Efficient Networks Router family Command line interface Specifikace Strana 1

Procházejte online nebo si stáhněte Specifikace pro Sítě Efficient Networks Router family Command line interface. Efficient Networks Router family Command line interface Product specifications Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 366
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - 5RXWHU)DPLO\

Part No. 107-0002-000(IILFLHQW1HWZRUNV5RXWHU)DPLO\7HFKQLF DO5HIHUHQFH*XLGH

Strany 2 - Efficient Networks

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide10 Efficient Networks®Sample VRRP Configuration. . . . . . . . . .

Strany 3

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-16 Efficient Networks®Relaying BootP RequestsThe DHCP re

Strany 4

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-17Network Address Translation (NAT)Net

Strany 5

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-18 Efficient Networks®Masquerading With masquerading, mu

Strany 6

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-19NOTE:ww.xx.yy.zz is the IP address t

Strany 7

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-20 Efficient Networks®-> remote addserver 192.168.1.2

Strany 8

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-21The second command gets an error due

Strany 9

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-22 Efficient Networks®Server Request HierarchyAs shown e

Strany 10 - Contents

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-23Classic NATWith classic NAT, one PC

Strany 11

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-24 Efficient Networks®IP Address RangeThe range of local

Strany 12

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-25Range Overlap Rules• The per-interfa

Strany 13 - INTRODUCTION

Efficient Networks®11ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsAccessibility . . . . . . . . . . . . . . . .

Strany 14 - Document Conventions

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-26 Efficient Networks®system selnat addpolicy <remote

Strany 15

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-27Viewing PoliciesThe policy listing i

Strany 16 - Page 1-4 Efficient Networks

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-28 Efficient Networks®-> system addserver <ipaddr&

Strany 17 - WMI Web Management Interface

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-29Key Enabled FeaturesThe router has s

Strany 18 - Page 1-6 Efficient Networks

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-30 Efficient Networks®NOTE:Feature keys are generated fo

Strany 19 - PRODUCT OVERVIEW

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-31Key RulesThe following rules apply w

Strany 20 - WAN Interfaces

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-32 Efficient Networks®Listing the Installed Feature Keys

Strany 21

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-33Feature StatusThe current feature st

Strany 22 - Virtual Connections

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-34 Efficient Networks®Spanning TreeThe Spanning Tree alg

Strany 23 - Bridging

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-35It does the following major tasks:•

Strany 24 - Page 2-6 Efficient Networks

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide12 Efficient Networks®Secure Shell (SSH) Configuration List Page.

Strany 25

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-36 Efficient Networks®Manual Boot ModeWhen the router is

Strany 26 - System Interoperability

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-37Option 2: Boot from Flash MemorySele

Strany 27 - Protocol Conformance

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-38 Efficient Networks®The boot IP address is the router

Strany 28 - IPX Routing

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-393. Select option 4 to Boot through t

Strany 29 - Encapsulation Options

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-40 Efficient Networks®The debugging mode (option #) is a

Strany 30 - Page 2-12 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-41The error patterns are listed in the

Strany 31 - INSTALLATION AND SETUP

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-42 Efficient Networks®Routers with Six LEDsIf your route

Strany 32 - Local Router

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-43Software Kernel UpgradesYou can upgr

Strany 33 - IP Routing Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-44 Efficient Networks®CAUTION:Warning: Before performing

Strany 34 - Page 3-4 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-45Step 7 When you are satisfied that t

Strany 35

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-1CHAPTER 1CHAPTER 1 INTRODUCTIONThis man

Strany 36 - IPX Routing Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-46 Efficient Networks®-> copy [email protected]:sf

Strany 37

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-47Differentiated Services Framework (D

Strany 38 - Bridging Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-48 Efficient Networks®QoS Deployment ExampleTo understan

Strany 39

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-49bandwidth beyond the 50% minimum wil

Strany 40

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-50 Efficient Networks®PoliciesQoS policies are created t

Strany 41

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-51qos set -sa 192.168.1.5 192.168.1.12

Strany 42 - MAC Encapsulated Routing

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-52 Efficient Networks®-du <duration> <hh:mm>

