table (with RFC 1483/RFC 1490), 56 configuration table (with RFC 1483MER/RFC 1490MER), 59 test, 63 IP routing table, 80 defining, 232 deleting, 243 moving, 250 IP slave mode, 317 IP subnets, 79 IP virtual router support, 80 IP virtual routing, 266, 277, 293, 324 IPCP, 5, 312 IPCP compression, 317 ipdebug command, 203 IPSec command formats, 392 connection without IKE, 163 RFCs, 29 security, 149 IPX routing concepts, 408 configuration information (with RFC 1483), 42 configuration information (with RFC
1490), 42 configuration table (with PPP), 54 configuration table (with RFC 1483/RFC 1490), 57 test, 64 ISDN, 339 ISDN phone numbers, 111
J
Jetstream troubleshooting, 193 jitter buffer adjustment, 193
K
kernel upgrade from the LAN, 176 upgrade from the WAN line, 178
L
L2TP, 137 commands, 363 configurations, 139 over IPSec, 150 LCP, 26 LEDs fatal error patterns, 173 ready state, 185 startup sequence, 184 LLC multiplexing, 30 LMI command, 334 logical Ethernet interfaces, 79 for VRRP, 117 login procedure, 14 LZS compression, 310
M
MAC Encapsulated Routing, 43 management IP address for a remote router, 314 for Ethernet interface, 275 management security, 107 mapping IP addresses with NAT, 95 maxsec.txt, 132 medsec.txt, 133 MER, 43 MIBs, 165
419
minsec.txt, 134 mlp debug command, 203 modem settings for dial backup, 114 sample init strings, 198 MTU command for Ethernet interface, 281 for WAN interface, 315 multicast address for RIP, 277 address for VRRP, 285 multiple Ethernet subnets, 79 multiple IP subnets, 79 multiple routing tables, 80
N
naming the router, 250 NAT, 95 NetBIOS and NetBUI request block, 241 NetMeeting, 100 Network Address Translation, 95 classic NAT, 99 configuration, 95 masquerading, 95 network information example, 73 sample worksheets, 73
IP option, 312 PPP option, 317 PFS, 151 ping command, 186, 217 Plug & Play, 48 policy commands, IKE, 154 port translation, 95 PPP encapsulation options, 30 PPP Link Protocol, 36 PPP options command, 317 PPP retry timer, 318 PPPoE, 103 bridge entry, 103 client, 104 close session command, 374 commands, 374 domain name, 104 list command, 375 sample configuration script, 105 session management, 106 timeout, 104 pre-activation, 343 proposal commands, IKE, 154 protocol standards, 28 pulse dialing, 115
R
Rapid Secure Encryption, 125 RARP server, 171 reboot command, 219 recovering passwords and IP addresses, 182 remote commands, 289 remote routers, 34 commands, 289 Remote Shell server, 233 replay detection, 150 reset button, 181 restarting a remote, 35 restoring configuration files, 179 retry timer, 318 RFC 1483, 36, 41 RFC 1483MER, 43 RFC 1490, 36, 41 RFC 1490MER, 43 RFCs supported, 28 RIP packet controls, 83
P
PAP, 25 PAP/CHAP authentication naming the router, 251 password command for local router when connecting to remote, 315 for remote, 316 for the target router, 252 password example, 65 passwords, 27 recovering the administrative password, 182 passwords for sample configuration, 65 payload compression, 310 PCM voice encoding, 23 peer commands, IKE, 154 Perfect Forward Secrecy, 151 periodic echo
420
PPP option, 318 rlogin port, 233 route tracing command, 224 RSE hardware option, 125
S
sample configurations dual-Ethernet router with IP, 77 IKE, 159 PPP with IP and IPX, 65 VRRP, 121 SAs, 149 save dod, 220 saving configuration files, 179 saving the configuration, 220 script execution, 183 SDSL commands, 342, 346 autobaud pre-activation, 343 autospeed detection, 342 debug commands, 205 secure VPN IPSec tunnels, 149 L2TP tunnels, 137 security authentication, 25 authentication passwords, 27 IKE, 149 IPSec, 149 Security Associations, 149 security timer, 252 server configuration for NAT, 96 request hierarchy, 98 setting a management address for a remote router, 314 for Ethernet interface, 275 SHDSL commands, 346 signaling cells, 193 SNMP access control, 107 client validation, 107 support, 165 supported MIBs, 165 SNTP server commands, 221 SNTP server request, 222 software kernel, 32 upgrades, 176
software option keys, 124 software options encryption, 126 IP filtering, 129 keys, 124 L2TP tunneling, 137 software version, 226 source routing, 80 Spanning Tree Protocol Ethernet interface, 333 remote router entry, 309 Stac LZS compression of the payload, 310 standards conformance, 28 status commands, 210 STP protocol Ethernet interface, 333 remote router entry, 309 subnet broadcasts, 82 subnets, 79 subscription, 23 support, contacting, 208 Symmetric Digital Subscriber Line, 342 Syslog client, 168 system commands, 230 system files, 32 system messages, 199
T
T.120 protocol, 101 T1.413 mode setting, 206 target router, 34 TCP port, 260 TCP/IP routing source and remote addresses, 42 technical support, contacting, 208 telephony services, 22 trouble-shooting, 191 Telnet, 166 command line access, 16 controlling router access, 107 Telnet client validation, 107 terminal access to the command line, 14 terminal emulation program baud rate, 172 TFTP client facility, 166 server, 166
421
time setting command, 224 manual boot mode option, 172 timeout period for a dial-up connection, 322 time-stamped messages, 199 Tollbridge troubleshooting, 193 tone dialing, 115 traceroute command, 224 tracing signaling cells, 193 transport mode, 149 tritone, 192 command, 192 troubleshooting bridging, 189 console, 187 factory configuration, 187 hardware problems, 187 history log, 185 IP routing, 189 IPX routing, 190 login password, 188 normal LED sequence, 185 PC connection, 188 power light off, 184 remote network access, 189 terminal window display, 187 using LEDs, 184 using ping, 186 troubleshooting voice routing, 191, 194 tunneling IPSec, 149 L2TP, 137 L2TP configurations, 139 with Dial Backup, 109
ers, 317 VC multiplexing, 30 version level, 226 virtual Ethernet interface, 79 Virtual Private Network security, 149 virtual route binding, 266 virtual router ID, 117 virtual routing table, 80 adding, 232 deleting, 243 moving, 250 VoDSL router, 22 voice encoding, 24 voice gateways, 22 voice profile, 23 voice routing, 22 alaw encoding command, 24 CAS refresh command, 24 debug commands, 192 frame voice command, 335 trouble-shooting, 191 voice profile command, 24 VPI/VCI find value, 191 VPN, 137 security, 149 VRID, 117 VRRP, 116 clearing the VRRP interface designation, 278 multicast address, 285
W
web GUI debug commands, 205
U
ulaw encoding, 24 unbind IP virtual route command for a remote interface, 324 for an Ethernet interface, 277 upgradable bridges, 20 upgrading the software kernel, 176
Y
Y2K compliance, 172
V
V.90 backup modem, 109 Van Jacobson compression of TCP/IP head422