5861 Cli
5861 Cli
Routers
Command Line Interface Guide
June 2001
Copyright
Efficient Networks provides this publication “as is” without warranty of any kind, either expressed or implied,
including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose.
All rights reserved. No part of this book may be reproduced in any form or by any means without written
permission from Efficient Networks.
Changes are periodically made to the information in this book. They will be incorporated in subsequent editions.
Efficient Networks may make improvements and/or changes in the product described in this publication at any
time.
Trademarks
Efficient Networks is a registered trademark of Efficient Networks, Inc.
All other trademarks and registered trademarks mentioned in this manual are the sole property of their respective
companies.
2
What’s New in This Release?
This version of the Command Line Interface (CLI) manual has been updated to document features available with
this release of the kernel software. The following list directs you to the new CLI documentation:
Release 5.3:
Built-in firewall filters — page 129
• Available when using the Copper Mountain CopperEdge™ 200 DSLAM, version 3.0, and router models
5871 IDSL, 5851 SDSL, and 7851 SDSL IAD — page 48
• Commands to manage the SNTP server list and issue an SNTP time request.
New date and time commands — page 212 and page 224
• For ATM debugging (page 204); for IKE debugging (page 208); and for the ADSL DMT modem timeout
(page 206).
Release 5.1.0:
New IP Filter types — page 129
3
• The IP filter type Forward has been replaced by the filter types Receive and Transmit.
• Configuration needed to receive incoming calls from NetMeeting or other H.323 applications.
Domain names allowed on ping and traceroute commands — page 217 and page 224
Release 5.0:
VRRP Backup — page 116
• Allows other routers in the LAN to serve as backups for a static default gateway.
• Uses a V.90 modem connected to the console port as an automatic backup when the DSL link fails.
• Shortens the time required to find the correct line speed by checking the line quality before activation.
• Perfect Forward Secrecy option to increase the security of the IKE key exchange — see page 151.
• Commands to stop, start, and restart a logical Ethernet interface — see page 79.
• Commands to stop, start, and restart an active session for a remote — see page 35.
• Command to change voice profile available if voice gateway is ATM standards-based — see page 23.
• Use dhcp addrelay and dhcp delrelay commands to change the BootP server list.
4
• The command syntax has changed for system addSyslogServer and system delSyslogServer.
• system addServer — see page 233; remote addServer — see page 293; eth ip addServer — see page 265.
IP Filter changes — see eth ip filter, page 270 or remote ipfilter, page 300
• New -tcp rst parameter allows a filter to match the TCP RESET flag.
• PPP remote can receive IPCP information for dyamically reconfiguring the Ethernet interface.
5
About This Manual
This manual contains information on the syntax and use of the Command Line Interface for this family of DSL
routers. Configuration of network connections, bridging, routing, and security features are essentially the same for
all DSL routers, unless otherwise noted.
This manual is intended for small and home office users, remote office users, and other networking professionals
who are installing and maintaining bridged and routed networks.
It assumes that you have read the User Reference Guide that came with the router and have installed the router as
described in that guide.
As described in the User Reference Guide, a graphical interface is also available for configuring the router. It
provides many, but not all, of the capabilities of the Command Line Interface. Look for the User Reference Guide
in the box in which your router was shipped or find it on the Technical Support web site (www.efficient.com).
How to Access the Command Line. Describes how to access the router command line from a PC so you can
enter router commands.
Router Concepts. Contains information on topics such as routing and bridging operations, voice routing, PAP/
CHAP security negotiation, bandwidth management, interoperability, protocol conformance, and the file system.
Planning for Router Configuration. Discusses the information required for basic configuration of the router.
Configuring the Router. Outlines the commands required for basic configuration of the router.
Configuring Special Features. Describes how to configure advanced features, such as Bridge Filtering, RIP,
DHCP, NAT, Dial Backup, and VRRP.
Configuring Software Options. Describes how to install and configure features available via software option
keys, including Encryption, IP Filtering, L2TP Tunneling, and IKE/IPSec.
Managing the Router. Describes router management capabilities, including SNMP, Telnet, TFTP client and
server, BootP, Syslog, boot code options, software upgrades, backup and recovery procedures, and batch file
command execution.
Troubleshooting. Describes diagnostic tools used for identifying and correcting hardware and software problems.
Two indexes are provided at the end of the manual. The Command Index directs you to the desired command
description. The Topic Index directs you to specific feature discussions.
Typographic Conventions
The following typeface conventions are used in this guide:
8
RFC 1483/RFC 1490 Link Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
MAC Encapsulated Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
FRF8 Link Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Dual-Ethernet Router Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Copper Mountain Plug & Play . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Plug & Play Configuration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Bridge or Router? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Remote configuredForCMPPlay. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Chapter 3. Configuring the Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Configuration Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Configuring PPP with IP Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Configuring PPP with IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Configuring PPP with Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Configuring RFC 1483 / RFC 1490 with IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Configuring RFC 1483 / RFC 1490 with IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Configuring RFC 1483 / RFC 1490 with Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Configuring MAC Encapsulated Routing: RFC 1483MER / RFC 1490MER with IP Routing . 59
Configuring FRF8 with IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Configuring Mixed Network Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Configuring a Dual-Ethernet Router for IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Verify the Router Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Test IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Test Bridging to a Remote Destination. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Test IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Sample Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Sample Configuration 1: PPP with IP and IPX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Sample Configuration 2: RFC 1483 with IP and Bridging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Sample Configuration 3: Configuring a Dual-Ethernet Router for IP Routing . . . . . . . . . . . . . . 77
Chapter 4. Configuring Special Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
IP Subnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Logical Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Stopping and Starting an Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Interface Routing and Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Virtual Routing Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Bridge Filtering and IP Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Configure Bridge Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Internet Firewall Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
IP Directed Broadcast Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
RIP Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Advertising the Local Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Changing the Multicast Address for RIP-2 Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Multicast Forwarding Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
DHCP (Dynamic Host Configuration Protocol) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
DHCP Address Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
DHCP Client Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
DHCP Administration and Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Manipulating Subnetworks and Explicit Client Leases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Setting Option Values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Managing BootP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Defining Option Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
DHCP Information File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Clearing All DHCP Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
9
General NAT Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Masquerading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Classic NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
NetMeeting (H.323) with NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
PPPoE (PPP over Ethernet) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Configuring for PPPoE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Managing PPPoE Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Controlling Remote Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Disabling Remote Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Re-enabling Remote Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Validating Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Restricting Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Changing the SNMP Community Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Disabling WAN Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Dial Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Configuring Dial Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Specifying the Dialup Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Setting DSL Link Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Specifying Modem Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Disabling and Re-Enabling Dial Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
VRRP Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
VRRP Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Defining the VRRP Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Defining the VRID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Defining VRRP Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Starting VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Disabling or Deleting VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Sample VRRP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Master Router Configuration File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Backup Router Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Chapter 5. Configuring Software Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Software Option Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Listing the Installed Software Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Adding a New Software Option Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Encryption Hardware Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
PPP DES (RFC 1969) Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Diffie-Hellman Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
IP Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Built-in Firewall Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Filters and Interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Filter Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
IP Filter Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
ICMP Redirect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Filter Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
L2TP Tunneling — Virtual Dial-Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Advantages of Tunneling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
L2TP Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Sample Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
IPSec (Internet Protocol Security). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Transport and Tunnel Encapsulation Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
ESP and AH Security Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
10
IKE Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .151
Main Mode and Aggressive Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .152
Additional IKE Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153
Security Associations (SAs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153
IKE Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154
IKE Peer Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154
IKE Proposal Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155
IKE IPSec Proposal Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156
IKE IPSec Policy Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157
IKE Configuration Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159
Main Mode Example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159
Aggressive Mode Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162
IPSec Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163
Chapter 6. Managing the Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165
SNMP Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165
