Escolar Documentos
Profissional Documentos
Cultura Documentos
SOFTWARE REFERENCE
Contents
List of Figures
List of Tables
Preface
Purpose of this Manual .................................................................................. lxxi
Intended Audience ....................................................................................... lxxii
Structure of this Manual .............................................................................. lxxiii
Where To Find More Information .................................................................. lxxv
Standards and Protocols ............................................................................... lxxvi
Supported Standards and Protocols ....................................................... lxxvi
Obtaining Copies of Internet Protocols and Standards .......................... lxxviii
Background Reading ............................................................................ lxxviii
Publicly Accessible Documents ..................................................................... lxxix
Conventions ................................................................................................. lxxx
Special Feature Licences .............................................................................. lxxxiii
Allied Telesyn Offices and Locations ............................................................ lxxxiii
Readers Comments ..................................................................................... lxxxv
Command Summary
CHAPTER 1
Operation
Introduction ................................................................................................... 1-5
The Command Processor ............................................................................... 1-5
Normal Mode and Security Mode ............................................................ 1-5
User Privilege Levels ................................................................................. 1-8
Remote Security Officer ......................................................................... 1-10
Entering Commands .............................................................................. 1-10
Aliases ................................................................................................... 1-11
Online Help ........................................................................................... 1-12
Storing and Retrieving Configuration Information .................................. 1-12
The Graphical User Interface (GUI) ............................................................... 1-13
Enabling and Disabling the GUI ............................................................. 1-13
Accessing the GUI ................................................................................. 1-13
User Authentication Facility .......................................................................... 1-14
The User Authentication Database ......................................................... 1-15
Asynchronous Port Security ................................................................... 1-19
Telneting from the Router ...................................................................... 1-20
Counters ............................................................................................... 1-20
Semipermanent Manager Port ............................................................... 1-21
RADIUS ........................................................................................................ 1-21
TACACS ...................................................................................................... 1-23
iv
vi
1-113
1-114
1-115
1-117
1-118
1-119
1-120
1-121
1-122
1-123
1-125
1-126
1-127
1-128
1-129
1-130
1-132
1-132
1-133
1-134
1-135
1-135
1-136
1-137
1-140
1-140
1-140
1-144
1-146
Interfaces
Introduction ................................................................................................... 2-3
Naming interfaces .......................................................................................... 2-3
Simple Interface Names ........................................................................... 2-3
Fully Qualified Interface Names ................................................................ 2-5
Ethernet ........................................................................................................ 2-6
Encapsulations ........................................................................................ 2-7
Configuration .......................................................................................... 2-9
Synchronous Interfaces ................................................................................ 2-12
Encapsulations ...................................................................................... 2-12
Modem Control Signals ......................................................................... 2-13
Configuration ........................................................................................ 2-14
Asynchronous Interfaces .............................................................................. 2-16
Encapsulations ...................................................................................... 2-17
Configuration ........................................................................................ 2-17
Autobauding ......................................................................................... 2-22
Testing Serial Data Circuits ........................................................................... 2-22
Carrier Detect ........................................................................................ 2-22
Loop back ............................................................................................. 2-23
Data indicators ...................................................................................... 2-23
Displaying Interfaces .................................................................................... 2-23
Interface Link Traps ...................................................................................... 2-24
Managing Interfaces with SNMP .................................................................. 2-24
Command Reference ................................................................................... 2-25
CONNECT ASYN ................................................................................... 2-25
DISABLE INTERFACE LINKTRAP .............................................................. 2-26
DISABLE ASYN ...................................................................................... 2-26
DISABLE SYN ......................................................................................... 2-27
vii
viii
Frame Relay
Introduction ................................................................................................... 4-3
Encapsulation ................................................................................................ 4-4
Data Link Connections ................................................................................... 4-6
The Local Management Interface (LMI) .......................................................... 4-8
Logical Interfaces ........................................................................................... 4-8
Disabling or Resetting a Frame Relay Interface ............................................... 4-9
Disabling or Resetting a Frame Relay DLC ...................................................... 4-9
Slow-start Mechanism ................................................................................. 4-10
Congestion Detection .................................................................................. 4-11
Detection using CLLM messages ............................................................ 4-11
Detection using BECN bits ..................................................................... 4-11
Congestion Control Scheme ........................................................................ 4-12
Support for Frame Relay .............................................................................. 4-13
Encryption and Compression over Frame Relay ............................................. 4-14
Troubleshooting Frame Relay Networks ........................................................ 4-15
