Efficient Networks Router family Command line interface Spezifikationen

Stöbern Sie online oder laden Sie Spezifikationen nach Vernetzung Efficient Networks Router family Command line interface herunter. Efficient Networks Router family Command line interface Product specifications Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 366
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - 5RXWHU)DPLO\

Part No. 107-0002-000(IILFLHQW1HWZRUNV5RXWHU)DPLO\7HFKQLF DO5HIHUHQFH*XLGH

Seite 2 - Efficient Networks

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide10 Efficient Networks®Sample VRRP Configuration. . . . . . . . . .

Seite 3

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-16 Efficient Networks®Relaying BootP RequestsThe DHCP re

Seite 4

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-17Network Address Translation (NAT)Net

Seite 5

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-18 Efficient Networks®Masquerading With masquerading, mu

Seite 6

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-19NOTE:ww.xx.yy.zz is the IP address t

Seite 7

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-20 Efficient Networks®-> remote addserver 192.168.1.2

Seite 8

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-21The second command gets an error due

Seite 9

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-22 Efficient Networks®Server Request HierarchyAs shown e

Seite 10 - Contents

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-23Classic NATWith classic NAT, one PC

Seite 11

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-24 Efficient Networks®IP Address RangeThe range of local

Seite 12

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-25Range Overlap Rules• The per-interfa

Seite 13 - INTRODUCTION

Efficient Networks®11ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsAccessibility . . . . . . . . . . . . . . . .

Seite 14 - Document Conventions

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-26 Efficient Networks®system selnat addpolicy <remote

Seite 15

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-27Viewing PoliciesThe policy listing i

Seite 16 - Page 1-4 Efficient Networks

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-28 Efficient Networks®-> system addserver <ipaddr&

Seite 17 - WMI Web Management Interface

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-29Key Enabled FeaturesThe router has s

Seite 18 - Page 1-6 Efficient Networks

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-30 Efficient Networks®NOTE:Feature keys are generated fo

Seite 19 - PRODUCT OVERVIEW

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-31Key RulesThe following rules apply w

Seite 20 - WAN Interfaces

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-32 Efficient Networks®Listing the Installed Feature Keys

Seite 21

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-33Feature StatusThe current feature st

Seite 22 - Virtual Connections

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-34 Efficient Networks®Spanning TreeThe Spanning Tree alg

Seite 23 - Bridging

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-35It does the following major tasks:•

Seite 24 - Page 2-6 Efficient Networks

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide12 Efficient Networks®Secure Shell (SSH) Configuration List Page.

Seite 25

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-36 Efficient Networks®Manual Boot ModeWhen the router is

Seite 26 - System Interoperability

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-37Option 2: Boot from Flash MemorySele

Seite 27 - Protocol Conformance

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-38 Efficient Networks®The boot IP address is the router

Seite 28 - IPX Routing

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-393. Select option 4 to Boot through t

Seite 29 - Encapsulation Options

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-40 Efficient Networks®The debugging mode (option #) is a

Seite 30 - Page 2-12 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-41The error patterns are listed in the

Seite 31 - INSTALLATION AND SETUP

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-42 Efficient Networks®Routers with Six LEDsIf your route

Seite 32 - Local Router

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-43Software Kernel UpgradesYou can upgr

Seite 33 - IP Routing Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-44 Efficient Networks®CAUTION:Warning: Before performing

Seite 34 - Page 3-4 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-45Step 7 When you are satisfied that t

Seite 35

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-1CHAPTER 1CHAPTER 1 INTRODUCTIONThis man

Seite 36 - IPX Routing Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-46 Efficient Networks®-> copy [email protected]:sf

Seite 37

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-47Differentiated Services Framework (D

Seite 38 - Bridging Network Protocol

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-48 Efficient Networks®QoS Deployment ExampleTo understan

Seite 39

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-49bandwidth beyond the 50% minimum wil

Seite 40

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-50 Efficient Networks®PoliciesQoS policies are created t

Seite 41

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-51qos set -sa 192.168.1.5 192.168.1.12

Seite 42 - MAC Encapsulated Routing

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-52 Efficient Networks®-du <duration> <hh:mm>

Seite 43

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-53Deleting PoliciesPolicies can be del

Seite 44 - Configuring Your Computer

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-54 Efficient Networks®Misc. Administrative FunctionsThe