Telnet Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166
Client TFTP Facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166
TFTP Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166
BootP Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167
BootP Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167
BootP Service by the DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .167
Relaying BootP Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168
Syslog Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168
Boot Code Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169
What is the Boot Code?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169
Manual Boot Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .170
Identifying Fatal Boot Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173
Software Kernel Upgrades. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176
What is the Software Kernel? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176
Booting and Upgrading from the LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176
Upgrading from the WAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .178
Backup and Restore Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179
Backup Configuration Files (Recommended Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179
Restore Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179
Flash Memory Recovery Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180
Recovering Kernels for Routers with Configuration Switches. . . . . . . . . . . . . . . . . . . . . . . . . .180
Recovering Kernels for Routers with a Reset Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .181
Recovering Passwords and IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182
Routers with Configuration Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182
Routers with a Reset Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182
Batch File Command Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183
Chapter 7. Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184
Diagnostic Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184
Using LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184
History Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185
Ping Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .186
Investigating Hardware Installation Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .187
Investigating Software Configuration Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188
Connection Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188
Login Password Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188
Remote Network Access Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .189
Telnet Access Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .191
11
Software Download Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Voice Routing (VoDSL) Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
L2TP Tunnel Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Dial Backup Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
System Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Time-Stamped Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Debugging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
General Debug Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
ATM Debug Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Web GUI Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
SDSL Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
ADSL DMT Router Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Frame Relay Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
ATM Tracing Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
IP Filtering Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
IKE Debug Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Before Contacting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Chapter 8. Command Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Command Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Status Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
File System Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
SYSTEM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Ethernet Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
REMOTE Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
WAN Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
ADSL Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
ATM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
DMT Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Dual-Ethernet Router (ETH) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Frame Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
HDSL Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
IDSL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
SDSL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
SHDSL Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
DHCP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
L2TP — Virtual Dial-Up Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Bridge Filtering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
PPPoE Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
IKE (Internet Key Exchange) Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
IPSec Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Appendix A. Network Information Worksheets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
Configuring PPP with IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Configuring PPP with IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Configuring PPP with Bridging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Configuring RFC 1483 / RFC 1490 with IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Configuring RFC 1483 / RFC 1490 with IPX Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Configuring RFC 1483 / RFC 1490 with Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Configuring RFC 1483MER / RFC 1490MER with IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Configuring FRF8 with IP Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
Configuring a Dual-Ethernet Router for IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
12
Appendix B. Configuring IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .408
IPX Routing Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .408
Configure IPX Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .408
Step 1: Collect Your Network Information for the Target (Local) Router . . . . . . . . . . . . . . . . .409
Step 2: Review your Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .410
Command Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .411
Topic Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .416
13
How to Access the Command Line
This manual describes the Command Line Interface for your router. The Command Line Interface gives you
access to all capabilities of your router.
A GUI (graphic user interface) is also available for configuring the router. It provides many, but not all, of the
capabilities of the Command Line Interface. To learn how to access the GUI, refer to the User Reference Guide
that came in the box in which your router was shipped or find the guide on the Technical Support web site
(www.efficient.com).
To use the Command Line Interface, you must first access the router command line. To do this, you:
5. Enter the login password. (The default is admin. To change the login password, use the system admin
command, page 236). You may then begin entering router commands.
The router supports both local access and remote access. In step 3 above, the terminal session could be:
• The terminal window from within the Quick Start or Configuration Manager application (for local access)
Terminal Window
To access the terminal window from within the Quick Start or Configuration Manager application:
The menu selection Commands provides shortcuts to most of the commands described in this manual.
Terminal Session under Windows (HyperTerminal)
To open the HyperTerminal emulator available under the Windows operating system:
1. Click Start on your desktop and then select Programs > Accessories > Communications > Hyperterminal.
2. Double-click Hypertrm.exe.
3. In the Phone Number window, under Connect using, select Choose Direct to Com 1 (or 2).
4. In the Com 1 (or 2) Properties page, enter the following port settings and select OK:
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: Hardware
(To use a baud rate other than
9600, see page 172.)
Baud rate
(Data rate): 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: Hardware
(To use a baud rate other
than 9600, see page 172.)
To set up a Telnet session under Windows for remote access to the router:
1. Make sure that your PC and router addresses are in the same subnetwork. For example, the router address
could be 192.168.254.254 and the PC address could be 192.168.254.253.
This chapter provides background information applicable to the router on topics useful to network administrators.
These topics include:
The router can operate as a bridge, as a router, or as both. The following sections describe routing and bridging
and how the two functions operate together.
Routing
Routing is the process that determines where data is sent. A router can route user data from source to destination
over different LAN and WAN links. Routing relies on routing address tables to determine the best path for each
packet to take.
The routes within a routing address table are established in two ways:
• You can enter specific static routes. For each route, you enter the address for a remote destination with path
details and a value for the perceived cost of that route (path latency).
• The routing tables can also be built dynamically; i.e., the location of remote stations, hosts, and networks are
updated from broadcast packet information.
Bridging
Bridging connects two or more LANs so that all devices share the same logical LAN segment and network
numbers. Transparent bridging allows locally connected devices to send frames to all devices as if they were local.
The MAC layer header contains source and destination addresses used to transfer frames. An address table is
dynamically built and updated with the logical port a device is connected to as frames are received. (To see the
contents of the bridging table, use the command bi list, page 212.)
Our bridging support includes the IEEE 802.1D standard for LAN-to-LAN bridging and the Spanning Tree
Protocol for interoperability with other vendors’ bridge/routers. Bridging is provided over PPP as well as adjacent
LAN ports.
You can control the flow of packets through the router using bridge filters. The filters can “deny” or “allow”
packets to cross the network based on the content of the packets. This feature lets you restrict or forward messages
with a specified address, protocol, or data content. Common uses are to prevent access to remote networks, control
unauthorized access to the local network, and limit unnecessary traffic.
For example, to restrict remote access for specific users, you could define bridge filters using the local MAC
address of each user to be restricted. Each bridge filter is specified as a “deny” filter based on the MAC address
and position of the address within the packet. Deny filtering mode is then enabled to initiate bridge filtering.
While in deny mode, all packets containing one of the filtered MAC addresses are denied bridging across the
router.
Similarly, protocol filtering can be used to prevent a specific protocol from being bridged. In this case, the
protocol ID field in a packet is used to deny or allow a packet. You can also restrict the bridging of specific
broadcast packets.
Bridge-Only Units
A series of bridge-only units is available, both upgradable and non-upgradable. An upgradable bridge can be
upgraded to a router; a non-upgradable bridge cannot.
These bridge-only units are pre-configured; no further configuration is required. The unit comes up in bridge
mode automatically.
Upgrading an upgradable bridge to become a router requires the addition of a software option key. The software
option key turns on the IP Routing feature. To read about software option keys, see page 124.
Typical usage When only IP/IPX traffic is to be routed and all other traffic is to be
ignored. For IP, used for Internet access.
Note: This is the most easily controlled configuration.
Typical usage When only IP/IPX traffic is to be routed but some non-routed protocol is
required. Used for client/server configurations.
Typical usage Peer-to-peer bridging and when the remote end supports only bridging.
• The router operates as a router for network protocols that are enabled for routing (IP or IPX).
• The router operates as a bridge for protocols that are not supported for routing.
• Routing takes precedence over bridging; i.e., when routing is active, the router uses the packet’s protocol
address information to route the packet.
• If the protocol is not supported, then bridging uses the MAC address information to forward the packet.
• One remote router can be designated as the outbound default bridging destination. All outbound bridging
traffic with an unknown destination is sent to the default bridging destination.
• Bridging can be enabled or disabled for specific remote routers.
• Routing can be enabled or disabled for the entire router and for individual remotes.
Operation of the router is influenced by routing and bridging controls and filters set during router configuration as
well as automatic spoofing and filtering performed by the router. For example, general IP or IPX routing, and
routing or bridging from specific remote routers are controls set during the configuration process.
Spoofing and filtering, which minimize the number of packets that flow across the WAN, are performed
automatically by the router. For example, RIP routing packets and certain NetBEUI packets are spoofed even if
only bridging is enabled.
