Efficient Networks Router family Command line interface Spezifikationen

Stöbern Sie online oder laden Sie Spezifikationen nach Vernetzung Efficient Networks Router family Command line interface herunter. Efficient Networks Router family Command line interface Specifications [en] Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 379
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Router Family

SpeedStream ª Router Family Command Line Interface Guide

Seite 2 - Trademarks

10BootP Concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152BootP

Seite 3 - WhatÕs New in This Release?

100 Chapter 4. Configuring Special Featuresremote setourpasswd Secret PPPoEuser## Define an IP route for the remote.remote addiproute 0.0.0.0 0.0.

Seite 4

Chapter 4. Configuring Special Features 101Controlling Remote Management With the following security control features, the user can control remote man

Seite 5 - About This Manual

102 Chapter 4. Configuring Special Featuressystem addsnmpfilter 192.168.1.5 192.168.1.12To delete client ranges previously defined, use these commands

Seite 6 - Typographic Conventions

Chapter 4. Configuring Special Features 103Dial BackupThe Dial Backup capability provides a backup V.90 connection to the Internet when the default DS

Seite 7 - Table of Contents

104 Chapter 4. Configuring Special Features¥ Minimum retry period before DSL link restoration is attempted¥ Specify the modem parameters.¥ Specify the

Seite 8

Chapter 4. Configuring Special Features 105The router determines your gateway and/or DNS address implicitly via a means such as DHCP, static configura

Seite 9

106 Chapter 4. Configuring Special Featurescheck whether the DSL link has been restored. This time period between checks is called the retry period (d

Seite 10

Chapter 4. Configuring Special Features 107# pause), and finally the 7-digit local number.remote setphone async 1 9,5554218 backup# Specifies the bit

Seite 11

108 Chapter 4. Configuring Special FeaturesThe following illustration shows two routers connecting a LAN to the Internet. By using VRRP, the backup ro

Seite 12 - Terminal Window

Chapter 4. Configuring Special Features 109For example, assume that the gateway IP address is 192.168.100.254. If the default logical interface (0:0)

Seite 13

11Router Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206SYSTEM (Ta

Seite 14

110 Chapter 4. Configuring Special FeaturesAdding a VRID Attribute RecordTo define a record to contain the attributes for a VRID in a router, use this

Seite 15

Chapter 4. Configuring Special Features 111Note: Our implementation does not validate the IP addresses in the advertisement packet or authenticate usi

Seite 16 - Chapter 1. Router Concepts

112 Chapter 4. Configuring Special FeaturesSample VRRP ConfigurationThe sample configuration shown here is for two routers, one master and one backup.

Seite 17 - Bridging

Chapter 4. Configuring Special Features 113## Use the default time interval (1 second) and preemption option (preempt).## Save the changes and then re

Seite 18 -

114 Chapter 5. Configuring Software OptionsChapter 5. ConÞguring Software OptionsThe features described in this chapter can be purchased as software o

Seite 19 - Telephony Services

Chapter 5. Configuring Software Options 115Adding a New Software Option KeyA software option key is a 44-character string, unique to a particular rout

Seite 20

116 Chapter 5. Configuring Software OptionsEncryptionNote: Encryption is a software option. The following section applies only for routers with this o

Seite 21 - Changing Your Voice Profile

Chapter 5. Configuring Software Options 117Use this sample configuration with the additional encryption commands as a guideline to configure your own

Seite 22

118 Chapter 5. Configuring Software Optionsremote setEncryption DESE_1_KEY dh96.num SOHOsaverebootFile Format for the Diffie-Hellman Number FileThe fi

Seite 23 - Authentication Process

Chapter 5. Configuring Software Options 119IP FilteringIP Filtering is a type of firewall used to control network traffic. The process involves filter

Seite 24

How to Access the Command Line This manual describes the Command Line Interface for your router. The Command Line Interface gives you access to all c

Seite 25 - Protocol Conformance

120 Chapter 5. Configuring Software OptionsIf NAT translation is enabled for the Input interface, NAT translation is performed. Forward Phase At this

Seite 26 - Encapsulation Options

Chapter 5. Configuring Software Options 121action is for packets coming from the local protected network; it passes the packet to IPSec so it can be e

Seite 27 - RFC 1483 or RFC 1490

122 Chapter 5. Configuring Software OptionsL2TP Tunneling Ñ Virtual Dial-UpThis section has four parts:¥ The Introduction provides a general overview

Seite 28 - (Frame Relay)

Chapter 5. Configuring Software Options 123LNS, L2TP Client, LAC, and Dial User An L2TP tunnel is created between an L2TP client and an L2TP network s

Seite 29

124 Chapter 5. Configuring Software OptionsLNS and L2TP Client Relationship The LNS acts as the supervising system. The L2TP client acts both as the d

Seite 30 - 30 Chapter 1. Router Concepts

Chapter 5. Configuring Software Options 1252. Decide if one side or both sides of the connection should be allowed to initiate a tunnel. 3. Create th

Seite 31 - Remote Routers

126 Chapter 5. Configuring Software Options l2tp set authen on | off <TunnelName> Type of L2TP support for tunnel:Configure the entry to act

Seite 32 - Protocols to be Used

Chapter 5. Configuring Software Options 127Simple L2TP Client Configuration Example This example shows how a telecommuter working at home (client side

Seite 33

128 Chapter 5. Configuring Software Options2. Work_Router 3. Shared_Secret 4. 10.0.0.1L2TP tunnel configuration commands. These commands would be use

Seite 34 - IP Routing Network Protocol

Chapter 5. Configuring Software Options 1291. ppp_soho2. ppp_soho_secret3. We assume that this router will authenticate the router at work with the fo

Seite 35 - IP Routing Addresses

How to Access the Command Line 13 Terminal Session under Windows (HyperTerminal) To open the HyperTerminal emulator available under the Windows oper

Seite 36 - IPX Routing Entries

130 Chapter 5. Configuring Software OptionsTunnelOnly the L2TP client (soho) will initiate the tunnel and make the connection. The tunnel is routed th

Seite 37

Chapter 5. Configuring Software Options 131Enable IP routing for soho:eth ip enable eth ip addr 192.168.101.1 255.255.255.0 Set up ISDN parameters:isd

Seite 38

132 Chapter 5. Configuring Software OptionsCreate a DHCP pool of addresses:dhcp add 172.16.0.0 255.255.255.0 dhcp del 192.168.254.0dhcp set addr 172.1

Seite 39 - IP Routing Entries

Chapter 5. Configuring Software Options 133save reboot¥ Configuration commands for LNSserverNote: LNSserver is a DSL router. Define LNSserver:system n

Seite 40

134 Chapter 5. Configuring Software OptionsIPSec (Internet Protocol Security)Note: IPSec security is a software option for your router. The option be

Seite 41 - DLCI (with RFC 1490)

Chapter 5. Configuring Software Options 135It can also be used for L2TP over IPSec. The routers at either end of the L2TP tunnel do both the IPSec and

Seite 42 - MAC Encapsulated Routing

136 Chapter 5. Configuring Software OptionsThe following figure shows the transformed IP packet after the ESP or AH protocol has been applied in tunne

Seite 43

Chapter 5. Configuring Software Options 137during this phase. Phase 2 IKE then exchanges proposals for IPSec security attributes, generates the encryp

Seite 44 - FRF8 Link Protocol

138 Chapter 5. Configuring Software OptionsAdditional IKE SettingsIn addition to the peer identification and shared secret described earlier, IKE requ

Seite 45

Chapter 5. Configuring Software Options 139IKE CommandsThe Internet Key Exchange (IKE) process consists of two phases. In phase 1, a moderately secure

Seite 46

14 How to Access the Command Line Terminal Session for Macintosh or UNIX To open a terminal window emulation in a Macintosh or UNIX environment, you

Seite 47

140 Chapter 5. Configuring Software OptionsSets the IP address of the other endpoint. One end, the gateway, has a fixed IP address. The other end, the

Seite 48 - ConÞguration Tables

Chapter 5. Configuring Software Options 141ike proposals set dh_group <NONE | 1 | 2 > <ProposalName>Proposes the Diffie-Hellman (DH) key g

Seite 49

142 Chapter 5. Configuring Software OptionsNONE No ESP encapsulation and no ESP message authentication. (If you select this option, the encapsulation

Seite 50

Chapter 5. Configuring Software Options 143ike ipsec policies set mode <TUNNEL | TRANSPORT> <PolicyName>Specifies the encapsulation mode (

Seite 51 - PPP with Bridging

144 Chapter 5. Configuring Software OptionsIKE Configuration ExamplesThis section shows two simple IKE configurations. The installation CD also contai

Seite 52

Chapter 5. Configuring Software Options 145# MD5 authentication# Diffie-Hellman group 2 key exchange# 24-hour timeout# Unlimited dataike proposals add

Seite 53

146 Chapter 5. Configuring Software Options# Describe the home office peer# IKE main mode is used because the home office has a fixed IP address # (19

Seite 54 - (for Frame Relay

Chapter 5. Configuring Software Options 147saverebootAggressive Mode ExampleThis example supposes, like the preceding main mode example, that a secure

Seite 55 - 1490MER with IP Routing

148 Chapter 5. Configuring Software Optionsike peers set localidtype domainname home_peerike peers set localid branchoffice.big.com home_peerIPSec Com

Seite 56 - FRF8 with IP Routing

Chapter 5. Configuring Software Options 149Specifies the identifier (SPID) for the IPSec tunnel. It must match the SPID at the other end of the tunnel

Seite 57

How to Access the Command Line 154. The router displays a line identifying itself and then displays the Login: prompt.