Strany 43

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-53Deleting PoliciesPolicies can be del

Strany 44 - Configuring Your Computer

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-54 Efficient Networks®Misc. Administrative FunctionsThe

Strany 45 - Windows 98

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-1CHAPTER 5CHAPTER 5 SYSTEM SECURITYT

Strany 46 - Step6 Click OK

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-2 Efficient Networks®Document ConventionsTable explains the s

Strany 47 - Windows NT 4

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-2 Efficient Networks®User AuthenticationUser authenticatio

Strany 48

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-3There are two methods for creating a us

Strany 49 - Windows 2000

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-4 Efficient Networks®Access to system operation can be fur

Strany 50 - Step5 Click Properties

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-5Access: WAN, LAN, ConsoleStatus: Enable

Strany 51 - Step 7 Click OK

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-6 Efficient Networks®Initial (Default) SettingWhen the rou

Strany 52 - Windows ME

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-7-> user set lookup radius Subsequent

Strany 53

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-8 Efficient Networks®Managing User AccountsThe following s

Strany 54 - Windows XP

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-9-> user set password myname newsecre

Strany 55 - Step 5 Click Properties

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-10 Efficient Networks®Changing account accessThe Access Pr

Strany 56 - Mac OS 9.x

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-11Once the RADIUS server receives the re

Strany 57

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-3BER Basic Encoding Rules or Bit Error Rate

Strany 58 - Mac OS X

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-12 Efficient Networks®Server Information ConfigurationFor

Strany 59

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-13Radius Server ConfigurationWhile vendo

Strany 60 - Page 3-30 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-14 Efficient Networks®Serial-Console Port0x00010000 Serial

Strany 61

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-15Controlling Remote ManagementSeveral m

Strany 62 - Installation

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-16 Efficient Networks®-> system snmpport default2->

Strany 63

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-17Restricting Remote AccessTo allow remo

Strany 64 - Establishing a Connection

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-18 Efficient Networks®Disabling WAN ManagementYou can allo

Strany 65

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-19The following command is used to enabl

Strany 66 - Terminal Sessions

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-20 Efficient Networks®PAP/CHAP Security AuthenticationThe

Strany 67

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-21During link negotiation (LCP), each si

Strany 68

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-4 Efficient Networks®LOP Loss of Pointer (UNI Fault Managemen

Strany 69

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-22 Efficient Networks®PAP AuthenticationFor PAP, when a PA

Strany 70 - Configuring the Router

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-23Authentication LevelsThe router also u

Strany 71 - Configuration Tables

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-24 Efficient Networks®Receive FiltersThe router next compa

Strany 72

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-25Output FiltersFinally, the router comp

Strany 73

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-26 Efficient Networks®Filter ExamplesExample 1: Input Filt

Strany 74

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-27-> remote ipfilter append input acc

Strany 75 - Configuring PPP with Bridging

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-28 Efficient Networks®eth ip filter flush inputeth ip filt

Strany 76

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-29Example 4: Medium Security FirewallThe

Strany 77

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-30 Efficient Networks®# E-mail - SMTP and POP3 requests fr

Strany 78

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-31# SSL acceptedremote ipfilter insert i

Strany 79

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-5VPCI Virtual Path Connection IdentifierVPI

Strany 80

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-32 Efficient Networks®# NNTP tcpremote ipfilter insert out

Strany 81 - Test IP Routing

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-33# Turn on ip filter watch for debuggin

Strany 82 - Test IPX Routing

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-34 Efficient Networks®Stateful FirewallThe Built-in Firewa

Strany 83

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-35command - This parameter defines the l

Strany 84 - Page 3-54 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-36 Efficient Networks®Application --a imap | telnet | boot

Strany 85 - SYSTEM MANAGEMENT

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-37message logging - Specify one of these

Strany 86 - DHCP Address Allocation

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-38 Efficient Networks®• The order in which the rules are e

Strany 87 - DHCP Client Requests

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-39Rule ModificationTo modify a previousl

Strany 88 - Adding a Subnetwork

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-40 Efficient Networks®Port Information - When port informa

Strany 89

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-41Message Logging - Modifies the message

Strany 90 - Setting the Lease Time

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-6 Efficient Networks®This page intentionally left blank.

