SpeedStream ª Router Family Command Line Interface Guide
10BootP Concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152BootP
100 Chapter 4. Configuring Special Featuresremote setourpasswd Secret PPPoEuser## Define an IP route for the remote.remote addiproute 0.0.0.0 0.0.
Chapter 4. Configuring Special Features 101Controlling Remote Management With the following security control features, the user can control remote man
102 Chapter 4. Configuring Special Featuressystem addsnmpfilter 192.168.1.5 192.168.1.12To delete client ranges previously defined, use these commands
Chapter 4. Configuring Special Features 103Dial BackupThe Dial Backup capability provides a backup V.90 connection to the Internet when the default DS
104 Chapter 4. Configuring Special Features¥ Minimum retry period before DSL link restoration is attempted¥ Specify the modem parameters.¥ Specify the
Chapter 4. Configuring Special Features 105The router determines your gateway and/or DNS address implicitly via a means such as DHCP, static configura
106 Chapter 4. Configuring Special Featurescheck whether the DSL link has been restored. This time period between checks is called the retry period (d
Chapter 4. Configuring Special Features 107# pause), and finally the 7-digit local number.remote setphone async 1 9,5554218 backup# Specifies the bit
108 Chapter 4. Configuring Special FeaturesThe following illustration shows two routers connecting a LAN to the Internet. By using VRRP, the backup ro
Chapter 4. Configuring Special Features 109For example, assume that the gateway IP address is 192.168.100.254. If the default logical interface (0:0)
11Router Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206SYSTEM (Ta
110 Chapter 4. Configuring Special FeaturesAdding a VRID Attribute RecordTo define a record to contain the attributes for a VRID in a router, use this
Chapter 4. Configuring Special Features 111Note: Our implementation does not validate the IP addresses in the advertisement packet or authenticate usi
112 Chapter 4. Configuring Special FeaturesSample VRRP ConfigurationThe sample configuration shown here is for two routers, one master and one backup.
Chapter 4. Configuring Special Features 113## Use the default time interval (1 second) and preemption option (preempt).## Save the changes and then re
114 Chapter 5. Configuring Software OptionsChapter 5. ConÞguring Software OptionsThe features described in this chapter can be purchased as software o
Chapter 5. Configuring Software Options 115Adding a New Software Option KeyA software option key is a 44-character string, unique to a particular rout
116 Chapter 5. Configuring Software OptionsEncryptionNote: Encryption is a software option. The following section applies only for routers with this o
Chapter 5. Configuring Software Options 117Use this sample configuration with the additional encryption commands as a guideline to configure your own
118 Chapter 5. Configuring Software Optionsremote setEncryption DESE_1_KEY dh96.num SOHOsaverebootFile Format for the Diffie-Hellman Number FileThe fi
Chapter 5. Configuring Software Options 119IP FilteringIP Filtering is a type of firewall used to control network traffic. The process involves filter
How to Access the Command Line This manual describes the Command Line Interface for your router. The Command Line Interface gives you access to all c
120 Chapter 5. Configuring Software OptionsIf NAT translation is enabled for the Input interface, NAT translation is performed. Forward Phase At this
Chapter 5. Configuring Software Options 121action is for packets coming from the local protected network; it passes the packet to IPSec so it can be e
122 Chapter 5. Configuring Software OptionsL2TP Tunneling Ñ Virtual Dial-UpThis section has four parts:¥ The Introduction provides a general overview
Chapter 5. Configuring Software Options 123LNS, L2TP Client, LAC, and Dial User An L2TP tunnel is created between an L2TP client and an L2TP network s
124 Chapter 5. Configuring Software OptionsLNS and L2TP Client Relationship The LNS acts as the supervising system. The L2TP client acts both as the d
Chapter 5. Configuring Software Options 1252. Decide if one side or both sides of the connection should be allowed to initiate a tunnel. 3. Create th
126 Chapter 5. Configuring Software Options l2tp set authen on | off <TunnelName> Type of L2TP support for tunnel:Configure the entry to act
Chapter 5. Configuring Software Options 127Simple L2TP Client Configuration Example This example shows how a telecommuter working at home (client side
128 Chapter 5. Configuring Software Options2. Work_Router 3. Shared_Secret 4. 10.0.0.1L2TP tunnel configuration commands. These commands would be use
Chapter 5. Configuring Software Options 1291. ppp_soho2. ppp_soho_secret3. We assume that this router will authenticate the router at work with the fo
How to Access the Command Line 13 Terminal Session under Windows (HyperTerminal) To open the HyperTerminal emulator available under the Windows oper
130 Chapter 5. Configuring Software OptionsTunnelOnly the L2TP client (soho) will initiate the tunnel and make the connection. The tunnel is routed th
Chapter 5. Configuring Software Options 131Enable IP routing for soho:eth ip enable eth ip addr 192.168.101.1 255.255.255.0 Set up ISDN parameters:isd
132 Chapter 5. Configuring Software OptionsCreate a DHCP pool of addresses:dhcp add 172.16.0.0 255.255.255.0 dhcp del 192.168.254.0dhcp set addr 172.1
Chapter 5. Configuring Software Options 133save reboot¥ Configuration commands for LNSserverNote: LNSserver is a DSL router. Define LNSserver:system n
134 Chapter 5. Configuring Software OptionsIPSec (Internet Protocol Security)Note: IPSec security is a software option for your router. The option be
Chapter 5. Configuring Software Options 135It can also be used for L2TP over IPSec. The routers at either end of the L2TP tunnel do both the IPSec and
136 Chapter 5. Configuring Software OptionsThe following figure shows the transformed IP packet after the ESP or AH protocol has been applied in tunne
Chapter 5. Configuring Software Options 137during this phase. Phase 2 IKE then exchanges proposals for IPSec security attributes, generates the encryp
138 Chapter 5. Configuring Software OptionsAdditional IKE SettingsIn addition to the peer identification and shared secret described earlier, IKE requ
Chapter 5. Configuring Software Options 139IKE CommandsThe Internet Key Exchange (IKE) process consists of two phases. In phase 1, a moderately secure
14 How to Access the Command Line Terminal Session for Macintosh or UNIX To open a terminal window emulation in a Macintosh or UNIX environment, you
140 Chapter 5. Configuring Software OptionsSets the IP address of the other endpoint. One end, the gateway, has a fixed IP address. The other end, the
Chapter 5. Configuring Software Options 141ike proposals set dh_group <NONE | 1 | 2 > <ProposalName>Proposes the Diffie-Hellman (DH) key g
142 Chapter 5. Configuring Software OptionsNONE No ESP encapsulation and no ESP message authentication. (If you select this option, the encapsulation
Chapter 5. Configuring Software Options 143ike ipsec policies set mode <TUNNEL | TRANSPORT> <PolicyName>Specifies the encapsulation mode (
144 Chapter 5. Configuring Software OptionsIKE Configuration ExamplesThis section shows two simple IKE configurations. The installation CD also contai
Chapter 5. Configuring Software Options 145# MD5 authentication# Diffie-Hellman group 2 key exchange# 24-hour timeout# Unlimited dataike proposals add
146 Chapter 5. Configuring Software Options# Describe the home office peer# IKE main mode is used because the home office has a fixed IP address # (19
Chapter 5. Configuring Software Options 147saverebootAggressive Mode ExampleThis example supposes, like the preceding main mode example, that a secure
148 Chapter 5. Configuring Software Optionsike peers set localidtype domainname home_peerike peers set localid branchoffice.big.com home_peerIPSec Com
Chapter 5. Configuring Software Options 149Specifies the identifier (SPID) for the IPSec tunnel. It must match the SPID at the other end of the tunnel
How to Access the Command Line 154. The router displays a line identifying itself and then displays the Login: prompt.
