Efficient Networks Router family Command line interface Specifikace

Procházejte online nebo si stáhněte Specifikace pro Sítě Efficient Networks Router family Command line interface. Efficient Networks Router family Command line interface Product specifications Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 366
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - 5RXWHU)DPLO\

Part No. 107-0002-000(IILFLHQW1HWZRUNV5RXWHU)DPLO\7HFKQLF DO5HIHUHQFH*XLGH

Strany 2 - Efficient Networks

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide10 Efficient Networks®Sample VRRP Configuration. . . . . . . . . .

Strany 3

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-16 Efficient Networks®Relaying BootP RequestsThe DHCP re

Strany 4

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-17Network Address Translation (NAT)Net

Strany 5

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-18 Efficient Networks®Masquerading With masquerading, mu

Strany 6

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-19NOTE:ww.xx.yy.zz is the IP address t

Strany 7

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-20 Efficient Networks®-> remote addserver 192.168.1.2

Strany 8

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-21The second command gets an error due

Strany 9

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-22 Efficient Networks®Server Request HierarchyAs shown e

Strany 10 - Contents

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-23Classic NATWith classic NAT, one PC

Strany 11

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-24 Efficient Networks®IP Address RangeThe range of local

Strany 12

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-25Range Overlap Rules• The per-interfa

Strany 13 - INTRODUCTION

Efficient Networks®11ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsAccessibility . . . . . . . . . . . . . . . .

Strany 14 - Document Conventions

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-26 Efficient Networks®system selnat addpolicy <remote

Strany 15

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-27Viewing PoliciesThe policy listing i

Strany 16 - Page 1-4 Efficient Networks

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-28 Efficient Networks®-> system addserver <ipaddr&

Strany 17 - WMI Web Management Interface

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-29Key Enabled FeaturesThe router has s

Strany 18 - Page 1-6 Efficient Networks

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-30 Efficient Networks®NOTE:Feature keys are generated fo

Strany 19 - PRODUCT OVERVIEW

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-31Key RulesThe following rules apply w

Strany 20 - WAN Interfaces

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-32 Efficient Networks®Listing the Installed Feature Keys

Strany 21

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-33Feature StatusThe current feature st

Strany 22 - Virtual Connections

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-34 Efficient Networks®Spanning TreeThe Spanning Tree alg

Strany 23 - Bridging

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-35It does the following major tasks:•

Strany 24 - Page 2-6 Efficient Networks

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide12 Efficient Networks®Secure Shell (SSH) Configuration List Page.

Strany 25

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-36 Efficient Networks®Manual Boot ModeWhen the router is

Strany 26 - System Interoperability

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-37Option 2: Boot from Flash MemorySele

Strany 27 - Protocol Conformance

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-38 Efficient Networks®The boot IP address is the router

Strany 28 - IPX Routing

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-393. Select option 4 to Boot through t

Strany 29 - Encapsulation Options

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-40 Efficient Networks®The debugging mode (option #) is a

Strany 30 - Page 2-12 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-41The error patterns are listed in the

Strany 31 - INSTALLATION AND SETUP

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-42 Efficient Networks®Routers with Six LEDsIf your route

Strany 32 - Local Router

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-43Software Kernel UpgradesYou can upgr

Strany 33 - IP Routing Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-44 Efficient Networks®CAUTION:Warning: Before performing

Strany 34 - Page 3-4 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-45Step 7 When you are satisfied that t

Strany 35

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-1CHAPTER 1CHAPTER 1 INTRODUCTIONThis man

Strany 36 - IPX Routing Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-46 Efficient Networks®-> copy [email protected]:sf

Strany 37

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-47Differentiated Services Framework (D

Strany 38 - Bridging Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-48 Efficient Networks®QoS Deployment ExampleTo understan

Strany 39

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-49bandwidth beyond the 50% minimum wil

Strany 40

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-50 Efficient Networks®PoliciesQoS policies are created t

Strany 41

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-51qos set -sa 192.168.1.5 192.168.1.12

Strany 42 - MAC Encapsulated Routing

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-52 Efficient Networks®-du <duration> <hh:mm>

