Efficient Networks Router family Command line interface Specifikace

Procházejte online nebo si stáhněte Specifikace pro Sítě Efficient Networks Router family Command line interface. Efficient Networks Router family Command line interface Specifications [en] Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 379
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Router Family

SpeedStream ª Router Family Command Line Interface Guide

Strany 2 - Trademarks

10BootP Concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152BootP

Strany 3 - WhatÕs New in This Release?

100 Chapter 4. Configuring Special Featuresremote setourpasswd Secret PPPoEuser## Define an IP route for the remote.remote addiproute 0.0.0.0 0.0.

Strany 4

Chapter 4. Configuring Special Features 101Controlling Remote Management With the following security control features, the user can control remote man

Strany 5 - About This Manual

102 Chapter 4. Configuring Special Featuressystem addsnmpfilter 192.168.1.5 192.168.1.12To delete client ranges previously defined, use these commands

Strany 6 - Typographic Conventions

Chapter 4. Configuring Special Features 103Dial BackupThe Dial Backup capability provides a backup V.90 connection to the Internet when the default DS

Strany 7 - Table of Contents

104 Chapter 4. Configuring Special Features¥ Minimum retry period before DSL link restoration is attempted¥ Specify the modem parameters.¥ Specify the

Strany 8

Chapter 4. Configuring Special Features 105The router determines your gateway and/or DNS address implicitly via a means such as DHCP, static configura

Strany 9

106 Chapter 4. Configuring Special Featurescheck whether the DSL link has been restored. This time period between checks is called the retry period (d

Strany 10

Chapter 4. Configuring Special Features 107# pause), and finally the 7-digit local number.remote setphone async 1 9,5554218 backup# Specifies the bit

Strany 11

108 Chapter 4. Configuring Special FeaturesThe following illustration shows two routers connecting a LAN to the Internet. By using VRRP, the backup ro

Strany 12 - Terminal Window

Chapter 4. Configuring Special Features 109For example, assume that the gateway IP address is 192.168.100.254. If the default logical interface (0:0)

Strany 13

11Router Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206SYSTEM (Ta

Strany 14

110 Chapter 4. Configuring Special FeaturesAdding a VRID Attribute RecordTo define a record to contain the attributes for a VRID in a router, use this

Strany 15

Chapter 4. Configuring Special Features 111Note: Our implementation does not validate the IP addresses in the advertisement packet or authenticate usi

Strany 16 - Chapter 1. Router Concepts

112 Chapter 4. Configuring Special FeaturesSample VRRP ConfigurationThe sample configuration shown here is for two routers, one master and one backup.

Strany 17 - Bridging

Chapter 4. Configuring Special Features 113## Use the default time interval (1 second) and preemption option (preempt).## Save the changes and then re

Strany 18 -

114 Chapter 5. Configuring Software OptionsChapter 5. ConÞguring Software OptionsThe features described in this chapter can be purchased as software o

Strany 19 - Telephony Services

Chapter 5. Configuring Software Options 115Adding a New Software Option KeyA software option key is a 44-character string, unique to a particular rout

Strany 20

116 Chapter 5. Configuring Software OptionsEncryptionNote: Encryption is a software option. The following section applies only for routers with this o

Strany 21 - Changing Your Voice Profile

Chapter 5. Configuring Software Options 117Use this sample configuration with the additional encryption commands as a guideline to configure your own

Strany 22

118 Chapter 5. Configuring Software Optionsremote setEncryption DESE_1_KEY dh96.num SOHOsaverebootFile Format for the Diffie-Hellman Number FileThe fi

Strany 23 - Authentication Process

Chapter 5. Configuring Software Options 119IP FilteringIP Filtering is a type of firewall used to control network traffic. The process involves filter

Strany 24

How to Access the Command Line This manual describes the Command Line Interface for your router. The Command Line Interface gives you access to all c

Strany 25 - Protocol Conformance

120 Chapter 5. Configuring Software OptionsIf NAT translation is enabled for the Input interface, NAT translation is performed. Forward Phase At this

Strany 26 - Encapsulation Options

Chapter 5. Configuring Software Options 121action is for packets coming from the local protected network; it passes the packet to IPSec so it can be e

Strany 27 - RFC 1483 or RFC 1490

122 Chapter 5. Configuring Software OptionsL2TP Tunneling Ñ Virtual Dial-UpThis section has four parts:¥ The Introduction provides a general overview

Strany 28 - (Frame Relay)

Chapter 5. Configuring Software Options 123LNS, L2TP Client, LAC, and Dial User An L2TP tunnel is created between an L2TP client and an L2TP network s

Strany 29

124 Chapter 5. Configuring Software OptionsLNS and L2TP Client Relationship The LNS acts as the supervising system. The L2TP client acts both as the d

Strany 30 - 30 Chapter 1. Router Concepts

Chapter 5. Configuring Software Options 1252. Decide if one side or both sides of the connection should be allowed to initiate a tunnel. 3. Create th

Strany 31 - Remote Routers

126 Chapter 5. Configuring Software Options l2tp set authen on | off <TunnelName> Type of L2TP support for tunnel:Configure the entry to act

Strany 32 - Protocols to be Used

Chapter 5. Configuring Software Options 127Simple L2TP Client Configuration Example This example shows how a telecommuter working at home (client side

Strany 33

128 Chapter 5. Configuring Software Options2. Work_Router 3. Shared_Secret 4. 10.0.0.1L2TP tunnel configuration commands. These commands would be use

Strany 34 - IP Routing Network Protocol

Chapter 5. Configuring Software Options 1291. ppp_soho2. ppp_soho_secret3. We assume that this router will authenticate the router at work with the fo

Strany 35 - IP Routing Addresses

How to Access the Command Line 13 Terminal Session under Windows (HyperTerminal) To open the HyperTerminal emulator available under the Windows oper

Strany 36 - IPX Routing Entries

130 Chapter 5. Configuring Software OptionsTunnelOnly the L2TP client (soho) will initiate the tunnel and make the connection. The tunnel is routed th

Strany 37

Chapter 5. Configuring Software Options 131Enable IP routing for soho:eth ip enable eth ip addr 192.168.101.1 255.255.255.0 Set up ISDN parameters:isd

Strany 38

132 Chapter 5. Configuring Software OptionsCreate a DHCP pool of addresses:dhcp add 172.16.0.0 255.255.255.0 dhcp del 192.168.254.0dhcp set addr 172.1

Strany 39 - IP Routing Entries

Chapter 5. Configuring Software Options 133save reboot¥ Configuration commands for LNSserverNote: LNSserver is a DSL router. Define LNSserver:system n

Strany 40

134 Chapter 5. Configuring Software OptionsIPSec (Internet Protocol Security)Note: IPSec security is a software option for your router. The option be

Strany 41 - DLCI (with RFC 1490)

Chapter 5. Configuring Software Options 135It can also be used for L2TP over IPSec. The routers at either end of the L2TP tunnel do both the IPSec and

Strany 42 - MAC Encapsulated Routing

136 Chapter 5. Configuring Software OptionsThe following figure shows the transformed IP packet after the ESP or AH protocol has been applied in tunne

Strany 43

Chapter 5. Configuring Software Options 137during this phase. Phase 2 IKE then exchanges proposals for IPSec security attributes, generates the encryp

Strany 44 - FRF8 Link Protocol

138 Chapter 5. Configuring Software OptionsAdditional IKE SettingsIn addition to the peer identification and shared secret described earlier, IKE requ

Strany 45

Chapter 5. Configuring Software Options 139IKE CommandsThe Internet Key Exchange (IKE) process consists of two phases. In phase 1, a moderately secure

Strany 46

14 How to Access the Command Line Terminal Session for Macintosh or UNIX To open a terminal window emulation in a Macintosh or UNIX environment, you

Strany 47

140 Chapter 5. Configuring Software OptionsSets the IP address of the other endpoint. One end, the gateway, has a fixed IP address. The other end, the

Strany 48 - ConÞguration Tables

Chapter 5. Configuring Software Options 141ike proposals set dh_group <NONE | 1 | 2 > <ProposalName>Proposes the Diffie-Hellman (DH) key g

Strany 49

142 Chapter 5. Configuring Software OptionsNONE No ESP encapsulation and no ESP message authentication. (If you select this option, the encapsulation

Strany 50

Chapter 5. Configuring Software Options 143ike ipsec policies set mode <TUNNEL | TRANSPORT> <PolicyName>Specifies the encapsulation mode (

Strany 51 - PPP with Bridging

144 Chapter 5. Configuring Software OptionsIKE Configuration ExamplesThis section shows two simple IKE configurations. The installation CD also contai

Strany 52

Chapter 5. Configuring Software Options 145# MD5 authentication# Diffie-Hellman group 2 key exchange# 24-hour timeout# Unlimited dataike proposals add

Strany 53

146 Chapter 5. Configuring Software Options# Describe the home office peer# IKE main mode is used because the home office has a fixed IP address # (19

Strany 54 - (for Frame Relay

Chapter 5. Configuring Software Options 147saverebootAggressive Mode ExampleThis example supposes, like the preceding main mode example, that a secure

Strany 55 - 1490MER with IP Routing

148 Chapter 5. Configuring Software Optionsike peers set localidtype domainname home_peerike peers set localid branchoffice.big.com home_peerIPSec Com

Strany 56 - FRF8 with IP Routing

Chapter 5. Configuring Software Options 149Specifies the identifier (SPID) for the IPSec tunnel. It must match the SPID at the other end of the tunnel

Strany 57

How to Access the Command Line 154. The router displays a line identifying itself and then displays the Login: prompt.

