Teldat Router TCP-IP Configuration
Teldat Router TCP-IP Configuration
TCP-IP Configuration
Doc. DM502-I Rev. 8.30
February, 2000
INDEX
Chapter 1 Introduction................................................................................................. 1
1. Introduction to IP Protocol ............................................................................................ 2
1.1. The Meaning of IP Addresses............................................................................. 2
1.2. IP Address Classes ............................................................................................. 2
1.3. Subnet Addresses ............................................................................................... 3
1.4. Subnet Mask....................................................................................................... 4
1.5. IP Routing.......................................................................................................... 5
a) Default Router.................................................................................................... 6
b) Faulty Packets.................................................................................................... 6
c) Router ID ........................................................................................................... 6
d) Internal IP address............................................................................................. 7
e) Broadcast Packets.............................................................................................. 7
f) Receiving IP broadcasts ..................................................................................... 7
g) Multicast Packets ............................................................................................... 7
h) IP classless......................................................................................................... 8
i) Access Control ................................................................................................... 9
j) Address Translation (NAT) ................................................................................. 9
1.6. Interior Gateway Protocol................................................................................... 10
Chapter 2 Configuration .............................................................................................. 11
1. IP Configuration ........................................................................................................... 12
1.1. Access the IP Configuration Environment .......................................................... 12
1.2. Assign IP Addresses to Network hardware interfaces.......................................... 12
1.3. Enable Dynamic Routing.................................................................................... 12
1.4. Add Static Routing Information.......................................................................... 13
a) Default Routers .................................................................................................. 13
b) Default Subnet Routers....................................................................................... 14
c) Static Network / Subnet Routes........................................................................... 14
d) Aggregation Routes............................................................................................ 14
e) Multipath ........................................................................................................... 14
f) IP Classless........................................................................................................ 16
1.5. IP Access Controls Configuration....................................................................... 16
1.6. NAT Configuration ............................................................................................ 18
Chapter 3 Configuration Commands........................................................................... 19
1. IP Configuration Commands ........................................................................................ 20
1.1. ? (HELP) ............................................................................................................ 21
1.2. ADD .................................................................................................................. 21
a) ADD ACCESS-CONTROL.................................................................................. 21
b) ADD ADDRESS ................................................................................................. 22
c) ADD AGGREGATION-ROUTE.......................................................................... 22
d) ADD FILTER ..................................................................................................... 23
e) ADD ROUTE ..................................................................................................... 23
1.3. CHANGE........................................................................................................... 24
a) CHANGE ADDRESS.......................................................................................... 24
b) CHANGE FILTER.............................................................................................. 24
c) CHANGE ROUTE .............................................................................................. 24
1.4. DELETE ............................................................................................................ 25
a) DELETE ACCESS-CONTROL............................................................................ 25
b) DELETE ADDRESS ........................................................................................... 25
- ii -
c) DELETE AGGREGATION-ROUTE.................................................................... 26
d) DELETE DEFAULT........................................................................................... 26
e) DELETE FILTER ............................................................................................... 26
f) DELETE ROUTE ............................................................................................... 27
1.5. DISABLE........................................................................................................... 27
a) DISABLE CLASSLESS ....................................................................................... 27
b) DISABLE DIRECTED-BROADCAST ................................................................. 27
c) DISABLE PER-PACKET-MULTIPATH.............................................................. 28
1.6. ENABLE............................................................................................................ 28
a) ENABLE CLASSLESS ........................................................................................ 28
b) ENABLE DIRECTED-BROADCAST .................................................................. 29
c) ENABLE PER-PACKET-MULTIPATH............................................................... 29
1.7. LIST................................................................................................................... 29
a) LIST ALL............................................................................................................ 30
b) LIST ACCESS-CONTROL .................................................................................. 30
c) LIST ADDRESSES.............................................................................................. 31
d) LIST PROTOCOLS............................................................................................. 31
e) LIST ROUTES .................................................................................................... 31
f) LIST SIZES......................................................................................................... 32
1.8. MOVE ............................................................................................................... 32