Strany 43

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-53Deleting PoliciesPolicies can be del

Strany 44 - Configuring Your Computer

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-54 Efficient Networks®Misc. Administrative FunctionsThe

Strany 45 - Windows 98

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-1CHAPTER 5CHAPTER 5 SYSTEM SECURITYT

Strany 46 - Step6 Click OK

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-2 Efficient Networks®Document ConventionsTable explains the s

Strany 47 - Windows NT 4

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-2 Efficient Networks®User AuthenticationUser authenticatio

Strany 48

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-3There are two methods for creating a us

Strany 49 - Windows 2000

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-4 Efficient Networks®Access to system operation can be fur

Strany 50 - Step5 Click Properties

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-5Access: WAN, LAN, ConsoleStatus: Enable

Strany 51 - Step 7 Click OK

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-6 Efficient Networks®Initial (Default) SettingWhen the rou

Strany 52 - Windows ME

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-7-> user set lookup radius Subsequent

Strany 53

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-8 Efficient Networks®Managing User AccountsThe following s

Strany 54 - Windows XP

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-9-> user set password myname newsecre

Strany 55 - Step 5 Click Properties

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-10 Efficient Networks®Changing account accessThe Access Pr

Strany 56 - Mac OS 9.x

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-11Once the RADIUS server receives the re

Strany 57

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-3BER Basic Encoding Rules or Bit Error Rate

Strany 58 - Mac OS X

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-12 Efficient Networks®Server Information ConfigurationFor

Strany 59

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-13Radius Server ConfigurationWhile vendo

Strany 60 - Page 3-30 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-14 Efficient Networks®Serial-Console Port0x00010000 Serial

Strany 61

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-15Controlling Remote ManagementSeveral m

Strany 62 - Installation

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-16 Efficient Networks®-> system snmpport default2->

Strany 63

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-17Restricting Remote AccessTo allow remo

Strany 64 - Establishing a Connection

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-18 Efficient Networks®Disabling WAN ManagementYou can allo

Strany 65

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-19The following command is used to enabl

Strany 66 - Terminal Sessions

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-20 Efficient Networks®PAP/CHAP Security AuthenticationThe

Strany 67

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-21During link negotiation (LCP), each si

Strany 68

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-4 Efficient Networks®LOP Loss of Pointer (UNI Fault Managemen

Strany 69

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-22 Efficient Networks®PAP AuthenticationFor PAP, when a PA

Strany 70 - Configuring the Router

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-23Authentication LevelsThe router also u

Strany 71 - Configuration Tables

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-24 Efficient Networks®Receive FiltersThe router next compa

Strany 72

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-25Output FiltersFinally, the router comp

Strany 73

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-26 Efficient Networks®Filter ExamplesExample 1: Input Filt

Strany 74

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-27-> remote ipfilter append input acc

Strany 75 - Configuring PPP with Bridging

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-28 Efficient Networks®eth ip filter flush inputeth ip filt

Strany 76

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-29Example 4: Medium Security FirewallThe

Strany 77

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-30 Efficient Networks®# E-mail - SMTP and POP3 requests fr

Strany 78

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-31# SSL acceptedremote ipfilter insert i

Strany 79

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-5VPCI Virtual Path Connection IdentifierVPI

Strany 80

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-32 Efficient Networks®# NNTP tcpremote ipfilter insert out

Strany 81 - Test IP Routing

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-33# Turn on ip filter watch for debuggin

Strany 82 - Test IPX Routing

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-34 Efficient Networks®Stateful FirewallThe Built-in Firewa

Strany 83

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-35command - This parameter defines the l

Strany 84 - Page 3-54 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-36 Efficient Networks®Application --a imap | telnet | boot

Strany 85 - SYSTEM MANAGEMENT

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-37message logging - Specify one of these

Strany 86 - DHCP Address Allocation

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-38 Efficient Networks®• The order in which the rules are e

Strany 87 - DHCP Client Requests

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-39Rule ModificationTo modify a previousl

Strany 88 - Adding a Subnetwork

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-40 Efficient Networks®Port Information - When port informa

Strany 89

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-41Message Logging - Modifies the message

Strany 90 - Setting the Lease Time

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-6 Efficient Networks®This page intentionally left blank.