Seite 58

150 Chapter 6. Managing the RouterChapter 6. Managing the RouterThis chapter describes facilities for managing, monitoring, and securing the router. T

Seite 59 - Test IP Routing

Chapter 6. Managing the Router 151trigger alarms on thresholds, graph or list node statistic counters, view and edit individual MIB variables, and pri

Seite 60 - Test IPX Routing

152 Chapter 6. Managing the RouterTFTPD rootdirectoryThe TFTPD operational parameters are kept in file ROUTER.INI in the form:rootdir=rootdirectoryret

Seite 61 - Sample ConÞgurations

Chapter 6. Managing the Router 153Relaying BootP RequestsThe DHCP relay list is an optional list of IP addresses of servers on the network. You create

Seite 62 - PPP/IP and IPX

154 Chapter 6. Managing the RouterBoot Code Maintenance OptionsThe router provides a number of maintenance options for booting router software. ¥ You

Seite 63 - SOHO System Settings

Chapter 6. Managing the Router 155Option 1: Retry Start-Up If you are in Manual Boot mode, you can reboot the router in the boot procedure order by se

Seite 64 - Entry: HQ

156 Chapter 6. Managing the RouterThe boot IP address is the router LAN IP address used during the boot procedure. This address may differ from the LA

Seite 65 - SOHO Routing controls

Chapter 6. Managing the Router 157When the router is configured by a PC, the GUI overwrites the time and date fields. The router time and date values

Seite 66

158 Chapter 6. Managing the RouterIdentifying Fatal Boot FailuresFatal boot failures can be identified by the light patterns shown by the LEDs on the

Seite 67

Chapter 6. Managing the Router 159Software Kernel UpgradesYou can upgrade the software kernel by downloading a new version from the LAN or from the WA

Seite 68 - Remote Passwords

16 Chapter 1. Router Concepts Chapter 1. Router Concepts This chapter provides background information applicable to the router on topics useful to ne

Seite 69 - Scenario:

160 Chapter 6. Managing the Routerthe return key for the load address). If all entered information is valid, the router boots from the network. An exa

Seite 70 - RFC 1483 / IP + Bridging

Chapter 6. Managing the Router 161where xxx.xxx.xxx.xxx is the TFTP server IP address, sfilename is the server filename of the kernel, and KERNEL.F2K

Seite 71

162 Chapter 6. Managing the RouterBackup and Restore ConÞguration FilesTo successfully save configuration files to the server, those files must alread

Seite 72 - SOHO Routing Controls

Chapter 6. Managing the Router 163FLASH Memory Recovery ProceduresRecovering Kernels for Routers with Configuration SwitchesIn the unlikely event that

Seite 73

164 Chapter 6. Managing the RouterRecovering Kernels for Routers with a Reset ButtonThe reset button (if your router has one) is recessed in an unlabe

Seite 74

Chapter 6. Managing the Router 1655. In the BootP Setting dialog box, click OK. Configuration Manager writes the above settings to a file called BOOTD

Seite 75 - IP Routing

166 Chapter 6. Managing the RouterBatch File Command ExecutionThis feature is used to load batch files of configuration commands into the router. This

Seite 76

Chapter 7. Troubleshooting 167Chapter 7. Troubleshooting Software problems usually occur when the routerÕs software configuration contains incomplete

Seite 77 - Multiple IP Subnets

168 Chapter 7. TroubleshootingOnce the router is in Ready State, the other LEDs may indicate transmitting and receiving activity as follows:¥ The WAN

Seite 78 - Virtual Routing Tables

Chapter 7. Troubleshooting 169Accessing History Log through Configuration Manager1. Select Tools and Terminal Window (the console cable is required).2

Seite 79 - Configure Bridge Filtering

Chapter 1. Router Concepts 17Numerous network protocols have evolved, and within each protocol are associated protocols for routing, error handling,

Seite 80

170 Chapter 7. TroubleshootingInterpretation and Troubleshooting To isolate a problem with the TCP/IP protocol, perform the following three tests:1. T

Seite 81 - IP (RIP) Protocol Controls

Chapter 7. Troubleshooting 171¥ connect to the router.¥ log in.¥ access the remote network.¥ access the router via Telnet.¥ download software.Finally,

Seite 82 - DHCP Client Requests

172 Chapter 7. TroubleshootingNote: If you do not reset switches 5 and 6 to the up position and then reboot, the router is placed in maintenance mode.

Seite 83 - ¥ Adding a Subnetwork

Chapter 7. Troubleshooting 173¥ The IP address must be within the valid range for the subnet.¥ Verify that the IP and gateway addresses are correct on

Seite 84

174 Chapter 7. Troubleshooting¥ Make sure that the Novell server is up.Incorrect VPI/VCI (ATM Routers)If you are given an incorrect VCI/VPI number or

Seite 85 - ¥ Commands

Chapter 7. Troubleshooting 175frame voice <x> Changes the voice DLCI to the specified number x.frame stats Shows LMI statistics.For a frame stat

Seite 86 - Setting Option Values

176 Chapter 7. TroubleshootingValue Actual ActualSpecified (G.711) (G.726)0-5 5.5 (1) 11 (1)6-11 11 (2) 11(1)12-16 16.5 (3) 22 (2)17-22 22 (4) 22 (2)2

Seite 87 - Managing BootP

Chapter 7. Troubleshooting 177Explanation: PAP cannot be negotiated.Can't agree with <router/user> on what their IP address should beExplan

Seite 88 - Enable/Disable BootP

178 Chapter 7. TroubleshootingExplanation: The router does not have a system name. For PAP/CHAP negotiation, the router will use a default name and pa

Seite 89 - Defining Option Types

Chapter 7. Troubleshooting 179Explanation: The remote destination refused to participate in the PAP/CHAP authentication process.Startup failedExplanat

Seite 90 - Clearing All DHCP Information

18 Chapter 1. Router ConceptsThese bridge-only units are pre-configured; no further configuration is required. The unit comes up in bridge mode automa

Seite 91 - Masquerading

180 Chapter 7. TroubleshootingDebugging CommandsThe following commands may be available for debugging purposes. Please use them with caution because t

Seite 92 - ¥ Interface-Specific Commands

Chapter 7. Troubleshooting 181Dumps all tables. If you capture and send this output to Technical Support, it can be useful in debugging problems. For

Seite 93

182 Chapter 7. TroubleshootingWeb GUI Debug CommandsIf you point your web browser to http://192.168.254.254/tools/index.html, you can display an index

Seite 94 - ¥ Server Request Hierarchy

Chapter 7. Troubleshooting 183 BER_METER_STATUS ... BER Meter Statussdsl btstat *Displays available SDSL status commands.sdsl bts felmDis

Seite 95 - Classic NAT

184 Chapter 7. TroubleshootingShows AAL2 statistics for voice router.voice 12stats clearResets values.dsp <NOEC | ECON>Turns echo canceller on (

Seite 96 - ¥ Range Overlap Rules

Chapter 7. Troubleshooting 185Frame Relay Debug Commandsframe statsDisplays statistics. For more information, see FRAME STATS, on page 204.ATM Tracing

Seite 97 - PPPoE (PPP over Ethernet)

186 Chapter 7. Troubleshooting¥ Type of operating system (Windows 95, 98, NT, or Windows for Workgroups)¥ Description of the problem¥ List of other eq

Seite 98 - PPPoE Client

Chapter 8. Command Reference 187Chapter 8. Command ReferenceThis chapter lists the formats of the commands you can enter on the router command line.T

Seite 99

188 Chapter 8. Command ReferenceExample:# ?Top-level commands:? help versionfilter logout exitr

Seite 100 - Managing PPPoE Sessions

Chapter 8. Command Reference 189ARP LISTLists Address Resolution Protocol (ARP) table entries in an IP routing environment. ARP is a tool used to f