Strany 91

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-42 Efficient Networks®The information displayed includes:•

Strany 92 - Setting Option Values

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-43The firewall shall, by default, drop a

Strany 93

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-44 Efficient Networks®UDP Flood AttackSimilar to ICMP floo

Strany 94 - Enable/Disable BootP

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-45Finger BombIn this attack, an intruder

Strany 95

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-46 Efficient Networks®EncryptionEncryption is a key-enable

Strany 96 - Commands

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-47Sample ConfigurationSuppose that the r

Strany 97 - -> dhcp del 128

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-48 Efficient Networks®Observe the following guidelines:• S

Strany 98 - -> dhcp clear all records

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-49File Format for the Diffie-Hellman Num

Strany 99 - BootP Service

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-50 Efficient Networks®IPSec (Internet Protocol Security)IP

Strany 100 - Relaying BootP Requests

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-51The router supports both IPSec encapsu

Strany 101 - General NAT Rules

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-1CHAPTER 2CHAPTER 2 PRODUCT OVERVIEW

Strany 102 - Client Configuration

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-52 Efficient Networks®If ESP encryption is selected, ESP a

Strany 103 - Server Configuration

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-53Because VPN users are likely to be usi

Strany 104 - Failed to add server

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-54 Efficient Networks®Main Mode and Aggressive ModeThe rou

Strany 105

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-55Additional IKE SettingsIn addition to

Strany 106 - Server Request Hierarchy

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-56 Efficient Networks®The session initiator creates a cook

Strany 107 - Host Remapping

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-57The following commands define the peer

Strany 108 - Page 4-24 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-58 Efficient Networks®IKE Proposal CommandsThe IKE proposa

Strany 109 - Creating Policies

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-59Defines the name of a new IKE IPSec pr

Strany 110 - Page 4-26 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-60 Efficient Networks®-> ike ipsec proposals set espaut

Strany 111 - NetMeeting (H.323) with NAT

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-61IKE IPSec Policy CommandsThe IKE IPSec

Strany 113 - Key Enabled Features

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-2 Efficient Networks®WAN InterfacesRouters are available

Strany 114 - Page 4-30 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-62 Efficient Networks®Requires that the data come from the

Strany 115 - Key Rules

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-63Main Mode ExampleThe following example

Strany 116 - -> key list -l

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-64 Efficient Networks®# Describe the branch office IKE pha

Strany 117 - Feature Revocation

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-65# Branch office example using IKE# Hom

Strany 118 - Boot Code Options

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-66 Efficient Networks®ike ipsec policies add home_policyik

Strany 119

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-67#Describe the branch office peer#IKE a

Strany 120 - Option 1: Retry Start-Up

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-68 Efficient Networks®IPSec CommandsThe following commands

Strany 121 - Option 3: Boot from Network

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-69-> ipsec set authentication <sha

Strany 122 - Page 4-38 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-70 Efficient Networks®SSHSecure Shell (SSH) is a key-enabl

Strany 123 - Option 6: Set Time and Date

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-71Another perspective of the SSH protoco

Strany 124 - Routers with Four LEDs

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-3IDSLIDSL (ISDN DSL) A hybrid of ISDN a

Strany 125

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-72 Efficient Networks®Once the secure session has been est

Strany 126 - Routers with Six LEDs

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-73SSH SessionsFor SSH to be operational,

Strany 127 - Software Kernel Upgrades

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-74 Efficient Networks®• Key pairs can also be generated wi

Strany 128 - CAUTION:

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-75BlowfishBlowfish is a block cipher tha

Strany 129 - Upgrading from the WAN

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-76 Efficient Networks®Configure Bridge FilteringBridge fil

Strany 130 - Task Complete

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-1CHAPTER 6CHAPTER 6 CONNECTI

Strany 131

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-2 Efficient Networks®NOTE:When you stop or restar

Strany 132 - QoS Deployment Example

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-3The address ranges assigned to