Seite 45 - Windows 98

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-1CHAPTER 5CHAPTER 5 SYSTEM SECURITYT

Seite 46 - Step6 Click OK

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-2 Efficient Networks®Document ConventionsTable explains the s

Seite 47 - Windows NT 4

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-2 Efficient Networks®User AuthenticationUser authenticatio

Seite 48

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-3There are two methods for creating a us

Seite 49 - Windows 2000

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-4 Efficient Networks®Access to system operation can be fur

Seite 50 - Step5 Click Properties

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-5Access: WAN, LAN, ConsoleStatus: Enable

Seite 51 - Step 7 Click OK

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-6 Efficient Networks®Initial (Default) SettingWhen the rou

Seite 52 - Windows ME

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-7-> user set lookup radius Subsequent

Seite 53

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-8 Efficient Networks®Managing User AccountsThe following s

Seite 54 - Windows XP

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-9-> user set password myname newsecre

Seite 55 - Step 5 Click Properties

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-10 Efficient Networks®Changing account accessThe Access Pr

Seite 56 - Mac OS 9.x

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-11Once the RADIUS server receives the re

Seite 57

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-3BER Basic Encoding Rules or Bit Error Rate

Seite 58 - Mac OS X

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-12 Efficient Networks®Server Information ConfigurationFor

Seite 59

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-13Radius Server ConfigurationWhile vendo

Seite 60 - Page 3-30 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-14 Efficient Networks®Serial-Console Port0x00010000 Serial

Seite 61

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-15Controlling Remote ManagementSeveral m

Seite 62 - Installation

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-16 Efficient Networks®-> system snmpport default2->

Seite 63

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-17Restricting Remote AccessTo allow remo

Seite 64 - Establishing a Connection

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-18 Efficient Networks®Disabling WAN ManagementYou can allo

Seite 65

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-19The following command is used to enabl

Seite 66 - Terminal Sessions

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-20 Efficient Networks®PAP/CHAP Security AuthenticationThe

Seite 67

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-21During link negotiation (LCP), each si

Seite 68

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-4 Efficient Networks®LOP Loss of Pointer (UNI Fault Managemen

Seite 69

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-22 Efficient Networks®PAP AuthenticationFor PAP, when a PA

Seite 70 - Configuring the Router

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-23Authentication LevelsThe router also u

Seite 71 - Configuration Tables

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-24 Efficient Networks®Receive FiltersThe router next compa

Seite 72

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-25Output FiltersFinally, the router comp

Seite 73

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-26 Efficient Networks®Filter ExamplesExample 1: Input Filt

Seite 74

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-27-> remote ipfilter append input acc

Seite 75 - Configuring PPP with Bridging

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-28 Efficient Networks®eth ip filter flush inputeth ip filt

Seite 76

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-29Example 4: Medium Security FirewallThe

Seite 77

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-30 Efficient Networks®# E-mail - SMTP and POP3 requests fr

Seite 78

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-31# SSL acceptedremote ipfilter insert i

Seite 79

Efficient Networks® Router familyTechnical Reference GuideChapter 1: IntroductionEfficient Networks®Page 1-5VPCI Virtual Path Connection IdentifierVPI

Seite 80

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-32 Efficient Networks®# NNTP tcpremote ipfilter insert out

Seite 81 - Test IP Routing

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-33# Turn on ip filter watch for debuggin

Seite 82 - Test IPX Routing

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-34 Efficient Networks®Stateful FirewallThe Built-in Firewa

Seite 83

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-35command - This parameter defines the l

Seite 84 - Page 3-54 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-36 Efficient Networks®Application --a imap | telnet | boot

Seite 85 - SYSTEM MANAGEMENT

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-37message logging - Specify one of these

Seite 86 - DHCP Address Allocation

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-38 Efficient Networks®• The order in which the rules are e

Seite 87 - DHCP Client Requests

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-39Rule ModificationTo modify a previousl

Seite 88 - Adding a Subnetwork

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-40 Efficient Networks®Port Information - When port informa

Seite 89

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-41Message Logging - Modifies the message

Seite 90 - Setting the Lease Time

Chapter 1: Introduction Efficient Networks® Router familyTechnical Reference GuidePage 1-6 Efficient Networks®This page intentionally left blank.