Seite 101 - Validating Clients

Chapter 1. Router Concepts 19¥ Routing takes precedence over bridging; i.e., when routing is active, the router uses the packetÕs protocol address inf

Seite 102 - Disabling WAN Management

190 Chapter 8. Command ReferenceExample:# bi listBRIDGE GROUP 0:00206F024C34: P US SD A 0180C2000000:

Seite 103 - Dial Backup

Chapter 8. Command Reference 191Additional interfaces on other routers could include:FR/3 144kb 0%/0% 0%/0% (HDLC/FR) OPENEDFR-VC/

Seite 104 - Addresses to Ping

192 Chapter 8. Command ReferenceIPXROUTESLists the current entries in the IPX routing table.IPXSAPSLists the current services in the IPX SAPs table.ip

Seite 105 - DSL Restoration Retry Period

Chapter 8. Command Reference 193LOGOUTLogs out to reinstate administrative security after you have completed changing the routerÕs configuration.MEMT

Seite 106 - Specifying Modem Parameters

194 Chapter 8. Command ReferencePINGThis command sends an echo message, available within the TCP/IP protocol suite. The echo message is sent to a rem

Seite 107 - VRRP Backup

Chapter 8. Command Reference 195PSLists all of the tasks (processes) running in the system and the status of the tasks.REBOOTThis command causes a re

Seite 108 - VRRP Configuration

196 Chapter 8. Command Reference¥ Ethernet IP address ¥ TCP/IP routing ¥ Remote router default bridging destination ¥ TCP/IP route addresses ¥ SAPs an

Seite 109 - Defining VRRP Attributes

Chapter 8. Command Reference 197save eth Saves the configuration settings for the Ethernet LAN into FLASH memory.save filter Saves the bridging filte

Seite 110

198 Chapter 8. Command ReferenceTCP STATSDisplays the TCP statistics and open connections.TRACEROUTETraces the route taken by packets sent from the ta

Seite 111

Chapter 8. Command Reference 199 18: 208.178.103.62 19: reply from 204.71.200.68: bytes=56 (data), time=95 ms traceroute: packets sent

Seite 112 - Internet

2 November 2000 Copyright Efficient Networks provides this publication Òas isÓ without warranty of any kind, either expressed or implied, including,

Seite 113

20 Chapter 1. Router Concepts¥ Support for these voice gateways:¥ Jetstream proprietary¥ CopperCom proprietary¥ ATM Forum Standards based (ATM Forum d

Seite 114 - Software Option Keys

200 Chapter 8. Command ReferenceFile System CommandsThe file system commands allow you to perform maintenance and recovery on the router. These comman

Seite 115 - Deleting Software Option Keys

Chapter 8. Command Reference 201DELETERemoves a file from the file system.filename Name of the file to be deleted. The filename is in the format xxxx

Seite 116 - Encryption

202 Chapter 8. Command Referenceindicates the file system is corrupted, you may wish to reformat the disk, reboot the router, and recopy the router so

Seite 117 - Diffie-Hellman Encryption

Chapter 8. Command Reference 203RENAMERenames a file in the file system.SYNCCommits the changes made to the file system to FLASH memory.Frame Command

Seite 118 - ¥ Default Generator

204 Chapter 8. Command ReferenceFRAME LMITurns frame LMI either on or off.Example:# frame onLMI is onFRAME VOICEDisplays the voice DLCI for voice rout

Seite 119 - IP Filtering

Chapter 8. Command Reference 205 Data Packets Out Queued... 0 Data Packets Out (dropped Q Full).. 0 Voice Cells In...

Seite 120 - Filter Actions

206 Chapter 8. Command ReferenceRouter ConÞguration CommandsConfiguration commands are used to set configuration information for each functional capab

Seite 121 - Special Notes

Chapter 8. Command Reference 207SYSTEM (Target Router System Configuration Commands)The following commands set basic router configuration information

Seite 122 - L2TP Concepts

208 Chapter 8. Command ReferenceSYSTEM ADDBOOTPSERVERAdds an address to the BootP server list. (The BootP server list is also the DHCP relay list.)Whi

Seite 123 - LAN/server

Chapter 8. Command Reference 209SYSTEM ADDIPROUTINGTABLEDefines a new virtual routing table. Once defined, you can add routes to the table using the

Seite 124 - Configuration

Chapter 1. Router Concepts 21Changing Your Voice ProfileIf your voice gateway is an ATM standards-based gateway, the voice profile must match the conf

Seite 125 - Configuration Commands

210 Chapter 8. Command Referenceaction One of the following command actions:ipaddr Selects the host with this IP address as server (4 decimals separat

Seite 126 - Sample Configurations

Chapter 8. Command Reference 211The Syslog filter can comprise one or more ranges of IP addresses that DHCP may return for Syslog servers. To delete

Seite 127 - ¥ Configuration Process

212 Chapter 8. Command Referencefirst ip addr First IP address of the client range. last ip addr Last IP address of the client range. May be omitted i

Seite 128 - PPP remote configuration

Chapter 8. Command Reference 213SYSTEM BACKUP ADDAdds an IP address to the list of addresses to be pinged for the Dial Backup option. The command can

Seite 129

214 Chapter 8. Command Referenceipaddr IP address to be deleted from the list (four decimals separated by periods). GW Gateway address. The router det

Seite 130 - Configuration Process

Chapter 8. Command Reference 215SYSTEM BACKUP PINGINTERVALChanges the ping interval for a group, that is, the number of seconds between pings during

Seite 131

216 Chapter 8. Command ReferenceSYSTEM BACKUP RETRYChanges the Dial Backup retry period. The retry period determines how often the router attempts to

Seite 132

Chapter 8. Command Reference 217percentage Minimum success rate required during a ping test of the addresses in the group (integer, 0 thru 99). The d

Seite 133

218 Chapter 8. Command ReferenceSYSTEM DELBOOTPSERVER Removes an address from the BootP server list. (The BootP server list is also the DHCP relay lis

Seite 134

Chapter 8. Command Reference 219system delHTTPFilter 192.168.1.5 192.168.1.12SYSTEM DELIPROUTINGTABLEDeletes a range of addresses that reference a vi

Seite 135 - ESP and AH Security Protocols

22 Chapter 1. Router ConceptsPAP/CHAP Security AuthenticationThe router supports PAP (Password Authentication Protocol) and CHAP (Challenge Handshake

Seite 136 - IKE Management

220 Chapter 8. Command Referencehttp HTTP port.tftp TFTP port.all All ports.last port Optional last port in the range of ports as seen by the remote e

Seite 137 - Main Mode and Aggressive Mode

Chapter 8. Command Reference 221SYSTEM DELSYSLOGSERVERRemoves an address from the list of Syslog servers. To see the server addresses, use the comman

Seite 138 - Security Associations (SAs)

222 Chapter 8. Command ReferenceSYSTEM HISTORYDisplays the routerÕs most recent console log.SYSTEM HTTPPORTManages HTTP port access including disablin

Seite 139 - IKE Commands

Chapter 8. Command Reference 223 Syslog Port... default (514) Allowed Syslog Servers... all Default Syslog Server

Seite 140 - IKE Proposal Commands

224 Chapter 8. Command Referenceit deletes them from the address ranges for the other virtual routing tables. The command then adds the specified addr

Seite 141 - IKE IPSec Proposal Commands

Chapter 8. Command Reference 225SYSTEM ONEWANDIALUP This command is useful when security concerns dictate than the router have only one connection ac

Seite 142 - IKE IPSec Policy Commands

226 Chapter 8. Command ReferenceSYSTEM SECURITYTIMERAutomatically logs out a Telnet or console user out of privileged mode when no typing has occurre

Seite 143

Chapter 8. Command Reference 227¥ bi (if bridging is enabled)¥ ipifs¥ iproutes¥ ipxroutesSYSTEM SYSLOGPORTManages Syslog port access including disabl

Seite 144 - IKE Configuration Examples

228 Chapter 8. Command ReferenceSYSTEM WAN2WANFORWARDINGAllows the user to manage WAN-to-WAN forwarding of data from one WAN link to another. For exam

Seite 145

Chapter 8. Command Reference 229ETH (Target Router Ethernet LAN Bridging and Routing)The following commands allow you to configure the Ethernet inter

Seite 146

Chapter 1. Router Concepts 23Authentication ProcessThe authentication process occurs regardless of whether a remote router connects to the local route

Seite 147 - Aggressive Mode Example

230 Chapter 8. Command ReferenceNote: This command requires a save and reboot before it takes effect. port# Ethernet interface (0 for a single-port ro

Seite 148 - IPSec Commands

Chapter 8. Command Reference 231If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specifi

Seite 149

232 Chapter 8. Command Referencegateway IP address (4 decimals separated by periods).hops Number of routers through which the packet must go to get

Seite 150 - SNMP Support

Chapter 8. Command Reference 233interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.If the rout

Seite 151 - TFTP Server

234 Chapter 8. Command Referenceeth ip bindRoute 10.1.3.0 255.255.255.0 1 192.168.252.9 ROSA 0:1eth ip bindRoute 10.1.3.0 255.255.255.0 1 192.168.252.