Strany 133 - -> qos off

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-4 Efficient Networks®RIP ControlsThe Routing Info

Strany 134 - Policy Parameters

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-5The available RIP options on t

Strany 135

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-4 Efficient Networks®Virtual ConnectionsThe router’s wide

Strany 136 - Moving Policies

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-6 Efficient Networks®ARPARP is a low-level protoc

Strany 137 - -> qos del all

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-7Dial BackupThe Dial Backup cap

Strany 138 - -> time <hh:mm:ss>

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-8 Efficient Networks®To set a restriction for an

Strany 139 - SYSTEM SECURITY

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-9Optionally, Dial Backup can ac

Strany 140 - User Authentication

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-10 Efficient Networks®# Specify the primary phone

Strany 141 - Management Classes

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-11Setting DSL Link ConditionsAf

Strany 142 - Templates

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-12 Efficient Networks®The default retry period is

Strany 143

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-13To clear the ping list of all

Strany 144 - Procedures

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-14 Efficient Networks®During the ping test, every

Strany 145 - -> user list lookup

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-15Dial SettingThe string for th

Strany 146 - *********"

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-5Routing offers advantages over bridgin

Strany 147 - -> user disable myname

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-16 Efficient Networks®VRRP BackupWhen a router is

Strany 148 - Changing account access

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-17IP AddressEvery logical inter

Strany 149 - -> rad list secret

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-18 Efficient Networks®A VRID has these characteri

Strany 150 - Server Retries Timer

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-19Defining VRRP AttributesEach

Strany 151 - Radius Server Configuration

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-20 Efficient Networks®Time Interval Attribute (de

Strany 152

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-21NOTE:Our implementation does

Strany 153 - Controlling Remote Management

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-22 Efficient Networks®Disabling or Deleting VRRPT

Strany 154 - Example:

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-23Sample VRRP ConfigurationThe

Strany 155 - Restricting Remote Access

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-24 Efficient Networks®eth ip vrid 7## A VRRP attr

Strany 156 - -> reboot

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-25# In this example, the VRRP i

Strany 157

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-6 Efficient Networks®Bridging has these capabilities:• Al

Strany 158 - Authentication Process

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-26 Efficient Networks®L2TP Tunneling - Virtual Di

Strany 159 - CHAP Authentication

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-27L2TP Concepts This section de

Strany 160 - Authentication Passwords

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-28 Efficient Networks®Tunnels• Tunnels are virtu

Strany 161 - IP Filtering

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-29A tunnel session automaticall

Strany 162 - Transmit Filters

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-30 Efficient Networks®Step 2 Try to establish IP

Strany 163 - ICMP Redirect

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-31NOTE:Verify that the IP addre

Strany 164 - Filter Examples

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-32 Efficient Networks®AssumptionsIn this example,

Strany 165 - Built-in Firewall Filters

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-333. Shared_Secret 4. 10.0.0.1L

Strany 166 - Page 5-28 Efficient Networks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-34 Efficient Networks®4. Does the remote router d

Strany 167

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-35Complete LNS and L2TP Client

Strany 168 - Page 5-30 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-7When to Use Routing or Bridging or Bot

Strany 169

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-36 Efficient Networks®Configuration ProcessThe fo

Strany 170 - Page 5-32 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-37Set up ISDN parameters:isdn s

Strany 171

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-38 Efficient Networks®eth ip enable eth ip addr 1

Strany 172 - Stateful Firewall

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-39Set up ISDN parameters:isdn s

Strany 173

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-40 Efficient Networks®remote add internet remote

Strany 174 - Page 5-36 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-41PPPoE (PPP over Ethernet)PPPo

Strany 175 - 64.12.11.1 -d out

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-42 Efficient Networks®In addition, if the remote

Strany 176 - Deleting Firewall Rules

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-43If your service provider char

Strany 177 - Rule Modification

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-44 Efficient Networks®## Enable bridging through

Strany 178 - Page 5-40 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-45# ---------------------------

Strany 179 - Viewing Dropped Packets

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-8 Efficient Networks®Routing and Bridging ControlsThe rou

Strany 180 - Denial of Service Attacks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-46 Efficient Networks® Flags ...