150 Chapter 6. Managing the RouterChapter 6. Managing the RouterThis chapter describes facilities for managing, monitoring, and securing the router. T
Chapter 6. Managing the Router 151trigger alarms on thresholds, graph or list node statistic counters, view and edit individual MIB variables, and pri
152 Chapter 6. Managing the RouterTFTPD rootdirectoryThe TFTPD operational parameters are kept in file ROUTER.INI in the form:rootdir=rootdirectoryret
Chapter 6. Managing the Router 153Relaying BootP RequestsThe DHCP relay list is an optional list of IP addresses of servers on the network. You create
154 Chapter 6. Managing the RouterBoot Code Maintenance OptionsThe router provides a number of maintenance options for booting router software. ¥ You
Chapter 6. Managing the Router 155Option 1: Retry Start-Up If you are in Manual Boot mode, you can reboot the router in the boot procedure order by se
156 Chapter 6. Managing the RouterThe boot IP address is the router LAN IP address used during the boot procedure. This address may differ from the LA
Chapter 6. Managing the Router 157When the router is configured by a PC, the GUI overwrites the time and date fields. The router time and date values
158 Chapter 6. Managing the RouterIdentifying Fatal Boot FailuresFatal boot failures can be identified by the light patterns shown by the LEDs on the
Chapter 6. Managing the Router 159Software Kernel UpgradesYou can upgrade the software kernel by downloading a new version from the LAN or from the WA
16 Chapter 1. Router Concepts Chapter 1. Router Concepts This chapter provides background information applicable to the router on topics useful to ne
160 Chapter 6. Managing the Routerthe return key for the load address). If all entered information is valid, the router boots from the network. An exa
Chapter 6. Managing the Router 161where xxx.xxx.xxx.xxx is the TFTP server IP address, sfilename is the server filename of the kernel, and KERNEL.F2K
162 Chapter 6. Managing the RouterBackup and Restore ConÞguration FilesTo successfully save configuration files to the server, those files must alread
Chapter 6. Managing the Router 163FLASH Memory Recovery ProceduresRecovering Kernels for Routers with Configuration SwitchesIn the unlikely event that
164 Chapter 6. Managing the RouterRecovering Kernels for Routers with a Reset ButtonThe reset button (if your router has one) is recessed in an unlabe
Chapter 6. Managing the Router 1655. In the BootP Setting dialog box, click OK. Configuration Manager writes the above settings to a file called BOOTD
166 Chapter 6. Managing the RouterBatch File Command ExecutionThis feature is used to load batch files of configuration commands into the router. This
Chapter 7. Troubleshooting 167Chapter 7. Troubleshooting Software problems usually occur when the routerÕs software configuration contains incomplete
168 Chapter 7. TroubleshootingOnce the router is in Ready State, the other LEDs may indicate transmitting and receiving activity as follows:¥ The WAN
Chapter 7. Troubleshooting 169Accessing History Log through Configuration Manager1. Select Tools and Terminal Window (the console cable is required).2
Chapter 1. Router Concepts 17Numerous network protocols have evolved, and within each protocol are associated protocols for routing, error handling,
170 Chapter 7. TroubleshootingInterpretation and Troubleshooting To isolate a problem with the TCP/IP protocol, perform the following three tests:1. T
Chapter 7. Troubleshooting 171¥ connect to the router.¥ log in.¥ access the remote network.¥ access the router via Telnet.¥ download software.Finally,
172 Chapter 7. TroubleshootingNote: If you do not reset switches 5 and 6 to the up position and then reboot, the router is placed in maintenance mode.
Chapter 7. Troubleshooting 173¥ The IP address must be within the valid range for the subnet.¥ Verify that the IP and gateway addresses are correct on
174 Chapter 7. Troubleshooting¥ Make sure that the Novell server is up.Incorrect VPI/VCI (ATM Routers)If you are given an incorrect VCI/VPI number or
Chapter 7. Troubleshooting 175frame voice <x> Changes the voice DLCI to the specified number x.frame stats Shows LMI statistics.For a frame stat
176 Chapter 7. TroubleshootingValue Actual ActualSpecified (G.711) (G.726)0-5 5.5 (1) 11 (1)6-11 11 (2) 11(1)12-16 16.5 (3) 22 (2)17-22 22 (4) 22 (2)2
Chapter 7. Troubleshooting 177Explanation: PAP cannot be negotiated.Can't agree with <router/user> on what their IP address should beExplan
178 Chapter 7. TroubleshootingExplanation: The router does not have a system name. For PAP/CHAP negotiation, the router will use a default name and pa
Chapter 7. Troubleshooting 179Explanation: The remote destination refused to participate in the PAP/CHAP authentication process.Startup failedExplanat
18 Chapter 1. Router ConceptsThese bridge-only units are pre-configured; no further configuration is required. The unit comes up in bridge mode automa
180 Chapter 7. TroubleshootingDebugging CommandsThe following commands may be available for debugging purposes. Please use them with caution because t
Chapter 7. Troubleshooting 181Dumps all tables. If you capture and send this output to Technical Support, it can be useful in debugging problems. For
182 Chapter 7. TroubleshootingWeb GUI Debug CommandsIf you point your web browser to http://192.168.254.254/tools/index.html, you can display an index
Chapter 7. Troubleshooting 183 BER_METER_STATUS ... BER Meter Statussdsl btstat *Displays available SDSL status commands.sdsl bts felmDis
184 Chapter 7. TroubleshootingShows AAL2 statistics for voice router.voice 12stats clearResets values.dsp <NOEC | ECON>Turns echo canceller on (
Chapter 7. Troubleshooting 185Frame Relay Debug Commandsframe statsDisplays statistics. For more information, see FRAME STATS, on page 204.ATM Tracing
186 Chapter 7. Troubleshooting¥ Type of operating system (Windows 95, 98, NT, or Windows for Workgroups)¥ Description of the problem¥ List of other eq
Chapter 8. Command Reference 187Chapter 8. Command ReferenceThis chapter lists the formats of the commands you can enter on the router command line.T
188 Chapter 8. Command ReferenceExample:# ?Top-level commands:? help versionfilter logout exitr
Chapter 8. Command Reference 189ARP LISTLists Address Resolution Protocol (ARP) table entries in an IP routing environment. ARP is a tool used to f
Chapter 1. Router Concepts 19¥ Routing takes precedence over bridging; i.e., when routing is active, the router uses the packetÕs protocol address inf
190 Chapter 8. Command ReferenceExample:# bi listBRIDGE GROUP 0:00206F024C34: P US SD A 0180C2000000:
Chapter 8. Command Reference 191Additional interfaces on other routers could include:FR/3 144kb 0%/0% 0%/0% (HDLC/FR) OPENEDFR-VC/
192 Chapter 8. Command ReferenceIPXROUTESLists the current entries in the IPX routing table.IPXSAPSLists the current services in the IPX SAPs table.ip