Seite 152 - BootP Service

Chapter 8. Command Reference 235If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specifi

Seite 153 - Syslog Client

236 Chapter 8. Command Referenceme Sends the incoming server request to the local router, regardless of its IP address.protocol Protocol used by the s

Seite 154 - Boot Code Maintenance Options

Chapter 8. Command Reference 237ETH IP DISABLEDisables IP routing across the Ethernet LAN. This commands acts as a master switch allowing you to disa

Seite 155 - Option 3: Boot from Network

238 Chapter 8. Command Referenceeth ip filter insert <type> <action> <parameters> [<interface>] Inserts a filter in the list o

Seite 156 - Option 6: Set Time and Date

Chapter 8. Command Reference 239The Þlter type speciÞes at which point the Þlter is compared to the IP packet (see the illustration under IP Filterin

Seite 157

24 Chapter 1. Router Conceptsrouter. This allows you to set a unique CHAP or PAP authentication password for authentication of the local site by the r

Seite 158

240 Chapter 8. Command Reference-dp <ICMP type> | <first dest port>[:<last dest port>]The packet must have a destination port that

Seite 159 - Software Kernel Upgrades

Chapter 8. Command Reference 241If -v (verbose) is specified, a message is printed every time this filter matches a packet, regardless of the filter

Seite 160 - Upgrading from the WAN Line

242 Chapter 8. Command ReferenceThe management IP address is separate from the IP address used for IP address translation. The IP address used for add

Seite 161

Chapter 8. Command Reference 243If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specifi

Seite 162 - Restore Configuration Files

244 Chapter 8. Command ReferenceETH IP RESTARTStops and restarts a logical Ethernet interface. To read about logical Ethernet interfaces, see page 77.

Seite 163

Chapter 8. Command Reference 245eth ip start 0:1ETH IP STOPStops a logical Ethernet interface. To read about logical Ethernet interfaces, see page 77

Seite 164 - Recovery Steps Using BootP

246 Chapter 8. Command ReferenceETH IP UNBINDROUTERemoves an Ethernet route from the named IP virtual routing table. To list the routes, use the iprou

Seite 165 - Routers with a Reset Button

Chapter 8. Command Reference 247interface Ethernet interface. The default Ethernet interface is 0:0.To specify a logical interface other than 0:0, sp

Seite 166 - Batch File Command Execution

248 Chapter 8. Command ReferenceETH IPX FRAMESets the frame encapsulation method. The default is 802.2.ETH LISTLists information about the Ethernet in

Seite 167 - Diagnostic Tools

Chapter 8. Command Reference 249 IP filters defined... no IP address/subnet mask... 192.168.0.101/255.255.255.0 Static

Seite 168 - History Log

Chapter 1. Router Concepts 25Interoperability Between the Router and Other EquipmentThe router uses industry-wide standards to ensure compatibility wi

Seite 169 - Ping Command

250 Chapter 8. Command ReferenceNote: This command takes effect immediately, but you must save the change if it is to persist after you restart the in

Seite 170 - Òctrl qÓ

Chapter 8. Command Reference 251port# Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be omitted if the route

Seite 171 - Login Password is invalid

252 Chapter 8. Command Referencepreempt Preempt immediately.nopreempt Do not preempt a router with lower priority.vrid Virtual router ID of the VRRP

Seite 172 - TCP/IP Routing

Chapter 8. Command Reference 253ETH VRRP SET PRIORITYSpecifies the priority attribute in a VRRP attribute record for the VRID (virtual router ID). Th

Seite 173 - IPX Routing

254 Chapter 8. Command ReferenceSkew_Time = (256 - Priority) / 256Thus, the default skew time is (256 - 100) / 256, or .609375. The default master dow

Seite 174 - Problems Downloading Software

Chapter 8. Command Reference 255Remote Access ConÞgurationThe following commands allow you to add, delete, and modify remote routers to which the tar

Seite 175 - Adjusting the Jitter Buffer

256 Chapter 8. Command ReferenceREMOTE CommandsREMOTE ?Lists the supported keywords. (The list varies depending on the router model.)stREMOTE ADDAdds

Seite 176 - System Messages

Chapter 8. Command Reference 257REMOTE ADDBRIDGEDefines the remote router entry as the default bridging destination for outbound bridging. The comman

Seite 177

258 Chapter 8. Command ReferenceREMOTE ADDIPROUTEAdds an IP address route to a network or station on the LAN connected beyond the remote router. The r

Seite 178

Chapter 8. Command Reference 259REMOTE ADDIPXSAPAdds an IPX SAP to the server information table for a service on the LAN network connected beyond the

Seite 179 - Startup failed

26 Chapter 1. Router Concepts¥ RFC 1877 Automatic IP / DNS¥ RFC 1962 PPP Compression Control Protocol (CCP)¥ RFC 1969 DES¥ RFC 1973 PPP in Frame Re

Seite 180 - Debugging Commands

260 Chapter 8. Command Referenceipaddr Selects the host with this IP address as server (4 decimals separated by periods).discard Discards the incoming

Seite 181 - ATM Debug Commands

Chapter 8. Command Reference 261remoteName Name of the remote router (character string).Example:The following command adds a route to virtual routing

Seite 182 - SDSL Debug Commands

262 Chapter 8. Command ReferenceExample:remote delbridge 01:08:03:0A:0B:0C HQREMOTE DELENCRYPTIONDeletes encryption files associated with a remote rou

Seite 183 - Voice Router Debug Commands

Chapter 8. Command Reference 263REMOTE DELIPXROUTEDeletes an IPX address for a network on the LAN connected beyond the remote router. Note: The reboo

Seite 184

264 Chapter 8. Command ReferenceREMOTE DELOURPASSWDRemoves the unique CHAP or PAP authentication password entries established by the command remote se

Seite 185 - IP Filtering Debug Commands

Chapter 8. Command Reference 265REMOTE DELSERVERDeletes an entry created by the remote addServer command (page 259).action One of the following comma

Seite 186

266 Chapter 8. Command ReferenceREMOTE DISAUTHENThis command is intended for situations where third-party routers cannot be authenticated; the target

Seite 187 - Chapter 8. Command Reference

Chapter 8. Command Reference 267REMOTE ENABRIDGEEnables bridging from the target router to the remote router. This command requires rebooting the tar

Seite 188 - System-Level Commands

268 Chapter 8. Command ReferenceIf no line numbers are specified, all filters in the list are deleted. If only the first line number is specified, all

Seite 189 - ARP LIST

Chapter 8. Command Reference 269drop The packet is discarded, without sending an ICMP (Internet Control Management Protocol) error message.reject The

Seite 190

Chapter 1. Router Concepts 270x0021 IP0x002d Van Jacobson compressed TCP/IP0x002f Van Jacobson uncompressed TCP/IP0x8031 Bridge NCP0x0031 Bridge Fram

Seite 191 - IPROUTES

270 Chapter 8. Command Reference- Specify -tcp noflag if neither the SYN flag nor the ACK flag can be set. For example, for the IP filter to match the

Seite 192 - IPXROUTES

Chapter 8. Command Reference 271remote ipfilter append forward drop -da 192.168.0.0 -dm 255.255.0.0 internetremote ipfilter append forward drop -da 1

Seite 193 - MLP SUMMARY

272 Chapter 8. Command Reference mtu... 1500REMOTE LISTBRIDGELists the current bridge settings for the specified remot

Seite 194

Chapter 8. Command Reference 273 Total IP remote routes... 5 192.168.210.0/255.255.255.0/1 10.0.0.0/255.0.0.0/1

Seite 195

274 Chapter 8. Command ReferenceNote: If the remote name is not specified, a list of phone numbers is displayed for each remote router in the database

Seite 196

Chapter 8. Command Reference 275E164 ITU E164 encoding.partial The MAC address of the router is substituted for octets 2-7 of the NSAP.full No change

Seite 197

276 Chapter 8. Command Referencein | out | both Incoming traffic, outgoing traffic, or both. The default is both.remoteName Name of the remote router

Seite 198 - TRACEROUTE

Chapter 8. Command Reference 277The threshold is used in bandwidth on demand management. Initially, a call is activated on one B-channel. When bandwi

Seite 199

278 Chapter 8. Command ReferenceREMOTE SETENCRYPTION (DifÞe-Hellman Encryption)This command is used to specify encryption based on the Diffie-Hellman