Routers are available whose WAN interfaces conform to various DSL standards. Separate sets of commands are
provided for each type of DSL. The following lists each supported DSL standard with a link to its set of
commands:
The WAN interface of the router is displayed each time the router reboots, as in the following IDSL example:
Voice Routing
A Voice over DSL (VoDSL) router allows the delivery of both telephony (voice) and data services over a single
DSL line. It acts as an Integrated Access Device (IAD), residing on the customer premises and connecting to a
DSL circuit. As such, it serves as a circuit/packet gateway and provides standard telephone service as well as
Internet service via an Ethernet connection. Thus, the user has access to toll-quality telephone lines and
continuous, high-speed Internet and remote LAN services over a single copper loop.
This diagram illustrates how a Voice over DSL router connects both a phone system to the PSTN and a LAN to
the Internet over the same DSL line.
• Jetstream (proprietary)
• CopperCom (proprietary)
• Upstream traffic shaping (bandwidth management) of data when the telephony interface is active
• ADPCM or PCM voice encoding
• Local echo canceling (G.168)
Upstream over subscription is supported for most gateways. If the bandwidth is insufficient to support a new
outgoing call, the user does not receive a dial tone when going off hook. Downstream over subscription should be
managed by the gateway. Currently, if the bandwidth is occupied by calls and a new call is received, all users may
hear clicking.
• For telephony over ATM, the VPI/VCI is automatically set. (For most routers, it is set to 0*39).
• For telephony over Frame Relay, the DLCI is automatically set to 22. The value must match your service
provider’s value.
Use the Web GUI to verify the VPI/VCI or DLCI numbers for the data and voice connections.You can change the
value if necessary (see Voice Routing (VoDSL) Troubleshooting, page 191).
The phone number for each port is set by your voice service provider.
The phone dial tone is provided by the Class 5 switch via the voice gateway at your regional switching center
(RSC). All voice features of the switch are passed through to the phone set. The router supports the calling
services that you subscribe to from your service provider, such as call forwarding, caller ID, messaging, etc.
The bandwidth required to initiate an upstream call is always about 80 Kbps (64 Kb plus overhead), whether PCM
or ADPCM encoding is used. Although for ADPCM only about 40 Kb is used (32 Kb plus overhead), 80Kbps is
always reserved because the ADPCM call can switch to a PCM call on the fly. This switching is done for all V.90
calls and some fax calls by the voice gateway.
Configuration for voice and data routing can be performed using the Web-based Easy Setup configuration
program. For ATM standards-based gateways, the voice profile must match the configuration of the voice
gateway (see Changing Your ATM Standard Voice Profile, page 23).
You can use the Port Monitor GUI program to see the voice PVC and the last event message. To see LMI
statistics for a frame relay router, use the frame stats command (page 334). To see AAL2 statistics for the voice
gateway, use the voice l2stats command (Jetstream gateway only). For other commands to monitor telephony
services, see Trouble-Shooting Telephony Services (page 191).
You can display and change your active voice profile. The default voice profile is 9. To display the current voice
profile, enter this command:
voice profile
To change your active voice profile, specify the profile number on the voice profile command.
Silence Payload
profile ADPCM32? Suppression? Size?
7 Yes Yes 44 bytes
8 No Yes 44 bytes
9 No No 44 bytes
10 Yes No 44 bytes
11 Yes No 40 bytes
12 Yes Yes 40 bytes
# voice profile 10
The active profile has been changed
Profile 10 active, pcm or adpcm32, 44 byte packets
The two modes are called active and always; the default is active mode, in which CAS refresh is not performed
during an idle state. To see the current setting, enter this command:
voice refreshcas
To have CAS refresh signals sent only when voice is present, enter this command:
Note: A mode change is effective immediately. However, you must save the change if it is to persist across
reboots.
The router supports PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication
Protocol) under PPP.
Security authentication may not be required due to the nature of the connection in a DSL environment (traffic
occurs on a dedicated line/virtual circuit. However, authentication may be specifically required by the remote end,
the ISP, or the NSP. When authentication is not required, security can be disabled with the command remote
disauthen (page 299).
PAP provides verification of passwords between routers using a two-way handshake. One router (peer) sends the
system name and password to the other router. Then the other router (known as the authenticator) checks the
peer’s password against the configured remote router’s password and returns acknowledgment.
PAP Authentication
1
.....Accepted/Rejected.......
CHAP is more secure than PAP because unencrypted passwords are not sent across the network. CHAP uses a
three-way handshake. One router (known as the authenticator) challenges the other router (known as the peer) by
generating a random number and sending it along with the system name. The peer then applies a one-way hash
algorithm to the random number and returns this encrypted information along with the system name.
The authenticator then runs the same algorithm and compares the result with the expected value. This authentica-
tion method depends upon a password or secret known only to both ends.
Authentication Process
The authentication process occurs regardless of whether a remote router connects to the local router or vice versa,
and even if the remote end does not request authentication. It is a bi-directional process, where each end can
authenticate the other using the protocol of its choice (provided the other end supports it).
During link negotiation (LCP), each side of the link negotiates which protocol to use for authentication during the
connection.
Note: If desired, you can override the negotiation of an authentication protocol and force the local router to use
the designated protocol. To designate PAP or CHAP, use the command system authen (page 236).
If both routers have PAP authentication, then they negotiate PAP authentication. Otherwise, the local router
always requests CHAP authentication first; if CHAP is refused, PAP is requested. If the remote does not accept
either PAP or CHAP, the link is dropped; i.e., the router does not communicate without a minimum security level.
On the other hand, the local router does accept any authentication scheme required by the remote, including no
authentication at all.
CHAP Authentication
For CHAP, the router issues a CHAP challenge request to the remote side. The challenge includes the system
name and random number. The remote end, using a hash algorithm, transforms the name and number into a
response value. When the remote end returns the challenge response, the router can validate the response
challenge value using the entry in the remote router database. If the response is invalid, the call is disconnected.
If the other end negotiated CHAP, the remote end can, similarly, request authentication from the local router. The
router uses its system name and password to respond to the CHAP challenge.
PAP Authentication
For PAP, when a PAP login request is received from the remote end, the router checks the remote router PAP
security using the remote router database. If the remote router is not in the remote router database or the remote
router password is invalid, the call is disconnected. If the remote router and password are valid, the local router
acknowledges the PAP login request.
If PAP was negotiated by the remote end for the local side of the authentication process and the minimum security
level is CHAP, as configured in the remote router database, the link is dropped as a security violation.
Authentication Passwords
Access to the router is controlled by an administration password set by the command system admin (page 236).
As part of the router configuration, you may set the following authentication passwords:
• System authentication password — the default system password used to access any remote router. Remote
sites use this password to authenticate the local site.
This default authentication password is set by the command system passwd (page 252).
• System override password — optional password used only to connect to a specific remote router for
authentication by that remote site.
To specify a unique system override password for a remote router, use the command remote SetOurPasswd
(page 315). This password is used instead of the general system password only for connecting to a specific
remote router. This allows you to set a unique CHAP or PAP authentication password for authentication of
the local site by the remote site only when the router connects to that remote site.
A common use for the system override password is to set the password assigned to you by your Internet
Service Provider (ISP). Similarly, the system name of the local router (set by the command system name)
can be overridden for connecting to a specific remote with the command remote setOurSysName (page
316).
• Remote authentication password — password used by the router to authenticate the remote site. Each
remote router entered in the remote router database has a password used when the remote site attempts to gain
access to the local router.
To set the remote authentication password, use the command remote setpasswd (page 316).
Authentication Levels
The router also uses security levels, as follows:
• Remote authentication protocol — Each remote router entered in the remote router database has a minimum
security level that must be negotiated before the remote router gains access to the local router.
• System authentication protocol — A system-wide control is available for overriding the minimum security
level in the entire remote router database.
The router uses industry-wide standards to ensure compatibility with routers and equipment from other vendors.