1.9. NAT................................................................................................................... 32
1.10. SET.................................................................................................................... 33
a) SET ACCESS-CONTROL ................................................................................... 33
b) SET BROADCAST-ADDRESS ............................................................................ 33
c) SET CACHE-SIZE.............................................................................................. 34
d) SET DEFAULT................................................................................................... 34
e) SET INTERNAL-IP-ADDRESS ........................................................................... 35
f) SET REASSEMBLY SIZE.................................................................................... 35
g) SET ROUTING................................................................................................... 35
h) SET ROUTER-ID ............................................................................................... 36
1.11. TVRP................................................................................................................. 36
1.12. EXIT.................................................................................................................. 37
Chapter 4 Monitoring................................................................................................... 38
1. IP Monitoring Commands ............................................................................................. 39
1.1. ? (HELP) ............................................................................................................ 40
1.2. AGGREGATION-ROUTE ................................................................................. 40
1.3. ACCESS controls............................................................................................... 41
1.4. BPING ............................................................................................................... 42
1.5. CACHE.............................................................................................................. 43
1.6. COUNTERS....................................................................................................... 43
a) COUNTERS SHOW............................................................................................ 44
b) COUNTERS DELETE ........................................................................................ 45
1.7. DUMP routing tables.......................................................................................... 45
1.8. INTERFACE addresses ...................................................................................... 46
1.9. NAT................................................................................................................... 47
1.10. PING [address]................................................................................................... 47
1.11. ROUTE given address ........................................................................................ 49
1.12. SIZES ................................................................................................................ 49
1.13. STATIC ROUTES.............................................................................................. 50
1.14. TRACEROUTE address ..................................................................................... 51
1.15. TVRP................................................................................................................. 52
1.16. EXIT.................................................................................................................. 53
- iii -
Chapter 1
Introduction
1. Introduction to IP Protocol
IP is a network layer protocol that provides a connectionless datagram service for the delivery of data.
The fact that is connectionless makes IP an unreliable protocol: one that tries but does nothing to
guarantee delivery of data. As used on the Internet, IP is the package used to carry data; actual delivery
of the data is assured by transport layer protocols like TCP (Transmission Control Protocol).
TELDAT’s IP implementation conforms the standards defined by the TCP/IP protocol suite.
128.42.10.23
Each IP address forms a pair of identifiers, one identifies the network, the netid; and another identifies
a host on that network, the hostid.
Subnet ID Host ID
There is no set standard for the width of the subnet part; it can be a few bits wide to most of the width
of the hostid field.
255.255.255.0
Note: It is impossible to use different size subnetid when using RIP-1. In this case you
must use OSPF or configure RIP-2.
CAUTION: Assign variable length subnets with care. If you assign a subnet in an
overlapping fashion, problems may occur.
1.5. IP Routing
IP uses routing tables to decide where to send a packet. The routing table is a list of all the network
segments that IP knows how to reach. The routing table contains both dynamic and static routes.
A dynamic route is one that is learned through OSPF, RIP. These protocols regularly update their
routing tables as network conditions change. Dynamic routing allows the router to transmit packets
around network failures.
A static route is a route that never changes. You must enter a static route when configuring IP. Static
routes persist across power downs, restarts, and software reloads. They are used when the router for
some reason cannot determine the correct dynamic route.
IP routing happens as follows:
• IP receives the packet and reads the 32 bit destination address found within the packet header.
• If the packet is destined for this router, further routing is not necessary and IP hands the packet to
the appropriate internal software module. Packets in this category include the following:
∗ Control packets for IP itself
∗ Routing update packets
∗ Packets used for diagnostics purposes
• If the packet is destined for a host on a directly connected network segment, IP matches the 32 bit
destination address with the appropriate physical address in the ARP table. IP then hands the
packet to the appropriate lower level protocol module for transmission directly to the destination
node.
• If the packet is destined for a host on a remote network segment, IP uses the routing table to
determine which router leads to that network segment. Each entry in the routing table contains a
destination address and the IP address of the next hop router. If IP matches the destination
address in the table with the destination contained in the packet, the packet is handed to the
appropriate lower level protocol module for transmission to that next hop.
• If the packet has no entry for its IP address in the routing table, the packet is routed to the default
router. Default routers are used to route packets whose destination address is not found in the
routing table. This router is assumed to know the location of the packet’s destination.
IP also performs several other major tasks: as faulty packets deletion or several filtering types.
e) Broadcast Packets
A broadcast message is one that is destined for all hosts on the given network. IP occasionally sends
broadcast addresses on its own behalf. These broadcast messages are used, among other things, to
update the IP routing tables on other routers when running RIP-1 or RIP-2. The router never forward
broadcast packets.
NOTE: When configuring the router’s broadcast address, all nodes or systems on the
wire MUST use the same broadcast format.
To indicate that a packet is a broadcast packet (intended for all hosts), the senders sets the packet’s IP
destination address to the currently used broadcast address. The broadcast style that you configure is
either a LOCAL WIRE broadcast or NETWORK broadcast that uses a fill pattern of all “0” or all “1”.