Seite 200 - File System Commands

Chapter 8. Command Reference 279txrip Transmit IP RIP-1 compatible broadcast packets and RIP-2 multicast packets to the remote site. When this option

Seite 201 - FORMAT DISK

28 Chapter 1. Router ConceptsMAC Encapsulated Routing: RFC 1483MER (ATM) or RFC 1490MER (Frame Relay)MER encapsulation allows IP packets to be carried

Seite 202

280 Chapter 8. Command ReferenceroutersÕ local WAN port. This command requires that you define a Source WAN IP Address with the command:remote setSrcI

Seite 203 - Frame Commands

Chapter 8. Command Reference 281remote setMaxLine 2 HQREMOTE SETMGMTIPADDRThis command assigns to the remote router entry an IP address which is to b

Seite 204 - FRAME STATS

282 Chapter 8. Command ReferenceThe following command keeps a channel allocated for the session even when there is no traffic.remote setMinLine 1 PPPo

Seite 205

Chapter 8. Command Reference 283REMOTE SETOURSYSNAMESets a unique CHAP or PAP authentication system name for the local router that is used for authen

Seite 206 - Router ConÞguration Commands

284 Chapter 8. Command ReferenceremoteName Name of the remote entry (character string).Example:# The phone number begins with 9 (to get an outside lin

Seite 207 - Commands)

Chapter 8. Command Reference 285REMOTE SETPVC Specifies the PVC number for connecting to the remote router.REMOTE SETRMTIPADDRSets the WAN IP address

Seite 208 - SYSTEM ADDHTTPFILTER

286 Chapter 8. Command ReferenceFor more information on the Dial Backup option, see page 149.bitrate Bit rate to be used for the phone number. Possibl

Seite 209 - SYSTEM ADDSERVER

Chapter 8. Command Reference 287A timeout period is desirable if your service provider charges by the hour. However, the connection has to wait a few

Seite 210 - SYSTEM ADDSYSLOGFILTER

288 Chapter 8. Command ReferenceREMOTE STATSCLEARAllows the user to reset the statistics counter for a given remote router.REMOTE STOPIf the remote is

Seite 211 - SYSTEM ADDTELNETFILTER

Chapter 8. Command Reference 289Example:The following command stops the active session for remote HQ.remote stop HQREMOTE UNBINDIPVIRTUALROUTERemoves

Seite 212 - SYSTEM AUTHEN

Chapter 1. Router Concepts 29Router System and ConÞguration FilesThe system software and configuration information for the router are contained in fil

Seite 213 - SYSTEM BACKUP DELETE

290 Chapter 8. Command ReferenceADSL CommandsUse the following commands to manage the ADSL (Asymmetric Digital Subscriber Line) link for an ADSL route

Seite 214 - SYSTEM BACKUP ENABLE

Chapter 8. Command Reference 291ADSL STATSShows the current error status for the ADSL connection.adsl stats [clear]clear Option used to reset the cou

Seite 215 - SYSTEM BACKUP PINGSAMPLES

292 Chapter 8. Command ReferenceATM CommandsUse the following commands to manage the ATM (Asynchronous Transfer Mode) link for an ATM router. ATM ?Lis

Seite 216 - SYSTEM BACKUP SUCCESSRATE

Chapter 8. Command Reference 293ATM SPEEDSets the speed of the ATM link in kilobits per second. The default upstream speed is 326 Kb/s. Use this comm

Seite 217 - SYSTEM DEFAULTMODEM

294 Chapter 8. Command Referenceremote setATMtraffic 47 1 HQThe following command disables ATM traffic-shaping on remote router HQ:remote setATMtraffi

Seite 218 - SYSTEM DELHTTPFILTER

Chapter 8. Command Reference 295DMT CommandsThese commands manage the ADSL DMT (Discrete MultiTone) router. To see additional DMT debug commands, see

Seite 219 - SYSTEM DELSERVER

296 Chapter 8. Command ReferenceDual-Ethernet Router (ETH) CommandsThe following Ethernet commands are used to manage the Ethernet interfaces of the D

Seite 220 - SYSTEM DELSYSLOGFILTER

Chapter 8. Command Reference 297option stpSet this option to on to use the Spanning Tree Protocol (STP). The default is on.STP is used to detect brid

Seite 221 - SYSTEM DELUDPRELAY

298 Chapter 8. Command ReferenceHDSL CommandsUse the following commands to manage the HDSL (High-Speed Digital Subscriber Line) link for an HDSL route

Seite 222 - SYSTEM LIST

Chapter 8. Command Reference 299HDSL ?Lists the supported keywords.HDSL SAVESaves the HDSL-related changes across restarts and reboots.HDSL SPEEDCO e

Seite 223 - SYSTEM MOVEIPROUTINGTABLE

3 WhatÕs New in This Release? This version of the Command Line Interface (CLI) manual has been updated to document features available with this rel

Seite 224 - SYSTEM NAME

30 Chapter 1. Router Conceptssoftware keys are isomorphic to one and only one router. For more information on software option keys, see page 114.

Seite 225 - SYSTEM PASSWD

300 Chapter 8. Command ReferenceHDSL TERMINAL The router is by default configured as the Customer Premises Equipment (CPE). Use this command if you in

Seite 226 - SYSTEM SUPPORTTRACE

Chapter 8. Command Reference 301IDSL CommandsAn IDSL (ISDN Digital Subscriber Line) delivers a maximum symmetric 144 Kbps of bandwidth. The IDSL band

Seite 227 - SYSTEM TELNETPORT

302 Chapter 8. Command ReferenceThe IDSL bandwidth is composed of two 64 Kbps B channels, plus one 16 Kbps D channel. Your speed setting indicates the

Seite 228 - SYSTEM WAN2WANFORWARDING

Chapter 8. Command Reference 303REMOTE SETPROTOCOLThis IDSL-specific command is used to select the appropriate link protocol for your IDSL connection

Seite 229

304 Chapter 8. Command ReferenceSDSL CommandsThe commands in this section manage the Symmetric Digital Subscriber Line (SDSL) link for an SDSL router.

Seite 230 - ETH IP ADDHOSTMAPPING

Chapter 8. Command Reference 30503/09/1998-17:15:35:DOD: link to co over ATM-VC/1 is now up03/09/1998-17:15:57:SDSL: Line Rate at last activation sav

Seite 231 - ETH IP ADDROUTE

306 Chapter 8. Command ReferenceThe default status is on. However, to be effective, autobaud pre-activation must also be enabled at the Central Office

Seite 232 - ETH IP ADDSERVER

Chapter 8. Command Reference 307speed Speed in kbps. To see the speeds available for the model type, enter sdsl speed. If the auto-speed search is in

Seite 233 - ETH IP BINDROUTE

308 Chapter 8. Command Referencecpe Defines the router as the customer premises (CPE) equipment.co Defines the router as the central office (CO) equip

Seite 234 - ETH IP DELHOSTMAPPING

Chapter 8. Command Reference 309DHCP CommandsThe following DHCP (Dynamic Host Configuration Protocol) commands allow you to:¥ Enable and disable subn

Seite 235 - ETH IP DELSERVER

Chapter 2. Planning for Router Configuration 31Chapter 2. Planning for Router ConÞgurationThis chapter describes the basic information you need befor

Seite 236 - ETH IP DIRECTEDBCAST

310 Chapter 8. Command ReferenceDHCP ADDRELAY Adds an address to the DHCP relay list. (This list is also the BootP server list.) While the relay list

Seite 237 - ETH IP FILTER

Chapter 8. Command Reference 311DHCP BOOTP FILE Specifies the boot file name (kernel) and the subnet to which it applies.Note: Be sure to specify th

Seite 238

312 Chapter 8. Command ReferenceDHCP CLEAR ALL RECORDSClears all DHCP information, including all leases and all global DHCP information. Unlike erase

Seite 239

Chapter 8. Command Reference 313DHCP DEL Deletes a subnetwork lease, a specific client lease, or a code.DHCP DELRELAY Removes an address from the DHC

Seite 240

314 Chapter 8. Command ReferenceDHCP DISABLE Disables a subnetwork or a client lease.DHCP ENABLE Enables a subnetwork or a client lease.DHCP LISTLists

Seite 241 - ETH IP MGMT

Chapter 8. Command Reference 315DOMAINNAME (15)... efficient.comWINSSERVER (44)... 192.168.254.73Subnet 192.168.254.0, EnabledMask.