To interoperate, the router supports standard protocols on the physical level, data link level, and network level.
For two systems to communicate directly, they must use the same protocol at each level.
Physical media Hardware and electrical Router Ethernet and modem hardware
signaling interfaces for copper wire or fiber cable
Data link Packet transmission method Router hardware and software kernel. Can be
(frame type or encapsulation Ethernet, ATM, or Frame Relay
method)
The data-link protocol level defines the transmission of data packets between two systems over the LAN or WAN
physical link. The frame type or encapsulation method defines a way to run multiple network-level protocols over
a single LAN or WAN link. Most protocols do not support negotiable options, except for PPP.
The router supports both ATM (Asynchronous Transfer Mode) and Frame Relay transmission. ATM transport
uses fixed-length cells; Frame Relay transport uses variable-length packets.
The packet formats for these encapsulation methods are given in Encapsulation Options, page 29.
Protocol Conformance
The router conforms to RFCs designed to address performance, authentication, and multi-protocol encapsulation.
The following RFCs are supported:
IP Routing
IP routing support, in conformance with RFC 791, provides the ability to process TCP/IP frames at the network
layer for routing. IP routing support includes the Routing Interface Protocol (RIP), in conformance with RFC
1058 (RIP v.1) and RFC 1723 (RIP v.2).
IPX Routing
IPX routing conforms to the Novell® NetWare™ IPX Router Development Guide, Version 1.10.
Encapsulation Options
This section describes the packet format for each encapsulation option supported by the router.
Note: The same encapsulation method must be used by both ends of the connection (the router and the DSLAM).
PPP
This protocol uses VC multiplexing, as defined in RFC 2364; it dedicates a virtual circuit to PPP traffic only. (The
other encapsulation method defined in RFC 2364, LLC multiplexing, is described in the next section, PPPLLC.)
Each packet begins with a one- or two-byte protocol ID. Typical IDs are:
0xc021 LCP
0x8021 IPCP
0x0021 IP
The command for this encapsulation option is: remote setProtocol PPP <remoteName> (page 320).
Note: With PPP over ATM, the address and control fields (i.e., FF03) are never present; this also is the case for
LCP packets.
PPPLLC
This protocol (LLC-multiplexed) allows PPP traffic to be carried simultaneously with other traffic on a single
virtual circuit (as opposed to the PPP method of encapsulation—VC multiplexing—which dedicates a virtual
circuit to PPP traffic only).
Each PPP packet is prepended with the sequence 0xFEFE03CF. Thus, an LLC packet has the format:
0xFEFE03CF 0xC021.
The command for this encapsulation option is: remote setProtocol PPPLLC <remoteName> (page 320).
Bridging
User data packets are prepended by the sequence 0xAAAA0300 0x80c20007 0x0000 followed by the
Ethernet frame containing the packet.
802.1D Spanning Tree packets are prepended with the header 0xAAAA0300 0x80C2000E.
Routing
For this encapsulation option, the commands, as described on page 320, are:
If IP routing is enabled, then IP packets are prepended with the sequence 0xAAAA0300 0x80c20007 0x0000 and
sent as bridged frames. If IP routing is not enabled, then the packets appear as bridged frames.
FRF8
IP packets have prepended to them the following sequence: 0x03CC.
The command for this encapsulation option is: remote setprotocol FRF8 <remoteName>
rawIP
IP packets do not have any protocol headers prepended to them; they appear as IP packets on the wire. Only IP
packets can be transported since there is no possible method to distinguish other types of packets (bridged frames
or IPX).
The command for this encapsulation option is: remote setProtocol rawIP <remoteName>
The system software and configuration information for the router are in its DOS-compatible file system. The file
system commands, similar to DOS commands, are described in File System Commands, page 226.
It is wise to keep a backup copy of the system and configuration files. For more information on the backup and
restoration of configuration files, see page 179.
Any file contained within the system may be retrieved or replaced using the TFTP protocol. Specifically,
configuration files and the operating system upgrades can be updated. Only one copy of the router software is
allowed in the router’s FLASH memory. For more information on these topics, see Managing the Router, page
165.
Note: Users should not delete any of these files, unless advised to do so by Technical Support.
ASIC.AIC FPGA (Field Programmable Gate Array) file that provides the logic that customizes the
router hardware (not present in the 5950 or 5871 models).
The following files are for automatic execution of command scripts. For more information, see page 183.
nosec.txt No security
The keys for software options that have been purchased are kept in the file KEYFILE.DAT. Do not copy the key
file from one router to another router, even if the two routers are the same model with the same kernel. The
software keys are isomorphic to one and only one router. For more information on software option keys, see page
124.
This chapter describes the basic information you need before you can begin configuring your router. The basic
configuration tasks can be performed using the Command Line Interface described in this manual or the graphic
interface described in the User Reference Guide. (A copy of the Guide came with your router; it is also availabe
on the web site www.efficient.com.) The basic configuration information is the same for either interface.
• Setting names, passwords, PVC numbers, and link and network parameters
• Configuring specific protocol requirements, such as IP or IPX addresses and IP protocol controls
An alternate configuration method, called Plug & Play, is available with the Copper Mountain CopperEdge™ 200
DSLAM. This method is described at the end of the chapter.
Remote Routers
This manual frequently refers to the local router and remote routers, which are defined as follows.
Local router. Router that you are configuring. Also referred to as target router.
Remote routers. All the routers to which the local (target) router may connect.
Remote router database. Database which resides in the local router and contains information about the
remote routers to which the local router can connect.
Router A Router B
Remote router database
Router B DSL
Router C
Network
Router C
Router D Router D
As shown in the illustration, the remote router database in the local router contains an entry for each remote
router. A remote router entry defines:
• Connection parameters
• Security features
The commands that define information for a remote router entry start with the word remote and end with the
name of the remote entry. Most of these commands are described in the section REMOTE Commands, on page
289.
The active session for a remote can be stopped and started independently (see the commands remote stop, page
324, remote start, page 322, and remote restart, page 307). These commands allow you to activate configuration
changes for a remote without rebooting the router. (Many configuration changes require a save and restart or
reboot before the change becomes effective.)
Protocols to be Used
The information needed to configure the router depends on the link protocol and network protocols that are to be
used. The link protocol and network protocols used are generally determined by your Network Service Provider.
Note: Use the blank Network Information Worksheets in appendix A to collect your network information.
PPP with:
• IP Routing, go to page 36
• IPX Routing, go to page 38
• Bridging, go to page 40
• IP Routing, go to page 41
• IPX Routing, go to page 42
• Bridging, go to page 43
RFC 1483 MER or RFC 1490 MER (MAC Encapsulated Routing) with:
• IP Routing, go to page 44
FRF8 with:
• IP Routing, go to page 46
PPP over ATM and PPP over Frame Relay use different connection identifiers:
To configure the IP network protocol and PPP link protocol, you need the following information.
• System Names and Authentication Passwords for the Local Router and All Remote Routers
You define a system name and authentication password for the local router. Remote routers check the
system name and authentication password to authenticate the local router.
Although the system names and authentication passwords for the remote routers are defined by the
service provider, you must have this information because the local router uses it to authenticate the
remote router. The name and password are used in both PAP and CHAP authentication. To see how this
information is used, refer to PAP/CHAP Security Authentication, on page 25 .
Note: If the service provider does not support the authentication of remotes by the local router, use the
command remote disauthen <remoteName> to disable the authentication process.
Note: A sample configuration containing names and passwords is provided in the section Sample
Configuration 1: PPP with IP and IPX, on page 65 .
ATM uses two connection identifiers that describe the PVC (Permanent Virtual Circuit). These identifiers are
the VPI (Virtual Path Identifier) and the VCI (Virtual Channel Identifier). Your router may have been
preconfigured with VPI/VCI numbers. If not, you need to get these numbers from your service provider.