Configuring Frame Relay .............................................................................. 4-15
ix
xi
X.25
Introduction ................................................................................................... 6-3
LAPB .............................................................................................................. 6-4
DCE Mode ..................................................................................................... 6-4
DTE Mode ..................................................................................................... 6-5
DTE Addresses ............................................................................................... 6-7
X.25 DCE Route Mapping .............................................................................. 6-7
Encapsulations ............................................................................................... 6-8
Configuring LAPB .......................................................................................... 6-9
Configuring an Interface for LAPB ......................................................... 6-10
Configuring LAPB Interface Parameters ................................................. 6-10
Configuring X.25 DCE ................................................................................. 6-11
Configure the LAPB Interface ................................................................ 6-11
Configure the X.25 DCE Interface ......................................................... 6-11
Configuring DTE Addresses ................................................................... 6-12
Configuring X.25 Route Mapping .......................................................... 6-12
Configuring X.25 DCE TCP Keep Alive parameters ................................ 6-13
Displaying and Debugging X.25 DCE Interfaces ..................................... 6-13
Configuring X.25 DTE .................................................................................. 6-14
Configure the LAPB Interface ................................................................ 6-14
Configure the X.25 DTE Interface .......................................................... 6-14
Configuring Call Parameter Entries ........................................................ 6-15
Configuring Permanent Virtual Circuits .................................................. 6-15
Hunt Groups ................................................................................................ 6-16
Configuration Examples ............................................................................... 6-18
A Basic X.25 Setup ................................................................................ 6-18
An Extended X.25 Setup ....................................................................... 6-24
X.25 over ISDN D Channel ..................................................................... 6-30
X.25 Hunt Groups ................................................................................. 6-31
xii
Synchronous Tunnelling
Introduction ...................................................................................................
Support for Synchronous Tunnelling ...............................................................
Configuration Example ..................................................................................
Command Reference .....................................................................................
ADD STT .................................................................................................
DELETE STT .............................................................................................
RESET STT ...............................................................................................
SET STT ...................................................................................................
SHOW STT ..............................................................................................
7-2
7-2
7-3
7-4
7-4
7-5
7-6
7-6
7-7
xiii
CHAPTER 8
xiv
xv
xvi
CHAPTER 9
xvii
IP Multicasting
Introduction ................................................................................................. 10-3
References ................................................................................................... 10-3
Overview of Multicast Routing ..................................................................... 10-3
Distance Vector Multicast Routing Protocol (DVMRP) .................................... 10-5
Configuring DVMRP .............................................................................. 10-6
Protocol Independent Multicast (PIM) ........................................................... 10-7
PIM Sparse Mode ......................................................................................... 10-7
PIM Sparse Mode Roles ......................................................................... 10-7
PIM SPARSE Mode Operation ................................................................ 10-8
Phase One Rendezvous Point Tree ..................................................... 10-9
Phase Two Register Stop ................................................................... 10-9
Phase Three Shortest Path Tree ......................................................... 10-9
PIM Dense Mode Version 2 ........................................................................ 10-10
Configuring PIM ........................................................................................ 10-11
Internet Group Management Protocol (IGMP) ............................................ 10-13
IGMP Proxy ......................................................................................... 10-14
Configuring IGMP ............................................................................... 10-15
Configuration Examples ............................................................................. 10-15
Multicasting using DVMRP .................................................................. 10-16
PIM Sparse Mode ................................................................................ 10-21
Command Reference ................................................................................. 10-24
ADD DVMRP INTERFACE ..................................................................... 10-25
ADD PIM BSRCANDIDATE .................................................................... 10-25
ADD PIM INTERFACE ........................................................................... 10-26
ADD PIM RPCANDIDATE ...................................................................... 10-27
DELETE DVMRP INTERFACE ................................................................. 10-28
DELETE PIM BSRCANDIDATE ................................................................ 10-29
DELETE PIM INTERFACE ....................................................................... 10-29
DELETE PIM RPCANDIDATE .................................................................. 10-29
DISABLE DVMRP .................................................................................. 10-30
DISABLE DVMRP DEBUG ..................................................................... 10-30
DISABLE IP IGMP ................................................................................. 10-31
DISABLE IP IGMP INTERFACE ............................................................... 10-31
DISABLE PIM ....................................................................................... 10-32
DISABLE PIM DEBUG ........................................................................... 10-32
ENABLE DVMRP .................................................................................. 10-32
ENABLE DVMRP DEBUG ...................................................................... 10-33
xviii
IPv6 Multicasting
Introduction ................................................................................................. 11-3
Overview of IPv6 Multicast Routing .............................................................. 11-3
Multicast Listener Discovery (MLD) ............................................................... 11-5
Queries and Reports .............................................................................. 11-5