Strany 181 - ICMP Flood Attack

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-47Transport (Layer-2) VPNsVirtu

Strany 182 - Tiny Packet Attack

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-48 Efficient Networks®Network (Layer-3) VPNsTunne

Strany 183 - Ping Flood

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-49Technology StandardsIPSecThis

Strany 184 - Encryption

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-50 Efficient Networks®Tunnel ServerFunctionThe L2

Strany 185 - Configuration Commands

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-51LocationThis software is inst

Strany 186

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-52 Efficient Networks®Workstation Client to LAN S

Strany 187

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-53Types of VPNs usedBoth ATM PV

Strany 188 - Page 5-50 Efficient Networks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-54 Efficient Networks®DES Encryption with Dynamic

Strany 189 - Device or

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-55Step 1: Configure Both Router

Strany 190 - IKE Management

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-9The router supports the following WAN

Strany 191 - Phase 2 IKE:

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-56 Efficient Networks®NOTE:You cannot ping the tu

Strany 192 - Phase 1 IKE — Main Mode:

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-57Set LAC and/or LNS. In this c

Strany 193 - Security Associations (SAs)

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-58 Efficient Networks®Define the name of our tunn

Strany 194 - -> ike peers list

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-59Add an IP route to the LAN on

Strany 195

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-60 Efficient Networks®

Strany 196 - IKE IPSec Proposal Commands

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-61VPN with IP Filtering and MS

Strany 197 - <proposalname>

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-62 Efficient Networks®This page intentionally lef

Strany 198 - Page 5-60 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-1CHAPTER 7CHAPTER 7 MON

Strany 199 - IKE IPSec Policy Commands

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-2 Efficient Networks®SNMPThe Simple Network

Strany 200 - IKE Configuration Examples

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-3Trap GenerationSNMP agent

Strany 201 - Main Mode Example

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-10 Efficient Networks®IP RoutingIP routing support, in co

Strany 202 - Page 5-64 Efficient Networks

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-4 Efficient Networks®Configuring SNMPThe rou

Strany 203 - ″ThisIsASecret12345;)″

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-5Sets the SNMP password.-&

Strany 204 - (No fixed IP address)

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-6 Efficient Networks®TroubleshootingSoftware

Strany 205

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-7LEDs in Ready StateOnce t

Strany 206 - IPSec Commands

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-8 Efficient Networks®History LogThe History

Strany 207

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-9If the terminal window di

Strany 208 - SSH Protocol

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-10 Efficient Networks®Connection ProblemsIf

Strany 209 - Version Identification

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-11Remote Network Access Pr

Strany 210 - Requests (commands)

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-12 Efficient Networks®TCP/IP Routing• Check

Strany 211 - -> ssh keygen

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-13IPX Routing• Check that

Strany 212 - Encryption Options

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-11Encapsulation OptionsThis section des

Strany 213 - Bridge Filtering

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-14 Efficient Networks®Telnet Access Problems

Strany 214 - Configure Bridge Filtering

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-15If you hear clicking dur

Strany 215 - -> eth restart

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-16 Efficient Networks®remote setauthen chap

Strany 216 - -> eth ip options

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-1CHAPTER 8CHAPTER 8 WEB MANA

Strany 217 - Managing Routes

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-2 Efficient Networks®Radio Button Radio buttons a

Strany 218 - RIP Controls

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-3Router Information PageThe prim

Strany 219 - -> eth list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-4 Efficient Networks®Easy SetupThe Easy Setup scre

Strany 220

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-5On the Protocol Selection page

Strany 221 - Dial Backup

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-6 Efficient Networks®Point-to-Point Protocol over

Strany 222 - Configuring Dial Backup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-7If IP Routing enabled is select

Strany 223

 Copyright 2002, Efficient Networks, Inc.All rights reserved. Printed in the U.S.A.Efficient Networks and SpeedStream are registered trademarks, and

Strany 224 - ISDN Phone Numbers

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-12 Efficient Networks®RFC 1483 or RFC 1490BridgingUser da

Strany 225 - -> system list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-8 Efficient Networks®Step2 Enter the PPPoE Service