Seite 242 - ETH IP MTU

316 Chapter 8. Command ReferenceExample 1:The following command lists all available options (predefined and user-defined):#dhcp list definedoptionscod

Seite 243 - ETH IP OPTIONS

Chapter 8. Command Reference 317code REQUESTEDIPADDR (50), 1 occurrence, type IPADDRESS-RESERVEDcode IPADDRLEASETIME (51), 1 occurrence, type LONGINT

Seite 244 - ETH IP START

318 Chapter 8. Command ReferenceDHCP SET EXPIRE This command is used to manually change a client lease expiration time to a certain value. Note 1:

Seite 245 - ETH IP TRANSLATE

Chapter 8. Command Reference 319Example 3:dhcp set lease 192.168.254.0 infinite (sets lease time to inÞnite for this subnet)

Seite 246 - ETH IP VRID

32 Chapter 2. Planning for Router ConfigurationThe commands that define information for a remote router entry start with the word remote and end with

Seite 247 - ETH IPX ENABLE

320 Chapter 8. Command ReferenceDHCP SET MASKUsed to conveniently change the mask of a DHCP subnet without having to delete and recreate the subnet an

Seite 248 - ETH LIST

Chapter 8. Command Reference 321value Value to be assigned to the speciÞed option. It could be a byte, word, signed long, unsigned long, binary, IP a

Seite 249 - ETH VRRP CLEAR PASSWORD

322 Chapter 8. Command ReferenceL2TP Ñ Virtual Dial-Up Configuration CommandsThis section contains L2TP command descriptions. For a complete discussio

Seite 250 - ETH VRRP LIST

Chapter 8. Command Reference 323L2TP CLOSECloses an L2TP tunnel and/or session.L2TP DELDeletes a tunnel entry.L2TP FORWARDThe router can be conÞgured

Seite 251 - ETH VRRP SET OPTION

324 Chapter 8. Command ReferenceL2TP LISTProvides a complete display of the current conÞguration settings for tunnel(s), except for the authentication

Seite 252 - ETH VRRP SET PASSWORD

Chapter 8. Command Reference 325Caution: If the IP address of the remote tunnel is part of a subnet that is also reached through the tunnel, a routin

Seite 253 - ETH VRRP SET TIMEINTERVAL

326 Chapter 8. Command ReferenceL2TP SET DIALOUTLets the LNS instruct the L2TP client to use an ISDN phone line to place a call on its behalf.L2TP SET

Seite 254

Chapter 8. Command Reference 327L2TP SET OURPASSWORDSpeciÞes the routerÕs secret/password for PPP authentication on a per-tunnel basis.L2TP SET OURSY

Seite 255 - Remote Access ConÞguration

328 Chapter 8. Command ReferenceL2TP SET TYPEDeÞnes the type of L2TP support for the tunnel. The routerÕs role is deÞned on a per-tunnel basis.L2TP S

Seite 256 - REMOTE Commands

Chapter 8. Command Reference 329TunnelName Name of the tunnel (character string). The name is case-sensitive.Examples:This command restricts the tun

Seite 257 - REMOTE ADDHOSTMAPPING

Chapter 2. Planning for Router Configuration 33To configure a Dual-Ethernet Router:Select one of these two configurations:Configuring the Dual-Ethern

Seite 258 - REMOTE ADDIPXROUTE

330 Chapter 8. Command ReferenceREMOTE SETLNSWith this command, this remote is the path to the LNS, and it will forward the incoming call (which match

Seite 259 - REMOTE ADDSERVER

Chapter 8. Command Reference 331FILTER BR (Bridge Filtering) CommandsBridge filtering allows you to control the packets transferred across the router

Seite 260 - REMOTE BINDIPVIRTUALROUTE

332 Chapter 8. Command Referencepos Byte offset within a packet; number from 0-127.data Hexadecimal number up to 6 bytes.Example:This command deletes

Seite 261 - REMOTE DELBRIDGE

Chapter 8. Command Reference 333PPPoE CommandsThis section contains the commands that are specific to PPPoE (PPP over Ethernet). To learn more about

Seite 262 - REMOTE DELIPROUTE

334 Chapter 8. Command Reference# pppoe listPPPoE Client Session ... DialUpPPP.net PPPoE/Ifs number... 1 Access Concentrator.. 15021109

Seite 263 - REMOTE DELIPXSAP

Chapter 8. Command Reference 335IKE (Internet Key Exchange) CommandsThe IKE software option and the IKE commands are described in IPSec (Internet Pro

Seite 264 - REMOTE DELPHONE

336 Chapter 8. Command ReferenceIKE IPSEC POLICIES ENABLEEnables an IPSec policy. An enable command is required for each new policy; the enable comman

Seite 265 - REMOTE DISABLE

Chapter 8. Command Reference 337IKE IPSEC POLICIES SET DESTPORTDefines a destination port filtering parameter value for the policy. The destination p

Seite 266 - REMOTE ENABLE

338 Chapter 8. Command Referenceike ipsec policies set interface all mypolicyIKE IPSEC POLICIES SET MODEDefines the mode filtering parameter value for

Seite 267 - REMOTE IPFILTER

Chapter 8. Command Reference 339none Perfect Forward Secrecy negotiation is not required for this connection.PolicyName Name of the IPsec policy to w

Seite 268

34 Chapter 2. Planning for Router ConfigurationPPP Link Protocol (over ATM or Frame Relay)The PPP Link Protocol is an encapsulation method that can be

Seite 269

340 Chapter 8. Command ReferenceIPaddress IP address allowed to be the source of the data (4 decimals separated by periods).IPmask IP network mask (4

Seite 270

Chapter 8. Command Reference 341protected network. (See the example below.) You can use the eth ip addhostmapping command (page 230) to map a range o

Seite 271 - REMOTE LIST

342 Chapter 8. Command ReferenceIKE IPSEC PROPOSALS DELETEDeletes an existing IKE IPSec proposal. For more information, see IKE IPSec Proposal Command

Seite 272 - REMOTE LISTIPROUTES

Chapter 8. Command Reference 343ProposalName Name of the IPsec proposal to which the AH authentication parameter is added. To see the proposal names

Seite 273 - REMOTE LISTPHONES

344 Chapter 8. Command ReferenceExample: ike ipsec proposals set espenc 3des myproposalIKE IPSEC PROPOSALS SET IPCOMPSets the proposal parameter that

Seite 274 - REMOTE SETATMNSAP

Chapter 8. Command Reference 345Example: ike ipsec proposals set lifetime 600 myproposalIKE PEERS ADDDefines the name of a new IKE peer. Other comman

Seite 275 - REMOTE SETBOD

346 Chapter 8. Command ReferenceIKE PEERS SET ADDRESSSets the IP address of the other endpoint of the secure IKE peer connection. The address specifie

Seite 276 - REMOTE SETBWTHRESH

Chapter 8. Command Reference 347One of the following:IPADDR The local ID must be an IP address.DOMAINNAME The local ID must be a domain name.EMAIL Th

Seite 277 - REMOTE SETCOMPRESSION

348 Chapter 8. Command ReferenceThe peer ID type must match the local ID type on the other end of the connection. The possible ID types are IP address

Seite 278 - REMOTE SETIPOPTIONS

Chapter 8. Command Reference 349ProposalName Name of the IKE proposal to be deleted. To see the proposal names in use, use the ike proposals list com

Seite 279 - REMOTE SETIPTRANSLATE

Chapter 2. Planning for Router Configuration 35ttttDNS Internet Account Information (optional)The Domain Name Service (DNS) maps host names to IP add

Seite 280 - REMOTE SETMAXLINE

350 Chapter 8. Command ReferenceOne of the following:DES Use DES (56-bit) encryption. 3DES Use 3DES (168-bit) encryption (if 3DES is enabled in the ro

Seite 281 - REMOTE SETMINLINE

Chapter 8. Command Reference 351PRESHARE Preshared key.ProposalName Name of the IKE proposal to which the session authentication parameter is added.