Protocol Independent Multicast Sparse Mode (PIM-SM) ................................ 11-7
Configuring PIM-SM .................................................................................... 11-7
Configuring MLD ......................................................................................... 11-9
Configuration Example .............................................................................. 11-10
Command Reference ................................................................................. 11-15
ADD PIM6 BSRCANDIDATE .................................................................. 11-15
ADD PIM6 INTERFACE ......................................................................... 11-15
ADD PIM6 RPCANDIDATE .................................................................... 11-16
DELETE PIM6 BSRCANDIDATE .............................................................. 11-17
DELETE PIM6 INTERFACE ..................................................................... 11-17
DELETE PIM6 RPCANDIDATE ................................................................ 11-18
DISABLE IPV6 MLD .............................................................................. 11-18
DISABLE IPV6 MLD DEBUG .................................................................. 11-19
DISABLE IPV6 MLD INTERFACE ............................................................ 11-19
DISABLE PIM6 ..................................................................................... 11-19
DISABLE PIM6 DEBUG ......................................................................... 11-20
ENABLE IPV6 MLD ............................................................................... 11-20
ENABLE IPV6 MLD DEBUG ................................................................... 11-20
ENABLE IPV6 MLD INTERFACE ............................................................. 11-21
ENABLE PIM6 ...................................................................................... 11-21
ENABLE PIM6 DEBUG .......................................................................... 11-22
PURGE PIM6 ........................................................................................ 11-22
RESET PIM6 INTERFACE ....................................................................... 11-23
SET IPV6 MLD ...................................................................................... 11-23
SET IPV6 MLD INTERFACE .................................................................... 11-25
SET PIM6 ............................................................................................. 11-25
SET PIM6 BSRCANDIDATE ................................................................... 11-26
SET PIM6 INTERFACE ........................................................................... 11-27
SET PIM6 RPCANDIDATE ..................................................................... 11-27
SHOW IPV6 MLD ................................................................................. 11-28
SHOW IPV6 MLD CONFIG ................................................................... 11-30
SHOW IPV6 MLD COUNTERS ............................................................... 11-31
SHOW IPV6 MLD DEBUG ..................................................................... 11-32
SHOW PIM6 ........................................................................................ 11-32
SHOW PIM6 BSRCANDIDATE ............................................................... 11-33
SHOW PIM6 CONFIG ........................................................................... 11-35
SHOW PIM6 COUNTERS ...................................................................... 11-35
xix
11-37
11-38
11-39
11-40
11-43
11-44
11-45
Novell IPX
Introduction ................................................................................................. 12-3
The IPX Protocol ........................................................................................... 12-3
Addressing in a Novell Network ................................................................... 12-3
Interfaces and Circuits .................................................................................. 12-4
Routing ....................................................................................................... 12-5
Service Advertisement .................................................................................. 12-7
Traffic Filters ................................................................................................ 12-8
RIP and SAP Filters ....................................................................................... 12-8
Wildcard Expressions ............................................................................. 12-9
RIP Filters ............................................................................................. 12-10
SAP Filters ........................................................................................... 12-10
Global Versus Circuit-Specific Filters ..................................................... 12-11
Dial-on-Demand IPX .................................................................................. 12-11
SPX Spoofing with Dial-on-Demand IPX ..................................................... 12-12
Troubleshooting SPX Spoofing ............................................................. 12-13
Extended PING for IPX ............................................................................... 12-15
Counters and the MIB ................................................................................ 12-16
Configuration Examples ............................................................................. 12-16
A Basic IPX Setup ................................................................................ 12-16
IPX Dial-On-Demand ........................................................................... 12-21
Command Reference ................................................................................. 12-29
ADD IPX CIRCUIT ................................................................................ 12-29
ADD IPX EXCLUSION ........................................................................... 12-33
ADD IPX INCLUSION ............................................................................ 12-34
ADD IPX RIP ........................................................................................ 12-35
ADD IPX ROUTE .................................................................................. 12-36
ADD IPX SAP ....................................................................................... 12-37
ADD IPX SERVICE ................................................................................ 12-38
DELETE IPX CIRCUIT ............................................................................ 12-40
DELETE IPX EXCLUSION ....................................................................... 12-40
DELETE IPX INCLUSION ........................................................................ 12-41
DELETE IPX RIP .................................................................................... 12-42
DELETE IPX ROUTE .............................................................................. 12-43
DELETE IPX SAP ................................................................................... 12-43
DELETE IPX SERVICE ............................................................................ 12-44
DISABLE IPX ........................................................................................ 12-44
DISABLE IPX CIRCUIT ........................................................................... 12-45
ENABLE IPX ......................................................................................... 12-45
ENABLE IPX CIRCUIT ............................................................................ 12-46
PURGE IPX ........................................................................................... 12-46
RESET IPX ............................................................................................ 12-47
SET IPX CIRCUIT .................................................................................. 12-48
SET IPX GRIP|GSAP .............................................................................. 12-51