If you are connecting to multiple remote sites, you need the unique VPI and VCI numbers that identify each
remote destination.
The Domain Name Service (DNS) maps host names to IP addresses. DNS is performed by Domain Name
Servers. The router can get DNS information automatically. Or, you can choose to configure DNS manually.
Consult with your Network Service Provider to determine if you need to enter the following information:
• IP Routing Addresses
Note: An Ethernet route is usually defined when there are multiple routers on the Ethernet that cannot
exchange routing information. This feature is only used in special circumstances.
A TCP/IP Default Route should be designated in the routing table for all traffic that cannot be directed
to other specific routes. Define the default route to a remote router or, in special circumstances, define an
Ethernet gateway. There can be only one default route specified.
To configure the IPX network protocol and PPP link protocol, you need the following information.
• System Names and Authentication Passwords for the Local Router and All Remote Routers
You define a system name and authentication password for the local router. Remote routers check the
system name and authentication password to authenticate the local router.
Although the system names and authentication passwords for the remote routers are defined by the
service provider, you must have this information because the local router uses it to authenticate the
remote router. The name and password are used in both PAP and CHAP authentication. To see how this
information is used, refer to PAP/CHAP Security Authentication, on page 25 .
Note: If the service provider does not support the authentication of remotes by the local router, use the
command remote disauthen <remoteName> to disable the authentication process.
Note: A sample configuration containing names and passwords is provided in the section Sample
Configuration 1: PPP with IP and IPX, on page 65 .
ATM uses two connection identifiers that describe the PVC (Permanent Virtual Circuit). These identifiers are
the VPI (Virtual Path Identifier) and the VCI (Virtual Channel Identifier). Your router may have been
preconfigured with VPI/VCI numbers. If not, you need to get these numbers from your service provider.
If you are connecting to multiple remote sites, you need the unique VPI and VCI numbers that identify each
remote destination.
The DLCI (Data Link Connection Identifier) number applies to Frame Relay routers only. Get your DLCI
from your service provider.
IPX routes define the paths to specific destinations. Routers need them so servers and clients can exchange
packets. A path to a file server is based on the Internal Network Number of the server. A path to a client is
based on the External Network Number (Ethernet) of the client.
You need the following information (most likely from your network administrator) for IPX routing.
It is a logical network number that identifies an individual Novell server. It specifies a route to the
services (i.e., file services, print services) that Novell offers. It must be a unique number.
It refers to a physical LAN/wire network segment to which servers, routers, and PCs are connected
(Ethernet cable-to-router segment). It must be a unique number.
Important: This number is part of the routing information. It only identifies the WAN segment between
the two routers. Note that only those two routers need to have the WAN Network Number configured.
SAP entries should reflect primary logon servers for the clients on the local LAN. Only the servers on the
remote side of the link have to be entered. Local servers do not need to be entered.
Frame Type
With local servers on your LAN, make sure to select the proper frame type for the IPX network number.
To determine this, consult with your network administrator. When you have only NetWare clients on
your LAN, keep the default (802.2) selected as most clients can support any type. The frame type choices
are:
DIX For DEC, Intel, Xerox; this setting is also referred to as “Ethernet II”, and it is becoming
obsolete.
Note: For step-by-step information on how to configure IPX routing, see Configuring IPX Routing, on page 408.
To configure bridging as the network protocol and PPP as the link protocol, you need the following information:
• System Names and Authentication Passwords for the Local Router and All Remote Routers
You define a system name and authentication password for the local router. Remote routers check the
system name and authentication password to authenticate the local router.
Although the system names and authentication passwords for the remote routers are defined by the
service provider, you must have this information because the local router uses it to authenticate the
remote router. The name and password are used in both PAP and CHAP authentication. To see how this
information is used, refer to PAP/CHAP Security Authentication, on page 25 .
Note: If the service provider does not support the authentication of remotes by the local router, use the
command remote disauthen <remoteName> to disable the authentication process.
Note: A sample configuration containing names and passwords is provided in the section Sample
Configuration 1: PPP with IP and IPX, on page 65 .
ATM uses two connection identifiers that describe the PVC (Permanent Virtual Circuit). These identifiers are
the VPI (Virtual Path Identifier) and the VCI (Virtual Channel Identifier). Your router may have been
preconfigured with VPI/VCI numbers. If not, you need to get these numbers from your service provider.
If you are connecting to multiple remote sites, you need the unique VPI and VCI numbers that identify each
remote destination.
The DLCI (Data Link Connection Identifier) number applies to Frame Relay routers only. Get your DLCI
from your service provider.
The Domain Name Service (DNS) maps host names to IP addresses. DNS is performed by Domain Name
Servers. The router can get DNS information automatically. Or, you can choose to configure DNS manually.
Consult with your Network Service Provider to determine if you need to enter the following information:
RFC 1483 and RFC 1490 combined with the IP, IPX, or Bridging network protocols share the same configuration
characteristics, except for the connection identifiers: VPI/VCI numbers are used for RFC 1483 and a DLCI
number is used for RFC 1490.
Obtain the information as described in the appropriate section. This data will be used later to configure your router
using the Command Line Interface (see Configuration Tables, on page 52).
To configure IP as the network protocol and RFC 1483 or RFC 1490 as the link protocol, you need the following
information:
If you are connecting to multiple remote sites, get additional VPI and VCI numbers from your Network
Service Provider. These numbers identify the remote destination and must be unique for each remote.
The DLCI number applies to Frame-Relay routers only; it identifies your connection. Get you DLCI
from your Network Service Provider.
Consult with your Network Service Provider to find out if you need to enter the following information:
• IP Routing Entries
If NAT is not enabled, you may need to specify a source WAN IP address for the WAN connection to
the remote router.
A TCP/IP Default Route should be designated in the routing table for all traffic that cannot be
directed to other specific routes. Define the default route to a remote router or, in special
circumstances, define an Ethernet gateway. There can be only one default route specified.
To configure IPX as the network protocol and RFC 1483 or RFC 1490 as the link protocol, you need the
following information:
The VPI and VCI numbers apply to ATM routers only. Your router may have been preconfigured with
VPI/VCI numbers. If not, get these numbers from your Network Service Provider.
If you are connecting to multiple remote sites, get additional VPI and VCI numbers from your Network
Service Provider. These numbers identify the remote destination and must be unique for each remote.
The DLCI number applies to Frame-Relay routers only; it identifies your connection. Get you DLCI
from your Network Service Provider.
IPX routes define the paths to specific destinations. Routers need them so servers and clients can exchange
packets. A path to a file server is based on the Internal Network Number of the server. A path to a client is
based on the External Network Number (Ethernet) of the client.
You need the following information (most likely from your network administrator) for IPX routing.
It is a logical network number that identifies an individual Novell server. It specifies a route to the
services (i.e., file services, print services) that Novell offers. It must be a unique number.
It refers to a physical LAN/wire network segment to which servers, routers, and PCs are connected
(Ethernet cable-to-router segment). It must be a unique number.
Important: This number is part of the routing information. It is only used to identify the WAN segment
between the two routers. Note that only those two routers need to have the WAN Network Number
configured.
SAP entries should reflect primary logon servers for the clients on the local LAN. Only the servers on the
remote side of the link have to be entered. Local servers do not need to be entered.
Frame Type
With local servers on your LAN, make sure to select the proper frame type for the IPX network number.
To determine this, consult with your network administrator. When you have only NetWare clients on
your LAN, keep the default (802.2) selected as most clients can support any type. The frame type choices
are:
DIX For DEC, Intel, Xerox; this setting is also referred to as “Ethernet II”, and it is becoming
obsolete.
To configure bridging as the network protocol and RFC 1483 or RFC 1490 as the link protocol, you need the
following information:
The VPI and VCI numbers apply to ATM routers only. Your router may have been preconfigured with
VPI/VCI numbers. If not, get these numbers from your Network Service Provider.