Chapter 8. Command Reference 193LOGOUTLogs out to reinstate administrative security after you have completed changing the routerÕs configuration.MEMT
194 Chapter 8. Command ReferencePINGThis command sends an echo message, available within the TCP/IP protocol suite. The echo message is sent to a rem
Chapter 8. Command Reference 195PSLists all of the tasks (processes) running in the system and the status of the tasks.REBOOTThis command causes a re
196 Chapter 8. Command Reference¥ Ethernet IP address ¥ TCP/IP routing ¥ Remote router default bridging destination ¥ TCP/IP route addresses ¥ SAPs an
Chapter 8. Command Reference 197save eth Saves the configuration settings for the Ethernet LAN into FLASH memory.save filter Saves the bridging filte
198 Chapter 8. Command ReferenceTCP STATSDisplays the TCP statistics and open connections.TRACEROUTETraces the route taken by packets sent from the ta
Chapter 8. Command Reference 199 18: 208.178.103.62 19: reply from 204.71.200.68: bytes=56 (data), time=95 ms traceroute: packets sent
2 November 2000 Copyright Efficient Networks provides this publication Òas isÓ without warranty of any kind, either expressed or implied, including,
20 Chapter 1. Router Concepts¥ Support for these voice gateways:¥ Jetstream proprietary¥ CopperCom proprietary¥ ATM Forum Standards based (ATM Forum d
200 Chapter 8. Command ReferenceFile System CommandsThe file system commands allow you to perform maintenance and recovery on the router. These comman
Chapter 8. Command Reference 201DELETERemoves a file from the file system.filename Name of the file to be deleted. The filename is in the format xxxx
202 Chapter 8. Command Referenceindicates the file system is corrupted, you may wish to reformat the disk, reboot the router, and recopy the router so
Chapter 8. Command Reference 203RENAMERenames a file in the file system.SYNCCommits the changes made to the file system to FLASH memory.Frame Command
204 Chapter 8. Command ReferenceFRAME LMITurns frame LMI either on or off.Example:# frame onLMI is onFRAME VOICEDisplays the voice DLCI for voice rout
Chapter 8. Command Reference 205 Data Packets Out Queued... 0 Data Packets Out (dropped Q Full).. 0 Voice Cells In...
206 Chapter 8. Command ReferenceRouter ConÞguration CommandsConfiguration commands are used to set configuration information for each functional capab
Chapter 8. Command Reference 207SYSTEM (Target Router System Configuration Commands)The following commands set basic router configuration information
208 Chapter 8. Command ReferenceSYSTEM ADDBOOTPSERVERAdds an address to the BootP server list. (The BootP server list is also the DHCP relay list.)Whi
Chapter 8. Command Reference 209SYSTEM ADDIPROUTINGTABLEDefines a new virtual routing table. Once defined, you can add routes to the table using the
Chapter 1. Router Concepts 21Changing Your Voice ProfileIf your voice gateway is an ATM standards-based gateway, the voice profile must match the conf
210 Chapter 8. Command Referenceaction One of the following command actions:ipaddr Selects the host with this IP address as server (4 decimals separat
Chapter 8. Command Reference 211The Syslog filter can comprise one or more ranges of IP addresses that DHCP may return for Syslog servers. To delete
212 Chapter 8. Command Referencefirst ip addr First IP address of the client range. last ip addr Last IP address of the client range. May be omitted i
Chapter 8. Command Reference 213SYSTEM BACKUP ADDAdds an IP address to the list of addresses to be pinged for the Dial Backup option. The command can
214 Chapter 8. Command Referenceipaddr IP address to be deleted from the list (four decimals separated by periods). GW Gateway address. The router det
Chapter 8. Command Reference 215SYSTEM BACKUP PINGINTERVALChanges the ping interval for a group, that is, the number of seconds between pings during
216 Chapter 8. Command ReferenceSYSTEM BACKUP RETRYChanges the Dial Backup retry period. The retry period determines how often the router attempts to
Chapter 8. Command Reference 217percentage Minimum success rate required during a ping test of the addresses in the group (integer, 0 thru 99). The d
218 Chapter 8. Command ReferenceSYSTEM DELBOOTPSERVER Removes an address from the BootP server list. (The BootP server list is also the DHCP relay lis
Chapter 8. Command Reference 219system delHTTPFilter 192.168.1.5 192.168.1.12SYSTEM DELIPROUTINGTABLEDeletes a range of addresses that reference a vi
22 Chapter 1. Router ConceptsPAP/CHAP Security AuthenticationThe router supports PAP (Password Authentication Protocol) and CHAP (Challenge Handshake
220 Chapter 8. Command Referencehttp HTTP port.tftp TFTP port.all All ports.last port Optional last port in the range of ports as seen by the remote e
Chapter 8. Command Reference 221SYSTEM DELSYSLOGSERVERRemoves an address from the list of Syslog servers. To see the server addresses, use the comman
222 Chapter 8. Command ReferenceSYSTEM HISTORYDisplays the routerÕs most recent console log.SYSTEM HTTPPORTManages HTTP port access including disablin
Chapter 8. Command Reference 223 Syslog Port... default (514) Allowed Syslog Servers... all Default Syslog Server
224 Chapter 8. Command Referenceit deletes them from the address ranges for the other virtual routing tables. The command then adds the specified addr
Chapter 8. Command Reference 225SYSTEM ONEWANDIALUP This command is useful when security concerns dictate than the router have only one connection ac
226 Chapter 8. Command ReferenceSYSTEM SECURITYTIMERAutomatically logs out a Telnet or console user out of privileged mode when no typing has occurre
Chapter 8. Command Reference 227¥ bi (if bridging is enabled)¥ ipifs¥ iproutes¥ ipxroutesSYSTEM SYSLOGPORTManages Syslog port access including disabl
228 Chapter 8. Command ReferenceSYSTEM WAN2WANFORWARDINGAllows the user to manage WAN-to-WAN forwarding of data from one WAN link to another. For exam
Chapter 8. Command Reference 229ETH (Target Router Ethernet LAN Bridging and Routing)The following commands allow you to configure the Ethernet inter
Chapter 1. Router Concepts 23Authentication ProcessThe authentication process occurs regardless of whether a remote router connects to the local route
230 Chapter 8. Command ReferenceNote: This command requires a save and reboot before it takes effect. port# Ethernet interface (0 for a single-port ro
Chapter 8. Command Reference 231If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specifi
232 Chapter 8. Command Referencegateway IP address (4 decimals separated by periods).hops Number of routers through which the packet must go to get
Chapter 8. Command Reference 233interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.If the rout
234 Chapter 8. Command Referenceeth ip bindRoute 10.1.3.0 255.255.255.0 1 192.168.252.9 ROSA 0:1eth ip bindRoute 10.1.3.0 255.255.255.0 1 192.168.252.