Strany 58

150 Chapter 6. Managing the RouterChapter 6. Managing the RouterThis chapter describes facilities for managing, monitoring, and securing the router. T

Strany 59 - Test IP Routing

Chapter 6. Managing the Router 151trigger alarms on thresholds, graph or list node statistic counters, view and edit individual MIB variables, and pri

Strany 60 - Test IPX Routing

152 Chapter 6. Managing the RouterTFTPD rootdirectoryThe TFTPD operational parameters are kept in file ROUTER.INI in the form:rootdir=rootdirectoryret

Strany 61 - Sample ConÞgurations

Chapter 6. Managing the Router 153Relaying BootP RequestsThe DHCP relay list is an optional list of IP addresses of servers on the network. You create

Strany 62 - PPP/IP and IPX

154 Chapter 6. Managing the RouterBoot Code Maintenance OptionsThe router provides a number of maintenance options for booting router software. ¥ You

Strany 63 - SOHO System Settings

Chapter 6. Managing the Router 155Option 1: Retry Start-Up If you are in Manual Boot mode, you can reboot the router in the boot procedure order by se

Strany 64 - Entry: HQ

156 Chapter 6. Managing the RouterThe boot IP address is the router LAN IP address used during the boot procedure. This address may differ from the LA

Strany 65 - SOHO Routing controls

Chapter 6. Managing the Router 157When the router is configured by a PC, the GUI overwrites the time and date fields. The router time and date values

Strany 66

158 Chapter 6. Managing the RouterIdentifying Fatal Boot FailuresFatal boot failures can be identified by the light patterns shown by the LEDs on the

Strany 67

Chapter 6. Managing the Router 159Software Kernel UpgradesYou can upgrade the software kernel by downloading a new version from the LAN or from the WA

Strany 68 - Remote Passwords

16 Chapter 1. Router Concepts Chapter 1. Router Concepts This chapter provides background information applicable to the router on topics useful to ne

Strany 69 - Scenario:

160 Chapter 6. Managing the Routerthe return key for the load address). If all entered information is valid, the router boots from the network. An exa

Strany 70 - RFC 1483 / IP + Bridging

Chapter 6. Managing the Router 161where xxx.xxx.xxx.xxx is the TFTP server IP address, sfilename is the server filename of the kernel, and KERNEL.F2K

Strany 71

162 Chapter 6. Managing the RouterBackup and Restore ConÞguration FilesTo successfully save configuration files to the server, those files must alread

Strany 72 - SOHO Routing Controls

Chapter 6. Managing the Router 163FLASH Memory Recovery ProceduresRecovering Kernels for Routers with Configuration SwitchesIn the unlikely event that

Strany 73

164 Chapter 6. Managing the RouterRecovering Kernels for Routers with a Reset ButtonThe reset button (if your router has one) is recessed in an unlabe

Strany 74

Chapter 6. Managing the Router 1655. In the BootP Setting dialog box, click OK. Configuration Manager writes the above settings to a file called BOOTD

Strany 75 - IP Routing

166 Chapter 6. Managing the RouterBatch File Command ExecutionThis feature is used to load batch files of configuration commands into the router. This

Strany 76

Chapter 7. Troubleshooting 167Chapter 7. Troubleshooting Software problems usually occur when the routerÕs software configuration contains incomplete

Strany 77 - Multiple IP Subnets

168 Chapter 7. TroubleshootingOnce the router is in Ready State, the other LEDs may indicate transmitting and receiving activity as follows:¥ The WAN

Strany 78 - Virtual Routing Tables

Chapter 7. Troubleshooting 169Accessing History Log through Configuration Manager1. Select Tools and Terminal Window (the console cable is required).2

Strany 79 - Configure Bridge Filtering

Chapter 1. Router Concepts 17Numerous network protocols have evolved, and within each protocol are associated protocols for routing, error handling,

Strany 80

170 Chapter 7. TroubleshootingInterpretation and Troubleshooting To isolate a problem with the TCP/IP protocol, perform the following three tests:1. T

Strany 81 - IP (RIP) Protocol Controls

Chapter 7. Troubleshooting 171¥ connect to the router.¥ log in.¥ access the remote network.¥ access the router via Telnet.¥ download software.Finally,

Strany 82 - DHCP Client Requests

172 Chapter 7. TroubleshootingNote: If you do not reset switches 5 and 6 to the up position and then reboot, the router is placed in maintenance mode.

Strany 83 - ¥ Adding a Subnetwork

Chapter 7. Troubleshooting 173¥ The IP address must be within the valid range for the subnet.¥ Verify that the IP and gateway addresses are correct on

Strany 84

174 Chapter 7. Troubleshooting¥ Make sure that the Novell server is up.Incorrect VPI/VCI (ATM Routers)If you are given an incorrect VCI/VPI number or

Strany 85 - ¥ Commands

Chapter 7. Troubleshooting 175frame voice <x> Changes the voice DLCI to the specified number x.frame stats Shows LMI statistics.For a frame stat

Strany 86 - Setting Option Values

176 Chapter 7. TroubleshootingValue Actual ActualSpecified (G.711) (G.726)0-5 5.5 (1) 11 (1)6-11 11 (2) 11(1)12-16 16.5 (3) 22 (2)17-22 22 (4) 22 (2)2

Strany 87 - Managing BootP

Chapter 7. Troubleshooting 177Explanation: PAP cannot be negotiated.Can't agree with <router/user> on what their IP address should beExplan

Strany 88 - Enable/Disable BootP

178 Chapter 7. TroubleshootingExplanation: The router does not have a system name. For PAP/CHAP negotiation, the router will use a default name and pa

Strany 89 - Defining Option Types

Chapter 7. Troubleshooting 179Explanation: The remote destination refused to participate in the PAP/CHAP authentication process.Startup failedExplanat

Strany 90 - Clearing All DHCP Information

18 Chapter 1. Router ConceptsThese bridge-only units are pre-configured; no further configuration is required. The unit comes up in bridge mode automa

Strany 91 - Masquerading

180 Chapter 7. TroubleshootingDebugging CommandsThe following commands may be available for debugging purposes. Please use them with caution because t

Strany 92 - ¥ Interface-Specific Commands

Chapter 7. Troubleshooting 181Dumps all tables. If you capture and send this output to Technical Support, it can be useful in debugging problems. For

Strany 93

182 Chapter 7. TroubleshootingWeb GUI Debug CommandsIf you point your web browser to http://192.168.254.254/tools/index.html, you can display an index

Strany 94 - ¥ Server Request Hierarchy

Chapter 7. Troubleshooting 183 BER_METER_STATUS ... BER Meter Statussdsl btstat *Displays available SDSL status commands.sdsl bts felmDis

Strany 95 - Classic NAT

184 Chapter 7. TroubleshootingShows AAL2 statistics for voice router.voice 12stats clearResets values.dsp <NOEC | ECON>Turns echo canceller on (

Strany 96 - ¥ Range Overlap Rules

Chapter 7. Troubleshooting 185Frame Relay Debug Commandsframe statsDisplays statistics. For more information, see FRAME STATS, on page 204.ATM Tracing

Strany 97 - PPPoE (PPP over Ethernet)

186 Chapter 7. Troubleshooting¥ Type of operating system (Windows 95, 98, NT, or Windows for Workgroups)¥ Description of the problem¥ List of other eq

Strany 98 - PPPoE Client

Chapter 8. Command Reference 187Chapter 8. Command ReferenceThis chapter lists the formats of the commands you can enter on the router command line.T

Strany 99

188 Chapter 8. Command ReferenceExample:# ?Top-level commands:? help versionfilter logout exitr

Strany 100 - Managing PPPoE Sessions

Chapter 8. Command Reference 189ARP LISTLists Address Resolution Protocol (ARP) table entries in an IP routing environment. ARP is a tool used to f