If you are connecting to multiple remote sites, get additional VPI and VCI numbers from your Network
Service Provider. These numbers identify the remote destination and must be unique for each remote.
The DLCI number applies to Frame-Relay routers only; it identifies your connection. Get you DLCI
from your Network Service Provider.
Consult with your Network Service Provider to find out if you need to enter the following information:
RFC 1483MER and RFC 1490MER combined with the IP, IPX, or Bridging network protocols share the same
configuration characteristics, except for the connection identifiers: VPI/VCI numbers are used for RFC 1483MER
and a DLCI number is used for RFC 1490.
Obtain the information as described in the appropriate section. This data will be later used to configure your router
using the Command Line Interface (see Configuring MAC Encapsulated Routing: RFC 1483MER / RFC
1490MER with IP Routing, on page 59).
The VPI and VCI numbers apply to ATM routers only. Your router may have been preconfigured with
VPI/VCI numbers. If not, get these numbers from your Network Service Provider and then configure
them.
If you are connecting to multiple remote sites, get additional VPI and VCI numbers from your Network
Service Provider. These numbers identify the remote destination and must, therefore, be unique for each
remote.
The DLCI number applies to Frame Relay routers only. Your Network Service Provider or your
Network Access Provider will provide you with a DLCI (Data Link Connection Identifier). The DLCI is
an address identifying your connection.
This information is obtained from the Network Service Provider. Consult with your Network Service
Provider to find out if you need to enter the following information:
• IP Routing Entries
A TCP/IP Default Route should be designated in the routing table for all traffic that cannot be directed
to other specific routes. You will need to define the default route to a remote router or, in DLCI (special
circumstances, define an Ethernet gateway. There can be only one default route specified.
FRF8 is only used in conjunction with the IP network protocol. Obtain the information described below. This data
will be used later to configure your router using the Command Line Interface (see Configuration Tables, on page
52).
Your router may have been preconfigured with VPI/VCI numbers. If not, you will have to obtain these
numbers from your Network Service Provider and then configure them.
If you are connecting to multiple remote sites, get additional VPI and VCI numbers from your Network
Service Provider. These numbers identify the remote destination and must be unique for each remote.
Consult your Network Service Provider to find out if you need to enter the following information:
Note: If you intend to connect only to the Internet, enter this information using the Internet Quick Start
configurator.
• IP Routing Entries
A TCP/IP Default Route should be designated in the routing table for all traffic that cannot be directed
to other specific routes. Define the default route to a remote router or, in special circumstances, define it
to an Ethernet gateway. There can be only one default route specified.
Bridging is enabled by default when the router boots up. IP and IPX routing are disabled.
DHCP is enabled by default and the router’s DHCP server issues IP addresses to any PC request. The DHCP
default IP pool is 192.168.254. 2 through 192.168.254.20.
To connect to the router, use the router’s default IP address using a Telnet session, for example, and any 10Base-T
port on the router.
This router is configured by default as a bridge and no configuration steps are needed. The user needs only
establish a connection to the remote location (to the Internet Service Provider, for example).
Bridging is enabled by default when the router boots up. IP and IPX routing are disabled.
The eth commands are used to configure the Dual-Ethernet router for IP routing. Refer to the section Dual-
Ethernet Router (ETH) Commands, on page 332, for usage and syntax information.
The last parameter on an eth command determines which interface is being configured (0 for ETH/0, 1 for
ETH/1).
Each interface (ETH/0 and ETH/1) must be configured. A minimum of one route must be defined to have a
working configuration. This is generally a default route on the ETH/1 interface where all traffic otherwise
specified is automatically forwarded. This default route is: 0.0.0.0 255.255.255.255 1.
The gateway address is the IP address supplied by your Internet Service Provider or Network Administrator.
A Dual-Ethernet router sample configuration with IP Routing is provided in the Sample Configuration 3:
Configuring a Dual-Ethernet Router for IP Routing, on page 77 section.
An alternate configuration method, called Plug & Play, is available when using the Copper Mountain
CopperEdge™ 200 DSLAM, version 3.0, and the router models that support Copper Mountain, that is, 5871
IDSL, 5851 SDSL, and 7851 SDSL IAD.
Plug & Play eliminates the need for users or administrators to configure CPEs or IADs locally. It allows the
Copper Mountain CE200 DSLAM and all routers connected to it to exchange information via both Copper
Mountain Control Protocol (CMCP) messages and DHCP messages. The CE200 and its routers are able to
exchange the following types of data: IP addresses, net masks (for both voice and data VCs), voice gateway type,
voice gateway IP address, fragmentation capabilities, maximum number of voice channels, and CPE data function
and data encapsulation.
Plug & Play can run with the following network models as specified by the DSLAM:
HDIA stands for High Density IP Access. This network model applies to both the data and voice VCs
configured for an IAD attached to a single DSL port to the CE200. It allows you to use limited IP addressing
space with maximum efficiency. It allows IADs (or routers) and hosts to be on different premises but still on
the same subnet. In this network model, an IAD can be configured as a bridge or as a router.
With the Cross-Connect network model, the CE200 can multiplex point-to-point connections over different
WAN interfaces. It can also provide different encapsulation types and translations between different
encapsulation types. For example, the Cross-Connect network model now functions as a vehicle for
converting disparate frame formats between the DSL and WAN interfaces, as well as frame formats into
ATM formats.
With the Copper VPN™ network model, either in static forwarding mode or auto learning mode, subscriber
links act as wide-area extensions of a DSL remote LAN. Unlike the VWAN network model, CopperVPN
does not rely on the upstream device for integration of routing and bridging functions. The CE200 learns the
IP and MAC address and port number for every host supported by the CPEs.
For full details on the network models, please see your Copper Mountain documentation.
1. The DSLAM is configured to supply the router with its IP address, subnet mask, default gateway and primary
DNS server.
3. Once it senses these parameters, by default, it enables IP routing and activates the built-in remote router
database entry named configuredforCMPPlay.
4. The router then sends a DHCP request to the WAN for its IP address information.
5. IP filters are also automatically created for UDP port 500 to and from the router.
6. The Copper Mountain DSLAM, despite being a layer 2 pass-through device in most network models,
intercepts this request and answers it with the values configured in step 1.
Bridge or Router?
If the router is to be used as a bridge (that is, as a pass-through device), you need to enter a command before you
place the router on the Copper Mountain DSL line. The command is as follows:
Then, after it is placed on the DSL line, the router automatically activates in bridge mode. Otherwise, the router
automatically activates in router mode.
To see the current mode of the router, you can list the remote entry configuredForCMPPlay as shown in the next
section. In bridging mode, the Bridging enabled line is set to yes.
The Copper Mountain DSLAM supports the use of RFC 1483 IP encapsulation (routed) and RFC 1483 Ethernet
(bridged) encapsulation. However, the frame cmpplay command setting does not correlate to the type of
encapsulation used on the DSL link, but rather to the mode used when the DSL link activates.
• In router mode, the protocol type in the remote is set to RFC1483MER and IP translation is turned on. MER
implies that, although bridged 1483 encapsulation is used on the WAN, the router is still an IP router.
• Conversely, in bridge mode, bridged 1483 encapsulation is used, but the router is not acting as an IP router,
but just as a pass-through device.
Remote configuredForCMPPlay
When configured using Copper Mountain Plug & Play, the router creates a remote profile and automatically sets
up IP filters as shown below.
# rem list
INFORMATION FOR <configuredForCMPPlay>
Status............................... enabled
Interface in use..................... FR
Protocol in use...................... RFC1483 (SNAP) - MAC Encapsulated Routing
Data Link Connection Id (DLCI)....... 528
IP address translation............... on
IP filters defined................... yes
Send/Receive Multicast............... off
Block NetBIOS Packets................ off
Source IP address/subnet mask........ 0.0.0.0/0.0.0.0
Remote IP address/subnet mask........ 0.0.0.0/0.0.0.0
Management IP address/subnet mask.... 0.0.0.0/0.0.0.0
Having planned your configuration and acquired the necessary information as described in chapter 2, you are
ready to configure your router.