Strany 91

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-42 Efficient Networks®The information displayed includes:•

Strany 92 - Setting Option Values

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-43The firewall shall, by default, drop a

Strany 93

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-44 Efficient Networks®UDP Flood AttackSimilar to ICMP floo

Strany 94 - Enable/Disable BootP

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-45Finger BombIn this attack, an intruder

Strany 95

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-46 Efficient Networks®EncryptionEncryption is a key-enable

Strany 96 - Commands

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-47Sample ConfigurationSuppose that the r

Strany 97 - -> dhcp del 128

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-48 Efficient Networks®Observe the following guidelines:• S

Strany 98 - -> dhcp clear all records

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-49File Format for the Diffie-Hellman Num

Strany 99 - BootP Service

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-50 Efficient Networks®IPSec (Internet Protocol Security)IP

Strany 100 - Relaying BootP Requests

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-51The router supports both IPSec encapsu

Strany 101 - General NAT Rules

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-1CHAPTER 2CHAPTER 2 PRODUCT OVERVIEW

Strany 102 - Client Configuration

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-52 Efficient Networks®If ESP encryption is selected, ESP a

Strany 103 - Server Configuration

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-53Because VPN users are likely to be usi

Strany 104 - Failed to add server

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-54 Efficient Networks®Main Mode and Aggressive ModeThe rou

Strany 105

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-55Additional IKE SettingsIn addition to

Strany 106 - Server Request Hierarchy

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-56 Efficient Networks®The session initiator creates a cook

Strany 107 - Host Remapping

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-57The following commands define the peer

Strany 108 - Page 4-24 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-58 Efficient Networks®IKE Proposal CommandsThe IKE proposa

Strany 109 - Creating Policies

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-59Defines the name of a new IKE IPSec pr

Strany 110 - Page 4-26 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-60 Efficient Networks®-> ike ipsec proposals set espaut

Strany 111 - NetMeeting (H.323) with NAT

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-61IKE IPSec Policy CommandsThe IKE IPSec

Strany 113 - Key Enabled Features

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-2 Efficient Networks®WAN InterfacesRouters are available

Strany 114 - Page 4-30 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-62 Efficient Networks®Requires that the data come from the

Strany 115 - Key Rules

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-63Main Mode ExampleThe following example

Strany 116 - -> key list -l

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-64 Efficient Networks®# Describe the branch office IKE pha

Strany 117 - Feature Revocation

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-65# Branch office example using IKE# Hom

Strany 118 - Boot Code Options

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-66 Efficient Networks®ike ipsec policies add home_policyik

Strany 119

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-67#Describe the branch office peer#IKE a

Strany 120 - Option 1: Retry Start-Up

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-68 Efficient Networks®IPSec CommandsThe following commands

Strany 121 - Option 3: Boot from Network

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-69-> ipsec set authentication <sha

Strany 122 - Page 4-38 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-70 Efficient Networks®SSHSecure Shell (SSH) is a key-enabl

Strany 123 - Option 6: Set Time and Date

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-71Another perspective of the SSH protoco

Strany 124 - Routers with Four LEDs

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-3IDSLIDSL (ISDN DSL) A hybrid of ISDN a

Strany 125

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-72 Efficient Networks®Once the secure session has been est

Strany 126 - Routers with Six LEDs

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-73SSH SessionsFor SSH to be operational,

Strany 127 - Software Kernel Upgrades

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-74 Efficient Networks®• Key pairs can also be generated wi

Strany 128 - CAUTION:

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-75BlowfishBlowfish is a block cipher tha

Strany 129 - Upgrading from the WAN

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-76 Efficient Networks®Configure Bridge FilteringBridge fil

Strany 130 - Task Complete

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-1CHAPTER 6CHAPTER 6 CONNECTI

Strany 131

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-2 Efficient Networks®NOTE:When you stop or restar

Strany 132 - QoS Deployment Example

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-3The address ranges assigned to

Strany 133 - -> qos off

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-4 Efficient Networks®RIP ControlsThe Routing Info