Chapter 8. Command Reference 235If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specifi
236 Chapter 8. Command Referenceme Sends the incoming server request to the local router, regardless of its IP address.protocol Protocol used by the s
Chapter 8. Command Reference 237ETH IP DISABLEDisables IP routing across the Ethernet LAN. This commands acts as a master switch allowing you to disa
238 Chapter 8. Command Referenceeth ip filter insert <type> <action> <parameters> [<interface>] Inserts a filter in the list o
Chapter 8. Command Reference 239The Þlter type speciÞes at which point the Þlter is compared to the IP packet (see the illustration under IP Filterin
24 Chapter 1. Router Conceptsrouter. This allows you to set a unique CHAP or PAP authentication password for authentication of the local site by the r
240 Chapter 8. Command Reference-dp <ICMP type> | <first dest port>[:<last dest port>]The packet must have a destination port that
Chapter 8. Command Reference 241If -v (verbose) is specified, a message is printed every time this filter matches a packet, regardless of the filter
242 Chapter 8. Command ReferenceThe management IP address is separate from the IP address used for IP address translation. The IP address used for add
Chapter 8. Command Reference 243If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1) must be specifi
244 Chapter 8. Command ReferenceETH IP RESTARTStops and restarts a logical Ethernet interface. To read about logical Ethernet interfaces, see page 77.
Chapter 8. Command Reference 245eth ip start 0:1ETH IP STOPStops a logical Ethernet interface. To read about logical Ethernet interfaces, see page 77
246 Chapter 8. Command ReferenceETH IP UNBINDROUTERemoves an Ethernet route from the named IP virtual routing table. To list the routes, use the iprou
Chapter 8. Command Reference 247interface Ethernet interface. The default Ethernet interface is 0:0.To specify a logical interface other than 0:0, sp
248 Chapter 8. Command ReferenceETH IPX FRAMESets the frame encapsulation method. The default is 802.2.ETH LISTLists information about the Ethernet in
Chapter 8. Command Reference 249 IP filters defined... no IP address/subnet mask... 192.168.0.101/255.255.255.0 Static
Chapter 1. Router Concepts 25Interoperability Between the Router and Other EquipmentThe router uses industry-wide standards to ensure compatibility wi
250 Chapter 8. Command ReferenceNote: This command takes effect immediately, but you must save the change if it is to persist after you restart the in
Chapter 8. Command Reference 251port# Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be omitted if the route
252 Chapter 8. Command Referencepreempt Preempt immediately.nopreempt Do not preempt a router with lower priority.vrid Virtual router ID of the VRRP
Chapter 8. Command Reference 253ETH VRRP SET PRIORITYSpecifies the priority attribute in a VRRP attribute record for the VRID (virtual router ID). Th
254 Chapter 8. Command ReferenceSkew_Time = (256 - Priority) / 256Thus, the default skew time is (256 - 100) / 256, or .609375. The default master dow
Chapter 8. Command Reference 255Remote Access ConÞgurationThe following commands allow you to add, delete, and modify remote routers to which the tar
256 Chapter 8. Command ReferenceREMOTE CommandsREMOTE ?Lists the supported keywords. (The list varies depending on the router model.)stREMOTE ADDAdds
Chapter 8. Command Reference 257REMOTE ADDBRIDGEDefines the remote router entry as the default bridging destination for outbound bridging. The comman
258 Chapter 8. Command ReferenceREMOTE ADDIPROUTEAdds an IP address route to a network or station on the LAN connected beyond the remote router. The r
Chapter 8. Command Reference 259REMOTE ADDIPXSAPAdds an IPX SAP to the server information table for a service on the LAN network connected beyond the
26 Chapter 1. Router Concepts¥ RFC 1877 Automatic IP / DNS¥ RFC 1962 PPP Compression Control Protocol (CCP)¥ RFC 1969 DES¥ RFC 1973 PPP in Frame Re
260 Chapter 8. Command Referenceipaddr Selects the host with this IP address as server (4 decimals separated by periods).discard Discards the incoming
Chapter 8. Command Reference 261remoteName Name of the remote router (character string).Example:The following command adds a route to virtual routing
262 Chapter 8. Command ReferenceExample:remote delbridge 01:08:03:0A:0B:0C HQREMOTE DELENCRYPTIONDeletes encryption files associated with a remote rou
Chapter 8. Command Reference 263REMOTE DELIPXROUTEDeletes an IPX address for a network on the LAN connected beyond the remote router. Note: The reboo
264 Chapter 8. Command ReferenceREMOTE DELOURPASSWDRemoves the unique CHAP or PAP authentication password entries established by the command remote se
Chapter 8. Command Reference 265REMOTE DELSERVERDeletes an entry created by the remote addServer command (page 259).action One of the following comma
266 Chapter 8. Command ReferenceREMOTE DISAUTHENThis command is intended for situations where third-party routers cannot be authenticated; the target
Chapter 8. Command Reference 267REMOTE ENABRIDGEEnables bridging from the target router to the remote router. This command requires rebooting the tar
268 Chapter 8. Command ReferenceIf no line numbers are specified, all filters in the list are deleted. If only the first line number is specified, all
Chapter 8. Command Reference 269drop The packet is discarded, without sending an ICMP (Internet Control Management Protocol) error message.reject The
Chapter 1. Router Concepts 270x0021 IP0x002d Van Jacobson compressed TCP/IP0x002f Van Jacobson uncompressed TCP/IP0x8031 Bridge NCP0x0031 Bridge Fram
270 Chapter 8. Command Reference- Specify -tcp noflag if neither the SYN flag nor the ACK flag can be set. For example, for the IP filter to match the
Chapter 8. Command Reference 271remote ipfilter append forward drop -da 192.168.0.0 -dm 255.255.0.0 internetremote ipfilter append forward drop -da 1
272 Chapter 8. Command Reference mtu... 1500REMOTE LISTBRIDGELists the current bridge settings for the specified remot
Chapter 8. Command Reference 273 Total IP remote routes... 5 192.168.210.0/255.255.255.0/1 10.0.0.0/255.0.0.0/1
274 Chapter 8. Command ReferenceNote: If the remote name is not specified, a list of phone numbers is displayed for each remote router in the database
Chapter 8. Command Reference 275E164 ITU E164 encoding.partial The MAC address of the router is substituted for octets 2-7 of the NSAP.full No change
276 Chapter 8. Command Referencein | out | both Incoming traffic, outgoing traffic, or both. The default is both.remoteName Name of the remote router