Seite 282 - REMOTE SETOURPASSWD

352 Chapter 8. Command ReferenceIPSEC ENABLEEnables a defined IPSec SA entry, indicating it is complete and ready to be used. The command can also re-

Seite 283 - REMOTE SETPHONE

Chapter 8. Command Reference 353 key=012345678901234567890123456789012345678901234567 SHA1 key=abcdefabcdefabcdefabcdefabcdefabcdefabcd (20)No c

Seite 284 - REMOTE SETPROTOCOL

354 Chapter 8. Command Referenceipsec set direction <INBOUND | OUTBOUND> <SAname>One of the following:INBOUNDOUTBOUNDSAname Name of the IP

Seite 285 - REMOTE SETSPEED

Chapter 8. Command Reference 355IPSEC SET IDENTSpecifies the identifier (SPID) for the IPSec tunnel. It must match the SPID at the other end of the t

Seite 286 - REMOTE SETTIMER

356 Appendix A. Network Information WorksheetsAppendix A. Network Information WorksheetsTo configure the target (local) router, fill out the blank wor

Seite 287 - REMOTE STATS

Appendix A. Network Information Worksheets 357Configuring PPP with IP RoutingPPP with IP Routing Steps Commands Your settingsSystem SettingsSystem Nam

Seite 288 - REMOTE STOP

358 Appendix A. Network Information WorksheetsConfiguring PPP with IPX Routing PPP with IPX Routing Steps Commands Your SettingsSystem SettingsSystem

Seite 289 - REMOTE UNBINDIPVIRTUALROUTE

Appendix A. Network Information Worksheets 359Configuring PPP with BridgingPPP with Bridging Steps Commands Your SettingsSystem SettingsSystem Name sy

Seite 290 - ADSL Commands

36 Chapter 2. Planning for Router ConfigurationIPX Routing Network ProtocolttttSystem Names and Authentication PasswordsFor the Target RouterYou defin

Seite 291 - ADSL STATS

360 Appendix A. Network Information WorksheetsConfiguring RFC 1483 / RFC 1490 with IP RoutingRFC 1483 / RFC 1490 with IP Routing Steps Commands Your S

Seite 292 - ATM Commands

Appendix A. Network Information Worksheets 361Configuring RFC 1483 / RFC 1490 with IPX RoutingRFC 1483 / RFC 1490 with IPX Routing Steps Commands Your

Seite 293 - REMOTE SETATMTRAFFIC

362 Appendix A. Network Information WorksheetsConfiguring RFC 1483 / RFC 1490 with BridgingRFC 1483 / RFC 1490 with Bridging Steps Commands Your Setti

Seite 294

Appendix A. Network Information Worksheets 363Configuring RFC 1483MER / RFC 1490MER with IP Routing RFC 1483MER/RFC 1490MER with IP Routing Steps Comm

Seite 295 - DMT Commands

364 Appendix A. Network Information WorksheetsConfiguring FRF8 with IP RoutingRFC 1483FR with IP Routing Steps Commands Your SettingsSystem SettingsSy

Seite 296 - ETH BR OPTIONS

Appendix A. Network Information Worksheets 365Configuring a Dual-Ethernet Router for IP RoutingThis table outlines commands used to configure a Dual-E

Seite 297

366 Appendix B. Configuring IPX RoutingAppendix B. ConÞguring IPX RoutingIPX Routing ConceptsTo establish IPX Routing, you will need to enter all remo

Seite 298 - HDSL Commands

Appendix B. Configuring IPX Routing 367Step 1: Collect Your Network Information for the Target (Local) RouterThe remote side of the WAN link has all o

Seite 299 - HDSL SPEED

368 Appendix B. Configuring IPX RoutingStep 2: Review your SettingsCommands used to review your IPX configuration:Ð eth listÐ remote listÐ ipxsa

Seite 300 - HDSL TERMINAL

369Command IndexSymbols?, 187Aadsl ?, 290adsl restart, 290adsl speed, 290adsl stats, 291arp delete, 188arp list, 189atm ?, 292atm reset, 29

Seite 301 - IDSL Commands

Chapter 2. Planning for Router Configuration 37Internal Network NumberIt is a logical network number that identifies an individual Novell server. It

Seite 302 - REMOTE SETDLCI

370 eth ip delRoute, 235eth ip delServer, 235eth ip directedBcast, 236eth ip disable, 237eth ip enable, 237eth ip filter, 237eth ip firewall,

Seite 303

371ike peers set mode, 347ike peers set peerID, 347ike peers set peerIDtype, 347ike peers set secret, 348ike proposals add, 348ike proposals de

Seite 304 - SDSL Commands

372 remote bindIPVirtualRoute, 260remote blockNetBios, 261remote del, 261remote delATMnsap, 261remote delBridge, 261remote delEncryption, 262re

Seite 305 - SDSL PREACT

373system addUdpRelay, 212system admin, 212system authen, 212system backup add, 213system backup delete, 213system backup disable, 214system b

Seite 306 - SDSL SPEED

374 Topic IndexNumerics3DES encryption, 135IKE proposal command, 141Aaddress translation, 91ADPCM voice encoding, 20ADSL DMT router commands, 295debu

Seite 307 - SDSL TERMINAL

375VRRP, 112configuration files, backup/restore, 162configuration informationDual-Ethernet router, 45FRF8 + IP, 44PPP + IP, 34, 36, 38RFC 1483 + bri

Seite 308 - Example:

376 FRF8, 44GG.Lite DMT link type, 295G_DMT mode setting, 184G_LITE mode setting, 184GUI debug commands, 182Hhistory log, 168host mapping, 95HTTP acc

Seite 309 - DHCP Commands

377Kkernelupgrade from the LAN, 159upgrade from the WAN line, 160keyfile.dat, 115LL2TP, 122commands, 322configurations, 124over IPSec, 135LED fatal

Seite 310 - DHCP BOOTP DISALLOW

378 RFC 1483, 34, 39RFC 1483MER, 42RFC 1490, 34, 39RFC 1490MER, 42RFCs supported, 25RIP packet controls, 81route tracing command, 198router configura

Seite 311 - DHCP CLEAR ADDRESSES

379transport mode, 134troubleshootingbridging, 172console, 170factory configuration, 170hardware problems, 170history log, 168IP routing, 172IPX rou

Seite 312 - DHCP CLEAR VALUEOPTION

38 Chapter 2. Planning for Router ConfigurationBridging Network Protocol ttttSystem Names and Authentication PasswordsFor the Target RouterYou define

Seite 313 - DHCP DELRELAY

Chapter 2. Planning for Router Configuration 39RFC 1483/RFC 1490 Link ProtocolsThe Link Protocol RFC 1483 is a multiprotocol encapsulation method ove

Seite 314 - DHCP LIST

4 IP Filter changes Ñ see eth ip filter, page 237 or remote ipfilter , page 267¥ New -tcp rst parameter allows a filter to match the TCP RES

Seite 315 - DHCP LIST DEFINEDOPTIONS

40 Chapter 2. Planning for Router ConfigurationTCP/IP Ethernet RoutesYou normally do not need to define an Ethernet IP route. An Ethernet IP route con

Seite 316 - Example 1:

Chapter 2. Planning for Router Configuration 41Internal Network NumberThis is a logical network number that identifies an individual Novell server. I

Seite 317 - DHCP SET ADDRESSES

42 Chapter 2. Planning for Router ConfigurationttttDNS Internet Account Information (optional)This information is obtained from the Network Service Pr

Seite 318 - DHCP SET LEASE

Chapter 2. Planning for Router Configuration 43¥ DNS server address¥ DNS second server address¥ DNS domain nameNote: If you intend to only connect to

Seite 319 - Example 3:

44 Chapter 2. Planning for Router ConfigurationFRF8 Link ProtocolThe FRF8 Link Protocol is an encapsulation method that allows an ATM router to intero

Seite 320 - DHCP SET VALUEOPTION

Chapter 2. Planning for Router Configuration 45For the ATM WAN Interface This information is obtained from the Network Administrator or the Network S

Seite 321

46 Chapter 2. Planning for Router ConfigurationConfiguring the Dual-Ethernet Router for IP RoutingThe eth commands are used to configure the Dual-Ethe

Seite 322 - L2TP CALL

Chapter 3. Configuring Router Software 47Chapter 3. ConÞguring Router SoftwareThis chapter covers configuration tables and verifying the router confi

Seite 323 - L2TP FORWARD

48 Chapter 3. Configuring Router SoftwareConÞguration TablesThe following tables give you step-by-step instructions for standard configurations of the

Seite 324 - L2TP SET ADDRESS

Chapter 3. Configuring Router Software 49Configuring PPP with IP Routing This table outlines configuration commands for the PPP Link Protocol with th

Seite 325 - L2TP SET CHAPSECRET

About This Manual This manual contains information on the syntax and use of the Command Line Interface for the family of DSL routers. Configuration o

Seite 326 - L2TP SET OURADDRESS

50 Chapter 3. Configuring Router SoftwareConfiguring PPP with IPX Routing This table outlines configuration commands for the PPP Link Protocol with th

Seite 327 - L2TP SET REMOTENAME

Chapter 3. Configuring Router Software 51Configuring PPP with Bridging This table outlines configuration commands for the PPP Link Protocol with the

Seite 328 - L2TP SET WANIF

52 Chapter 3. Configuring Router SoftwareConfiguring RFC 1483 / RFC 1490 with IP Routing This table outlines configuration commands for the RFC 1483 a

Seite 329 - REMOTE SETL2TPCLIENT

Chapter 3. Configuring Router Software 53Configuring RFC 1483 / RFC 1490 with IPX Routing This table outlines configuration commands for the RFC 1483

Seite 330 - REMOTE SETLNS

54 Chapter 3. Configuring Router SoftwareConfiguring RFC 1483 / RFC 1490 with Bridging This table outlines configuration commands for the RFC 1483 and