SET IPX RIP .......................................................................................... 12-51
SET IPX SAP ......................................................................................... 12-52
SHOW IPX ........................................................................................... 12-53
SHOW IPX CACHE ............................................................................... 12-55
SHOW IPX CALLLOG ........................................................................... 12-55
SHOW IPX CIRCUIT ............................................................................. 12-59
xx
DECnet
Introduction ................................................................................................. 13-2
Overview of a DECnet Network ................................................................... 13-2
DECnet Addresses ....................................................................................... 13-3
Routing and the Default Router ................................................................... 13-3
Routes and Routing Tables ........................................................................... 13-4
Filters ........................................................................................................... 13-5
Managing the Router ................................................................................... 13-5
Counter ................................................................................................ 13-5
Timers ................................................................................................... 13-6
Costs ..................................................................................................... 13-6
Configuration Examples ............................................................................... 13-8
A Basic DECnet Setup ............................................................................ 13-8
Troubleshooting .................................................................................. 13-10
Refining the DECnet Setup .................................................................. 13-11
Command Reference ................................................................................. 13-12
ADD DECNET EXCLUSION ................................................................... 13-13
ADD DECNET INCLUSION .................................................................... 13-14
ADD DECNET INTERFACE .................................................................... 13-15
ADD DECNET LPN ............................................................................... 13-16
DELETE DECNET EXCLUSION ............................................................... 13-16
DELETE DECNET INCLUSION ................................................................ 13-17
DELETE DECNET INTERFACE ................................................................ 13-18
DELETE DECNET LPN ........................................................................... 13-19
DISABLE DECNET ................................................................................. 13-19
ENABLE DECNET ................................................................................. 13-20
PURGE DECNET ................................................................................... 13-20
RESET DECNET .................................................................................... 13-21
SET DECNET ........................................................................................ 13-21
SET DECNET INTERFACE ...................................................................... 13-24
SHOW DECNET ................................................................................... 13-25
SHOW DECNET COUNTER ................................................................... 13-26
SHOW DECNET EXCLUSION ................................................................ 13-29
SHOW DECNET INCLUSION ................................................................. 13-29
SHOW DECNET INTERFACE ................................................................. 13-30
SHOW DECNET LPN ............................................................................ 13-31
SHOW DECNET ROUTE ........................................................................ 13-32
CHAPTER 14
Terminal Server
Introduction .................................................................................................
TTY Devices .................................................................................................
Command Line Editing and Recall ................................................................
Multiple Sessions .........................................................................................
Accessing Telnet Hosts and Other Services ...................................................
Telnet ....................................................................................................
Services .................................................................................................
14-2
14-2
14-4
14-6
14-7
14-7
14-8
xxi
Printer Server
Introduction ................................................................................................. 15-2
Line Printer Daemon (LPD) ........................................................................... 15-2
Support for LPD ..................................................................................... 15-2
Configuring LPD .................................................................................... 15-3
Printer Operation ................................................................................... 15-6
Troubleshooting .................................................................................... 15-7
Stream Printing ............................................................................................ 15-8
Support for Stream Printing ................................................................... 15-9
Configuring Stream Printing .................................................................. 15-9
Permanent Assignments ............................................................................ 15-11
Setting up a Permanent Assignment .................................................... 15-11
Command Reference ................................................................................. 15-13
ADD PERM .......................................................................................... 15-13
ADD STREAM ...................................................................................... 15-14
CREATE LPD ........................................................................................ 15-15
DELETE PERM ...................................................................................... 15-16
DELETE STREAM .................................................................................. 15-16
DESTROY LPD ...................................................................................... 15-17
DISABLE LPD ....................................................................................... 15-17
ENABLE LPD ........................................................................................ 15-18
RESET LPD ........................................................................................... 15-18
RESET PERM ........................................................................................ 15-19
RESET STREAM .................................................................................... 15-19
SET LPD ............................................................................................... 15-20
SET PERM ............................................................................................ 15-21
SHOW LPD .......................................................................................... 15-21
SHOW PERM ....................................................................................... 15-22
SHOW STREAM ................................................................................... 15-23
xxii
CHAPTER 16
xxiii
CHAPTER 17
Bridging
Introduction ................................................................................................. 17-3