During a LOCAL WIRE broadcast the entire destination address is filled with the pattern. During a
NETWORK broadcast only the hostid is filled with the pattern.
f) Receiving IP broadcasts
The IP recognizes all forms of broadcast messages and addressing. If the network portion of the
broadcast address indicates either local wire or a directly connected IP network, IP treats the packet as
if it is addressed to itself.
IP also forwards directed broadcasts. A directed broadcast is a broadcast destined for networks other
than the networks on which it originated. By enabling IPs directed broadcast feature, you can forward
IP packets whose destination is a non local broadcast address.
g) Multicast Packets
You can configure 2 or more routes in IP protocol, towards the same destination network through the
distinct sequential hops.
X25
NRI-2
Ip-B
Gw B
Destination Network
Source Network Ip-C
PPP SERIAL
Gw C
IP source IP Destination
Ip-D
DLCI-1
Gw D
FR
DLCI-2 Ip-E
Gw E
In the previous figure you can see the possibility of forwarding to the IP destination address through
various distinct gateways (Gw).
The routes can be static or learnt through the dynamic routing protocol. This accepts the possibility of
multipaths. (OSPF).
If two or more routes agree i.e. they cost the same, the outgoing interface is active and the ‘per packet
Multipath IP flag’ is enabled, there is a balance of traffic (up to a maximum of 4 routes). If the flag is
not enabled then the traffic is not balanced.
h) IP classless
A router may receive packets destined for a network subnet which does not have a subnet router
configured by default. The following figure displays a router belonging to the 128.20.0.0 network and
connected to the 128.20.1.0, 128.20.2.0, and 128.20.3.0 subnets. E.g. the host sends packets towards
128.3.4.1. If the router receives packets by default, destined to a subnet to which it is not directly
connected and that doesn’t possess a subnet default route, the router discards the packet.
128.20.3.0
128.20.2.0
128.20.0.0
128.20.4.1
128.20.4.1
REJECTED
128.20.1.1
128.20.2.0
128.20.0.0
128.20.4.1
128.20.4.1
128.20.1.1
i) Access Control
This feature allows you to control the forwarding of packets by examining the masked source and
masked destination addresses in the IP header, the protocol type in the IP header, or the port number in
the TCP or UDP headers.
After enabling access control, any packet that the router receives is matched to the control list before
being matched to the routing table.
There are two types of entries in the access control list, inclusive and exclusive. If an address matches
an inclusive entry, the packet is forwarded. If an address matches an exclusive entry, the packet is
dropped. If no match exists, the packet is also dropped.
Beware when using access controls. Packets originated by the router are also subjected to access
controls before being forwarded. Specifically do not filter out any RIP or OSPF packets being sent or
received by the router. You can use the wild card inclusive entry as the last entry in the access control
list, or explicitly include them.
This section outlines the initial steps required to configure IP protocol. After completing these tasks,
you must save the configuration and restart the router for the new configuration to take effect. The
following sections discuss each configuration task in more detail.
Config> PROTOCOL IP
IP config>
Default Router: Packets are routed to default routers when the packet destination cannot be found in
the routing table.
Default Subnet Router: If you are using subnetted networks, you can define a separate default router
for each subnetted network.
Static Routes: For each destination that is to have a fixed route, configure the next hop and distance to
the destination.
Aggregation routes: When you have a number of routes with the destination addresses beginning with
the same numeration, defining an aggregation route can be convenient: i.e. a route that encompasses all
the previous ones. In this way, the dynamic route protocols, configured only to announce the
aggregated routes do not overload the routing tables of other routers with unnecessary information. The
aggregation route is not really a route, it is a mark which appears in the active routes table indicating
that a series of aggregated routes exist.
Multipath: Routes to the same destination can be configured through the distinct sequential hops at an
equal or different cost. If the cost is equal, and the multipath is enabled, the traffic is balanced.
a) Default Routers
Routers send packets having unknown destinations (i.e., destinations not present in the routing table)
toward the default router.
A default router is configured in the router by specifying the next hop to use to get to the default router
and the cost of sending packets to the default router. You can configure as many routers by default as
you wish assigning each a cost. The cheapest accessible router is activated. If two or more routes (up
to a maximum of four) are activated at the same time and providing the multipath feature is enabled,
traffic balance is carried out. In the following example, the next hop toward the default router is
130.1.1.191 and the cost of sending a packet to the default router is 1.
Default routers can be learned and advertised by both the OSPF and RIP protocol. For the OSPF
protocol, a router can be configured to advertise itself as the default router.