Strany 101 - Validating Clients

Chapter 1. Router Concepts 19¥ Routing takes precedence over bridging; i.e., when routing is active, the router uses the packetÕs protocol address inf

Strany 102 - Disabling WAN Management

190 Chapter 8. Command ReferenceExample:# bi listBRIDGE GROUP 0:00206F024C34: P US SD A 0180C2000000:

Strany 103 - Dial Backup

Chapter 8. Command Reference 191Additional interfaces on other routers could include:FR/3 144kb 0%/0% 0%/0% (HDLC/FR) OPENEDFR-VC/

Strany 104 - Addresses to Ping

192 Chapter 8. Command ReferenceIPXROUTESLists the current entries in the IPX routing table.IPXSAPSLists the current services in the IPX SAPs table.ip

Strany 105 - DSL Restoration Retry Period

Chapter 8. Command Reference 193LOGOUTLogs out to reinstate administrative security after you have completed changing the routerÕs configuration.MEMT

Strany 106 - Specifying Modem Parameters

194 Chapter 8. Command ReferencePINGThis command sends an echo message, available within the TCP/IP protocol suite. The echo message is sent to a rem

Strany 107 - VRRP Backup

Chapter 8. Command Reference 195PSLists all of the tasks (processes) running in the system and the status of the tasks.REBOOTThis command causes a re

Strany 108 - VRRP Configuration

196 Chapter 8. Command Reference¥ Ethernet IP address ¥ TCP/IP routing ¥ Remote router default bridging destination ¥ TCP/IP route addresses ¥ SAPs an

Strany 109 - Defining VRRP Attributes

Chapter 8. Command Reference 197save eth Saves the configuration settings for the Ethernet LAN into FLASH memory.save filter Saves the bridging filte

Strany 110

198 Chapter 8. Command ReferenceTCP STATSDisplays the TCP statistics and open connections.TRACEROUTETraces the route taken by packets sent from the ta

Strany 111

Chapter 8. Command Reference 199 18: 208.178.103.62 19: reply from 204.71.200.68: bytes=56 (data), time=95 ms traceroute: packets sent

Strany 112 - Internet

2 November 2000 Copyright Efficient Networks provides this publication Òas isÓ without warranty of any kind, either expressed or implied, including,

Strany 113

20 Chapter 1. Router Concepts¥ Support for these voice gateways:¥ Jetstream proprietary¥ CopperCom proprietary¥ ATM Forum Standards based (ATM Forum d

Strany 114 - Software Option Keys

200 Chapter 8. Command ReferenceFile System CommandsThe file system commands allow you to perform maintenance and recovery on the router. These comman

Strany 115 - Deleting Software Option Keys

Chapter 8. Command Reference 201DELETERemoves a file from the file system.filename Name of the file to be deleted. The filename is in the format xxxx

Strany 116 - Encryption

202 Chapter 8. Command Referenceindicates the file system is corrupted, you may wish to reformat the disk, reboot the router, and recopy the router so

Strany 117 - Diffie-Hellman Encryption

Chapter 8. Command Reference 203RENAMERenames a file in the file system.SYNCCommits the changes made to the file system to FLASH memory.Frame Command

Strany 118 - ¥ Default Generator

204 Chapter 8. Command ReferenceFRAME LMITurns frame LMI either on or off.Example:# frame onLMI is onFRAME VOICEDisplays the voice DLCI for voice rout

Strany 119 - IP Filtering

Chapter 8. Command Reference 205 Data Packets Out Queued... 0 Data Packets Out (dropped Q Full).. 0 Voice Cells In...

Strany 120 - Filter Actions

206 Chapter 8. Command ReferenceRouter ConÞguration CommandsConfiguration commands are used to set configuration information for each functional capab

Strany 121 - Special Notes

Chapter 8. Command Reference 207SYSTEM (Target Router System Configuration Commands)The following commands set basic router configuration information

Strany 122 - L2TP Concepts

208 Chapter 8. Command ReferenceSYSTEM ADDBOOTPSERVERAdds an address to the BootP server list. (The BootP server list is also the DHCP relay list.)Whi

Strany 123 - LAN/server

Chapter 8. Command Reference 209SYSTEM ADDIPROUTINGTABLEDefines a new virtual routing table. Once defined, you can add routes to the table using the

Strany 124 - Configuration

Chapter 1. Router Concepts 21Changing Your Voice ProfileIf your voice gateway is an ATM standards-based gateway, the voice profile must match the conf

Strany 125 - Configuration Commands

210 Chapter 8. Command Referenceaction One of the following command actions:ipaddr Selects the host with this IP address as server (4 decimals separat

Strany 126 - Sample Configurations

Chapter 8. Command Reference 211The Syslog filter can comprise one or more ranges of IP addresses that DHCP may return for Syslog servers. To delete

Strany 127 - ¥ Configuration Process

212 Chapter 8. Command Referencefirst ip addr First IP address of the client range. last ip addr Last IP address of the client range. May be omitted i

Strany 128 - PPP remote configuration

Chapter 8. Command Reference 213SYSTEM BACKUP ADDAdds an IP address to the list of addresses to be pinged for the Dial Backup option. The command can

Strany 129

214 Chapter 8. Command Referenceipaddr IP address to be deleted from the list (four decimals separated by periods). GW Gateway address. The router det

Strany 130 - Configuration Process

Chapter 8. Command Reference 215SYSTEM BACKUP PINGINTERVALChanges the ping interval for a group, that is, the number of seconds between pings during

Strany 131

216 Chapter 8. Command ReferenceSYSTEM BACKUP RETRYChanges the Dial Backup retry period. The retry period determines how often the router attempts to

Strany 132

Chapter 8. Command Reference 217percentage Minimum success rate required during a ping test of the addresses in the group (integer, 0 thru 99). The d

Strany 133

218 Chapter 8. Command ReferenceSYSTEM DELBOOTPSERVER Removes an address from the BootP server list. (The BootP server list is also the DHCP relay lis

Strany 134

Chapter 8. Command Reference 219system delHTTPFilter 192.168.1.5 192.168.1.12SYSTEM DELIPROUTINGTABLEDeletes a range of addresses that reference a vi

Strany 135 - ESP and AH Security Protocols

22 Chapter 1. Router ConceptsPAP/CHAP Security AuthenticationThe router supports PAP (Password Authentication Protocol) and CHAP (Challenge Handshake

Strany 136 - IKE Management

220 Chapter 8. Command Referencehttp HTTP port.tftp TFTP port.all All ports.last port Optional last port in the range of ports as seen by the remote e

Strany 137 - Main Mode and Aggressive Mode

Chapter 8. Command Reference 221SYSTEM DELSYSLOGSERVERRemoves an address from the list of Syslog servers. To see the server addresses, use the comman

Strany 138 - Security Associations (SAs)

222 Chapter 8. Command ReferenceSYSTEM HISTORYDisplays the routerÕs most recent console log.SYSTEM HTTPPORTManages HTTP port access including disablin

Strany 139 - IKE Commands

Chapter 8. Command Reference 223 Syslog Port... default (514) Allowed Syslog Servers... all Default Syslog Server

Strany 140 - IKE Proposal Commands

224 Chapter 8. Command Referenceit deletes them from the address ranges for the other virtual routing tables. The command then adds the specified addr

Strany 141 - IKE IPSec Proposal Commands

Chapter 8. Command Reference 225SYSTEM ONEWANDIALUP This command is useful when security concerns dictate than the router have only one connection ac

Strany 142 - IKE IPSec Policy Commands

226 Chapter 8. Command ReferenceSYSTEM SECURITYTIMERAutomatically logs out a Telnet or console user out of privileged mode when no typing has occurre

Strany 143

Chapter 8. Command Reference 227¥ bi (if bridging is enabled)¥ ipifs¥ iproutes¥ ipxroutesSYSTEM SYSLOGPORTManages Syslog port access including disabl

Strany 144 - IKE Configuration Examples

228 Chapter 8. Command ReferenceSYSTEM WAN2WANFORWARDINGAllows the user to manage WAN-to-WAN forwarding of data from one WAN link to another. For exam

Strany 145

Chapter 8. Command Reference 229ETH (Target Router Ethernet LAN Bridging and Routing)The following commands allow you to configure the Ethernet inter

Strany 146

Chapter 1. Router Concepts 23Authentication ProcessThe authentication process occurs regardless of whether a remote router connects to the local route

Strany 147 - Aggressive Mode Example

230 Chapter 8. Command ReferenceNote: This command requires a save and reboot before it takes effect. port# Ethernet interface (0 for a single-port ro

Strany 148 - IPSec Commands

Chapter 8. Command Reference 231If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specifi

Strany 149

232 Chapter 8. Command Referencegateway IP address (4 decimals separated by periods).hops Number of routers through which the packet must go to get

Strany 150 - SNMP Support

Chapter 8. Command Reference 233interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.If the rout

Strany 151 - TFTP Server

234 Chapter 8. Command Referenceeth ip bindRoute 10.1.3.0 255.255.255.0 1 192.168.252.9 ROSA 0:1eth ip bindRoute 10.1.3.0 255.255.255.0 1 192.168.252.