Seite 91

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-42 Efficient Networks®The information displayed includes:•

Seite 92 - Setting Option Values

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-43The firewall shall, by default, drop a

Seite 93

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-44 Efficient Networks®UDP Flood AttackSimilar to ICMP floo

Seite 94 - Enable/Disable BootP

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-45Finger BombIn this attack, an intruder

Seite 95

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-46 Efficient Networks®EncryptionEncryption is a key-enable

Seite 96 - Commands

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-47Sample ConfigurationSuppose that the r

Seite 97 - -> dhcp del 128

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-48 Efficient Networks®Observe the following guidelines:• S

Seite 98 - -> dhcp clear all records

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-49File Format for the Diffie-Hellman Num

Seite 99 - BootP Service

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-50 Efficient Networks®IPSec (Internet Protocol Security)IP

Seite 100 - Relaying BootP Requests

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-51The router supports both IPSec encapsu

Seite 101 - General NAT Rules

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-1CHAPTER 2CHAPTER 2 PRODUCT OVERVIEW

Seite 102 - Client Configuration

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-52 Efficient Networks®If ESP encryption is selected, ESP a

Seite 103 - Server Configuration

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-53Because VPN users are likely to be usi

Seite 104 - Failed to add server

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-54 Efficient Networks®Main Mode and Aggressive ModeThe rou

Seite 105

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-55Additional IKE SettingsIn addition to

Seite 106 - Server Request Hierarchy

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-56 Efficient Networks®The session initiator creates a cook

Seite 107 - Host Remapping

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-57The following commands define the peer

Seite 108 - Page 4-24 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-58 Efficient Networks®IKE Proposal CommandsThe IKE proposa

Seite 109 - Creating Policies

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-59Defines the name of a new IKE IPSec pr

Seite 110 - Page 4-26 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-60 Efficient Networks®-> ike ipsec proposals set espaut

Seite 111 - NetMeeting (H.323) with NAT

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-61IKE IPSec Policy CommandsThe IKE IPSec

Seite 113 - Key Enabled Features

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-2 Efficient Networks®WAN InterfacesRouters are available

Seite 114 - Page 4-30 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-62 Efficient Networks®Requires that the data come from the

Seite 115 - Key Rules

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-63Main Mode ExampleThe following example

Seite 116 - -> key list -l

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-64 Efficient Networks®# Describe the branch office IKE pha

Seite 117 - Feature Revocation

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-65# Branch office example using IKE# Hom

Seite 118 - Boot Code Options

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-66 Efficient Networks®ike ipsec policies add home_policyik

Seite 119

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-67#Describe the branch office peer#IKE a

Seite 120 - Option 1: Retry Start-Up

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-68 Efficient Networks®IPSec CommandsThe following commands

Seite 121 - Option 3: Boot from Network

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-69-> ipsec set authentication <sha

Seite 122 - Page 4-38 Efficient Networks

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-70 Efficient Networks®SSHSecure Shell (SSH) is a key-enabl

Seite 123 - Option 6: Set Time and Date

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-71Another perspective of the SSH protoco

Seite 124 - Routers with Four LEDs

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-3IDSLIDSL (ISDN DSL) A hybrid of ISDN a

Seite 125

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-72 Efficient Networks®Once the secure session has been est

Seite 126 - Routers with Six LEDs

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-73SSH SessionsFor SSH to be operational,

Seite 127 - Software Kernel Upgrades

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-74 Efficient Networks®• Key pairs can also be generated wi

Seite 128 - CAUTION:

Efficient Networks® Router familyTechnical Reference GuideChapter 5: System SecurityEfficient Networks®Page 5-75BlowfishBlowfish is a block cipher tha

Seite 129 - Upgrading from the WAN

Chapter 5: System Security Efficient Networks® Router familyTechnical Reference GuidePage 5-76 Efficient Networks®Configure Bridge FilteringBridge fil

Seite 130 - Task Complete

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-1CHAPTER 6CHAPTER 6 CONNECTI

Seite 131

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-2 Efficient Networks®NOTE:When you stop or restar

Seite 132 - QoS Deployment Example

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-3The address ranges assigned to

Seite 133 - -> qos off

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-4 Efficient Networks®RIP ControlsThe Routing Info

Seite 134 - Policy Parameters

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-5The available RIP options on t

Seite 135

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-4 Efficient Networks®Virtual ConnectionsThe router’s wide

Seite 136 - Moving Policies

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-6 Efficient Networks®ARPARP is a low-level protoc