The RIP protocol can be configured so that it will advertise knowledge of the default router (if it has
any) to its neighbors.
RIP can also be configured so that a learned default router will (or will not) override a statically
configured default router.
The above example specifies that the next hop to the subnet default router is 18.0.0.6 , and that the cost
of routing a packet to the default subnet router is 2.
Routes dynamically learned through the RIP and OSPF protocols can override static routes. For the RIP
protocol, you can disable this override behavior.
d) Aggregation Routes
Use the following commands to create and delete aggregation routes.
e) Multipath
In order to configure the per packet multipaths by packet, the following steps must be carried out:
• Add a static route to each route. A determined cost is assigned.
• Enable or disable the ‘per packet Multipaths’ IP flag.
or
IP config> DISABLE PER-PACKET-MULTIPATH
• Configure (or not) the TMP-RECOVER-BACKUP parameters of the X.25 Node’s various
global (See X.25 manual Dm507-I)
f) IP Classless
Routing strategies:
• IP Class routing strategy : Suppose a router directly connected to a subnet (10.1.1.0) of a major
net 10.0.0.0. If the router receives packets destined for another subnet in the same major network
(10.2.1.0) and the router does not have any explicit information on it, despite having a default
network route (10.0.0.0/0) if there is no default subnet route configured (10.0.0.0/8) the packet is
not forwarded. This is a protective behavior to prevent possible loops.
• Classless routing strategy: all received packets are forwarded to the following hop which
indicates the destination route. It is the most restrictive (more 1’s in the mask) and at the least
cost.
If the “IP Classless routing” is not enabled, the router will route on a “IP class routing strategy” basis.
This operation should be avoided where possible to protect the network from loops. An alternative
solution should be sought first e.g.
• No IP classless.
• Add as many subnet default routes as networks divided into subnets exist.
This feature is disabled by default. You can enable or disable by executing the following command:
IP config> ENABLE CLASSLESS
or
IP config> DISABLE CLASSLESS
The next example prevents any host on subnet 1 of Class B network 150.150.0.0. from sending packets
to hosts on subnet on subnet 2 of Class B network 150.150.0.0 (assuming a 1 byte subnet mask).
This command allows the router to send and receive all RIP packets
This command allows the router to send and receive all OSPF packets.
If IP access control is enabled, you must be careful with packets that the router originates and receives.
Be sure not to filter out the RIP or OSPF packets being sent or received by the router. The easiest way
to do this is to add a wildcard inclusive entry as the last in the access control list. Alternately, you can
add specific entries for RIP and/or OSPF, perhaps with restrictive addresses and masks. Note that some
OSPF packets are sent to the Class D multicast addresses 224.0.0.5 and 224.0.0.6, which is important
if address checking is being done for routing protocols. See the ADD command section in this chapter
for more information on access control.
If you have certain IP networks/subnets that you do not want to forward packets to, nor distribute
routing information about, it is best to specify those networks as filters. To add a network filter, use the
following command:
It is recommended that you filter to local loopback network 127.0.0.0 so as not to propagate packets
destined as a loopback. Use the following command:
This section summarizes and then explains all IP configuration commands. These commands allow you
to configure the router’s IP protocol behavior to meet your specific requirements.
Enter IP configuration commands at the prompt: IP config>, to access this prompt you must enter
*P 4
User configuration
Config> PROTOCOL IP
Internet protocol user configuration
IP config>
Command Function
CHANGE Modifies information that was originally entered with the ADD command.
DELETE Deletes IP configuration information that had been entered with the ADD
command.
DISABLE Disable certain IP features that have been turned on by the ENABLE
command.
SET Establishes IP configuration modes such as the type of access control and the
format of broadcast addresses.
1.1. ? (HELP)
Use the ? (HELP) command to list the commands that are available from the current prompt level. You
can also enter a ? after a specific command name to list its options.
Syntax:
IP config> ?
Example:
IP config> ?
ADD
CHANGE
DELETE
DISABLE
ENABLE
LIST
MOVE
NAT
SET
TVRP
EXIT
IP config>
1.2. ADD
Use the ADD command to add IP information to your configuration. This command lets you add
interface addresses, access controls, and filters.
Syntax:
IP config> ADD ?
ACCESS-CONTROL
ADDRESS
AGGREGATION-ROUTE
FILTER
ROUTE
a) ADD ACCESS-CONTROL
Adds an access control entry to the end of the access control list. This allows you to describe a class of
packets to forward or drop, depending on the type of the entry. The length and order of the IP access
control list can affect the performance of the IP forwarder.