Strany 152 - BootP Service

Chapter 8. Command Reference 235If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specifi

Strany 153 - Syslog Client

236 Chapter 8. Command Referenceme Sends the incoming server request to the local router, regardless of its IP address.protocol Protocol used by the s

Strany 154 - Boot Code Maintenance Options

Chapter 8. Command Reference 237ETH IP DISABLEDisables IP routing across the Ethernet LAN. This commands acts as a master switch allowing you to disa

Strany 155 - Option 3: Boot from Network

238 Chapter 8. Command Referenceeth ip filter insert <type> <action> <parameters> [<interface>] Inserts a filter in the list o

Strany 156 - Option 6: Set Time and Date

Chapter 8. Command Reference 239The Þlter type speciÞes at which point the Þlter is compared to the IP packet (see the illustration under IP Filterin

Strany 157

24 Chapter 1. Router Conceptsrouter. This allows you to set a unique CHAP or PAP authentication password for authentication of the local site by the r

Strany 158

240 Chapter 8. Command Reference-dp <ICMP type> | <first dest port>[:<last dest port>]The packet must have a destination port that

Strany 159 - Software Kernel Upgrades

Chapter 8. Command Reference 241If -v (verbose) is specified, a message is printed every time this filter matches a packet, regardless of the filter

Strany 160 - Upgrading from the WAN Line

242 Chapter 8. Command ReferenceThe management IP address is separate from the IP address used for IP address translation. The IP address used for add

Strany 161

Chapter 8. Command Reference 243If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specifi

Strany 162 - Restore Configuration Files

244 Chapter 8. Command ReferenceETH IP RESTARTStops and restarts a logical Ethernet interface. To read about logical Ethernet interfaces, see page 77.

Strany 163

Chapter 8. Command Reference 245eth ip start 0:1ETH IP STOPStops a logical Ethernet interface. To read about logical Ethernet interfaces, see page 77

Strany 164 - Recovery Steps Using BootP

246 Chapter 8. Command ReferenceETH IP UNBINDROUTERemoves an Ethernet route from the named IP virtual routing table. To list the routes, use the iprou

Strany 165 - Routers with a Reset Button

Chapter 8. Command Reference 247interface Ethernet interface. The default Ethernet interface is 0:0.To specify a logical interface other than 0:0, sp

Strany 166 - Batch File Command Execution

248 Chapter 8. Command ReferenceETH IPX FRAMESets the frame encapsulation method. The default is 802.2.ETH LISTLists information about the Ethernet in

Strany 167 - Diagnostic Tools

Chapter 8. Command Reference 249 IP filters defined... no IP address/subnet mask... 192.168.0.101/255.255.255.0 Static

Strany 168 - History Log

Chapter 1. Router Concepts 25Interoperability Between the Router and Other EquipmentThe router uses industry-wide standards to ensure compatibility wi

Strany 169 - Ping Command

250 Chapter 8. Command ReferenceNote: This command takes effect immediately, but you must save the change if it is to persist after you restart the in

Strany 170 - Òctrl qÓ

Chapter 8. Command Reference 251port# Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be omitted if the route

Strany 171 - Login Password is invalid

252 Chapter 8. Command Referencepreempt Preempt immediately.nopreempt Do not preempt a router with lower priority.vrid Virtual router ID of the VRRP

Strany 172 - TCP/IP Routing

Chapter 8. Command Reference 253ETH VRRP SET PRIORITYSpecifies the priority attribute in a VRRP attribute record for the VRID (virtual router ID). Th

Strany 173 - IPX Routing

254 Chapter 8. Command ReferenceSkew_Time = (256 - Priority) / 256Thus, the default skew time is (256 - 100) / 256, or .609375. The default master dow

Strany 174 - Problems Downloading Software

Chapter 8. Command Reference 255Remote Access ConÞgurationThe following commands allow you to add, delete, and modify remote routers to which the tar

Strany 175 - Adjusting the Jitter Buffer

256 Chapter 8. Command ReferenceREMOTE CommandsREMOTE ?Lists the supported keywords. (The list varies depending on the router model.)stREMOTE ADDAdds

Strany 176 - System Messages

Chapter 8. Command Reference 257REMOTE ADDBRIDGEDefines the remote router entry as the default bridging destination for outbound bridging. The comman

Strany 177

258 Chapter 8. Command ReferenceREMOTE ADDIPROUTEAdds an IP address route to a network or station on the LAN connected beyond the remote router. The r

Strany 178

Chapter 8. Command Reference 259REMOTE ADDIPXSAPAdds an IPX SAP to the server information table for a service on the LAN network connected beyond the

Strany 179 - Startup failed

26 Chapter 1. Router Concepts¥ RFC 1877 Automatic IP / DNS¥ RFC 1962 PPP Compression Control Protocol (CCP)¥ RFC 1969 DES¥ RFC 1973 PPP in Frame Re

Strany 180 - Debugging Commands

260 Chapter 8. Command Referenceipaddr Selects the host with this IP address as server (4 decimals separated by periods).discard Discards the incoming

Strany 181 - ATM Debug Commands

Chapter 8. Command Reference 261remoteName Name of the remote router (character string).Example:The following command adds a route to virtual routing

Strany 182 - SDSL Debug Commands

262 Chapter 8. Command ReferenceExample:remote delbridge 01:08:03:0A:0B:0C HQREMOTE DELENCRYPTIONDeletes encryption files associated with a remote rou

Strany 183 - Voice Router Debug Commands

Chapter 8. Command Reference 263REMOTE DELIPXROUTEDeletes an IPX address for a network on the LAN connected beyond the remote router. Note: The reboo

Strany 184

264 Chapter 8. Command ReferenceREMOTE DELOURPASSWDRemoves the unique CHAP or PAP authentication password entries established by the command remote se

Strany 185 - IP Filtering Debug Commands

Chapter 8. Command Reference 265REMOTE DELSERVERDeletes an entry created by the remote addServer command (page 259).action One of the following comma

Strany 186

266 Chapter 8. Command ReferenceREMOTE DISAUTHENThis command is intended for situations where third-party routers cannot be authenticated; the target

Strany 187 - Chapter 8. Command Reference

Chapter 8. Command Reference 267REMOTE ENABRIDGEEnables bridging from the target router to the remote router. This command requires rebooting the tar

Strany 188 - System-Level Commands

268 Chapter 8. Command ReferenceIf no line numbers are specified, all filters in the list are deleted. If only the first line number is specified, all

Strany 189 - ARP LIST

Chapter 8. Command Reference 269drop The packet is discarded, without sending an ICMP (Internet Control Management Protocol) error message.reject The

Strany 190

Chapter 1. Router Concepts 270x0021 IP0x002d Van Jacobson compressed TCP/IP0x002f Van Jacobson uncompressed TCP/IP0x8031 Bridge NCP0x0031 Bridge Fram

Strany 191 - IPROUTES

270 Chapter 8. Command Reference- Specify -tcp noflag if neither the SYN flag nor the ACK flag can be set. For example, for the IP filter to match the

Strany 192 - IPXROUTES

Chapter 8. Command Reference 271remote ipfilter append forward drop -da 192.168.0.0 -dm 255.255.0.0 internetremote ipfilter append forward drop -da 1

Strany 193 - MLP SUMMARY

272 Chapter 8. Command Reference mtu... 1500REMOTE LISTBRIDGELists the current bridge settings for the specified remot

Strany 194

Chapter 8. Command Reference 273 Total IP remote routes... 5 192.168.210.0/255.255.255.0/1 10.0.0.0/255.0.0.0/1

Strany 195

274 Chapter 8. Command ReferenceNote: If the remote name is not specified, a list of phone numbers is displayed for each remote router in the database

Strany 196

Chapter 8. Command Reference 275E164 ITU E164 encoding.partial The MAC address of the router is substituted for octets 2-7 of the NSAP.full No change

Strany 197

276 Chapter 8. Command Referencein | out | both Incoming traffic, outgoing traffic, or both. The default is both.remoteName Name of the remote router

Strany 198 - TRACEROUTE

Chapter 8. Command Reference 277The threshold is used in bandwidth on demand management. Initially, a call is activated on one B-channel. When bandwi

Strany 199

278 Chapter 8. Command ReferenceREMOTE SETENCRYPTION (DifÞe-Hellman Encryption)This command is used to specify encryption based on the Diffie-Hellman