Seite 137 - -> qos del all

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-7Dial BackupThe Dial Backup cap

Seite 138 - -> time <hh:mm:ss>

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-8 Efficient Networks®To set a restriction for an

Seite 139 - SYSTEM SECURITY

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-9Optionally, Dial Backup can ac

Seite 140 - User Authentication

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-10 Efficient Networks®# Specify the primary phone

Seite 141 - Management Classes

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-11Setting DSL Link ConditionsAf

Seite 142 - Templates

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-12 Efficient Networks®The default retry period is

Seite 143

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-13To clear the ping list of all

Seite 144 - Procedures

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-14 Efficient Networks®During the ping test, every

Seite 145 - -> user list lookup

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-15Dial SettingThe string for th

Seite 146 - *********"

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-5Routing offers advantages over bridgin

Seite 147 - -> user disable myname

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-16 Efficient Networks®VRRP BackupWhen a router is

Seite 148 - Changing account access

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-17IP AddressEvery logical inter

Seite 149 - -> rad list secret

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-18 Efficient Networks®A VRID has these characteri

Seite 150 - Server Retries Timer

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-19Defining VRRP AttributesEach

Seite 151 - Radius Server Configuration

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-20 Efficient Networks®Time Interval Attribute (de

Seite 152

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-21NOTE:Our implementation does

Seite 153 - Controlling Remote Management

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-22 Efficient Networks®Disabling or Deleting VRRPT

Seite 154 - Example:

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-23Sample VRRP ConfigurationThe

Seite 155 - Restricting Remote Access

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-24 Efficient Networks®eth ip vrid 7## A VRRP attr

Seite 156 - -> reboot

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-25# In this example, the VRRP i

Seite 157

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-6 Efficient Networks®Bridging has these capabilities:• Al

Seite 158 - Authentication Process

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-26 Efficient Networks®L2TP Tunneling - Virtual Di

Seite 159 - CHAP Authentication

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-27L2TP Concepts This section de

Seite 160 - Authentication Passwords

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-28 Efficient Networks®Tunnels• Tunnels are virtu

Seite 161 - IP Filtering

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-29A tunnel session automaticall

Seite 162 - Transmit Filters

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-30 Efficient Networks®Step 2 Try to establish IP

Seite 163 - ICMP Redirect

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-31NOTE:Verify that the IP addre

Seite 164 - Filter Examples

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-32 Efficient Networks®AssumptionsIn this example,

Seite 165 - Built-in Firewall Filters

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-333. Shared_Secret 4. 10.0.0.1L

Seite 166 - Page 5-28 Efficient Networks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-34 Efficient Networks®4. Does the remote router d

Seite 167

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-35Complete LNS and L2TP Client

Seite 168 - Page 5-30 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-7When to Use Routing or Bridging or Bot

Seite 169

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-36 Efficient Networks®Configuration ProcessThe fo

Seite 170 - Page 5-32 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-37Set up ISDN parameters:isdn s

Seite 171

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-38 Efficient Networks®eth ip enable eth ip addr 1

Seite 172 - Stateful Firewall

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-39Set up ISDN parameters:isdn s

Seite 173

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-40 Efficient Networks®remote add internet remote

Seite 174 - Page 5-36 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-41PPPoE (PPP over Ethernet)PPPo

Seite 175 - 64.12.11.1 -d out

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-42 Efficient Networks®In addition, if the remote

Seite 176 - Deleting Firewall Rules

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-43If your service provider char

Seite 177 - Rule Modification

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-44 Efficient Networks®## Enable bridging through

Seite 178 - Page 5-40 Efficient Networks

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-45# ---------------------------

Seite 179 - Viewing Dropped Packets

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-8 Efficient Networks®Routing and Bridging ControlsThe rou

Seite 180 - Denial of Service Attacks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-46 Efficient Networks® Flags ...