Strany 134 - Policy Parameters

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-5The available RIP options on t

Strany 135

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-4 Efficient Networks®Virtual ConnectionsThe router’s wide

Strany 136 - Moving Policies

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-6 Efficient Networks®ARPARP is a low-level protoc

Strany 137 - -> qos del all

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-7Dial BackupThe Dial Backup cap

Strany 138 - -> time <hh:mm:ss>

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-8 Efficient Networks®To set a restriction for an

Strany 139 - SYSTEM SECURITY

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-9Optionally, Dial Backup can ac

Strany 140 - User Authentication

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-10 Efficient Networks®# Specify the primary phone

Strany 141 - Management Classes

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-11Setting DSL Link ConditionsAf

Strany 142 - Templates

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-12 Efficient Networks®The default retry period is

Strany 143

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-13To clear the ping list of all

Strany 144 - Procedures

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-14 Efficient Networks®During the ping test, every

Strany 145 - -> user list lookup

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-15Dial SettingThe string for th

Strany 146 - *********"

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-5Routing offers advantages over bridgin

Strany 147 - -> user disable myname

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-16 Efficient Networks®VRRP BackupWhen a router is

Strany 148 - Changing account access

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-17IP AddressEvery logical inter

Strany 149 - -> rad list secret

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-18 Efficient Networks®A VRID has these characteri

Strany 150 - Server Retries Timer

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-19Defining VRRP AttributesEach

Strany 151 - Radius Server Configuration

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-20 Efficient Networks®Time Interval Attribute (de

Strany 152

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-21NOTE:Our implementation does

Strany 153 - Controlling Remote Management

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-22 Efficient Networks®Disabling or Deleting VRRPT

Strany 154 - Example:

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-23Sample VRRP ConfigurationThe

Strany 155 - Restricting Remote Access

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-24 Efficient Networks®eth ip vrid 7## A VRRP attr

Strany 156 - -> reboot

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-25# In this example, the VRRP i

Strany 157

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-6 Efficient Networks®Bridging has these capabilities:• Al

Strany 158 - Authentication Process

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-26 Efficient Networks®L2TP Tunneling - Virtual Di

Strany 159 - CHAP Authentication

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-27L2TP Concepts This section de

Strany 160 - Authentication Passwords

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-28 Efficient Networks®Tunnels• Tunnels are virtu

Strany 161 - IP Filtering

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-29A tunnel session automaticall

Strany 162 - Transmit Filters

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-30 Efficient Networks®Step 2 Try to establish IP

Strany 163 - ICMP Redirect

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-31NOTE:Verify that the IP addre

Strany 164 - Filter Examples

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-32 Efficient Networks®AssumptionsIn this example,

Strany 165 - Built-in Firewall Filters

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-333. Shared_Secret 4. 10.0.0.1L

Strany 166 - Page 5-28 Efficient Networks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-34 Efficient Networks®4. Does the remote router d

Strany 167

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-35Complete LNS and L2TP Client

Strany 168 - Page 5-30 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-7When to Use Routing or Bridging or Bot

Strany 169

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-36 Efficient Networks®Configuration ProcessThe fo

Strany 170 - Page 5-32 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-37Set up ISDN parameters:isdn s

Strany 171

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-38 Efficient Networks®eth ip enable eth ip addr 1

Strany 172 - Stateful Firewall

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-39Set up ISDN parameters:isdn s

Strany 173

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-40 Efficient Networks®remote add internet remote

Strany 174 - Page 5-36 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-41PPPoE (PPP over Ethernet)PPPo

Strany 175 - 64.12.11.1 -d out

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-42 Efficient Networks®In addition, if the remote

Strany 176 - Deleting Firewall Rules

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-43If your service provider char

Strany 177 - Rule Modification

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-44 Efficient Networks®## Enable bridging through

Strany 178 - Page 5-40 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-45# ---------------------------

Strany 179 - Viewing Dropped Packets

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-8 Efficient Networks®Routing and Bridging ControlsThe rou

Strany 180 - Denial of Service Attacks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-46 Efficient Networks® Flags ...