Strany 226 - Addresses to Ping

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-9A PPP Username and password are

Strany 227

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-10 Efficient Networks®RFC 1483 NetworkingSelection

Strany 228 -

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-11Selection of this option will

Strany 229 - Dial Setting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-12 Efficient Networks®RFC 1483 MAC Encapsulated Ro

Strany 230 - VRRP Backup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-13Step2 Optional, click to selec

Strany 231 - -> eth ip vrid 7 0:1

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-14 Efficient Networks®Dynamic Host Configuration P

Strany 232 - -> eth list 0:1

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-15Selection of manual DNS config

Strany 233 - -> eth vrrp list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-16 Efficient Networks®Local Area Network Configura

Strany 234 - Page 6-20 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-17User ManagementThe User Manage

Strany 235 - Starting VRRP

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-1CHAPTER 3CHAPTER 3 INSTALLATI

Strany 236 - Disabling or Deleting VRRP

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-18 Efficient Networks®Adding A User AccountTo add

Strany 237 - Internet

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-19Privileges can be configured i

Strany 238 - Page 6-24 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-20 Efficient Networks®The Add/Modify User page is

Strany 239

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-21Privileges can be configured i

Strany 240 - Advantages of Tunneling

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-22 Efficient Networks®User Lookup ConfigurationThe

Strany 241 - L2TP Client Illustration

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-23Secure Mode ConfigurationSecur

Strany 242 - LAN/server

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-24 Efficient Networks®Change PasswordThe Change Pa

Strany 243

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-25Access Control FormThe Access

Strany 244 - Commands to configure tunnels

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-26 Efficient Networks®ExamplesThe following exampl

Strany 245 - Sample Configurations

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-27Key Enabled Feature List PageT

Strany 246 - Page 6-32 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-2 Efficient Networks®Remote RoutersThroughout this

Strany 247

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-28 Efficient Networks®Add Feature PageThe Add Feat

Strany 248 - Page 6-34 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-29Delete Feature PageThe Delete

Strany 249

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-30 Efficient Networks®Update Feature PageSome feat

Strany 250 - (ISDN)

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-31Feature Enabled/Disable PageWh

Strany 251

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-32 Efficient Networks®Revoke Feature PageIf a feat

Strany 252 - Page 6-38 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-33Unrevoke Feature PageThe Unrev

Strany 253

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-34 Efficient Networks®Router Clock PageThis functi

Strany 254 - Define the actual tunnel:

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-35DCHP ConfigurationDHCP is a TC

Strany 255 - PPPoE (PPP over Ethernet)

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-36 Efficient Networks®To re-configure the current

Strany 256 - PPPoE Client

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-37NOTE:The last IP address must

Strany 257

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-3Protocols to be UsedThe informat

Strany 258 - Page 6-44 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-38 Efficient Networks®NATNetwork Address Translati

Strany 259 - Managing PPPoE Sessions

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-39Inbound NAT SettingThis sectio

Strany 260 - Flags ... 1

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-40 Efficient Networks®Advanced SetupThe Advanced S

Strany 261 - ATM or Frame Relay transport

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-41SNMPSimple Network Management

Strany 262 - Tunneling

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-42 Efficient Networks®To configure SNMP, perform t

Strany 263 - DES Encryption

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-43SNMP IP Filter PageThe SNMP IP

Strany 264 - Page 6-50 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-44 Efficient Networks®To delete a filter, perform

Strany 265 - Types of VPNs used

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-45SSHSecure Shell (SSH) allows s

Strany 266 - LAN client to LAN server

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-46 Efficient Networks®Secure Shell Configuration p

Strany 267 - Secure VPN Option

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-47SSH ConfigurationTo change the

Strany 268 - Page 6-54 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-4 Efficient Networks®• For Remote Routers:Although

Strany 269

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-48 Efficient Networks®SSH KeysDiffie-Hellman is th

Strany 270 - Page 6-56 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-49Key UploadTo load the key pair

Strany 271

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-50 Efficient Networks®Firewall ScriptsYour router

Strany 272 - Page 6-58 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-51CAUTION:All network security e