Seite 181 - ICMP Flood Attack

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-47Transport (Layer-2) VPNsVirtu

Seite 182 - Tiny Packet Attack

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-48 Efficient Networks®Network (Layer-3) VPNsTunne

Seite 183 - Ping Flood

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-49Technology StandardsIPSecThis

Seite 184 - Encryption

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-50 Efficient Networks®Tunnel ServerFunctionThe L2

Seite 185 - Configuration Commands

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-51LocationThis software is inst

Seite 186

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-52 Efficient Networks®Workstation Client to LAN S

Seite 187

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-53Types of VPNs usedBoth ATM PV

Seite 188 - Page 5-50 Efficient Networks

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-54 Efficient Networks®DES Encryption with Dynamic

Seite 189 - Device or

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-55Step 1: Configure Both Router

Seite 190 - IKE Management

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-9The router supports the following WAN

Seite 191 - Phase 2 IKE:

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-56 Efficient Networks®NOTE:You cannot ping the tu

Seite 192 - Phase 1 IKE — Main Mode:

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-57Set LAC and/or LNS. In this c

Seite 193 - Security Associations (SAs)

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-58 Efficient Networks®Define the name of our tunn

Seite 194 - -> ike peers list

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-59Add an IP route to the LAN on

Seite 195

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-60 Efficient Networks®

Seite 196 - IKE IPSec Proposal Commands

Efficient Networks® Router familyCommand Line Interface GuideChapter 6: Connection ManagementEfficient Networks®Page 6-61VPN with IP Filtering and MS

Seite 197 - <proposalname>

Chapter 6: Connection Management Efficient Networks® Router familyCommand Line Interface GuidePage 6-62 Efficient Networks®This page intentionally lef

Seite 198 - Page 5-60 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-1CHAPTER 7CHAPTER 7 MON

Seite 199 - IKE IPSec Policy Commands

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-2 Efficient Networks®SNMPThe Simple Network

Seite 200 - IKE Configuration Examples

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-3Trap GenerationSNMP agent

Seite 201 - Main Mode Example

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-10 Efficient Networks®IP RoutingIP routing support, in co

Seite 202 - Page 5-64 Efficient Networks

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-4 Efficient Networks®Configuring SNMPThe rou

Seite 203 - ″ThisIsASecret12345;)″

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-5Sets the SNMP password.-&

Seite 204 - (No fixed IP address)

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-6 Efficient Networks®TroubleshootingSoftware

Seite 205

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-7LEDs in Ready StateOnce t

Seite 206 - IPSec Commands

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-8 Efficient Networks®History LogThe History

Seite 207

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-9If the terminal window di

Seite 208 - SSH Protocol

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-10 Efficient Networks®Connection ProblemsIf

Seite 209 - Version Identification

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-11Remote Network Access Pr

Seite 210 - Requests (commands)

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-12 Efficient Networks®TCP/IP Routing• Check

Seite 211 - -> ssh keygen

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-13IPX Routing• Check that

Seite 212 - Encryption Options

Efficient Networks® Router familyTechnical Reference GuideChapter 2: Product OverviewEfficient Networks®Page 2-11Encapsulation OptionsThis section des

Seite 213 - Bridge Filtering

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-14 Efficient Networks®Telnet Access Problems

Seite 214 - Configure Bridge Filtering

Efficient Networks® Router familyTechnical Reference GuideChapter 7: Monitoring System PerformanceEfficient Networks®Page 7-15If you hear clicking dur

Seite 215 - -> eth restart

Chapter 7: Monitoring System Performance Efficient Networks® Router familyTechnical Reference GuidePage 7-16 Efficient Networks®remote setauthen chap

Seite 216 - -> eth ip options

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-1CHAPTER 8CHAPTER 8 WEB MANA

Seite 217 - Managing Routes

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-2 Efficient Networks®Radio Button Radio buttons a

Seite 218 - RIP Controls

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-3Router Information PageThe prim

Seite 219 - -> eth list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-4 Efficient Networks®Easy SetupThe Easy Setup scre

Seite 220

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-5On the Protocol Selection page

Seite 221 - Dial Backup

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-6 Efficient Networks®Point-to-Point Protocol over

Seite 222 - Configuring Dial Backup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-7If IP Routing enabled is select

Seite 223

 Copyright 2002, Efficient Networks, Inc.All rights reserved. Printed in the U.S.A.Efficient Networks and SpeedStream are registered trademarks, and

Seite 224 - ISDN Phone Numbers

Chapter 2: Product Overview Efficient Networks® Router familyTechnical Reference GuidePage 2-12 Efficient Networks®RFC 1483 or RFC 1490BridgingUser da

Seite 225 - -> system list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-8 Efficient Networks®Step2 Enter the PPPoE Service

Seite 226 - Addresses to Ping

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-9A PPP Username and password are