Strany 181 - ICMP Flood Attack

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-47Transport (Layer-2) VPNsVirtu

Strany 182 - Tiny Packet Attack

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-48 Efficient Networks®Network (Layer-3) VPNsTunne

Strany 183 - Ping Flood

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-49Technology StandardsIPSecThis

Strany 184 - Encryption

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-50 Efficient Networks®Tunnel ServerFunctionThe L2

Strany 185 - Configuration Commands

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-51LocationThis software is inst

Strany 186

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-52 Efficient Networks®Workstation Client to LAN S

Strany 187

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-53Types of VPNs usedBoth ATM PV

Strany 188 - Page 5-50 Efficient Networks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-54 Efficient Networks®DES Encryption with Dynamic

Strany 189 - Device or

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-55Step 1: Configure Both Router

Strany 190 - IKE Management

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-9The router supports the following WAN

Strany 191 - Phase 2 IKE:

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-56 Efficient Networks®NOTE:You cannot ping the tu

Strany 192 - Phase 1 IKE — Main Mode:

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-57Set LAC and/or LNS. In this c

Strany 193 - Security Associations (SAs)

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-58 Efficient Networks®Define the name of our tunn

Strany 194 - -> ike peers list

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-59Add an IP route to the LAN on

Strany 195

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-60 Efficient Networks®

Strany 196 - IKE IPSec Proposal Commands

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-61VPN with IP Filtering and MS

Strany 197 - <proposalname>

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-62 Efficient Networks®This page intentionally lef

Strany 198 - Page 5-60 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-1CHAPTER 7CHAPTER 7 MON

Strany 199 - IKE IPSec Policy Commands

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-2 Efficient Networks®SNMPThe Simple Network

Strany 200 - IKE Configuration Examples

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-3Trap GenerationSNMP agent

Strany 201 - Main Mode Example

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-10 Efficient Networks®IP RoutingIP routing support, in co

Strany 202 - Page 5-64 Efficient Networks

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-4 Efficient Networks®Configuring SNMPThe rou

Strany 203 - ″ThisIsASecret12345;)″

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-5Sets the SNMP password.-&

Strany 204 - (No fixed IP address)

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-6 Efficient Networks®TroubleshootingSoftware

Strany 205

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-7LEDs in Ready StateOnce t

Strany 206 - IPSec Commands

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-8 Efficient Networks®History LogThe History

Strany 207

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-9If the terminal window di

Strany 208 - SSH Protocol

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-10 Efficient Networks®Connection ProblemsIf

Strany 209 - Version Identification

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-11Remote Network Access Pr

Strany 210 - Requests (commands)

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-12 Efficient Networks®TCP/IP Routing• Check

Strany 211 - -> ssh keygen

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-13IPX Routing• Check that

Strany 212 - Encryption Options

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-11Encapsulation OptionsThis section des

Strany 213 - Bridge Filtering

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-14 Efficient Networks®Telnet Access Problems

Strany 214 - Configure Bridge Filtering

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-15If you hear clicking dur

Strany 215 - -> eth restart

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-16 Efficient Networks®remote setauthen chap

Strany 216 - -> eth ip options

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-1CHAPTER 8CHAPTER 8 WEB MANA

Strany 217 - Managing Routes

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-2 Efficient Networks®Radio Button Radio buttons a

Strany 218 - RIP Controls

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-3Router Information PageThe prim

Strany 219 - -> eth list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-4 Efficient Networks®Easy SetupThe Easy Setup scre

Strany 220

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-5On the Protocol Selection page

Strany 221 - Dial Backup

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-6 Efficient Networks®Point-to-Point Protocol over

Strany 222 - Configuring Dial Backup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-7If IP Routing enabled is select

Strany 223

 Copyright 2002, Efficient Networks, Inc.All rights reserved. Printed in the U.S.A.Efficient Networks and SpeedStream are registered trademarks, and

Strany 224 - ISDN Phone Numbers

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-12 Efficient Networks®RFC 1483 or RFC 1490BridgingUser da

Strany 225 - -> system list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-8 Efficient Networks®Step2 Enter the PPPoE Service