Strany 273

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-52 Efficient Networks®QoSQoS is a key enabled feat

Strany 274 - Page 6-60 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-53To change the current settings

Strany 275

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-54 Efficient Networks®QoS Policy Configuration pag

Strany 276 - Page 6-62 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-55QoS Policy ParametersThe follo

Strany 277 - PERFORMANCE

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-56 Efficient Networks®The following configuration

Strany 278

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-57Step3 In the field provided, s

Strany 279 - Trap Generation

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-5NOTE:An Ethernet route is usuall

Strany 280 - Configuring SNMP

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-58 Efficient Networks®QoS Policy CreationTo create

Strany 281

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-59Qos Policy ModificationTo modi

Strany 282 - Troubleshooting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-60 Efficient Networks®Stateful FirewallAn IP filte

Strany 283

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-61To change the current settings

Strany 284 - Step 3 Click Connect

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-62 Efficient Networks®Dropped Packet PageThe Dropp

Strany 285

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-63Firewall Rule Configuration pa

Strany 286

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-64 Efficient Networks®Address - These parameters d

Strany 287

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-65To delete a single rule or ran

Strany 288 - Page 7-12 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-66 Efficient Networks®Firewall Rule CreationTo cre

Strany 289

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-67Firewall Rule ModificationTo m

Strany 290 - Software Download Problems

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-6 Efficient Networks®IPX Routing Network ProtocolSy

Strany 291 - L2TP Tunnel Troubleshooting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-68 Efficient Networks®Dial BackupDial Backup, when

Strany 292 - Page 7-16 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-69Step7 Enter the Reset DSL Time

Strany 293 - WEB MANAGEMENT INTERFACE

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-70 Efficient Networks®Step3 Click the Home link to

Strany 294

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-71Command Line InterfaceCommand

Strany 295 - Router Information Page

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-72 Efficient Networks®Web Management Interface Pr

Strany 296 - Easy Setup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-73tools/dhcp.html Data - Read D

Strany 297

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-74 Efficient Networks®tools/loopGround.html Voice

Strany 298 - Page8-6 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-7You need the following informati

Strany 299

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-8 Efficient Networks®Bridging Network ProtocolTo co

Strany 300 - Page8-8 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-9DNS Internet Account Information

Strany 301

B. After receiving an RMA, the end user shall ship the product or defective component, including power supplies and cable, where applicable, freight o

Strany 302 - RFC 1483 Networking

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-10 Efficient Networks®IP Routing Entries• For the E

Strany 303

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-11DLCI number (for RFC 1490)The D

Strany 304 - Page8-12 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-12 Efficient Networks®Bridging Network ProtocolTo c

Strany 305

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-13If you are connecting to multip

Strany 306 - Page8-14 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-14 Efficient Networks®If NAT is not enabled, you ma

Strany 307

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-15Microsoft WindowsWindows 98Step1

Strany 308 - Step3 Click Save and Reboot

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-16 Efficient Networks®Step6 Click OK.Step7 Click OK

Strany 309 - User Management

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-17Windows NT 4Step1 On your deskto

Strany 310 - Adding A User Account

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-18 Efficient Networks®Step6 Click OK.Step7 Click OK

Strany 311 - Editing A User Account

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-19Windows 2000Step1 On your deskto

Strany 312

Efficient Networks® Router familyTechnical Reference GuideTable of ContentsContentsEfficient Networks®51 Introduction. . . . . . . . . . . . . . . .

Strany 313

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-20 Efficient Networks®Step5 Click Properties.Step6

Strany 314

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-21Step 7 Click OK.Step 8 Click OK

Strany 315

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-22 Efficient Networks®Windows MEStep 1 On your desk

Strany 316

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-23Step 6 Under the IP Address tab

Strany 317 - Access Control Form

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-24 Efficient Networks®Windows XPStep 1 On your desk

Strany 318 - Feature Activation

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-25Step 4 The Local Area Connectio

Strany 319 - Key Enabled Feature List Page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-26 Efficient Networks®Apple MacintoshTo configure T

Strany 320

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-27Step 2 The TCP/IP control panel