Seite 227

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-10 Efficient Networks®RFC 1483 NetworkingSelection

Seite 228 -

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-11Selection of this option will

Seite 229 - Dial Setting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-12 Efficient Networks®RFC 1483 MAC Encapsulated Ro

Seite 230 - VRRP Backup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-13Step2 Optional, click to selec

Seite 231 - -> eth ip vrid 7 0:1

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-14 Efficient Networks®Dynamic Host Configuration P

Seite 232 - -> eth list 0:1

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-15Selection of manual DNS config

Seite 233 - -> eth vrrp list

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-16 Efficient Networks®Local Area Network Configura

Seite 234 - Page 6-20 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-17User ManagementThe User Manage

Seite 235 - Starting VRRP

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-1CHAPTER 3CHAPTER 3 INSTALLATI

Seite 236 - Disabling or Deleting VRRP

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-18 Efficient Networks®Adding A User AccountTo add

Seite 237 - Internet

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-19Privileges can be configured i

Seite 238 - Page 6-24 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-20 Efficient Networks®The Add/Modify User page is

Seite 239

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-21Privileges can be configured i

Seite 240 - Advantages of Tunneling

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-22 Efficient Networks®User Lookup ConfigurationThe

Seite 241 - L2TP Client Illustration

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-23Secure Mode ConfigurationSecur

Seite 242 - LAN/server

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-24 Efficient Networks®Change PasswordThe Change Pa

Seite 243

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-25Access Control FormThe Access

Seite 244 - Commands to configure tunnels

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-26 Efficient Networks®ExamplesThe following exampl

Seite 245 - Sample Configurations

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-27Key Enabled Feature List PageT

Seite 246 - Page 6-32 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-2 Efficient Networks®Remote RoutersThroughout this

Seite 247

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-28 Efficient Networks®Add Feature PageThe Add Feat

Seite 248 - Page 6-34 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-29Delete Feature PageThe Delete

Seite 249

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-30 Efficient Networks®Update Feature PageSome feat

Seite 250 - (ISDN)

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-31Feature Enabled/Disable PageWh

Seite 251

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-32 Efficient Networks®Revoke Feature PageIf a feat

Seite 252 - Page 6-38 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-33Unrevoke Feature PageThe Unrev

Seite 253

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-34 Efficient Networks®Router Clock PageThis functi

Seite 254 - Define the actual tunnel:

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-35DCHP ConfigurationDHCP is a TC

Seite 255 - PPPoE (PPP over Ethernet)

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-36 Efficient Networks®To re-configure the current

Seite 256 - PPPoE Client

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-37NOTE:The last IP address must

Seite 257

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-3Protocols to be UsedThe informat

Seite 258 - Page 6-44 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-38 Efficient Networks®NATNetwork Address Translati

Seite 259 - Managing PPPoE Sessions

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-39Inbound NAT SettingThis sectio

Seite 260 - Flags ... 1

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-40 Efficient Networks®Advanced SetupThe Advanced S

Seite 261 - ATM or Frame Relay transport

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-41SNMPSimple Network Management

Seite 262 - Tunneling

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-42 Efficient Networks®To configure SNMP, perform t

Seite 263 - DES Encryption

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-43SNMP IP Filter PageThe SNMP IP

Seite 264 - Page 6-50 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-44 Efficient Networks®To delete a filter, perform

Seite 265 - Types of VPNs used

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-45SSHSecure Shell (SSH) allows s

Seite 266 - LAN client to LAN server

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-46 Efficient Networks®Secure Shell Configuration p

Seite 267 - Secure VPN Option

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-47SSH ConfigurationTo change the

Seite 268 - Page 6-54 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-4 Efficient Networks®• For Remote Routers:Although

Seite 269

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-48 Efficient Networks®SSH KeysDiffie-Hellman is th

Seite 270 - Page 6-56 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-49Key UploadTo load the key pair

Seite 271

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-50 Efficient Networks®Firewall ScriptsYour router

Seite 272 - Page 6-58 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-51CAUTION:All network security e

Seite 273

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-52 Efficient Networks®QoSQoS is a key enabled feat

Seite 274 - Page 6-60 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-53To change the current settings

Seite 275

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-54 Efficient Networks®QoS Policy Configuration pag

Seite 276 - Page 6-62 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-55QoS Policy ParametersThe follo

Seite 277 - PERFORMANCE

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-56 Efficient Networks®The following configuration