Chapter 8. Command Reference 277The threshold is used in bandwidth on demand management. Initially, a call is activated on one B-channel. When bandwi
278 Chapter 8. Command ReferenceREMOTE SETENCRYPTION (DifÞe-Hellman Encryption)This command is used to specify encryption based on the Diffie-Hellman
Chapter 8. Command Reference 279txrip Transmit IP RIP-1 compatible broadcast packets and RIP-2 multicast packets to the remote site. When this option
28 Chapter 1. Router ConceptsMAC Encapsulated Routing: RFC 1483MER (ATM) or RFC 1490MER (Frame Relay)MER encapsulation allows IP packets to be carried
280 Chapter 8. Command ReferenceroutersÕ local WAN port. This command requires that you define a Source WAN IP Address with the command:remote setSrcI
Chapter 8. Command Reference 281remote setMaxLine 2 HQREMOTE SETMGMTIPADDRThis command assigns to the remote router entry an IP address which is to b
282 Chapter 8. Command ReferenceThe following command keeps a channel allocated for the session even when there is no traffic.remote setMinLine 1 PPPo
Chapter 8. Command Reference 283REMOTE SETOURSYSNAMESets a unique CHAP or PAP authentication system name for the local router that is used for authen
284 Chapter 8. Command ReferenceremoteName Name of the remote entry (character string).Example:# The phone number begins with 9 (to get an outside lin
Chapter 8. Command Reference 285REMOTE SETPVC Specifies the PVC number for connecting to the remote router.REMOTE SETRMTIPADDRSets the WAN IP address
286 Chapter 8. Command ReferenceFor more information on the Dial Backup option, see page 149.bitrate Bit rate to be used for the phone number. Possibl
Chapter 8. Command Reference 287A timeout period is desirable if your service provider charges by the hour. However, the connection has to wait a few
288 Chapter 8. Command ReferenceREMOTE STATSCLEARAllows the user to reset the statistics counter for a given remote router.REMOTE STOPIf the remote is
Chapter 8. Command Reference 289Example:The following command stops the active session for remote HQ.remote stop HQREMOTE UNBINDIPVIRTUALROUTERemoves
Chapter 1. Router Concepts 29Router System and ConÞguration FilesThe system software and configuration information for the router are contained in fil
290 Chapter 8. Command ReferenceADSL CommandsUse the following commands to manage the ADSL (Asymmetric Digital Subscriber Line) link for an ADSL route
Chapter 8. Command Reference 291ADSL STATSShows the current error status for the ADSL connection.adsl stats [clear]clear Option used to reset the cou
292 Chapter 8. Command ReferenceATM CommandsUse the following commands to manage the ATM (Asynchronous Transfer Mode) link for an ATM router. ATM ?Lis
Chapter 8. Command Reference 293ATM SPEEDSets the speed of the ATM link in kilobits per second. The default upstream speed is 326 Kb/s. Use this comm
294 Chapter 8. Command Referenceremote setATMtraffic 47 1 HQThe following command disables ATM traffic-shaping on remote router HQ:remote setATMtraffi
Chapter 8. Command Reference 295DMT CommandsThese commands manage the ADSL DMT (Discrete MultiTone) router. To see additional DMT debug commands, see
296 Chapter 8. Command ReferenceDual-Ethernet Router (ETH) CommandsThe following Ethernet commands are used to manage the Ethernet interfaces of the D
Chapter 8. Command Reference 297option stpSet this option to on to use the Spanning Tree Protocol (STP). The default is on.STP is used to detect brid
298 Chapter 8. Command ReferenceHDSL CommandsUse the following commands to manage the HDSL (High-Speed Digital Subscriber Line) link for an HDSL route
Chapter 8. Command Reference 299HDSL ?Lists the supported keywords.HDSL SAVESaves the HDSL-related changes across restarts and reboots.HDSL SPEEDCO e
3 WhatÕs New in This Release? This version of the Command Line Interface (CLI) manual has been updated to document features available with this rel
30 Chapter 1. Router Conceptssoftware keys are isomorphic to one and only one router. For more information on software option keys, see page 114.
300 Chapter 8. Command ReferenceHDSL TERMINAL The router is by default configured as the Customer Premises Equipment (CPE). Use this command if you in
Chapter 8. Command Reference 301IDSL CommandsAn IDSL (ISDN Digital Subscriber Line) delivers a maximum symmetric 144 Kbps of bandwidth. The IDSL band
302 Chapter 8. Command ReferenceThe IDSL bandwidth is composed of two 64 Kbps B channels, plus one 16 Kbps D channel. Your speed setting indicates the
Chapter 8. Command Reference 303REMOTE SETPROTOCOLThis IDSL-specific command is used to select the appropriate link protocol for your IDSL connection
304 Chapter 8. Command ReferenceSDSL CommandsThe commands in this section manage the Symmetric Digital Subscriber Line (SDSL) link for an SDSL router.
Chapter 8. Command Reference 30503/09/1998-17:15:35:DOD: link to co over ATM-VC/1 is now up03/09/1998-17:15:57:SDSL: Line Rate at last activation sav
306 Chapter 8. Command ReferenceThe default status is on. However, to be effective, autobaud pre-activation must also be enabled at the Central Office
Chapter 8. Command Reference 307speed Speed in kbps. To see the speeds available for the model type, enter sdsl speed. If the auto-speed search is in
308 Chapter 8. Command Referencecpe Defines the router as the customer premises (CPE) equipment.co Defines the router as the central office (CO) equip
Chapter 8. Command Reference 309DHCP CommandsThe following DHCP (Dynamic Host Configuration Protocol) commands allow you to:¥ Enable and disable subn
Chapter 2. Planning for Router Configuration 31Chapter 2. Planning for Router ConÞgurationThis chapter describes the basic information you need befor
310 Chapter 8. Command ReferenceDHCP ADDRELAY Adds an address to the DHCP relay list. (This list is also the BootP server list.) While the relay list
Chapter 8. Command Reference 311DHCP BOOTP FILE Specifies the boot file name (kernel) and the subnet to which it applies.Note: Be sure to specify th
312 Chapter 8. Command ReferenceDHCP CLEAR ALL RECORDSClears all DHCP information, including all leases and all global DHCP information. Unlike erase
Chapter 8. Command Reference 313DHCP DEL Deletes a subnetwork lease, a specific client lease, or a code.DHCP DELRELAY Removes an address from the DHC
314 Chapter 8. Command ReferenceDHCP DISABLE Disables a subnetwork or a client lease.DHCP ENABLE Enables a subnetwork or a client lease.DHCP LISTLists
Chapter 8. Command Reference 315DOMAINNAME (15)... efficient.comWINSSERVER (44)... 192.168.254.73Subnet 192.168.254.0, EnabledMask.