Strany 200 - File System Commands

Chapter 8. Command Reference 279txrip Transmit IP RIP-1 compatible broadcast packets and RIP-2 multicast packets to the remote site. When this option

Strany 201 - FORMAT DISK

28 Chapter 1. Router ConceptsMAC Encapsulated Routing: RFC 1483MER (ATM) or RFC 1490MER (Frame Relay)MER encapsulation allows IP packets to be carried

Strany 202

280 Chapter 8. Command ReferenceroutersÕ local WAN port. This command requires that you define a Source WAN IP Address with the command:remote setSrcI

Strany 203 - Frame Commands

Chapter 8. Command Reference 281remote setMaxLine 2 HQREMOTE SETMGMTIPADDRThis command assigns to the remote router entry an IP address which is to b

Strany 204 - FRAME STATS

282 Chapter 8. Command ReferenceThe following command keeps a channel allocated for the session even when there is no traffic.remote setMinLine 1 PPPo

Strany 205

Chapter 8. Command Reference 283REMOTE SETOURSYSNAMESets a unique CHAP or PAP authentication system name for the local router that is used for authen

Strany 206 - Router ConÞguration Commands

284 Chapter 8. Command ReferenceremoteName Name of the remote entry (character string).Example:# The phone number begins with 9 (to get an outside lin

Strany 207 - Commands)

Chapter 8. Command Reference 285REMOTE SETPVC Specifies the PVC number for connecting to the remote router.REMOTE SETRMTIPADDRSets the WAN IP address

Strany 208 - SYSTEM ADDHTTPFILTER

286 Chapter 8. Command ReferenceFor more information on the Dial Backup option, see page 149.bitrate Bit rate to be used for the phone number. Possibl

Strany 209 - SYSTEM ADDSERVER

Chapter 8. Command Reference 287A timeout period is desirable if your service provider charges by the hour. However, the connection has to wait a few

Strany 210 - SYSTEM ADDSYSLOGFILTER

288 Chapter 8. Command ReferenceREMOTE STATSCLEARAllows the user to reset the statistics counter for a given remote router.REMOTE STOPIf the remote is

Strany 211 - SYSTEM ADDTELNETFILTER

Chapter 8. Command Reference 289Example:The following command stops the active session for remote HQ.remote stop HQREMOTE UNBINDIPVIRTUALROUTERemoves

Strany 212 - SYSTEM AUTHEN

Chapter 1. Router Concepts 29Router System and ConÞguration FilesThe system software and configuration information for the router are contained in fil

Strany 213 - SYSTEM BACKUP DELETE

290 Chapter 8. Command ReferenceADSL CommandsUse the following commands to manage the ADSL (Asymmetric Digital Subscriber Line) link for an ADSL route

Strany 214 - SYSTEM BACKUP ENABLE

Chapter 8. Command Reference 291ADSL STATSShows the current error status for the ADSL connection.adsl stats [clear]clear Option used to reset the cou

Strany 215 - SYSTEM BACKUP PINGSAMPLES

292 Chapter 8. Command ReferenceATM CommandsUse the following commands to manage the ATM (Asynchronous Transfer Mode) link for an ATM router. ATM ?Lis

Strany 216 - SYSTEM BACKUP SUCCESSRATE

Chapter 8. Command Reference 293ATM SPEEDSets the speed of the ATM link in kilobits per second. The default upstream speed is 326 Kb/s. Use this comm

Strany 217 - SYSTEM DEFAULTMODEM

294 Chapter 8. Command Referenceremote setATMtraffic 47 1 HQThe following command disables ATM traffic-shaping on remote router HQ:remote setATMtraffi

Strany 218 - SYSTEM DELHTTPFILTER

Chapter 8. Command Reference 295DMT CommandsThese commands manage the ADSL DMT (Discrete MultiTone) router. To see additional DMT debug commands, see

Strany 219 - SYSTEM DELSERVER

296 Chapter 8. Command ReferenceDual-Ethernet Router (ETH) CommandsThe following Ethernet commands are used to manage the Ethernet interfaces of the D

Strany 220 - SYSTEM DELSYSLOGFILTER

Chapter 8. Command Reference 297option stpSet this option to on to use the Spanning Tree Protocol (STP). The default is on.STP is used to detect brid

Strany 221 - SYSTEM DELUDPRELAY

298 Chapter 8. Command ReferenceHDSL CommandsUse the following commands to manage the HDSL (High-Speed Digital Subscriber Line) link for an HDSL route

Strany 222 - SYSTEM LIST

Chapter 8. Command Reference 299HDSL ?Lists the supported keywords.HDSL SAVESaves the HDSL-related changes across restarts and reboots.HDSL SPEEDCO e

Strany 223 - SYSTEM MOVEIPROUTINGTABLE

3 WhatÕs New in This Release? This version of the Command Line Interface (CLI) manual has been updated to document features available with this rel

Strany 224 - SYSTEM NAME

30 Chapter 1. Router Conceptssoftware keys are isomorphic to one and only one router. For more information on software option keys, see page 114.

Strany 225 - SYSTEM PASSWD

300 Chapter 8. Command ReferenceHDSL TERMINAL The router is by default configured as the Customer Premises Equipment (CPE). Use this command if you in

Strany 226 - SYSTEM SUPPORTTRACE

Chapter 8. Command Reference 301IDSL CommandsAn IDSL (ISDN Digital Subscriber Line) delivers a maximum symmetric 144 Kbps of bandwidth. The IDSL band

Strany 227 - SYSTEM TELNETPORT

302 Chapter 8. Command ReferenceThe IDSL bandwidth is composed of two 64 Kbps B channels, plus one 16 Kbps D channel. Your speed setting indicates the

Strany 228 - SYSTEM WAN2WANFORWARDING

Chapter 8. Command Reference 303REMOTE SETPROTOCOLThis IDSL-specific command is used to select the appropriate link protocol for your IDSL connection

Strany 229

304 Chapter 8. Command ReferenceSDSL CommandsThe commands in this section manage the Symmetric Digital Subscriber Line (SDSL) link for an SDSL router.

Strany 230 - ETH IP ADDHOSTMAPPING

Chapter 8. Command Reference 30503/09/1998-17:15:35:DOD: link to co over ATM-VC/1 is now up03/09/1998-17:15:57:SDSL: Line Rate at last activation sav

Strany 231 - ETH IP ADDROUTE

306 Chapter 8. Command ReferenceThe default status is on. However, to be effective, autobaud pre-activation must also be enabled at the Central Office

Strany 232 - ETH IP ADDSERVER

Chapter 8. Command Reference 307speed Speed in kbps. To see the speeds available for the model type, enter sdsl speed. If the auto-speed search is in

Strany 233 - ETH IP BINDROUTE

308 Chapter 8. Command Referencecpe Defines the router as the customer premises (CPE) equipment.co Defines the router as the central office (CO) equip

Strany 234 - ETH IP DELHOSTMAPPING

Chapter 8. Command Reference 309DHCP CommandsThe following DHCP (Dynamic Host Configuration Protocol) commands allow you to:¥ Enable and disable subn

Strany 235 - ETH IP DELSERVER

Chapter 2. Planning for Router Configuration 31Chapter 2. Planning for Router ConÞgurationThis chapter describes the basic information you need befor

Strany 236 - ETH IP DIRECTEDBCAST

310 Chapter 8. Command ReferenceDHCP ADDRELAY Adds an address to the DHCP relay list. (This list is also the BootP server list.) While the relay list

Strany 237 - ETH IP FILTER

Chapter 8. Command Reference 311DHCP BOOTP FILE Specifies the boot file name (kernel) and the subnet to which it applies.Note: Be sure to specify th

Strany 238

312 Chapter 8. Command ReferenceDHCP CLEAR ALL RECORDSClears all DHCP information, including all leases and all global DHCP information. Unlike erase

Strany 239

Chapter 8. Command Reference 313DHCP DEL Deletes a subnetwork lease, a specific client lease, or a code.DHCP DELRELAY Removes an address from the DHC

Strany 240

314 Chapter 8. Command ReferenceDHCP DISABLE Disables a subnetwork or a client lease.DHCP ENABLE Enables a subnetwork or a client lease.DHCP LISTLists

Strany 241 - ETH IP MGMT

Chapter 8. Command Reference 315DOMAINNAME (15)... efficient.comWINSSERVER (44)... 192.168.254.73Subnet 192.168.254.0, EnabledMask.