This command adds an IP access control entry to the end of the list. Each entry must be assigned the
following: type, IP source, source-mask, IP destination, and destination-mask fields. The type must
either be inclusive or exclusive. The IP-source and IP-dest fields are in the form of IP addresses in
dotted decimal notation. Optionally, you may specify an IP protocol number range with the FIRST-
TELDAT ROUTER - TCP-IP Configuration Commands Doc.DM502-I
III - 21 Rev.8.30
PROTOCOL LAST-PROTOCOL fields. If a range of protocols has been specified, you may specify a
TCP and UDP port number range with the FIRST-PORT and LAST-PORT fields.
Syntax:
Example:
If you do not introduce all the necessary parameters in order to add an access control, the device will
request them.
Example:
b) ADD ADDRESS
Assigns an IP address to one of the router’s hardware network interfaces. A hardware network interface
will not receive or transmit IP packets until it has at least one IP address.
You must specify an IP address together with its subnet mask. For example, if the address is on a class
B network, using the third byte for subnetting, the mask would be 255.255.255.0. Use the LIST
DEVICES command to obtain the appropriate command interface-number.
Syntax:
Example:
c) ADD AGGREGATION-ROUTE
This adds the IP aggregation information to the routing table.
Syntax:
Example:
d) ADD FILTER
Designates an IP network/subnet to be filtered. IP packets will not be forwarded to filtered
networks/subnets, nor will routing information be disseminated concerning such destinations. Packets
destined for filtered network/subnets are simply discarded.
You must specify a filtered network/subnet together with its subnet mask. For example, to filter a
subnet of a class B network, using the third byte for subnetting, the mask would be 255.255.255.0.
Using the filter mechanism is more efficient than IP access controls, although not as flexible.
Syntax:
Example:
e) ADD ROUTE
Adds a static network/subnet routes to the router’s IP configuration. When dynamic routing information
is not available for a particular destination, static routes are used.
The destination is specified by an IP address (IP network/subnet/host) together with an address mask
(IP-mask). For example, if the destination is a subnet of a class B network, and the third byte of the IP
address is used as the subnet portion, the address mask would be set to 255.255.255.0.
The route to the destination is specified by the IP address of the next-hop, and the cost of routing the
packet to the destination. The next hop must be on the same (sub)net as one of the router´s directly
connected interfaces.
Syntax:
Example:
1.3. CHANGE
Use the CHANGE command to change an IP configuration item previously installed by the ADD
command. In general, you must specify the item you want to change, just as you specified the item with
the ADD command.
Syntax:
IP config> CHANGE ?
ADDRESS
FILTER
ROUTE
a) CHANGE ADDRESS
Modifies one of the router’s IP interface address. You must specify each new address together with the
new address’ subnet mask.
Syntax:
Example:
b) CHANGE FILTER
Modifies the subnet mask associated with a filtered network/subnet. Networks that are filtered become
black holes. No packets are forwarded to them; nor is routing information be distributed about them.
Syntax:
Example:
c) CHANGE ROUTE
Modifies either the subnet mask, next hop, or the cost ass Tj4.835.2ET0 11.0329.434. Tw 4.96 4 34
c) DELETE AGGREGATION-ROUTE
Deletes an IP aggregation route.
Syntax:
Example:
d) DELETE DEFAULT
Deletes either the default gateway or the default subnet router for the specified subnetted network.
Syntax:
Example:
Example:
e) DELETE FILTER
Deletes one of the router’s filtered networks.
Syntax:
c) DELETE AGGREGATION-ROUTE
Deletes an IP aggregation route.
Syntax:
Example:
d) DELETE DEFAULT
Deletes either the default gateway or the default subnet router for the specified subnetted network.
Syntax:
Example:
Example:
e) DELETE FILTER
Deletes one of the router’s filtered networks.
Syntax:
f) DELETE ROUTE
Deletes one of the router’s configured static routes.
Syntax:
Example:
1.5. DISABLE
Use the DISABLE command to disable IP features previously enabled by the ADD command.
Syntax:
IP config> DISABLE ?
CLASSLESS
DIRECTED-BROADCAST
PER-PACKET-MULTIPATH
a) DISABLE CLASSLESS
Disables the IP routing strategy “Classless Routing Strategy” so the router continues with “IP Class
Routing Strategy”.
Syntax:
Example:
b) DISABLE DIRECTED-BROADCAST
Disabled the forwarding of IP packet whose destination is a non-local (e.g., remote LAN) broadcast
address. The source host originates the packet as a unicast where it is then forwarded as a unicast to a
Syntax:
Example:
c) DISABLE PER-PACKET-MULTIPATH
If per-packet-multipath is disabled, the router will chose the first available path to a destination. The
default for this feature is disabled.