316 Chapter 8. Command ReferenceExample 1:The following command lists all available options (predefined and user-defined):#dhcp list definedoptionscod
Chapter 8. Command Reference 317code REQUESTEDIPADDR (50), 1 occurrence, type IPADDRESS-RESERVEDcode IPADDRLEASETIME (51), 1 occurrence, type LONGINT
318 Chapter 8. Command ReferenceDHCP SET EXPIRE This command is used to manually change a client lease expiration time to a certain value. Note 1:
Chapter 8. Command Reference 319Example 3:dhcp set lease 192.168.254.0 infinite (sets lease time to inÞnite for this subnet)
32 Chapter 2. Planning for Router ConfigurationThe commands that define information for a remote router entry start with the word remote and end with
320 Chapter 8. Command ReferenceDHCP SET MASKUsed to conveniently change the mask of a DHCP subnet without having to delete and recreate the subnet an
Chapter 8. Command Reference 321value Value to be assigned to the speciÞed option. It could be a byte, word, signed long, unsigned long, binary, IP a
322 Chapter 8. Command ReferenceL2TP Ñ Virtual Dial-Up Configuration CommandsThis section contains L2TP command descriptions. For a complete discussio
Chapter 8. Command Reference 323L2TP CLOSECloses an L2TP tunnel and/or session.L2TP DELDeletes a tunnel entry.L2TP FORWARDThe router can be conÞgured
324 Chapter 8. Command ReferenceL2TP LISTProvides a complete display of the current conÞguration settings for tunnel(s), except for the authentication
Chapter 8. Command Reference 325Caution: If the IP address of the remote tunnel is part of a subnet that is also reached through the tunnel, a routin
326 Chapter 8. Command ReferenceL2TP SET DIALOUTLets the LNS instruct the L2TP client to use an ISDN phone line to place a call on its behalf.L2TP SET
Chapter 8. Command Reference 327L2TP SET OURPASSWORDSpeciÞes the routerÕs secret/password for PPP authentication on a per-tunnel basis.L2TP SET OURSY
328 Chapter 8. Command ReferenceL2TP SET TYPEDeÞnes the type of L2TP support for the tunnel. The routerÕs role is deÞned on a per-tunnel basis.L2TP S
Chapter 8. Command Reference 329TunnelName Name of the tunnel (character string). The name is case-sensitive.Examples:This command restricts the tun
Chapter 2. Planning for Router Configuration 33To configure a Dual-Ethernet Router:Select one of these two configurations:Configuring the Dual-Ethern
330 Chapter 8. Command ReferenceREMOTE SETLNSWith this command, this remote is the path to the LNS, and it will forward the incoming call (which match
Chapter 8. Command Reference 331FILTER BR (Bridge Filtering) CommandsBridge filtering allows you to control the packets transferred across the router
332 Chapter 8. Command Referencepos Byte offset within a packet; number from 0-127.data Hexadecimal number up to 6 bytes.Example:This command deletes
Chapter 8. Command Reference 333PPPoE CommandsThis section contains the commands that are specific to PPPoE (PPP over Ethernet). To learn more about
334 Chapter 8. Command Reference# pppoe listPPPoE Client Session ... DialUpPPP.net PPPoE/Ifs number... 1 Access Concentrator.. 15021109
Chapter 8. Command Reference 335IKE (Internet Key Exchange) CommandsThe IKE software option and the IKE commands are described in IPSec (Internet Pro
336 Chapter 8. Command ReferenceIKE IPSEC POLICIES ENABLEEnables an IPSec policy. An enable command is required for each new policy; the enable comman
Chapter 8. Command Reference 337IKE IPSEC POLICIES SET DESTPORTDefines a destination port filtering parameter value for the policy. The destination p
338 Chapter 8. Command Referenceike ipsec policies set interface all mypolicyIKE IPSEC POLICIES SET MODEDefines the mode filtering parameter value for
Chapter 8. Command Reference 339none Perfect Forward Secrecy negotiation is not required for this connection.PolicyName Name of the IPsec policy to w
34 Chapter 2. Planning for Router ConfigurationPPP Link Protocol (over ATM or Frame Relay)The PPP Link Protocol is an encapsulation method that can be
340 Chapter 8. Command ReferenceIPaddress IP address allowed to be the source of the data (4 decimals separated by periods).IPmask IP network mask (4
Chapter 8. Command Reference 341protected network. (See the example below.) You can use the eth ip addhostmapping command (page 230) to map a range o
342 Chapter 8. Command ReferenceIKE IPSEC PROPOSALS DELETEDeletes an existing IKE IPSec proposal. For more information, see IKE IPSec Proposal Command
Chapter 8. Command Reference 343ProposalName Name of the IPsec proposal to which the AH authentication parameter is added. To see the proposal names
344 Chapter 8. Command ReferenceExample: ike ipsec proposals set espenc 3des myproposalIKE IPSEC PROPOSALS SET IPCOMPSets the proposal parameter that
Chapter 8. Command Reference 345Example: ike ipsec proposals set lifetime 600 myproposalIKE PEERS ADDDefines the name of a new IKE peer. Other comman
346 Chapter 8. Command ReferenceIKE PEERS SET ADDRESSSets the IP address of the other endpoint of the secure IKE peer connection. The address specifie
Chapter 8. Command Reference 347One of the following:IPADDR The local ID must be an IP address.DOMAINNAME The local ID must be a domain name.EMAIL Th
348 Chapter 8. Command ReferenceThe peer ID type must match the local ID type on the other end of the connection. The possible ID types are IP address
Chapter 8. Command Reference 349ProposalName Name of the IKE proposal to be deleted. To see the proposal names in use, use the ike proposals list com
Chapter 2. Planning for Router Configuration 35ttttDNS Internet Account Information (optional)The Domain Name Service (DNS) maps host names to IP add
350 Chapter 8. Command ReferenceOne of the following:DES Use DES (56-bit) encryption. 3DES Use 3DES (168-bit) encryption (if 3DES is enabled in the ro
Chapter 8. Command Reference 351PRESHARE Preshared key.ProposalName Name of the IKE proposal to which the session authentication parameter is added.