Seite 278

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-57Step3 In the field provided, s

Seite 279 - Trap Generation

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-5NOTE:An Ethernet route is usuall

Seite 280 - Configuring SNMP

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-58 Efficient Networks®QoS Policy CreationTo create

Seite 281

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-59Qos Policy ModificationTo modi

Seite 282 - Troubleshooting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-60 Efficient Networks®Stateful FirewallAn IP filte

Seite 283

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-61To change the current settings

Seite 284 - Step 3 Click Connect

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-62 Efficient Networks®Dropped Packet PageThe Dropp

Seite 285

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-63Firewall Rule Configuration pa

Seite 286

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-64 Efficient Networks®Address - These parameters d

Seite 287

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-65To delete a single rule or ran

Seite 288 - Page 7-12 Efficient Networks

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-66 Efficient Networks®Firewall Rule CreationTo cre

Seite 289

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-67Firewall Rule ModificationTo m

Seite 290 - Software Download Problems

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-6 Efficient Networks®IPX Routing Network ProtocolSy

Seite 291 - L2TP Tunnel Troubleshooting

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-68 Efficient Networks®Dial BackupDial Backup, when

Seite 292 - Page 7-16 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-69Step7 Enter the Reset DSL Time

Seite 293 - WEB MANAGEMENT INTERFACE

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage8-70 Efficient Networks®Step3 Click the Home link to

Seite 294

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page8-71Command Line InterfaceCommand

Seite 295 - Router Information Page

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-72 Efficient Networks®Web Management Interface Pr

Seite 296 - Easy Setup

Efficient Networks® Router familyTechnical Reference GuideChapter 8: WEB Management InterfaceEfficient Networks®Page 8-73tools/dhcp.html Data - Read D

Seite 297

Chapter 8: WEB Management Interface Efficient Networks® Router familyTechnical Reference GuidePage 8-74 Efficient Networks®tools/loopGround.html Voice

Seite 298 - Page8-6 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-7You need the following informati

Seite 299

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-8 Efficient Networks®Bridging Network ProtocolTo co

Seite 300 - Page8-8 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-9DNS Internet Account Information

Seite 301

B. After receiving an RMA, the end user shall ship the product or defective component, including power supplies and cable, where applicable, freight o

Seite 302 - RFC 1483 Networking

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-10 Efficient Networks®IP Routing Entries• For the E

Seite 303

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-11DLCI number (for RFC 1490)The D

Seite 304 - Page8-12 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-12 Efficient Networks®Bridging Network ProtocolTo c

Seite 305

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-13If you are connecting to multip

Seite 306 - Page8-14 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-14 Efficient Networks®If NAT is not enabled, you ma

Seite 307

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-15Microsoft WindowsWindows 98Step1

Seite 308 - Step3 Click Save and Reboot

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-16 Efficient Networks®Step6 Click OK.Step7 Click OK

Seite 309 - User Management

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-17Windows NT 4Step1 On your deskto

Seite 310 - Adding A User Account

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-18 Efficient Networks®Step6 Click OK.Step7 Click OK

Seite 311 - Editing A User Account

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page3-19Windows 2000Step1 On your deskto

Seite 312

Efficient Networks® Router familyTechnical Reference GuideTable of ContentsContentsEfficient Networks®51 Introduction. . . . . . . . . . . . . . . .

Seite 313

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage3-20 Efficient Networks®Step5 Click Properties.Step6

Seite 314

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-21Step 7 Click OK.Step 8 Click OK

Seite 315

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-22 Efficient Networks®Windows MEStep 1 On your desk

Seite 316

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-23Step 6 Under the IP Address tab

Seite 317 - Access Control Form

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-24 Efficient Networks®Windows XPStep 1 On your desk

Seite 318 - Feature Activation

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-25Step 4 The Local Area Connectio

Seite 319 - Key Enabled Feature List Page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-26 Efficient Networks®Apple MacintoshTo configure T

Seite 320

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-27Step 2 The TCP/IP control panel

Seite 321 - Step2 Click Apply

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-28 Efficient Networks®Mac OS XStep 1 Under the Appl

Seite 322

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-29Step 3 The Network window shoul

Seite 323 - Step3 Click Apply

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide6 Efficient Networks®PPP Link Protocol (over ATM or Frame Relay)

Seite 324

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-30 Efficient Networks®LinuxStep 1 From a terminal w