Strany 242 - ETH IP MTU

316 Chapter 8. Command ReferenceExample 1:The following command lists all available options (predefined and user-defined):#dhcp list definedoptionscod

Strany 243 - ETH IP OPTIONS

Chapter 8. Command Reference 317code REQUESTEDIPADDR (50), 1 occurrence, type IPADDRESS-RESERVEDcode IPADDRLEASETIME (51), 1 occurrence, type LONGINT

Strany 244 - ETH IP START

318 Chapter 8. Command ReferenceDHCP SET EXPIRE This command is used to manually change a client lease expiration time to a certain value. Note 1:

Strany 245 - ETH IP TRANSLATE

Chapter 8. Command Reference 319Example 3:dhcp set lease 192.168.254.0 infinite (sets lease time to inÞnite for this subnet)

Strany 246 - ETH IP VRID

32 Chapter 2. Planning for Router ConfigurationThe commands that define information for a remote router entry start with the word remote and end with

Strany 247 - ETH IPX ENABLE

320 Chapter 8. Command ReferenceDHCP SET MASKUsed to conveniently change the mask of a DHCP subnet without having to delete and recreate the subnet an

Strany 248 - ETH LIST

Chapter 8. Command Reference 321value Value to be assigned to the speciÞed option. It could be a byte, word, signed long, unsigned long, binary, IP a

Strany 249 - ETH VRRP CLEAR PASSWORD

322 Chapter 8. Command ReferenceL2TP Ñ Virtual Dial-Up Configuration CommandsThis section contains L2TP command descriptions. For a complete discussio

Strany 250 - ETH VRRP LIST

Chapter 8. Command Reference 323L2TP CLOSECloses an L2TP tunnel and/or session.L2TP DELDeletes a tunnel entry.L2TP FORWARDThe router can be conÞgured

Strany 251 - ETH VRRP SET OPTION

324 Chapter 8. Command ReferenceL2TP LISTProvides a complete display of the current conÞguration settings for tunnel(s), except for the authentication

Strany 252 - ETH VRRP SET PASSWORD

Chapter 8. Command Reference 325Caution: If the IP address of the remote tunnel is part of a subnet that is also reached through the tunnel, a routin

Strany 253 - ETH VRRP SET TIMEINTERVAL

326 Chapter 8. Command ReferenceL2TP SET DIALOUTLets the LNS instruct the L2TP client to use an ISDN phone line to place a call on its behalf.L2TP SET

Strany 254

Chapter 8. Command Reference 327L2TP SET OURPASSWORDSpeciÞes the routerÕs secret/password for PPP authentication on a per-tunnel basis.L2TP SET OURSY

Strany 255 - Remote Access ConÞguration

328 Chapter 8. Command ReferenceL2TP SET TYPEDeÞnes the type of L2TP support for the tunnel. The routerÕs role is deÞned on a per-tunnel basis.L2TP S

Strany 256 - REMOTE Commands

Chapter 8. Command Reference 329TunnelName Name of the tunnel (character string). The name is case-sensitive.Examples:This command restricts the tun

Strany 257 - REMOTE ADDHOSTMAPPING

Chapter 2. Planning for Router Configuration 33To configure a Dual-Ethernet Router:Select one of these two configurations:Configuring the Dual-Ethern

Strany 258 - REMOTE ADDIPXROUTE

330 Chapter 8. Command ReferenceREMOTE SETLNSWith this command, this remote is the path to the LNS, and it will forward the incoming call (which match

Strany 259 - REMOTE ADDSERVER

Chapter 8. Command Reference 331FILTER BR (Bridge Filtering) CommandsBridge filtering allows you to control the packets transferred across the router

Strany 260 - REMOTE BINDIPVIRTUALROUTE

332 Chapter 8. Command Referencepos Byte offset within a packet; number from 0-127.data Hexadecimal number up to 6 bytes.Example:This command deletes

Strany 261 - REMOTE DELBRIDGE

Chapter 8. Command Reference 333PPPoE CommandsThis section contains the commands that are specific to PPPoE (PPP over Ethernet). To learn more about

Strany 262 - REMOTE DELIPROUTE

334 Chapter 8. Command Reference# pppoe listPPPoE Client Session ... DialUpPPP.net PPPoE/Ifs number... 1 Access Concentrator.. 15021109

Strany 263 - REMOTE DELIPXSAP

Chapter 8. Command Reference 335IKE (Internet Key Exchange) CommandsThe IKE software option and the IKE commands are described in IPSec (Internet Pro

Strany 264 - REMOTE DELPHONE

336 Chapter 8. Command ReferenceIKE IPSEC POLICIES ENABLEEnables an IPSec policy. An enable command is required for each new policy; the enable comman

Strany 265 - REMOTE DISABLE

Chapter 8. Command Reference 337IKE IPSEC POLICIES SET DESTPORTDefines a destination port filtering parameter value for the policy. The destination p

Strany 266 - REMOTE ENABLE

338 Chapter 8. Command Referenceike ipsec policies set interface all mypolicyIKE IPSEC POLICIES SET MODEDefines the mode filtering parameter value for

Strany 267 - REMOTE IPFILTER

Chapter 8. Command Reference 339none Perfect Forward Secrecy negotiation is not required for this connection.PolicyName Name of the IPsec policy to w

Strany 268

34 Chapter 2. Planning for Router ConfigurationPPP Link Protocol (over ATM or Frame Relay)The PPP Link Protocol is an encapsulation method that can be

Strany 269

340 Chapter 8. Command ReferenceIPaddress IP address allowed to be the source of the data (4 decimals separated by periods).IPmask IP network mask (4

Strany 270

Chapter 8. Command Reference 341protected network. (See the example below.) You can use the eth ip addhostmapping command (page 230) to map a range o

Strany 271 - REMOTE LIST

342 Chapter 8. Command ReferenceIKE IPSEC PROPOSALS DELETEDeletes an existing IKE IPSec proposal. For more information, see IKE IPSec Proposal Command

Strany 272 - REMOTE LISTIPROUTES

Chapter 8. Command Reference 343ProposalName Name of the IPsec proposal to which the AH authentication parameter is added. To see the proposal names

Strany 273 - REMOTE LISTPHONES

344 Chapter 8. Command ReferenceExample: ike ipsec proposals set espenc 3des myproposalIKE IPSEC PROPOSALS SET IPCOMPSets the proposal parameter that

Strany 274 - REMOTE SETATMNSAP

Chapter 8. Command Reference 345Example: ike ipsec proposals set lifetime 600 myproposalIKE PEERS ADDDefines the name of a new IKE peer. Other comman

Strany 275 - REMOTE SETBOD

346 Chapter 8. Command ReferenceIKE PEERS SET ADDRESSSets the IP address of the other endpoint of the secure IKE peer connection. The address specifie

Strany 276 - REMOTE SETBWTHRESH

Chapter 8. Command Reference 347One of the following:IPADDR The local ID must be an IP address.DOMAINNAME The local ID must be a domain name.EMAIL Th

Strany 277 - REMOTE SETCOMPRESSION

348 Chapter 8. Command ReferenceThe peer ID type must match the local ID type on the other end of the connection. The possible ID types are IP address

Strany 278 - REMOTE SETIPOPTIONS

Chapter 8. Command Reference 349ProposalName Name of the IKE proposal to be deleted. To see the proposal names in use, use the ike proposals list com

Strany 279 - REMOTE SETIPTRANSLATE

Chapter 2. Planning for Router Configuration 35ttttDNS Internet Account Information (optional)The Domain Name Service (DNS) maps host names to IP add

Strany 280 - REMOTE SETMAXLINE

350 Chapter 8. Command ReferenceOne of the following:DES Use DES (56-bit) encryption. 3DES Use 3DES (168-bit) encryption (if 3DES is enabled in the ro

Strany 281 - REMOTE SETMINLINE

Chapter 8. Command Reference 351PRESHARE Preshared key.ProposalName Name of the IKE proposal to which the session authentication parameter is added.