The Bridging Process .................................................................................... 17-4
The Learning Process ............................................................................. 17-4
The Forwarding Process ......................................................................... 17-5
Ports ............................................................................................................ 17-6
Filtering ....................................................................................................... 17-7
Telnet to a Router Bridging IP ....................................................................... 17-8
Spanning Tree Protocol ................................................................................ 17-8
Electing the Root Bridge and Designated Bridge .................................... 17-9
Support for Bridging .................................................................................. 17-10
Configuring the Router as a Bridge ............................................................ 17-10
A Basic LAN Bridge Setup .................................................................... 17-11
Bridging in a Meshed Network with Spanning Tree .............................. 17-13
A Bridge Setup Using Filters ................................................................. 17-14
Command Reference ................................................................................. 17-16
ADD BRIDGE FILTER ............................................................................. 17-16
ADD BRIDGE GROUP ........................................................................... 17-19
ADD BRIDGE PORT .............................................................................. 17-20
ADD BRIDGE PROTOCOL ..................................................................... 17-20
ADD BRIDGE STATION ......................................................................... 17-23
DELETE BRIDGE FILTER ......................................................................... 17-23
DELETE BRIDGE GROUP ....................................................................... 17-24
DELETE BRIDGE PORT .......................................................................... 17-24
DELETE BRIDGE PROTOCOL ................................................................. 17-25
DELETE BRIDGE STATION ..................................................................... 17-25
DISABLE BRIDGE .................................................................................. 17-26
DISABLE BRIDGE LEARNING ................................................................. 17-26
DISABLE BRIDGE SPANNING ................................................................ 17-26
ENABLE BRIDGE .................................................................................. 17-27
ENABLE BRIDGE LEARNING ................................................................. 17-27
ENABLE BRIDGE SPANNING ................................................................. 17-27
PURGE BRIDGE .................................................................................... 17-28
RESET BRIDGE ..................................................................................... 17-28
SET BRIDGE AGEINGTIMER .................................................................. 17-29
SET BRIDGE FILTER ............................................................................... 17-29
SET BRIDGE GROUP ............................................................................. 17-31
SET BRIDGE PORT ................................................................................ 17-32
SET BRIDGE PROTOCOL ....................................................................... 17-33
SET BRIDGE SPANNING ........................................................................ 17-34
SHOW BRIDGE .................................................................................... 17-35
SHOW BRIDGE COUNTER .................................................................... 17-36
SHOW BRIDGE FILTER .......................................................................... 17-39
SHOW BRIDGE GROUP ........................................................................ 17-42
SHOW BRIDGE PORT ........................................................................... 17-43
SHOW BRIDGE PROTOCOL .................................................................. 17-46
SHOW BRIDGE SPANNING ................................................................... 17-47
SHOW BRIDGE STATION ...................................................................... 17-49
CHAPTER 18
18-2
18-2
18-4
18-5
18-6
18-6
18-7
18-8
xxiv
Test Facility
Introduction ................................................................................................. 19-2
Ethernet Port Tests ....................................................................................... 19-4
Asynchronous Port Tests ............................................................................... 19-6
Synchronous Port Tests ................................................................................. 19-7
Basic Rate ISDN Port Tests ............................................................................ 19-8
Primary Rate ISDN Port Tests ........................................................................ 19-9
MAC or PAC Card Tests ............................................................................. 19-10
Command Reference ................................................................................. 19-11
DISABLE TEST INTERFACE .................................................................... 19-11
ENABLE TEST INTERFACE ..................................................................... 19-12
RESET TEST INTERFACE ........................................................................ 19-14
SHOW TEST ......................................................................................... 19-14
CHAPTER 20
20-2
20-2
20-4
20-4
20-6
20-7
20-7
20-7
20-8
20-8
xxv
CHAPTER 22
xxvi
CHAPTER 23
Trigger Facility
Introduction ................................................................................................. 23-2
Defining Triggers .......................................................................................... 23-3
Examples ..................................................................................................... 23-4
Initiating ISDN Calls During Off-Peak Periods ......................................... 23-4
Command Reference ................................................................................... 23-6
ACTIVATE TRIGGER ............................................................................... 23-6
ADD TRIGGER ....................................................................................... 23-7
CREATE TRIGGER .................................................................................. 23-8
DELETE TRIGGER ................................................................................. 23-14
DESTROY TRIGGER .............................................................................. 23-14
DISABLE TRIGGER ................................................................................ 23-15
ENABLE TRIGGER ................................................................................ 23-16
PURGE TRIGGER .................................................................................. 23-16
SET TRIGGER ....................................................................................... 23-17
SHOW TRIGGER .................................................................................. 23-21
CHAPTER 24
AppleTalk
Introduction ................................................................................................. 24-3
AppleTalk Protocol Architecture ................................................................... 24-3
AppleTalk Nodes and Networks .................................................................... 24-3
LocalTalk ............................................................................................... 24-3
EtherTalk and TokenTalk ......................................................................... 24-5
AppleTalk Address Resolution Protocol (AARP) ............................................. 24-5