• connected to the router with a terminal emulation session (or ASCII terminal), and
These tasks are described in the User Reference Guide that came with your router. If you intend to use the
Configuration Manager, it is assumed that you have installed the Configuration Manager software and can access
the terminal window. For more information, see How to Access the Command Line, on page 14.
• configuration commands for each combination of link protocol and network protocol supported by the router.
(Your Network Service Provider determines the link protocol that you use.) A configuration table for the
Dual-Ethernet Router (with IP routing enabled) is also provided.
• a section on verifying the router configuration describes how to test IP, IPX, and bridging.
For complete, individual descriptions of the commands mentioned in this chapter, refer to Chapter 8. Command
Reference on page 209.
Worksheets are provided in appendix A so that you can enter details about your local router and remote routers.
The worksheets list the commands used. Fill out one worksheet for the local router and one for each remote
router.
Note: If you are setting up both ends of the network, use a mirror image of the information listed below for
configuring the router on the other end of the link.
Important: If you change any the of the following settings, you must save the change and then either reboot the
router or restart the interface for the change to take effect:
Remote Router: TCP/IP route addresses, IPX routes, IPX SAPs and bridging control, and enable, disable, or
add remote routers
The following tables give you step-by-step instructions for standard configurations of the following network
protocol/link protocol combinations, as well as a configuration table for a dual-Ethernet router:
System Settings
System Name Required system name <name>
System Message Optional system msg <message>
Authentication Password Required system passwd <password>
Ethernet IP Address As required eth ip addr <ipaddr> <ipnetmask> [<port#>]
DHCP Settings Already enabled; additional dhcp set valueoption domainname
settings may be required <domainname>
dhcp set valueoption domainnameserver <ipaddr>
Change Login Optional system admin <password>
Remote Routers
New Entry Enter: Remote Name remote add <remoteName>
Link Protocol/PVCa Select: PPP remote setProtocol PPP <remoteName>
(for ATM routers) Enter: VPI/VCI numbers remote setPVC <vpi number>*<vci number>
<remoteName>
Link Protocol/DLCIb Select: PPP remote setProtocol PPP <remoteName>
(for Frame Relay routers) Enter: DLCI number remote setDLCI <number> <remoteName>
System Settings
System Name Required system name <name>
System Message Optional system msg <message>
Authentication Password Required system passwd <password>
Ethernet IP Address As required eth ip addr <ipaddr> <ipnetmask>[<port#>]
Settings DHCP Already enabled; addit. dhcp set valueoption domainname <domainname>
settings may be required dhcp set valueoption domainnameserver < ipaddr >
Change Login Optional system admin <password>
Ethernet IPX Network # Enter: IPX network # eth ipx addr <ipxnet> [<port#>]
Frame Type (default: 802.2) eth ipx frame <type>
Remote Routers
New Entry Enter: Remote Name remote add <remoteName>
Link Protocol/PVCa Select: PPP remote setProtocol PPP <remoteName>
(for ATM routers) Enter: VPI/VCI numbers remote setPVC <vpi number>*<vci number>
<remoteName>
Link Protocol/DLCIb Select: PPP remote setProtocol PPP <remoteName>
(for Frame Relay routers) Enter: DLCI number remote setDLCI <number> <remoteName>
Securityc Choose security level remote setAuthen <protocol> <remoteName>
Remote’s Password Enter: password remote setPasswd <password> <remoteName>
Bridging On/Off Must be off remote disBridge <remoteName>
Add IPX Routes Enter appropriate info remote addIpxroute <ipxNet> <metric> <ticks>
<remoteName>
Add IPX SAPs Enter appropriate info remote addIpxsap <servicename> <ipxNet>
<ipxNode> <socket> <type> <hops> <remoteName>
WAN Network # Enter appropriate info remote setIpxaddr <ipxNet> <remoteName>
IP and IPX Routing
TCP/IP Routing Must be disabled eth ip disable
IPX Routing Must be enabled eth ipx enable
Store save
Reboot reboot
a Enter this information if you are using PPP in an ATM environment.
b Enter this information if you are using PPP in a Frame- Relay environment.
c If the ISP does not support the authentication of the ISP system by the caller, use the command:
remote disauthen <remoteName> to disable the authentication.
System Settings
System Name Required system name <name>
System Message Optional system msg <message>
Authorization Password Required system passwd <password>
DHCP Settings Already enabled; additional dhcp set valueoption domainname <domainname>
settings may be required dhcp set valueoption domainnameserver < ipaddr >
Change Login Optional system admin <password>
Remote Routers
New Entry Enter: Remote Name remote add <remoteName>
Link Protocol/PVCa Select: PPP remote setProtocol PPP <remoteName>
(for ATM routers) Enter: VPI/VCI remote setPVC <vpi number>*<vci number> <remoteName>
System Settings
System Message Optional system msg <message>
Ethernet IP Address As required eth ip addr <ipaddr> <ipnetmask> [<port#>]
DHCP Settings Already enabled; dhcp set valueoption domainname <domainname>
additional settings may dhcp set valueoption domainnameserver <ipaddr>
be required
Change Login Optional system admin <password>
Remote Routers
New Entry Enter: Remote Name remote add <remoteName>
Link Protocol/PVCa Select: RFC 1483 remote setProtocol RFC1483 <remoteName>
(for ATM routers) Enter: VPI/VCI remote setPVC <vpi number>*<vci number>
Numbers <remoteName>
Link Protocol/DLCIb Select: FR remote setProtocol FR <remoteName>
(for Frame Relay Enter: DLCI number remote setDLCI <number> <remoteName>
routers)
Bridging On/Off Must be OFF remote disBridge <remoteName>
TCP/IP Route Enter: Explicit or default remote addiproute <ipnet> <ipnetmask> <hops>
Address route with remote <remoteName>
gateway
If Address Translation To enable NAT, use: remote setIpTranslate on <remoteName>
(NAT) is enabled:
TCP/IP Route Enter: Source WAN Port remote setSrcIpAddr <ipaddr> <mask> <remoteName>
Addresses Address
If NAT is off: You may still need to remote setSrcIpAddr <ipaddr> <mask> <remoteName>
TCP/IP Route enter a Source WAN
Addresses Port Address
IP and IPX Routing
TCP/IP Routing Must be enabled eth ip enable
(Internet Firewall) (Optional) eth ip firewall <on | off >
IPX Routing Must be disabled eth ipx disable
Store save
Reboot reboot
a Enter this information if you are using RFC 1483 in an ATM environment.
b Enter this information if you are using RFC 1490 in a Frame-Relay environment.
System Settings
System Message Optional eth ip addr <ipaddr> <ipnetmask> [<port#>]
Ethernet IP Address As required dhcp set valueoption domainname <domainname>
dhcp set valueoption domainnameserver < ipaddr >
DHCP Settings Already enabled; eth ipx addr <ipxnet> [<port#>]
additional settings may be
required
Ethernet IPX Network # Enter: IPX Network # Frame eth ipx frame <type>
Type (default is 802.2)
Change Login Optional system admin <password>
Remote Routers
New Entry Enter: Remote Name remote add <remoteName>
System Settings
System Message Optional system msg <message>
DHCP Settings Already enabled; dhcp set valueoption domainname <domainname>
additional settings may be dhcp set valueoption domainnameserver <ipaddr>
required
Change Login Optional system admin <password>
Remote Routers
New Entry Enter: Remote Name remote add <remoteName>
Link Protocol/PVC Select: RFC 1483 remote setProtocol RFC1483 <remoteName>
(for ATM routers) Enter: VPI/VCI Numbers remote setPVC <vpi number>*<vci number>
<remoteName>
Link Protocol/DLCIa Select: FR remote setProtocol FR <remoteName>
(for Frame Relay Enter: DLCI number remote setDLCI <number> <remoteName>
routers)
Bridging On/Off Must be on remote enaBridge <remoteName>
IP and IPX Routing
IP Routing Must be disabled eth ip disable
IPX Routing Must be disabled eth ipx disable
Store save
Reboot reboot
a Enter this information if you are using RFC 1490 in a Frame-Relay environment.