Strany 282 - REMOTE SETOURPASSWD

352 Chapter 8. Command ReferenceIPSEC ENABLEEnables a defined IPSec SA entry, indicating it is complete and ready to be used. The command can also re-

Strany 283 - REMOTE SETPHONE

Chapter 8. Command Reference 353 key=012345678901234567890123456789012345678901234567 SHA1 key=abcdefabcdefabcdefabcdefabcdefabcdefabcd (20)No c

Strany 284 - REMOTE SETPROTOCOL

354 Chapter 8. Command Referenceipsec set direction <INBOUND | OUTBOUND> <SAname>One of the following:INBOUNDOUTBOUNDSAname Name of the IP

Strany 285 - REMOTE SETSPEED

Chapter 8. Command Reference 355IPSEC SET IDENTSpecifies the identifier (SPID) for the IPSec tunnel. It must match the SPID at the other end of the t

Strany 286 - REMOTE SETTIMER

356 Appendix A. Network Information WorksheetsAppendix A. Network Information WorksheetsTo configure the target (local) router, fill out the blank wor

Strany 287 - REMOTE STATS

Appendix A. Network Information Worksheets 357Configuring PPP with IP RoutingPPP with IP Routing Steps Commands Your settingsSystem SettingsSystem Nam

Strany 288 - REMOTE STOP

358 Appendix A. Network Information WorksheetsConfiguring PPP with IPX Routing PPP with IPX Routing Steps Commands Your SettingsSystem SettingsSystem

Strany 289 - REMOTE UNBINDIPVIRTUALROUTE

Appendix A. Network Information Worksheets 359Configuring PPP with BridgingPPP with Bridging Steps Commands Your SettingsSystem SettingsSystem Name sy

Strany 290 - ADSL Commands

36 Chapter 2. Planning for Router ConfigurationIPX Routing Network ProtocolttttSystem Names and Authentication PasswordsFor the Target RouterYou defin

Strany 291 - ADSL STATS

360 Appendix A. Network Information WorksheetsConfiguring RFC 1483 / RFC 1490 with IP RoutingRFC 1483 / RFC 1490 with IP Routing Steps Commands Your S

Strany 292 - ATM Commands

Appendix A. Network Information Worksheets 361Configuring RFC 1483 / RFC 1490 with IPX RoutingRFC 1483 / RFC 1490 with IPX Routing Steps Commands Your

Strany 293 - REMOTE SETATMTRAFFIC

362 Appendix A. Network Information WorksheetsConfiguring RFC 1483 / RFC 1490 with BridgingRFC 1483 / RFC 1490 with Bridging Steps Commands Your Setti

Strany 294

Appendix A. Network Information Worksheets 363Configuring RFC 1483MER / RFC 1490MER with IP Routing RFC 1483MER/RFC 1490MER with IP Routing Steps Comm

Strany 295 - DMT Commands

364 Appendix A. Network Information WorksheetsConfiguring FRF8 with IP RoutingRFC 1483FR with IP Routing Steps Commands Your SettingsSystem SettingsSy

Strany 296 - ETH BR OPTIONS

Appendix A. Network Information Worksheets 365Configuring a Dual-Ethernet Router for IP RoutingThis table outlines commands used to configure a Dual-E

Strany 297

366 Appendix B. Configuring IPX RoutingAppendix B. ConÞguring IPX RoutingIPX Routing ConceptsTo establish IPX Routing, you will need to enter all remo

Strany 298 - HDSL Commands

Appendix B. Configuring IPX Routing 367Step 1: Collect Your Network Information for the Target (Local) RouterThe remote side of the WAN link has all o

Strany 299 - HDSL SPEED

368 Appendix B. Configuring IPX RoutingStep 2: Review your SettingsCommands used to review your IPX configuration:Ð eth listÐ remote listÐ ipxsa

Strany 300 - HDSL TERMINAL

369Command IndexSymbols?, 187Aadsl ?, 290adsl restart, 290adsl speed, 290adsl stats, 291arp delete, 188arp list, 189atm ?, 292atm reset, 29

Strany 301 - IDSL Commands

Chapter 2. Planning for Router Configuration 37Internal Network NumberIt is a logical network number that identifies an individual Novell server. It

Strany 302 - REMOTE SETDLCI

370 eth ip delRoute, 235eth ip delServer, 235eth ip directedBcast, 236eth ip disable, 237eth ip enable, 237eth ip filter, 237eth ip firewall,

Strany 303

371ike peers set mode, 347ike peers set peerID, 347ike peers set peerIDtype, 347ike peers set secret, 348ike proposals add, 348ike proposals de

Strany 304 - SDSL Commands

372 remote bindIPVirtualRoute, 260remote blockNetBios, 261remote del, 261remote delATMnsap, 261remote delBridge, 261remote delEncryption, 262re

Strany 305 - SDSL PREACT

373system addUdpRelay, 212system admin, 212system authen, 212system backup add, 213system backup delete, 213system backup disable, 214system b

Strany 306 - SDSL SPEED

374 Topic IndexNumerics3DES encryption, 135IKE proposal command, 141Aaddress translation, 91ADPCM voice encoding, 20ADSL DMT router commands, 295debu

Strany 307 - SDSL TERMINAL

375VRRP, 112configuration files, backup/restore, 162configuration informationDual-Ethernet router, 45FRF8 + IP, 44PPP + IP, 34, 36, 38RFC 1483 + bri

Strany 308 - Example:

376 FRF8, 44GG.Lite DMT link type, 295G_DMT mode setting, 184G_LITE mode setting, 184GUI debug commands, 182Hhistory log, 168host mapping, 95HTTP acc

Strany 309 - DHCP Commands

377Kkernelupgrade from the LAN, 159upgrade from the WAN line, 160keyfile.dat, 115LL2TP, 122commands, 322configurations, 124over IPSec, 135LED fatal

Strany 310 - DHCP BOOTP DISALLOW

378 RFC 1483, 34, 39RFC 1483MER, 42RFC 1490, 34, 39RFC 1490MER, 42RFCs supported, 25RIP packet controls, 81route tracing command, 198router configura

Strany 311 - DHCP CLEAR ADDRESSES

379transport mode, 134troubleshootingbridging, 172console, 170factory configuration, 170hardware problems, 170history log, 168IP routing, 172IPX rou

Strany 312 - DHCP CLEAR VALUEOPTION

38 Chapter 2. Planning for Router ConfigurationBridging Network Protocol ttttSystem Names and Authentication PasswordsFor the Target RouterYou define

Strany 313 - DHCP DELRELAY

Chapter 2. Planning for Router Configuration 39RFC 1483/RFC 1490 Link ProtocolsThe Link Protocol RFC 1483 is a multiprotocol encapsulation method ove

Strany 314 - DHCP LIST

4 IP Filter changes Ñ see eth ip filter, page 237 or remote ipfilter , page 267¥ New -tcp rst parameter allows a filter to match the TCP RES

Strany 315 - DHCP LIST DEFINEDOPTIONS

40 Chapter 2. Planning for Router ConfigurationTCP/IP Ethernet RoutesYou normally do not need to define an Ethernet IP route. An Ethernet IP route con

Strany 316 - Example 1:

Chapter 2. Planning for Router Configuration 41Internal Network NumberThis is a logical network number that identifies an individual Novell server. I

Strany 317 - DHCP SET ADDRESSES

42 Chapter 2. Planning for Router ConfigurationttttDNS Internet Account Information (optional)This information is obtained from the Network Service Pr

Strany 318 - DHCP SET LEASE

Chapter 2. Planning for Router Configuration 43¥ DNS server address¥ DNS second server address¥ DNS domain nameNote: If you intend to only connect to

Strany 319 - Example 3:

44 Chapter 2. Planning for Router ConfigurationFRF8 Link ProtocolThe FRF8 Link Protocol is an encapsulation method that allows an ATM router to intero

Strany 320 - DHCP SET VALUEOPTION

Chapter 2. Planning for Router Configuration 45For the ATM WAN Interface This information is obtained from the Network Administrator or the Network S

Strany 321

46 Chapter 2. Planning for Router ConfigurationConfiguring the Dual-Ethernet Router for IP RoutingThe eth commands are used to configure the Dual-Ethe

Strany 322 - L2TP CALL

Chapter 3. Configuring Router Software 47Chapter 3. ConÞguring Router SoftwareThis chapter covers configuration tables and verifying the router confi

Strany 323 - L2TP FORWARD

48 Chapter 3. Configuring Router SoftwareConÞguration TablesThe following tables give you step-by-step instructions for standard configurations of the

Strany 324 - L2TP SET ADDRESS

Chapter 3. Configuring Router Software 49Configuring PPP with IP Routing This table outlines configuration commands for the PPP Link Protocol with th

Strany 325 - L2TP SET CHAPSECRET

About This Manual This manual contains information on the syntax and use of the Command Line Interface for the family of DSL routers. Configuration o

Strany 326 - L2TP SET OURADDRESS

50 Chapter 3. Configuring Router SoftwareConfiguring PPP with IPX Routing This table outlines configuration commands for the PPP Link Protocol with th

Strany 327 - L2TP SET REMOTENAME

Chapter 3. Configuring Router Software 51Configuring PPP with Bridging This table outlines configuration commands for the PPP Link Protocol with the

Strany 328 - L2TP SET WANIF

52 Chapter 3. Configuring Router SoftwareConfiguring RFC 1483 / RFC 1490 with IP Routing This table outlines configuration commands for the RFC 1483 a

Strany 329 - REMOTE SETL2TPCLIENT

Chapter 3. Configuring Router Software 53Configuring RFC 1483 / RFC 1490 with IPX Routing This table outlines configuration commands for the RFC 1483

Strany 330 - REMOTE SETLNS

54 Chapter 3. Configuring Router SoftwareConfiguring RFC 1483 / RFC 1490 with Bridging This table outlines configuration commands for the RFC 1483 and