Address Translation ............................................................................... 24-6
Dynamic Assignment of Protocol Addresses ........................................... 24-6
Datagram Delivery Protocol .......................................................................... 24-6
Routing Table Maintenance Protocol (RTMP) ................................................ 24-7
Name Binding Protocol (NBP) ....................................................................... 24-9
Zone Information Protocol (ZIP) .................................................................. 24-10
Support for AppleTalk ................................................................................ 24-10
AppleTalk Filtering ..................................................................................... 24-11
DDP packet filtering ............................................................................ 24-12
RTMP or Routing Update filtering ........................................................ 24-13
Zone filtering ....................................................................................... 24-14
AppleTalk Dial-On-Demand ........................................................................ 24-15
Configuration Example .............................................................................. 24-16
Command Reference ................................................................................. 24-19
ADD APPLE CIRCUIT ............................................................................ 24-19
ADD APPLE DLCI ................................................................................. 24-20
ADD APPLE PACKETFILTER ................................................................... 24-20
ADD APPLE PORT ................................................................................ 24-22
ADD APPLE ROUTE .............................................................................. 24-24
ADD APPLE ROUTEFILTER .................................................................... 24-25
ADD APPLE ZONE ................................................................................ 24-26
ADD APPLE ZONEFILTER ...................................................................... 24-26
DELETE APPLE CIRCUIT ........................................................................ 24-27
DELETE APPLE DLCI ............................................................................. 24-28
DELETE APPLE PACKETFILTER ............................................................... 24-28
DELETE APPLE PORT ............................................................................ 24-29
DELETE APPLE ROUTE .......................................................................... 24-29
DELETE APPLE ROUTEFILTER ................................................................. 24-30
DELETE APPLE ZONE ............................................................................ 24-30
DELETE APPLE ZONEFILTER ................................................................... 24-31
DISABLE APPLE .................................................................................... 24-31
DISABLE APPLE DEBUG ........................................................................ 24-32
ENABLE APPLE ..................................................................................... 24-32
ENABLE APPLE DEBUG ........................................................................ 24-32
xxvii
CHAPTER 26
Logging Facility
Introduction ................................................................................................. 26-2
Format of Log Messages .............................................................................. 26-3
Secure Router Log Protocol .......................................................................... 26-4
Net Manage Message Protocol ..................................................................... 26-5
Processing of Log Messages ......................................................................... 26-5
Output Definitions and Message Filters .................................................. 26-5
Destinations .......................................................................................... 26-6
Configuring Output Definitions ............................................................. 26-8
Configuring Message Filters .................................................................. 26-9
Configuration Example .............................................................................. 26-10
Command Reference ................................................................................. 26-13
ADD LOG OUTPUT .............................................................................. 26-13
ADD LOG RECEIVE .............................................................................. 26-16
CREATE LOG OUTPUT ......................................................................... 26-18
DELETE LOG OUTPUT .......................................................................... 26-21
DELETE LOG RECEIVE .......................................................................... 26-22
DESTROY LOG OUTPUT ....................................................................... 26-23
DISABLE LOG ...................................................................................... 26-23
DISABLE LOG GENERATION ................................................................. 26-23
DISABLE LOG OUTPUT ......................................................................... 26-24
DISABLE LOG RECEPTION .................................................................... 26-24
xxviii
26-25
26-25
26-25
26-26
26-26
26-27
26-27
26-32
26-33
26-34
26-41
26-43
26-47
26-48
26-50
Scripting
Introduction ................................................................................................. 27-2
Creating Scripts ........................................................................................... 27-2
Script Commands .................................................................................. 27-2
Using the Built-in Text Editor .................................................................. 27-3
Loading from a TFTP Server .................................................................... 27-3
Loading from an Asynchronous Port ...................................................... 27-3
Using Scripts ................................................................................................ 27-4
Script Parameters ......................................................................................... 27-4
Script Control Structures .............................................................................. 27-5
Command Reference ................................................................................... 27-5
ACTIVATE SCRIPT .................................................................................. 27-6
ADD SCRIPT .......................................................................................... 27-7
DEACTIVATE SCRIPT .............................................................................. 27-8
DELETE SCRIPT ...................................................................................... 27-8
IF..THEN..ELSE..ENDIF ............................................................................. 27-9
SET SCRIPT .......................................................................................... 27-10
SHOW SCRIPT ..................................................................................... 27-11
WAIT ................................................................................................... 27-13
CHAPTER 28
Telephony Services
Introduction ................................................................................................. 28-3
Ports ............................................................................................................ 28-4
Extensions ................................................................................................... 28-4
Groups ........................................................................................................ 28-5
Prefix Management ...................................................................................... 28-6