Strany 321 - Step2 Click Apply

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-28 Efficient Networks®Mac OS XStep 1 Under the Appl

Strany 322

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-29Step 3 The Network window shoul

Strany 323 - Step3 Click Apply

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide6 Efficient Networks®PPP Link Protocol (over ATM or Frame Relay)

Strany 324

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-30 Efficient Networks®LinuxStep 1 From a terminal w

Strany 325

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-31Step 3 When settings are comple

Strany 326 - Router Clock Page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-32 Efficient Networks®InstallationVerify the Packag

Strany 327 - DCHP Configuration

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-33Step 5 Connect the AC power ada

Strany 328 - Page8-36 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-34 Efficient Networks®Establishing a Connection To

Strany 329

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-35Step 2 Restart the PC and power

Strany 330

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-36 Efficient Networks®Terminal SessionsThe router s

Strany 331

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-37Step 4 In the Com 1 (or 2) Prop

Strany 332 - Advanced Setup

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-38 Efficient Networks®Terminal Session for Macintos

Strany 333 - SNMP Configuration Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-39Telnet Session for Remote Acces

Strany 334 - Page8-42 Efficient Networks

Efficient Networks®7ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsBootP Service . . . . . . . . . . . . . . . .

Strany 335 - Step2 Click Add IP Range

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-40 Efficient Networks®Configuring the RouterHaving

Strany 336 - SNMP Password Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-41Configuration TablesThe followi

Strany 337

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-42 Efficient Networks®Configuring PPP with IP Routi

Strany 338 - Page8-46 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-43Configuring PPP with IPX Routin

Strany 339 - SSH Configuration

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-44 Efficient Networks®Remote RoutersNew Entry Enter

Strany 340

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-45Configuring PPP with BridgingTh

Strany 341

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-46 Efficient Networks®Configuring RFC 1483 / RFC 14

Strany 342 - Firewall Scripts

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-47Link Protocol/DLCIb(for Frame R

Strany 343

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-48 Efficient Networks®Configuring RFC 1483 / RFC 14

Strany 344 - QoS Configuration Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-49Configuring RFC 1483 / RFC 1490

Strany 345 - Step4 Click Apply

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide8 Efficient Networks®Client-Server Security . . . . . . . . . . .

Strany 346 - QoS Policy Configuration page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-50 Efficient Networks®Configuring RFC 1483MER / RFC

Strany 347 - QoS Policy Deletion

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-51Verify the Router Configuration

Strany 348 - Step3 Select a delete option

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-52 Efficient Networks®Test IP Routing to a Remote D

Strany 349

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-53If you cannot access the remote

Strany 350 - Step4 Click Save

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-54 Efficient Networks®This page intentionally left

Strany 351 - Step2 Click Modify/Display

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-1CHAPTER 4CHAPTER 4 SYSTEM MANAGEM

Strany 352

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-2 Efficient Networks®DHCP (Dynamic Host Configuration Pr

Strany 353

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-3NOTE:For information on configuring t

Strany 354

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-4 Efficient Networks®Manipulating Subnetworks and Explic

Strany 355 - Firewall Rule Parameters

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-5Example 1:The following command creat

Strany 356 - Firewall Rule Deletion

Efficient Networks®9ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsMain Mode and Aggressive Mode. . . . . . . . .

Strany 357

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-6 Efficient Networks®Dynamic Client LeasesDynamic client

Strany 358

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-7CommandsThe following commands are us

Strany 359

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-8 Efficient Networks®To release the client lease so it b

Strany 360

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-9-> dhcp clear valueoption <code

Strany 361

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-10 Efficient Networks®-> dhcp list definedoptionsThis

Strany 362

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-11Specify the Boot (TFTP) ServerThe fo

Strany 363 - Step2 Click Execute

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-12 Efficient Networks®Configuring BootP/DHCP RelaysBootP

Strany 364

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-13To list the definition for all optio

Strany 365

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-14 Efficient Networks®Clearing All DHCP InformationIf ne

Strany 366

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-15BootP ServiceThis section first disc

Komentáře k této Příručce

Žádné komentáře