Seite 331 - FILTER BR DEL

Chapter 3. Configuring Router Software 55Configuring MAC Encapsulated Routing: RFC 1483MER / RFC 1490MER with IP Routing This table outlines configur

Seite 332 - FILTER BR USE

56 Chapter 3. Configuring Router SoftwareConfiguring FRF8 with IP Routing This table outlines configuration commands for the FRF8 Link Protocol with t

Seite 333 - PPPoE Commands

Chapter 3. Configuring Router Software 57Configuring Mixed Network Protocols Several network protocols can be configured concurrently in the same rou

Seite 334 - PPPOE LIST

58 Chapter 3. Configuring Router SoftwareConfiguring a Dual-Ethernet Router for IP RoutingThis table outlines commands used to configure a Dual-Ethern

Seite 335 - IKE IPSEC POLICIES DISABLE

Chapter 3. Configuring Router Software 59Verify the Router ConÞgurationTest IP RoutingTest IP Routing over the Local Ethernet LAN (from PC) ¥ Use the

Seite 336 - IKE IPSEC POLICIES SET DEST

6 About This Manual Typographic Conventions The following typeface conventions are used in this guide: Typeface Item Examples Italics Book titles, c

Seite 337

60 Chapter 3. Configuring Router SoftwareTest IPX RoutingOne way to test IPX routing is to check for access to servers on the remote LAN. Under Window

Seite 338 - IKE IPSEC POLICIES SET PFS

Chapter 3. Configuring Router Software 61Sample ConÞgurationsSample Configuration 1: PPP with IP and IPX This configuration example comprises:¥ A sce

Seite 339 - IKE IPSEC POLICIES SET SOURCE

62 Chapter 3. Configuring Router SoftwareSample Configuration 1: Diagram for Target Router (SOHO)Small Home Office SOHO (Target/Local Router)

Seite 340

Chapter 3. Configuring Router Software 63Sample Configuration 1: Tables for Target Router (SOHO) SOHO System SettingsConÞguration SectionItem Command

Seite 341 - IKE IPSEC PROPOSALS ADD

64 Chapter 3. Configuring Router SoftwareNote: Fill in one worksheet for each remote router in the remote router database.SOHO Remote Router DatabaseE

Seite 342 - IKE IPSEC PROPOSALS LIST

Chapter 3. Configuring Router Software 65SOHO Remote Router DatabaseEntry: ISPConÞguration SectionItem CommandsRemote RoutersNew Entry Remote RouterÕ

Seite 343

66 Chapter 3. Configuring Router SoftwareSample Configuration 1: Check the Configuration with the LIST CommandsType the following commands to obtain a

Seite 344

Chapter 3. Configuring Router Software 67 IPX network number... 00000000 Total IPX remote routes... 0 Total IPX SAPs...

Seite 345 - IKE PEERS LIST

68 Chapter 3. Configuring Router SoftwareInformation About Names and Passwords for Sample Configuration 1In this configuration example, the PPP Link P

Seite 346 - IKE PEERS SET LOCALIDTYPE

Chapter 3. Configuring Router Software 69Sample Configuration 2: RFC 1483 with IP and Bridging This configuration example comprises:¥ A scenario desc

Seite 347 - IKE PEERS SET PEERIDTYPE

7 Table of Contents WhatÕs New in This Release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 348 - IKE PROPOSALS DELETE

70 Chapter 3. Configuring Router SoftwareSample Configuration 2: Diagram for Target Router SOHOSmall Home Office SOHO (Target Router)

Seite 349 - IKE PROPOSALS SET ENCRYPTION

Chapter 3. Configuring Router Software 71Sample Configuration 2: Tables for Target Router (SOHO) SOHO System SettingsConÞguration Section Item Comman

Seite 350 - IKE PROPOSALS SET LIFETIME

72 Chapter 3. Configuring Router SoftwareSOHO Remote Router DatabaseEntry: ISPConÞguration SectionItem CommandsRemote RoutersNew Entry Remote RouterÕs

Seite 351

Chapter 3. Configuring Router Software 73Sample Configuration 2: Check the Configuration with the LIST Commandssystem listGENERAL INFORMATION FOR <

Seite 352 - IPSEC LIST

74 Chapter 3. Configuring Router Software Compression Negotiation... off Source IP address/subnet mask... 192.168.200.20/255.255.255

Seite 353 - IPSEC SET DIRECTION

Chapter 3. Configuring Router Software 75Sample Configuration 3: Configuring a Dual-Ethernet Router for IP RoutingScenario:The following example prov

Seite 354 - IPSEC SET GATEWAY

76 Chapter 4. Configuring Special FeaturesChapter 4. ConÞguring Special FeaturesThe features described in this chapter are advanced topics. They are p

Seite 355 - IPSEC SET SERVICE

Chapter 4. Configuring Special Features 77Multiple IP SubnetsYou may configure the router to provide access to multiple IP subnets on the Ethernet net

Seite 356

78 Chapter 4. Configuring Special FeaturesVirtual Routing TablesThe virtual routing feature allows you to define multiple routing tables. This is also

Seite 357 - PPP with IP Routing

Chapter 4. Configuring Special Features 79Bridge Filtering and IP Firewall You can control the flow of packets across the router using bridge filterin

Seite 358 - PPP with IPX Routing

8Configuration Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Seite 359 - Configuring PPP with Bridging

80 Chapter 4. Configuring Special FeaturesEnable/Disable Internet Firewall FilteringThe router supports IP Internet Firewall Filtering to prevent unau

Seite 360

Chapter 4. Configuring Special Features 81IP (RIP) Protocol ControlsYou can configure the router to send and receive RIP packet information, respectiv

Seite 361 - (for Frame Relay Routers)

82 Chapter 4. Configuring Special FeaturesDHCP (Dynamic Host ConÞguration Protocol)The router supports DHCP and can act as the DHCP server. (The route

Seite 362

Chapter 4. Configuring Special Features 83DHCP Administration and ConfigurationThe DHCP administration and configuration process is divided into the f

Seite 363

84 Chapter 4. Configuring Special Featuresdhcp add <net> <mask>To remove a subnetwork, use:dhcp del <net> Note: All client leases as

Seite 364 - RFC 1483FR with IP Routing

Chapter 4. Configuring Special Features 85Caution: If <ipaddr> is a subnet, you will delete the entire subnet.Setting the Lease Time¥ ConceptsTh

Seite 365

86 Chapter 4. Configuring Special FeaturesWarning: The client will not be aware that the administrator has changed or released a client lease!To chang

Seite 366 - ConÞgure IPX Routing

Chapter 4. Configuring Special Features 87To clear the value for a global option, use:dhcp clear valueoption <code>Example:To set the global val

Seite 367 - Ex: 00:00:00:00:00:01

88 Chapter 4. Configuring Special FeaturesNote: By default, the DHCP server does not satisfy BootP requests unless the administrator has explicitly en

Seite 368 - Step 2: Review your Settings

Chapter 4. Configuring Special Features 89Example 6:To clear the subnet 192.168.254.0 server IP address and file name:dhcp bootp tftpserver 192.168.25

Seite 369 - Command Index

9Dial Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 370

90 Chapter 4. Configuring Special FeaturesExample: To define a new option with a code of 128, a minimum number of IP addresses of 1, a maximum number

Seite 371

Chapter 4. Configuring Special Features 91Network Address Translation (NAT)The router supports both of the following NAT techniques:Classic NAT One NA

Seite 372

92 Chapter 4. Configuring Special FeaturesTo enable NAT for an Ethernet interface, use the commands:eth ip translate on <interface>saveThe save

Seite 373

Chapter 4. Configuring Special Features 93Remember to type save to make the changes persistent across reboots.Example 1:Assume that the local LAN netw

Seite 374 - Topic Index

94 Chapter 4. Configuring Special FeaturesNot enough memory was available to create an entry. This condition should not ordinarily occur because the a

Seite 375

Chapter 4. Configuring Special Features 95Classic NAT With classic NAT, one PC IP address is translated to one NAT IP address. This NAT technique is p

Seite 376

96 Chapter 4. Configuring Special Features¥ Multiple-Host Remapping EntriesUsers may enter as many host remapping entries as they wish.Example:remote

Seite 377

Chapter 4. Configuring Special Features 97PPPoE (PPP over Ethernet)PPPoE is a method of delivering PPP sessions over an Ethernet LAN connected to a DS

Seite 378

98 Chapter 4. Configuring Special Featuresremote setBrOptions stp off <remoteName> In addition, if the remote entry should be used only for

Seite 379

Chapter 4. Configuring Special Features 99To set up a timeout, set the minline value to 0 and specify the timeout period in seconds, as follows:remote

Kommentare zu diesen Handbüchern

Keine Kommentare