Numbers ...................................................................................................... 28-7
Bell .............................................................................................................. 28-8
Tones ........................................................................................................... 28-8
Calls .......................................................................................................... 28-12
Internal Calls ....................................................................................... 28-12
External Calls ...................................................................................... 28-13
Call Handling ............................................................................................. 28-15
ISDN Supplemental Services ................................................................. 28-15
PBX Functions ..................................................................................... 28-18
Number Processing .................................................................................... 28-24
Shortcode Dialling ............................................................................... 28-24
Call Barring ......................................................................................... 28-26
Call Override ....................................................................................... 28-27
xxix
xxx
CHAPTER 29
CHAPTER 30
xxxi
CHAPTER 31
CHAPTER 32
xxxii
CHAPTER 33
CHAPTER 34
Firewall
Introduction ................................................................................................. 34-3
Policies ........................................................................................................ 34-4
Rules ........................................................................................................... 34-5
Secure Shell Access ...................................................................................... 34-8
Multicast Packet Handling ............................................................................ 34-8
Access Lists .................................................................................................. 34-9
List Files ................................................................................................. 34-9
RADIUS Servers ................................................................................... 34-10
Network Address Translation (NAT) ............................................................ 34-11
Interface-based NAT ............................................................................ 34-12
Rule-based NAT ................................................................................... 34-12
Web Redirection with Reverse NAT Rules ............................................. 34-12
Dynamic Interfaces .................................................................................... 34-13
Firewall SMTP Proxy (Application Gateway) ................................................ 34-15
Interaction Between the SMTP Proxy and Firewall Rules ....................... 34-15
Protecting the Email System ................................................................ 34-15
Firewall HTTP Application Gateway (Proxy) ................................................. 34-16
Firewall HTTP Proxies and Firewall Policies ............................................ 34-16
HTTP Filters ......................................................................................... 34-17
Logging ............................................................................................... 34-17
Monitoring Firewall Activity ........................................................................ 34-18
Notifications ........................................................................................ 34-18
Debugging .......................................................................................... 34-18
Event Triggers ...................................................................................... 34-18
Logging ............................................................................................... 34-19
Accounting ................................................................................................ 34-21
Configuration Examples ............................................................................. 34-22
Minimum Configuration for a Small Office .......................................... 34-22
A Firewall with an ISP-assigned Internet Address ................................. 34-22
A Firewall with a Single Global Internet Address .................................. 34-23
Allowing Access to a WWW Server ...................................................... 34-23
Software Release 2.4.1
C613-03047-00 REV A
xxxiii
Secure Shell
Introduction ................................................................................................. 35-2
Support for Secure Shell ............................................................................... 35-2
Configuring Secure Shell .............................................................................. 35-3
Configuration Example ................................................................................ 35-5
Command Reference ................................................................................... 35-8
ADD SSH USER ...................................................................................... 35-8
DELETE SSH USER .................................................................................. 35-9
DISABLE SSH SERVER ........................................................................... 35-10
DISABLE SSH USER .............................................................................. 35-10
ENABLE SSH SERVER ........................................................................... 35-11
xxxiv
35-12
35-12
35-13
35-14
35-22
35-23
35-24
CHAPTER 37
IP Security (IPsec)
Introduction ................................................................................................. 37-3
Overview of IPsec ......................................................................................... 37-3
Security Associations (SA) ...................................................................... 37-4
IPsec Policies .......................................................................................... 37-4
IPsec Key Management ......................................................................... 37-5
Overview of IP Payload Compression ............................................................ 37-5
Overview of ISAKMP/IKE .............................................................................. 37-6
Key Management .................................................................................. 37-6
ISAKMP ................................................................................................. 37-8
IKE ...................................................................................................... 37-10
Support for IPsec ....................................................................................... 37-11
SPD ..................................................................................................... 37-13
SA Bundles .......................................................................................... 37-15
Key Management ................................................................................ 37-16
Dynamic IP Addresses .......................................................................... 37-17
IPsec Support for IPv6 .......................................................................... 37-18
IPsec over UDP .................................................................................... 37-19
Pre-IPsec Security Associations ............................................................. 37-20
Support for ISAKMP/IKE ............................................................................. 37-20
ISAKMP Policies ................................................................................... 37-21
ISAKMP Exchanges .............................................................................. 37-22
ISAKMP SAs ........................................................................................ 37-23