Syntax:
Example:
1.6. ENABLE
Use the ENABLE command to activate IP features, capabilities, and information added to your IP
configuration.
Syntax:
IP config> ENABLE ?
CLASSLESS
DIRECTED-BROADCAST
PER-PACKET-MULTIPATH
a) ENABLE CLASSLESS
Enables the IP routing strategy “Classless Routing Strategy”.
Syntax:
Example:
TELDAT ROUTER - TCP-IP Configuration Commands Doc.DM502-I
III - 28 Rev.8.30
IP config> ENABLE CLASSLESS
IP config>
b) ENABLE DIRECTED-BROADCAST
Enables the forwarding of IP packets whose destination is non-local (e.g., remote LAN) broadcast
address. The packet is originated by the source host as a unicast where it is then forwarded as a unicast
to a destination subnet and “exploded” into a broadcast.
These packets can be used to locate network servers. The IP packet forwarder never forwards link level
broadcast/multicast, unless they correspond to Class D IP address. The default setting for this feature is
enabled.
Syntax:
Example:
c) ENABLE PER-PACKET-MULTIPATH
If per-packet-multipath is enabled, and there are multiple equal-cost paths to a destination, the router
chooses the path for forwarding each packet in a round robin fashion. The default for this feature is
disable.
Syntax:
Example:
1.7. LIST
Use the LIST command to display various pieces of the IP configuration data, depending on the
particular subcommand invoked.
IP config> LIST ?
ALL
ACCESS-CONTROLS
ADDRESSES
PROTOCOLS
ROUTES
SIZES
a) LIST ALL
Prints the entire IP configuration.
Syntax:
Example:
Routing
Protocols
Direct broadcast: enabled
OSPF: disabled
Per packet multipath: disabled
RIP: disabled
IP classless: disabled
IP config>
b) LIST ACCESS-CONTROL
Prints the configured access control mode (inclusive, exclusive, or disabled), and the list of configured
access control records. Each record is listed with its record number. This record number can be used to
reorder the list with the IP MOVE ACCESS-CONTROL command.
Syntax:
c) LIST ADDRESSES
Prints the IP interface address that have been assigned to the router, along with their configured
broadcast formats.
Syntax:
Example:
d) LIST PROTOCOLS
Prints the configured state of the IP routing protocols (RIP and OSPF).
Syntax:
Example:
e) LIST ROUTES
Displays the list of static network/subnet routes that have been configured and also lists any configured
default router. This also displays the configured aggregation routes.
Syntax:
Example:
f) LIST SIZES
Displays the routing table size, reassembly buffer size, and the route cache size.
Syntax:
Example:
1.8. MOVE
Use the MOVE command to change the order of the access control list. This command places record
number from# immediately after record number to#. After you move the records, they are immediately
after renumbered to reflect the new order.
Syntax:
Example:
1.9. NAT
You can access the NAT configuration menus through this command. For further details please consult
the NAT manual Dm520.
Syntax:
Example:
IP config> NAT
Conf NAT>
1.10. SET
Use the SET command to set certain values, routes, and formats within your IP configuration.
Syntax:
IP config> SET ?
ACCESS-CONTROL
BROADCAST-ADDRESS
CACHE-SIZE
DEFAULT
INTERNAL-IP-ADDRESS
REASSEMBLY-SIZE
ROUTING
ROUTER-ID
Example:
c) SET CACHE-SIZE
Configures the maximum number entries for the IP routing cache.
Syntax:
Example:
d) SET DEFAULT
The NETWORK-GATEWAY option configures a route to the default gateway. You should assume that
the default gateway has more complete routing information than the router itself. The route is specified
by the IP address of the next hop and the distance (cost) to the default gateway.
The SUBNET-GATEWAY option configures a route to a default subnet gateway. You can configure a
separate default subnet gateway for each subnetted network. The IP address of the next hop and the
distance (cost) to the default subnet gateway specify the route. All packets destined for unknown
subnets of a known subnetted network are forwarded to the subnetted network’s default subnet gateway.
More than one default router can be configured.
Syntax:
Example:
e) SET INTERNAL-IP-ADDRESS
Set the internal IP address that belongs to the router as a whole, and not any particular interface. This
address is always reachable regardless of the state of the interface. When the internal IP address and the
router ID are set in the same router, the internal IP address has precedence over the router ID. To delete
the internal IP address set the address to 0.0.0.0.