Strany 331 - FILTER BR DEL

Chapter 3. Configuring Router Software 55Configuring MAC Encapsulated Routing: RFC 1483MER / RFC 1490MER with IP Routing This table outlines configur

Strany 332 - FILTER BR USE

56 Chapter 3. Configuring Router SoftwareConfiguring FRF8 with IP Routing This table outlines configuration commands for the FRF8 Link Protocol with t

Strany 333 - PPPoE Commands

Chapter 3. Configuring Router Software 57Configuring Mixed Network Protocols Several network protocols can be configured concurrently in the same rou

Strany 334 - PPPOE LIST

58 Chapter 3. Configuring Router SoftwareConfiguring a Dual-Ethernet Router for IP RoutingThis table outlines commands used to configure a Dual-Ethern

Strany 335 - IKE IPSEC POLICIES DISABLE

Chapter 3. Configuring Router Software 59Verify the Router ConÞgurationTest IP RoutingTest IP Routing over the Local Ethernet LAN (from PC) ¥ Use the

Strany 336 - IKE IPSEC POLICIES SET DEST

6 About This Manual Typographic Conventions The following typeface conventions are used in this guide: Typeface Item Examples Italics Book titles, c

Strany 337

60 Chapter 3. Configuring Router SoftwareTest IPX RoutingOne way to test IPX routing is to check for access to servers on the remote LAN. Under Window

Strany 338 - IKE IPSEC POLICIES SET PFS

Chapter 3. Configuring Router Software 61Sample ConÞgurationsSample Configuration 1: PPP with IP and IPX This configuration example comprises:¥ A sce

Strany 339 - IKE IPSEC POLICIES SET SOURCE

62 Chapter 3. Configuring Router SoftwareSample Configuration 1: Diagram for Target Router (SOHO)Small Home Office SOHO (Target/Local Router)

Strany 340

Chapter 3. Configuring Router Software 63Sample Configuration 1: Tables for Target Router (SOHO) SOHO System SettingsConÞguration SectionItem Command

Strany 341 - IKE IPSEC PROPOSALS ADD

64 Chapter 3. Configuring Router SoftwareNote: Fill in one worksheet for each remote router in the remote router database.SOHO Remote Router DatabaseE

Strany 342 - IKE IPSEC PROPOSALS LIST

Chapter 3. Configuring Router Software 65SOHO Remote Router DatabaseEntry: ISPConÞguration SectionItem CommandsRemote RoutersNew Entry Remote RouterÕ

Strany 343

66 Chapter 3. Configuring Router SoftwareSample Configuration 1: Check the Configuration with the LIST CommandsType the following commands to obtain a

Strany 344

Chapter 3. Configuring Router Software 67 IPX network number... 00000000 Total IPX remote routes... 0 Total IPX SAPs...

Strany 345 - IKE PEERS LIST

68 Chapter 3. Configuring Router SoftwareInformation About Names and Passwords for Sample Configuration 1In this configuration example, the PPP Link P

Strany 346 - IKE PEERS SET LOCALIDTYPE

Chapter 3. Configuring Router Software 69Sample Configuration 2: RFC 1483 with IP and Bridging This configuration example comprises:¥ A scenario desc

Strany 347 - IKE PEERS SET PEERIDTYPE

7 Table of Contents WhatÕs New in This Release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 348 - IKE PROPOSALS DELETE

70 Chapter 3. Configuring Router SoftwareSample Configuration 2: Diagram for Target Router SOHOSmall Home Office SOHO (Target Router)

Strany 349 - IKE PROPOSALS SET ENCRYPTION

Chapter 3. Configuring Router Software 71Sample Configuration 2: Tables for Target Router (SOHO) SOHO System SettingsConÞguration Section Item Comman

Strany 350 - IKE PROPOSALS SET LIFETIME

72 Chapter 3. Configuring Router SoftwareSOHO Remote Router DatabaseEntry: ISPConÞguration SectionItem CommandsRemote RoutersNew Entry Remote RouterÕs

Strany 351

Chapter 3. Configuring Router Software 73Sample Configuration 2: Check the Configuration with the LIST Commandssystem listGENERAL INFORMATION FOR <

Strany 352 - IPSEC LIST

74 Chapter 3. Configuring Router Software Compression Negotiation... off Source IP address/subnet mask... 192.168.200.20/255.255.255

Strany 353 - IPSEC SET DIRECTION

Chapter 3. Configuring Router Software 75Sample Configuration 3: Configuring a Dual-Ethernet Router for IP RoutingScenario:The following example prov

Strany 354 - IPSEC SET GATEWAY

76 Chapter 4. Configuring Special FeaturesChapter 4. ConÞguring Special FeaturesThe features described in this chapter are advanced topics. They are p

Strany 355 - IPSEC SET SERVICE

Chapter 4. Configuring Special Features 77Multiple IP SubnetsYou may configure the router to provide access to multiple IP subnets on the Ethernet net

Strany 356

78 Chapter 4. Configuring Special FeaturesVirtual Routing TablesThe virtual routing feature allows you to define multiple routing tables. This is also

Strany 357 - PPP with IP Routing

Chapter 4. Configuring Special Features 79Bridge Filtering and IP Firewall You can control the flow of packets across the router using bridge filterin

Strany 358 - PPP with IPX Routing

8Configuration Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Strany 359 - Configuring PPP with Bridging

80 Chapter 4. Configuring Special FeaturesEnable/Disable Internet Firewall FilteringThe router supports IP Internet Firewall Filtering to prevent unau

Strany 360

Chapter 4. Configuring Special Features 81IP (RIP) Protocol ControlsYou can configure the router to send and receive RIP packet information, respectiv

Strany 361 - (for Frame Relay Routers)

82 Chapter 4. Configuring Special FeaturesDHCP (Dynamic Host ConÞguration Protocol)The router supports DHCP and can act as the DHCP server. (The route

Strany 362

Chapter 4. Configuring Special Features 83DHCP Administration and ConfigurationThe DHCP administration and configuration process is divided into the f

Strany 363

84 Chapter 4. Configuring Special Featuresdhcp add <net> <mask>To remove a subnetwork, use:dhcp del <net> Note: All client leases as

Strany 364 - RFC 1483FR with IP Routing

Chapter 4. Configuring Special Features 85Caution: If <ipaddr> is a subnet, you will delete the entire subnet.Setting the Lease Time¥ ConceptsTh

Strany 365

86 Chapter 4. Configuring Special FeaturesWarning: The client will not be aware that the administrator has changed or released a client lease!To chang

Strany 366 - ConÞgure IPX Routing

Chapter 4. Configuring Special Features 87To clear the value for a global option, use:dhcp clear valueoption <code>Example:To set the global val

Strany 367 - Ex: 00:00:00:00:00:01

88 Chapter 4. Configuring Special FeaturesNote: By default, the DHCP server does not satisfy BootP requests unless the administrator has explicitly en

Strany 368 - Step 2: Review your Settings

Chapter 4. Configuring Special Features 89Example 6:To clear the subnet 192.168.254.0 server IP address and file name:dhcp bootp tftpserver 192.168.25

Strany 369 - Command Index

9Dial Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 370

90 Chapter 4. Configuring Special FeaturesExample: To define a new option with a code of 128, a minimum number of IP addresses of 1, a maximum number

Strany 371

Chapter 4. Configuring Special Features 91Network Address Translation (NAT)The router supports both of the following NAT techniques:Classic NAT One NA

Strany 372

92 Chapter 4. Configuring Special FeaturesTo enable NAT for an Ethernet interface, use the commands:eth ip translate on <interface>saveThe save

Strany 373

Chapter 4. Configuring Special Features 93Remember to type save to make the changes persistent across reboots.Example 1:Assume that the local LAN netw

Strany 374 - Topic Index

94 Chapter 4. Configuring Special FeaturesNot enough memory was available to create an entry. This condition should not ordinarily occur because the a

Strany 375

Chapter 4. Configuring Special Features 95Classic NAT With classic NAT, one PC IP address is translated to one NAT IP address. This NAT technique is p

Strany 376

96 Chapter 4. Configuring Special Features¥ Multiple-Host Remapping EntriesUsers may enter as many host remapping entries as they wish.Example:remote

Strany 377

Chapter 4. Configuring Special Features 97PPPoE (PPP over Ethernet)PPPoE is a method of delivering PPP sessions over an Ethernet LAN connected to a DS

Strany 378

98 Chapter 4. Configuring Special Featuresremote setBrOptions stp off <remoteName> In addition, if the remote entry should be used only for

Strany 379

Chapter 4. Configuring Special Features 99To set up a timeout, set the minline value to 0 and specify the timeout period in seconds, as follows:remote

Komentáře k této Příručce

Žádné komentáře