352 Chapter 8. Command ReferenceIPSEC ENABLEEnables a defined IPSec SA entry, indicating it is complete and ready to be used. The command can also re-
Chapter 8. Command Reference 353 key=012345678901234567890123456789012345678901234567 SHA1 key=abcdefabcdefabcdefabcdefabcdefabcdefabcd (20)No c
354 Chapter 8. Command Referenceipsec set direction <INBOUND | OUTBOUND> <SAname>One of the following:INBOUNDOUTBOUNDSAname Name of the IP
Chapter 8. Command Reference 355IPSEC SET IDENTSpecifies the identifier (SPID) for the IPSec tunnel. It must match the SPID at the other end of the t
356 Appendix A. Network Information WorksheetsAppendix A. Network Information WorksheetsTo configure the target (local) router, fill out the blank wor
Appendix A. Network Information Worksheets 357Configuring PPP with IP RoutingPPP with IP Routing Steps Commands Your settingsSystem SettingsSystem Nam
358 Appendix A. Network Information WorksheetsConfiguring PPP with IPX Routing PPP with IPX Routing Steps Commands Your SettingsSystem SettingsSystem
Appendix A. Network Information Worksheets 359Configuring PPP with BridgingPPP with Bridging Steps Commands Your SettingsSystem SettingsSystem Name sy
36 Chapter 2. Planning for Router ConfigurationIPX Routing Network ProtocolttttSystem Names and Authentication PasswordsFor the Target RouterYou defin
360 Appendix A. Network Information WorksheetsConfiguring RFC 1483 / RFC 1490 with IP RoutingRFC 1483 / RFC 1490 with IP Routing Steps Commands Your S
Appendix A. Network Information Worksheets 361Configuring RFC 1483 / RFC 1490 with IPX RoutingRFC 1483 / RFC 1490 with IPX Routing Steps Commands Your
362 Appendix A. Network Information WorksheetsConfiguring RFC 1483 / RFC 1490 with BridgingRFC 1483 / RFC 1490 with Bridging Steps Commands Your Setti
Appendix A. Network Information Worksheets 363Configuring RFC 1483MER / RFC 1490MER with IP Routing RFC 1483MER/RFC 1490MER with IP Routing Steps Comm
364 Appendix A. Network Information WorksheetsConfiguring FRF8 with IP RoutingRFC 1483FR with IP Routing Steps Commands Your SettingsSystem SettingsSy
Appendix A. Network Information Worksheets 365Configuring a Dual-Ethernet Router for IP RoutingThis table outlines commands used to configure a Dual-E
366 Appendix B. Configuring IPX RoutingAppendix B. ConÞguring IPX RoutingIPX Routing ConceptsTo establish IPX Routing, you will need to enter all remo
Appendix B. Configuring IPX Routing 367Step 1: Collect Your Network Information for the Target (Local) RouterThe remote side of the WAN link has all o
368 Appendix B. Configuring IPX RoutingStep 2: Review your SettingsCommands used to review your IPX configuration:Ð eth listÐ remote listÐ ipxsa
369Command IndexSymbols?, 187Aadsl ?, 290adsl restart, 290adsl speed, 290adsl stats, 291arp delete, 188arp list, 189atm ?, 292atm reset, 29
Chapter 2. Planning for Router Configuration 37Internal Network NumberIt is a logical network number that identifies an individual Novell server. It
370 eth ip delRoute, 235eth ip delServer, 235eth ip directedBcast, 236eth ip disable, 237eth ip enable, 237eth ip filter, 237eth ip firewall,
371ike peers set mode, 347ike peers set peerID, 347ike peers set peerIDtype, 347ike peers set secret, 348ike proposals add, 348ike proposals de
372 remote bindIPVirtualRoute, 260remote blockNetBios, 261remote del, 261remote delATMnsap, 261remote delBridge, 261remote delEncryption, 262re
373system addUdpRelay, 212system admin, 212system authen, 212system backup add, 213system backup delete, 213system backup disable, 214system b
374 Topic IndexNumerics3DES encryption, 135IKE proposal command, 141Aaddress translation, 91ADPCM voice encoding, 20ADSL DMT router commands, 295debu
375VRRP, 112configuration files, backup/restore, 162configuration informationDual-Ethernet router, 45FRF8 + IP, 44PPP + IP, 34, 36, 38RFC 1483 + bri
376 FRF8, 44GG.Lite DMT link type, 295G_DMT mode setting, 184G_LITE mode setting, 184GUI debug commands, 182Hhistory log, 168host mapping, 95HTTP acc
377Kkernelupgrade from the LAN, 159upgrade from the WAN line, 160keyfile.dat, 115LL2TP, 122commands, 322configurations, 124over IPSec, 135LED fatal
378 RFC 1483, 34, 39RFC 1483MER, 42RFC 1490, 34, 39RFC 1490MER, 42RFCs supported, 25RIP packet controls, 81route tracing command, 198router configura
379transport mode, 134troubleshootingbridging, 172console, 170factory configuration, 170hardware problems, 170history log, 168IP routing, 172IPX rou
38 Chapter 2. Planning for Router ConfigurationBridging Network Protocol ttttSystem Names and Authentication PasswordsFor the Target RouterYou define
Chapter 2. Planning for Router Configuration 39RFC 1483/RFC 1490 Link ProtocolsThe Link Protocol RFC 1483 is a multiprotocol encapsulation method ove
4 IP Filter changes Ñ see eth ip filter, page 237 or remote ipfilter , page 267¥ New -tcp rst parameter allows a filter to match the TCP RES
40 Chapter 2. Planning for Router ConfigurationTCP/IP Ethernet RoutesYou normally do not need to define an Ethernet IP route. An Ethernet IP route con
Chapter 2. Planning for Router Configuration 41Internal Network NumberThis is a logical network number that identifies an individual Novell server. I
42 Chapter 2. Planning for Router ConfigurationttttDNS Internet Account Information (optional)This information is obtained from the Network Service Pr
Chapter 2. Planning for Router Configuration 43¥ DNS server address¥ DNS second server address¥ DNS domain nameNote: If you intend to only connect to
44 Chapter 2. Planning for Router ConfigurationFRF8 Link ProtocolThe FRF8 Link Protocol is an encapsulation method that allows an ATM router to intero
Chapter 2. Planning for Router Configuration 45For the ATM WAN Interface This information is obtained from the Network Administrator or the Network S
46 Chapter 2. Planning for Router ConfigurationConfiguring the Dual-Ethernet Router for IP RoutingThe eth commands are used to configure the Dual-Ethe
Chapter 3. Configuring Router Software 47Chapter 3. ConÞguring Router SoftwareThis chapter covers configuration tables and verifying the router confi
48 Chapter 3. Configuring Router SoftwareConÞguration TablesThe following tables give you step-by-step instructions for standard configurations of the
Chapter 3. Configuring Router Software 49Configuring PPP with IP Routing This table outlines configuration commands for the PPP Link Protocol with th
About This Manual This manual contains information on the syntax and use of the Command Line Interface for the family of DSL routers. Configuration o
50 Chapter 3. Configuring Router SoftwareConfiguring PPP with IPX Routing This table outlines configuration commands for the PPP Link Protocol with th
Chapter 3. Configuring Router Software 51Configuring PPP with Bridging This table outlines configuration commands for the PPP Link Protocol with the
52 Chapter 3. Configuring Router SoftwareConfiguring RFC 1483 / RFC 1490 with IP Routing This table outlines configuration commands for the RFC 1483 a
Chapter 3. Configuring Router Software 53Configuring RFC 1483 / RFC 1490 with IPX Routing This table outlines configuration commands for the RFC 1483