Syntax:
Example:
Syntax:
Example:
g) SET ROUTING
Sets the size of the router’s IP routing table. The default size is 768 entries. Setting the routing table
size to small causes dynamic routing information to be discarded. Setting the routing table size too large
wastes router memory resources.
Syntax:
h) SET ROUTER-ID
Sets the default IP address used by the router when sourcing various kinds of IP traffic. This address is
of particular importance in multicasting. For example the source address in pings (including multicast
pings), traceroute, and tftp packets sent by the router are set to the router-ID. In addition, the OSPF
router ID are set to the configured router ID.
The router ID must match one of the configured IP interface addresses of the router. If not, it is ignored.
When ignored, or just not configured, the default IP address of the router (and its OSPF router ID) is set
to the first IP address in the router’s configuration.
Note: Configuring a router-ID may cause the router’s OSPF router ID to change. If
this happens, link state advertisements originated by the router before the router ID
change persist until they age-out, possibly as long as 30 minutes. This may cause an
increase in link state database size.
Syntax:
Example:
1.11. TVRP
You can access the TVRP protocol configuration menus through this command. For further information
on this protocol please consult the TVRP Protocol manual Dm 525-I.
Syntax:
IP config> TVRP
Example:
TVRP config>
1.12. EXIT
Use the EXIT command to return to the previous prompt level.
Syntax:
IP config> EXIT
Example:
IP config> EXIT
Config>
This section summarizes and then explains all IP monitoring commands. These commands allow you to
monitor the router’s IP protocol behavior to meet your specific requirements.
Enter IP monitoring commands at the IP prompt: IP>, to access this prompt you must enter
*P 3
Console Operator
+PROTOCOL IP
IP>
Command Function
? (HELP) Lists all the IP commands and associated options.
ACCESS controls List the current IP access control mode, together with the configured
access control records.
BPING Carries out ping to each host in a specified network. This is also
known as ping broadcast.
COUNTERS List various IP statistics, including counts of routing errors and packets
dropped.
PING [address] Sends ICMP Echo Requests to another host once a second and watch
for a response. This command can be used to isolate trouble in an
internetwork environment. This admits parameters when no address is
specified.
ROUTE given address List whether a route exists for a specific IP destination, and if so, the
routing table entry that corresponds to the route.
The letters typed in bold are the minimum number of characters which need to be keyed in order to
activate the command.
1.1. ? (HELP)
Use the ? (HELP) command to list the commands that are available from the current prompt. You can
also enter a ? after a specific command name to list its options.
Syntax:
IP> ?
Example:
IP> ?
AGGREGATION-ROUTE
ACCESS controls
BPING
CACHE
COUNTERS
DUMP routing tables
INTERFACE addresses
NAT
PING [address]
ROUTE given address
SIZES
STATIC-ROUTES
TRACEROUTE address
TVRP
EXIT
IP>
1.2. AGGREGATION-ROUTE
Use the AGGREGATION-ROUTE command to view the list of configured aggregation routes.
Each route is already specified by an address and its corresponding mask.
The following example shows an aggregation route (aggregating all the networks which begin with
200).
IP> AGGREGATION-ROUTE
Example:
IP> AGGREGATION-ROUTE
Net Mask
-------- ---------
200.0.0.0 255.0.0.0 aggregation
IP>
Disabled: No access control is being done and the access control records are being ignored.
Enabled: Access control records is being done and the access control records are being
recognized.
Exclusive: Packets matching the access control record are being discarded.
Inclusive: Packets matching the access control record are being forwarded.
When access control is enabled, packets failing to match any access control record are discarded. Beg
and End Pro (protocol) indicates the IP protocol and Beg and End Prt (port) indicates the port number.
Invoc specifies the number of times that a particular entry in the IP access control system was invoked
by the characteristics of an incoming or outgoing packet.
Syntax:
1.4. BPING
Use the BPING (Broadcast PING) command so that the router can send an ICMP Echo request packet
to every subnet address and await a response.
A series of parameters are requested via the console:
IP destination: Any address pertaining to the subnet.
IP source: outgoing packets. By default the device chooses the source interface address (logical) of the
outgoing ping.
Destination mask: The subnet mask.
Time out: Time interval greater or equal to 10ms while waiting for an response to the packet sent. This
time is marked from the moment the packet is sent. The default value is one second.
Avoid fragmentation: IP datagram. This is an order for the router as the destination cannot reassemble
the pieces. The datagram can be fragmented by default.
The packet size is 56 bytes excluding the ICMP header.