Strany 226 - Addresses to Ping

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-9A PPP Username and password are

Strany 227

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-10 Efficient Networks®RFC 1483 NetworkingSelection

Strany 228 -

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-11Selection of this option will

Strany 229 - Dial Setting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-12 Efficient Networks®RFC 1483 MAC Encapsulated Ro

Strany 230 - VRRP Backup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-13Step2 Optional, click to selec

Strany 231 - -> eth ip vrid 7 0:1

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-14 Efficient Networks®Dynamic Host Configuration P

Strany 232 - -> eth list 0:1

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-15Selection of manual DNS config

Strany 233 - -> eth vrrp list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-16 Efficient Networks®Local Area Network Configura

Strany 234 - Page 6-20 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-17User ManagementThe User Manage

Strany 235 - Starting VRRP

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-1CHAPTER 3CHAPTER 3 INSTALLATI

Strany 236 - Disabling or Deleting VRRP

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-18 Efficient Networks®Adding A User AccountTo add

Strany 237 - Internet

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-19Privileges can be configured i

Strany 238 - Page 6-24 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-20 Efficient Networks®The Add/Modify User page is

Strany 239

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-21Privileges can be configured i

Strany 240 - Advantages of Tunneling

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-22 Efficient Networks®User Lookup ConfigurationThe

Strany 241 - L2TP Client Illustration

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-23Secure Mode ConfigurationSecur

Strany 242 - LAN/server

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-24 Efficient Networks®Change PasswordThe Change Pa

Strany 243

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-25Access Control FormThe Access

Strany 244 - Commands to configure tunnels

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-26 Efficient Networks®ExamplesThe following exampl

Strany 245 - Sample Configurations

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-27Key Enabled Feature List PageT

Strany 246 - Page 6-32 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-2 Efficient Networks®Remote RoutersThroughout this

Strany 247

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-28 Efficient Networks®Add Feature PageThe Add Feat

Strany 248 - Page 6-34 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-29Delete Feature PageThe Delete

Strany 249

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-30 Efficient Networks®Update Feature PageSome feat

Strany 250 - (ISDN)

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-31Feature Enabled/Disable PageWh

Strany 251

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-32 Efficient Networks®Revoke Feature PageIf a feat

Strany 252 - Page 6-38 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-33Unrevoke Feature PageThe Unrev

Strany 253

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-34 Efficient Networks®Router Clock PageThis functi

Strany 254 - Define the actual tunnel:

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-35DCHP ConfigurationDHCP is a TC

Strany 255 - PPPoE (PPP over Ethernet)

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-36 Efficient Networks®To re-configure the current

Strany 256 - PPPoE Client

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-37NOTE:The last IP address must

Strany 257

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-3Protocols to be UsedThe informat

Strany 258 - Page 6-44 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-38 Efficient Networks®NATNetwork Address Translati

Strany 259 - Managing PPPoE Sessions

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-39Inbound NAT SettingThis sectio

Strany 260 - Flags ... 1

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-40 Efficient Networks®Advanced SetupThe Advanced S

Strany 261 - ATM or Frame Relay transport

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-41SNMPSimple Network Management

Strany 262 - Tunneling

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-42 Efficient Networks®To configure SNMP, perform t

Strany 263 - DES Encryption

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-43SNMP IP Filter PageThe SNMP IP

Strany 264 - Page 6-50 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-44 Efficient Networks®To delete a filter, perform

Strany 265 - Types of VPNs used

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-45SSHSecure Shell (SSH) allows s

Strany 266 - LAN client to LAN server

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-46 Efficient Networks®Secure Shell Configuration p

Strany 267 - Secure VPN Option

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-47SSH ConfigurationTo change the

Strany 268 - Page 6-54 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-4 Efficient Networks®• For Remote Routers:Although

Strany 269

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-48 Efficient Networks®SSH KeysDiffie-Hellman is th

Strany 270 - Page 6-56 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-49Key UploadTo load the key pair

Strany 271

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-50 Efficient Networks®Firewall ScriptsYour router

Strany 272 - Page 6-58 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-51CAUTION:All network security e