54 Chapter 3. Configuring Router SoftwareConfiguring RFC 1483 / RFC 1490 with Bridging This table outlines configuration commands for the RFC 1483 and
Chapter 3. Configuring Router Software 55Configuring MAC Encapsulated Routing: RFC 1483MER / RFC 1490MER with IP Routing This table outlines configur
56 Chapter 3. Configuring Router SoftwareConfiguring FRF8 with IP Routing This table outlines configuration commands for the FRF8 Link Protocol with t
Chapter 3. Configuring Router Software 57Configuring Mixed Network Protocols Several network protocols can be configured concurrently in the same rou
58 Chapter 3. Configuring Router SoftwareConfiguring a Dual-Ethernet Router for IP RoutingThis table outlines commands used to configure a Dual-Ethern
Chapter 3. Configuring Router Software 59Verify the Router ConÞgurationTest IP RoutingTest IP Routing over the Local Ethernet LAN (from PC) ¥ Use the
6 About This Manual Typographic Conventions The following typeface conventions are used in this guide: Typeface Item Examples Italics Book titles, c
60 Chapter 3. Configuring Router SoftwareTest IPX RoutingOne way to test IPX routing is to check for access to servers on the remote LAN. Under Window
Chapter 3. Configuring Router Software 61Sample ConÞgurationsSample Configuration 1: PPP with IP and IPX This configuration example comprises:¥ A sce
62 Chapter 3. Configuring Router SoftwareSample Configuration 1: Diagram for Target Router (SOHO)Small Home Office SOHO (Target/Local Router)
Chapter 3. Configuring Router Software 63Sample Configuration 1: Tables for Target Router (SOHO) SOHO System SettingsConÞguration SectionItem Command
64 Chapter 3. Configuring Router SoftwareNote: Fill in one worksheet for each remote router in the remote router database.SOHO Remote Router DatabaseE
Chapter 3. Configuring Router Software 65SOHO Remote Router DatabaseEntry: ISPConÞguration SectionItem CommandsRemote RoutersNew Entry Remote RouterÕ
66 Chapter 3. Configuring Router SoftwareSample Configuration 1: Check the Configuration with the LIST CommandsType the following commands to obtain a
Chapter 3. Configuring Router Software 67 IPX network number... 00000000 Total IPX remote routes... 0 Total IPX SAPs...
68 Chapter 3. Configuring Router SoftwareInformation About Names and Passwords for Sample Configuration 1In this configuration example, the PPP Link P
Chapter 3. Configuring Router Software 69Sample Configuration 2: RFC 1483 with IP and Bridging This configuration example comprises:¥ A scenario desc
7 Table of Contents WhatÕs New in This Release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
70 Chapter 3. Configuring Router SoftwareSample Configuration 2: Diagram for Target Router SOHOSmall Home Office SOHO (Target Router)
Chapter 3. Configuring Router Software 71Sample Configuration 2: Tables for Target Router (SOHO) SOHO System SettingsConÞguration Section Item Comman
72 Chapter 3. Configuring Router SoftwareSOHO Remote Router DatabaseEntry: ISPConÞguration SectionItem CommandsRemote RoutersNew Entry Remote RouterÕs
Chapter 3. Configuring Router Software 73Sample Configuration 2: Check the Configuration with the LIST Commandssystem listGENERAL INFORMATION FOR <
74 Chapter 3. Configuring Router Software Compression Negotiation... off Source IP address/subnet mask... 192.168.200.20/255.255.255
Chapter 3. Configuring Router Software 75Sample Configuration 3: Configuring a Dual-Ethernet Router for IP RoutingScenario:The following example prov
76 Chapter 4. Configuring Special FeaturesChapter 4. ConÞguring Special FeaturesThe features described in this chapter are advanced topics. They are p
Chapter 4. Configuring Special Features 77Multiple IP SubnetsYou may configure the router to provide access to multiple IP subnets on the Ethernet net
78 Chapter 4. Configuring Special FeaturesVirtual Routing TablesThe virtual routing feature allows you to define multiple routing tables. This is also
Chapter 4. Configuring Special Features 79Bridge Filtering and IP Firewall You can control the flow of packets across the router using bridge filterin
8Configuration Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
80 Chapter 4. Configuring Special FeaturesEnable/Disable Internet Firewall FilteringThe router supports IP Internet Firewall Filtering to prevent unau
Chapter 4. Configuring Special Features 81IP (RIP) Protocol ControlsYou can configure the router to send and receive RIP packet information, respectiv
82 Chapter 4. Configuring Special FeaturesDHCP (Dynamic Host ConÞguration Protocol)The router supports DHCP and can act as the DHCP server. (The route
Chapter 4. Configuring Special Features 83DHCP Administration and ConfigurationThe DHCP administration and configuration process is divided into the f
84 Chapter 4. Configuring Special Featuresdhcp add <net> <mask>To remove a subnetwork, use:dhcp del <net> Note: All client leases as
Chapter 4. Configuring Special Features 85Caution: If <ipaddr> is a subnet, you will delete the entire subnet.Setting the Lease Time¥ ConceptsTh
86 Chapter 4. Configuring Special FeaturesWarning: The client will not be aware that the administrator has changed or released a client lease!To chang
Chapter 4. Configuring Special Features 87To clear the value for a global option, use:dhcp clear valueoption <code>Example:To set the global val
88 Chapter 4. Configuring Special FeaturesNote: By default, the DHCP server does not satisfy BootP requests unless the administrator has explicitly en
Chapter 4. Configuring Special Features 89Example 6:To clear the subnet 192.168.254.0 server IP address and file name:dhcp bootp tftpserver 192.168.25
9Dial Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
90 Chapter 4. Configuring Special FeaturesExample: To define a new option with a code of 128, a minimum number of IP addresses of 1, a maximum number
Chapter 4. Configuring Special Features 91Network Address Translation (NAT)The router supports both of the following NAT techniques:Classic NAT One NA
92 Chapter 4. Configuring Special FeaturesTo enable NAT for an Ethernet interface, use the commands:eth ip translate on <interface>saveThe save
Chapter 4. Configuring Special Features 93Remember to type save to make the changes persistent across reboots.Example 1:Assume that the local LAN netw
94 Chapter 4. Configuring Special FeaturesNot enough memory was available to create an entry. This condition should not ordinarily occur because the a
Chapter 4. Configuring Special Features 95Classic NAT With classic NAT, one PC IP address is translated to one NAT IP address. This NAT technique is p
96 Chapter 4. Configuring Special Features¥ Multiple-Host Remapping EntriesUsers may enter as many host remapping entries as they wish.Example:remote
Chapter 4. Configuring Special Features 97PPPoE (PPP over Ethernet)PPPoE is a method of delivering PPP sessions over an Ethernet LAN connected to a DS
98 Chapter 4. Configuring Special Featuresremote setBrOptions stp off <remoteName> In addition, if the remote entry should be used only for
Chapter 4. Configuring Special Features 99To set up a timeout, set the minline value to 0 and specify the timeout period in seconds, as follows:remote
Comentarios a estos manuales