The address the packet is sent to increases, beginning with the first subnet address which is not
broadcast i.e. the first and the last address are ignored.. The packets are sent every 100ms, however if
the time out is longer that the time between pings and an answer has not been received, the device waits
until the time out period has elapsed before sending a new packet.
If you receive a valid response, the corresponding delay is displayed. If not a ‘contact not established’
message is printed.
The BPING command is ended by clicking on any key or when the subnet addresses finish.
In the following example the destination address is 192.6.1.228 and the mask 255.255.255.248. After
executing the corresponding logical AND operation, the broadcast addresses are 192.6.1.224 and
192.6.1.231. This means that the BPING command is executed between addresses 192.6.1.225 and
192.6.1.230.
Syntax:
IP> BPING
IP> BPING
IP destination [0.0.0.0]? 192.6.1.228
IP source [192.6.1.191]?
Destination mask [255.255.255.0]? 255.255.255.248
Time out(>=10ms)[1000]? 50
Avoid fragmentation[no](Yes/No)? Y
PING 192.6.1.225... not established contact
PING 192.6.1.226... not established contact
PING 192.6.1.227... time=8. ms
PING 192.6.1.228... not established contact
PING 192.6.1.229... not established contact
PING 192.6.1.230... not established contact
IP>
1.5. CACHE
Use the CACHE command to display the IP routing cache which contains recently routed destinations.
If a destination is not in the cache, the router looks up the destination in the routing information table in
order to make a forwarding decision.
Syntax:
IP> CACHE
Example:
IP> CACHE
Destination Usage Next hop
192.6.2.12 6 192.6.2.12 (EtherNet (10 MBit)/0)
194.179.1.100 520 130.1.1.191 (Router->Node/0)
192.6.2.15 248 192.6.2.15 (EtherNet (10 MBit)/0)
192.6.1.157 206 130.1.1.191 (Router->Node/0)
192.6.2.3 4 192.6.2.3 (EtherNet (10 MBit)/0)
192.6.1.110 7 130.1.1.191 (Router->Node/0)
192.6.2.10 4 192.6.2.10 (EtherNet (10 MBit)/0)
192.6.1.34 1 130.1.1.191 (Router->Node/0)
192.6.1.250 1 130.1.1.191 (Router->Node/0)
IP>
1.6. COUNTERS
Use the COUNTERS command to display the statistics related to the IP forwarding process. This
includes a count of routing errors, along with the number of packets that have been dropped due to
congestion.
IP> COUNTERS ?
SHOW
DELETE
a) COUNTERS SHOW
IP multicast accepted IP multicasts that have been received and successfully processed by the
router.
IP packet overflows Packets that have been discarded due to congestion at the forwarder’s
input queue.
b) COUNTERS DELETE
Example:
Syntax:
Example:
The number in brackets (num) after Type indicates the number of static or directly configured routes
with the outgoing interface and subinterface activated and have the route as the destination.
A percentage sign “%” after the Type indicates the RIP “updates” are always accepted for this
destination.
A letter “A” after the Type indicates that the route coincides with an aggregation route.
A letter “a” after the Type indicates that the route is being added by an aggregation route.
A number in brackets at the end of the row indicates the number of active paths towards the destination
at the same cost.
Syntax:
Example:
1.9. NAT
You can access the NAT configuration menus through this command. For further details please consult
the NAT manual Dm520.
Syntax:
IP> NAT
Example:
IP> NAT
NAT monit>
Syntax:
Example:
1.12. SIZES
Use the SIZES command to display the configured sizes of specific IP parameters.
Syntax:
IP> SIZES
Example:
Routing table size Configured number of entries that the routing table will maintain.
Table entries used Number entries used from the routing table.
Reassembly buffer size Configured size of the reassembly buffer that is used to reassemble
fragmented IP packets.
Largest reassembled pkt Largest IP packet that this router has had to reassemble.
# cache entries in use Number of entries currently being used from cache.
Syntax:
Example:
Syntax:
IP> TRACEROUTE
Example:
TRACEROUTE Displays the destination area address and the size of the packet being
sent to that address.
1 The first trace showing the destination’s NSAP and the amount of time
it took the packet to arrive at the destination. The packet is traced three
times.
Destination Unreachable Indicates that no route to destination is available .
1*** Indicates that the router is expecting some form of response from the
2*** destination, but the destination is not responding.
1.15. TVRP
You can access the TVRP protocol monitoring menus through this command. For further information
on this protocol please consult the TVRP Protocol manual Dm 525-I.
Syntax:
IP> EXIT
Example:
IP> TVRP
TVRP Monitoring
TVRP monit>
Syntax:
IP> EXIT
Example:
IP> EXIT
+