Strany 273

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-52 Efficient Networks®QoSQoS is a key enabled feat

Strany 274 - Page 6-60 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-53To change the current settings

Strany 275

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-54 Efficient Networks®QoS Policy Configuration pag

Strany 276 - Page 6-62 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-55QoS Policy ParametersThe follo

Strany 277 - PERFORMANCE

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-56 Efficient Networks®The following configuration

Strany 278

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-57Step3 In the field provided, s

Strany 279 - Trap Generation

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-5NOTE:An Ethernet route is usuall

Strany 280 - Configuring SNMP

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-58 Efficient Networks®QoS Policy CreationTo create

Strany 281

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-59Qos Policy ModificationTo modi

Strany 282 - Troubleshooting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-60 Efficient Networks®Stateful FirewallAn IP filte

Strany 283

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-61To change the current settings

Strany 284 - Step 3 Click Connect

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-62 Efficient Networks®Dropped Packet PageThe Dropp

Strany 285

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-63Firewall Rule Configuration pa

Strany 286

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-64 Efficient Networks®Address - These parameters d

Strany 287

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-65To delete a single rule or ran

Strany 288 - Page 7-12 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-66 Efficient Networks®Firewall Rule CreationTo cre

Strany 289

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-67Firewall Rule ModificationTo m

Strany 290 - Software Download Problems

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-6 Efficient Networks®IPX Routing Network ProtocolSy

Strany 291 - L2TP Tunnel Troubleshooting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-68 Efficient Networks®Dial BackupDial Backup, when

Strany 292 - Page 7-16 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-69Step7 Enter the Reset DSL Time

Strany 293 - WEB MANAGEMENT INTERFACE

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-70 Efficient Networks®Step3 Click the Home link to

Strany 294

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-71Command Line InterfaceCommand

Strany 295 - Router Information Page

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-72 Efficient Networks®Web Management Interface Pr

Strany 296 - Easy Setup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-73tools/dhcp.html Data - Read D

Strany 297

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-74 Efficient Networks®tools/loopGround.html Voice

Strany 298 - Page8-6 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-7You need the following informati

Strany 299

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-8 Efficient Networks®Bridging Network ProtocolTo co

Strany 300 - Page8-8 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-9DNS Internet Account Information

Strany 301

B. After receiving an RMA, the end user shall ship the product or defective component, including power supplies and cable, where applicable, freight o

Strany 302 - RFC 1483 Networking

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-10 Efficient Networks®IP Routing Entries• For the E

Strany 303

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-11DLCI number (for RFC 1490)The D

Strany 304 - Page8-12 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-12 Efficient Networks®Bridging Network ProtocolTo c

Strany 305

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-13If you are connecting to multip

Strany 306 - Page8-14 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-14 Efficient Networks®If NAT is not enabled, you ma

Strany 307

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-15Microsoft WindowsWindows 98Step1

Strany 308 - Step3 Click Save and Reboot

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-16 Efficient Networks®Step6 Click OK.Step7 Click OK

Strany 309 - User Management

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-17Windows NT 4Step1 On your deskto

Strany 310 - Adding A User Account

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-18 Efficient Networks®Step6 Click OK.Step7 Click OK

Strany 311 - Editing A User Account

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-19Windows 2000Step1 On your deskto

Strany 312

Efficient Networks® Router familyTechnical Reference GuideTable of ContentsContentsEfficient Networks®51 Introduction. . . . . . . . . . . . . . . .

Strany 313

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-20 Efficient Networks®Step5 Click Properties.Step6

Strany 314

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-21Step 7 Click OK.Step 8 Click OK

Strany 315

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-22 Efficient Networks®Windows MEStep 1 On your desk

Strany 316

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-23Step 6 Under the IP Address tab

Strany 317 - Access Control Form

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-24 Efficient Networks®Windows XPStep 1 On your desk

Strany 318 - Feature Activation

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-25Step 4 The Local Area Connectio

Strany 319 - Key Enabled Feature List Page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-26 Efficient Networks®Apple MacintoshTo configure T

Strany 320

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-27Step 2 The TCP/IP control panel