Seite 325

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-31Step 3 When settings are comple

Seite 326 - Router Clock Page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-32 Efficient Networks®InstallationVerify the Packag

Seite 327 - DCHP Configuration

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-33Step 5 Connect the AC power ada

Seite 328 - Page8-36 Efficient Networks

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-34 Efficient Networks®Establishing a Connection To

Seite 329

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-35Step 2 Restart the PC and power

Seite 330

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-36 Efficient Networks®Terminal SessionsThe router s

Seite 331

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-37Step 4 In the Com 1 (or 2) Prop

Seite 332 - Advanced Setup

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-38 Efficient Networks®Terminal Session for Macintos

Seite 333 - SNMP Configuration Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-39Telnet Session for Remote Acces

Seite 334 - Page8-42 Efficient Networks

Efficient Networks®7ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsBootP Service . . . . . . . . . . . . . . . .

Seite 335 - Step2 Click Add IP Range

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-40 Efficient Networks®Configuring the RouterHaving

Seite 336 - SNMP Password Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-41Configuration TablesThe followi

Seite 337

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-42 Efficient Networks®Configuring PPP with IP Routi

Seite 338 - Page8-46 Efficient Networks

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-43Configuring PPP with IPX Routin

Seite 339 - SSH Configuration

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-44 Efficient Networks®Remote RoutersNew Entry Enter

Seite 340

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-45Configuring PPP with BridgingTh

Seite 341

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-46 Efficient Networks®Configuring RFC 1483 / RFC 14

Seite 342 - Firewall Scripts

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-47Link Protocol/DLCIb(for Frame R

Seite 343

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-48 Efficient Networks®Configuring RFC 1483 / RFC 14

Seite 344 - QoS Configuration Page

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-49Configuring RFC 1483 / RFC 1490

Seite 345 - Step4 Click Apply

ContentsTable of Contents Efficient Networks® Router familyTechnical Reference Guide8 Efficient Networks®Client-Server Security . . . . . . . . . . .

Seite 346 - QoS Policy Configuration page

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-50 Efficient Networks®Configuring RFC 1483MER / RFC

Seite 347 - QoS Policy Deletion

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-51Verify the Router Configuration

Seite 348 - Step3 Select a delete option

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-52 Efficient Networks®Test IP Routing to a Remote D

Seite 349

Efficient Networks® Router familyTechnical Reference GuideChapter 3: Installation and SetupEfficient Networks®Page 3-53If you cannot access the remote

Seite 350 - Step4 Click Save

Chapter 3: Installation and Setup Efficient Networks® Router familyTechnical Reference GuidePage 3-54 Efficient Networks®This page intentionally left

Seite 351 - Step2 Click Modify/Display

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-1CHAPTER 4CHAPTER 4 SYSTEM MANAGEM

Seite 352

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-2 Efficient Networks®DHCP (Dynamic Host Configuration Pr

Seite 353

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-3NOTE:For information on configuring t

Seite 354

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-4 Efficient Networks®Manipulating Subnetworks and Explic

Seite 355 - Firewall Rule Parameters

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-5Example 1:The following command creat

Seite 356 - Firewall Rule Deletion

Efficient Networks®9ContentsEfficient Networks® Router familyTechnical Reference GuideTable of ContentsMain Mode and Aggressive Mode. . . . . . . . .

Seite 357

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-6 Efficient Networks®Dynamic Client LeasesDynamic client

Seite 358

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-7CommandsThe following commands are us

Seite 359

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-8 Efficient Networks®To release the client lease so it b

Seite 360

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-9-> dhcp clear valueoption <code

Seite 361

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-10 Efficient Networks®-> dhcp list definedoptionsThis

Seite 362

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-11Specify the Boot (TFTP) ServerThe fo

Seite 363 - Step2 Click Execute

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-12 Efficient Networks®Configuring BootP/DHCP RelaysBootP

Seite 364

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-13To list the definition for all optio

Seite 365

Chapter 4: System Management Efficient Networks® Router familyTechnical Reference GuidePage 4-14 Efficient Networks®Clearing All DHCP InformationIf ne

Seite 366

Efficient Networks® Router familyTechnical Reference GuideChapter 4: System ManagementEfficient Networks®Page 4-15BootP ServiceThis section first disc

Kommentare zu diesen Handbüchern

Keine Kommentare