ISAKMP Heartbeats ............................................................................. 37-23
Pre-IPsec Security Associations ................................................................... 37-24
xxxv
xxxvi
CHAPTER 38
CHAPTER 39
xxxvii
39-14
39-14
39-15
39-15
39-16
39-16
39-17
39-18
xxxviii
CHAPTER 41
xxxix
APPENDIX A
Messages
Introduction .................................................................................................. A-3
Message Descriptions ................................................................................... A-4
smmm001smmm255: Global Messages ................................................ A-4
s002256s002999: Frame Relay ........................................................... A-10
s003256s003999: Point-to-Point Protocol ........................................... A-13
s004256s004999: AppleTalk ............................................................... A-16
s005256s005999: Internet Protocol (IP) .............................................. A-20
s006256s006999: Novell IPX .............................................................. A-30
s007256s007999: SYN Driver ............................................................. A-33
s008256s008999: DECnet .................................................................. A-34
s013256s013999: X.25 Layer 3 (DCE) ................................................. A-34
s014256s014999: Q.931 .................................................................... A-36
s017256s017999: LAPB ...................................................................... A-38
s018256s018999: TEST Module ......................................................... A-38
s019256s019999: LAPD ..................................................................... A-40
s020256s020999: Synchronous Tunnelling (STT) ................................. A-44
s021256s021999: Stream Printing ...................................................... A-44
s022256s022999: TCP ....................................................................... A-45
s023256s023999: Ethernet Driver ...................................................... A-45
s024256s024999: Permanent Assignments ........................................ A-45
s026256s026999: LPD Server ............................................................. A-46
s027256s027999: Bridging ................................................................. A-47
s030256s030999: X.25 Layer 3 (DTE) ................................................. A-52
s031256s031999: FLASH Driver .......................................................... A-53
s033256s033999: TELNET .................................................................. A-54
s034256s034999: System ................................................................... A-55
s035256s035999: Command Processor .............................................. A-56
s036256s036999: TTY ........................................................................ A-56
s037256s037999: ISDN Call Control ................................................... A-58
s038256s038999: MIOX ..................................................................... A-61
s039256s039999: BOOTP ................................................................... A-63
s040256s040999: Network Time Protocol (NTP) ................................. A-64
s041256s041999: BRI Driver ............................................................... A-65
s042256s042999: PRI Driver ............................................................... A-66
s043256s043999: PORT Driver ........................................................... A-68
s045256s045999: User Authentication Facility .................................... A-71
s046256s046999: Asynchronous Call Control .................................... A-74
s048256s048999: LOADER ................................................................. A-78
s049256s049999: INSTALL ................................................................. A-82
s050256s050999: Open Shortest Path First (OSPF) .............................. A-84
s051256s051999: Radius ................................................................... A-87
s052256s052999: Generic Routing Encapsulation (GRE) ..................... A-88
s053256s053999: Trigger Facility ........................................................ A-89
s054256s054999: Scripting ................................................................ A-91
s055256s055999: Time Division Multiplexing (TDM) ........................... A-92
s056256s056999: File Subsystem ....................................................... A-94
s057256s057999: Logging Facility ...................................................... A-95
s058256s058999: PING ...................................................................... A-98
s059256s059999: Simple Network Management Protocol (SNMP) .... A-100
s061256s061999: Telephony Services ............................................... A-100
s062256s062999: Security Associations ............................................ A-102
s066256s066999: Internet Protocol version 6 (IPv6) .......................... A-103
s067256s067999: Layer 2 Tunnelling Protocol (L2TP) ........................ A-105
s070256s070999: Dynamic Host Configuration Protocol (DHCP) ...... A-106
s073256s073999: Encryption ........................................................... A-106
s074256s074999: Star Key Management ......................................... A-108
s075256s075999: Secure Shell ......................................................... A-109
s076256s076999: Resource Reservation Protocol (RSVP) ................... A-110
xl
A-111
A-113
A-114
A-119
A-120
A-121
A-122
A-123
A-124
A-126
A-126
A-130
A-133
Reference Tables
Module Identifiers and Names ....................................................................... B-2
FLASH File System Message Codes ................................................................. B-5
ISDN Q.931 Call Clearance Cause Codes ....................................................... B-7
Log Message Types and Subtypes ................................................................... B-9
APPENDIX C
SNMP MIBs
Introduction .................................................................................................. C-2
Allied Telesyn Enterprise MIB ......................................................................... C-3
The Products Sub-tree ............................................................................ C-4
The AT Router Sub-tree .......................................................................... C-6
The Objects Group ................................................................................. C-6
The sysinfo Group ................................................................................ C-10
The arInterfaces Group ......................................................................... C-10
The Modules Group ............................................................................. C-11
MIB-II MIB ................................................................................................... C-18
Implementation .................................................................................... C-19
Frame Relay DTE MIB .................................................................................. C-20
Implementation .................................................................................... C-21
Ethernet-like Interface Types MIB ................................................................ C-22
Implementation .................................................................................... C-22
Bridge MIB .................................................................................................. C-23
Implementation .................................................................................... C-24
Host Resources MIB .................................................................................... C-25
Implementation .................................................................................... C-26
DS1, E1, DS2 and E2 Interface Types MIB .................................................... C-28
Implementation .................................................................................... C-29
Glossary
Index