Strany 321 - Step2 Click Apply

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-28 Efficient Networks®Mac OS XStep 1 Under the Appl

Strany 322

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-29Step 3 The Network window shoul

Strany 323 - Step3 Click Apply

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide6 Efficient Networks®PPP Link Protocol (over ATM or Frame Relay)

Strany 324

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-30 Efficient Networks®LinuxStep 1 From a terminal w

Strany 325

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-31Step 3 When settings are comple

Strany 326 - Router Clock Page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-32 Efficient Networks®InstallationVerify the Packag

Strany 327 - DCHP Configuration

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-33Step 5 Connect the AC power ada

Strany 328 - Page8-36 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-34 Efficient Networks®Establishing a Connection To

Strany 329

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-35Step 2 Restart the PC and power

Strany 330

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-36 Efficient Networks®Terminal SessionsThe router s

Strany 331

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-37Step 4 In the Com 1 (or 2) Prop

Strany 332 - Advanced Setup

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-38 Efficient Networks®Terminal Session for Macintos

Strany 333 - SNMP Configuration Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-39Telnet Session for Remote Acces

Strany 334 - Page8-42 Efficient Networks

Efficient Networks®7ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsBootP Service . . . . . . . . . . . . . . . .

Strany 335 - Step2 Click Add IP Range

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-40 Efficient Networks®Configuring the RouterHaving

Strany 336 - SNMP Password Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-41Configuration TablesThe followi

Strany 337

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-42 Efficient Networks®Configuring PPP with IP Routi

Strany 338 - Page8-46 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-43Configuring PPP with IPX Routin

Strany 339 - SSH Configuration

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-44 Efficient Networks®Remote RoutersNew Entry Enter

Strany 340

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-45Configuring PPP with BridgingTh

Strany 341

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-46 Efficient Networks®Configuring RFC 1483 / RFC 14

Strany 342 - Firewall Scripts

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-47Link Protocol/DLCIb(for Frame R

Strany 343

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-48 Efficient Networks®Configuring RFC 1483 / RFC 14

Strany 344 - QoS Configuration Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-49Configuring RFC 1483 / RFC 1490

Strany 345 - Step4 Click Apply

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide8 Efficient Networks®Client-Server Security . . . . . . . . . . .

Strany 346 - QoS Policy Configuration page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-50 Efficient Networks®Configuring RFC 1483MER / RFC

Strany 347 - QoS Policy Deletion

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-51Verify the Router Configuration

Strany 348 - Step3 Select a delete option

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-52 Efficient Networks®Test IP Routing to a Remote D

Strany 349

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-53If you cannot access the remote

Strany 350 - Step4 Click Save

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-54 Efficient Networks®This page intentionally left

Strany 351 - Step2 Click Modify/Display

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-1CHAPTER 4CHAPTER 4 SYSTEM MANAGEM

Strany 352

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-2 Efficient Networks®DHCP (Dynamic Host Configuration Pr

Strany 353

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-3NOTE:For information on configuring t

Strany 354

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-4 Efficient Networks®Manipulating Subnetworks and Explic

Strany 355 - Firewall Rule Parameters

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-5Example 1:The following command creat

Strany 356 - Firewall Rule Deletion

Efficient Networks®9ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsMain Mode and Aggressive Mode. . . . . . . . .

Strany 357

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-6 Efficient Networks®Dynamic Client LeasesDynamic client

Strany 358

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-7CommandsThe following commands are us

Strany 359

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-8 Efficient Networks®To release the client lease so it b

Strany 360

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-9-> dhcp clear valueoption <code

Strany 361

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-10 Efficient Networks®-> dhcp list definedoptionsThis

Strany 362

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-11Specify the Boot (TFTP) ServerThe fo

Strany 363 - Step2 Click Execute

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-12 Efficient Networks®Configuring BootP/DHCP RelaysBootP

Strany 364

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-13To list the definition for all optio

Strany 365

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-14 Efficient Networks®Clearing All DHCP InformationIf ne

Strany 366

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-15BootP ServiceThis section first disc

Komentáře k této Příručce

Žádné komentáře