System Settings
System Message Optional system msg <message>
Ethernet IP Address As required eth ip addr <ipnet> <ipnetmask> [<port#>]
DHCP Settings Already enabled; dhcp set valueoption domainname <domainname>
additional settings may dhcp set valueoption domainnameserver <ipaddr>
be required
Change Login Optional system admin <password>
Remote Routers
New Entry Enter: Remote Name remote add <remoteName>
Link Protocol/PVCa Select: RFC 1483MER remote setProtocol RFC1483MER <remoteName>
(for ATM routers) Enter: VPI/VCI Numbers remote setPVC <vpi number>*<vci number>
<remoteName>
Link Protocol/DLCIb Select: MER remote setProtocol MER <remoteName>
(for Frame Relay Enter: DLCI number remote setDLCI <number> <remoteName>
routers)
Bridging On/Off Must be off remote disBridge <remoteName>
TCP/IP Route Address Enter: Explicit or default remote addiproute <ipnet> <ipnetmask><ipGateway>
route with remote <ipGateway> <remoteName>
gateway
If NAT is enabled: To enable NAT, use: remote setIpTranslate on <remoteName>
If NAT is OFF: Enter: Source WAN Port remote setSrcIpAddr <ipaddr> <mask><remoteName>
Address + mask of the
remote network
TCP/IP Route Enter a Source WAN Port remote setSrcIpAddr <ipaddr> <mask> <remoteName>
Addresses Address + mask of the
remote network’s mask
IP and IPX Routing
TCP/IP Routing Must be enabled eth ip enable
(Internet Firewall) (optional) eth ip firewall <on | off >
IPX Routing Must be disabled eth ipx disable
Store save
Reboot reboot
a Enter this information if you are using RFC 1483 in an ATM environment.
b Enter this information if you are using RFC 1490 in a Frame-Relay environment.
System Settings
System Message Optional system msg <message>
Ethernet IP Address As required eth ip addr <ipaddr> <ipnetmask> [<port#>]
DHCP Settings Already enabled; dhcp set valueoption domainname <domainname>
additional settings may dhcp set valueoption domainnameserver <ipaddr>
be required
Change Login Optional system admin <password>
Remote Routers
New Entry Enter: Remote Name remote add <remoteName>
Link Protocol/PVC Select: FRF8 remote setProtocol FRF8 <remoteName>
Enter: VPI/VCI Numbers remote setPVC <vpi number>*<vci number>
<remoteName>
Bridging On/Off Must be off remote disBridge <remoteName>
TCP/IP Route Address Enter: explicit or default remote addIproute <ipnet> <ipnetmask> <hops>
route <remoteName>
If Address Translation To enable NAT, use: remote setIpTranslate on <remoteName>
(NAT) is enabled:
If NAT is OFF: Enter: Source WAN Port remote setSrcIpAddr <ipaddr> <mask><remoteName>
Address + mask of the
remote network
TCP/IP Route Enter a Source WAN Port remote setSrcIpAddr <ipaddr> <mask><remoteName>
Addresses Address + mask of the
remote network
IP and IPX Routing
TCP/IP Routing Must be enabled eth ip enable
(Internet Firewall) (Optional) eth ip firewall <on | off >
IPX Routing Must be disabled eth ipx disable
Store save
Reboot reboot
• Each network protocol in the combination is individually configured as described in the preceding tables.
• When configuring multiple network protocols, make sure that they are all enabled (even though the
configuration tables show them to be mutually exclusive).
For example, to configure bridging and IP routing (both with link protocol RFC 1483), you would refer to the
tables for RFC 1483 with Bridging and RFC 1483 with IP Routing. However, you must enable both bridging
and IP routing. IP routing will take precedence over bridging.
System Settings
System Name Optional system name <name>
System Settings
Message Optional system msg <message>
Ethernet Settings
Routing/ bridging Enable IP routing eth ip enable
controls Disable bridging eth br disable
ETH/0 IP address Define ETH/0 IP address eth ip addr <ipaddr> <ipnetmask> [<port#>]
ETH/1 IP address Define ETH/1 IP address eth ip addr <ipaddr> <ipnetmask> [<port#>]
TCP/IP static routes Set routes that do not change eth ip addroute <ipaddr> <ipnetmask> <gateway>
<hops> [<port#>]
DHCP Settings
Already enabled; additional settings may be required
DHCP settings Define DHCP network dhcp add | <net> <mask> | <ipaddr> | <code>
<min> <max> <type>
Create an address pool dhcp set addresses <first ipaddr> <last ipaddr>
Test IP Routing
Test IP Routing over the Local Ethernet LAN (from PC)
• Use the TCP/IP ping command or a similar method to contact the configured local router specifying the
Ethernet LAN IP address. The LEDs on the router should flash for each ping received.
• If you cannot contact the router, verify that the Ethernet IP address and subnet mask are correct and check the
cable connections.
• Make sure that you have saved and rebooted after setting the IP address.
• Check Network TCP/IP properties under Windows 95. If you are running Windows 3.1, check that you have
a TCP/IP driver installed.
• Using the TCP/IP ping command, contact a remote router from a local LAN-connected PC. When you enter
the ping command, the router will connect to the remote router using the DSL line.
• If remote or local WAN IP addresses are required, verify that they are valid.
• Use the iproutes command to check, first, the contents of the IP routing table and, second, that you have
specified a default route as well.
• Have a remote router contact the local router using a similar method.
• Contact a station, subnetwork, or host located on the network beyond a remote router to verify the TCP/IP
route addresses entered in the remote router database.
• Verify that you configured the correct static IP routes.
• Use the iproutes command to check the contents of the IP routing table.
• Check that the local Ethernet LAN IPX network number is correct.
• Verify that the WAN link network number is the same as the remote WAN link network number.
• Verify that the IPX routes and IPX SAPs you have specified are correct.
• List the contents of the routing and services tables using the ipxroutes and ipxsaps commands, respectively.
• Make sure that the security authentication method and password that you configured match the remote router.
• The Internet through an Internet Service Provider (ISP); it uses PPP as the link protocol with IP routing as the
network protocol. Network Address Translation (NAT) is enabled to the ISP because the ISP assigned the
SOHO only one IP address.
• A central site (HQ) through a Network Service Provider. (The NSP provides access to the DSL/ATM Wide
Area Network.) It uses PPP as the link protocol with IP and IPX as its network protocols.
IP addresses are issued by the DHCP server. DHCP is set up to issue DNS information to the SOHO LAN.
In this configuration example, the PPP link protocol requires using system names and passwords.
• System Passwords
SOHO has a system password “SOHOpasswd,” which is used when SOHO communicates with HQ for
authentication by that site and at any time when HQ challenges SOHO.
HQ has a system password “HQpasswd,” which is, likewise, used when HQ communicates with site SOHO
for authentication by SOHO and at any time SOHO challenges HQ.
ISP has a system password “ISPpasswd” used for the same purpose.
• Remote Passwords
Each router has a remote router’s password for each remote router defined in its Remote Router Database.
The router will use the remote password to authenticate the remote router when the remote router
communicates with or is challenged by the local site.
For example, SOHO has remote router entries for HQ and ISP; defined in each table entry is the respective
remote router’s password.
The following table shows the names and passwords for each router that must be defined for authentication to be
performed correctly. (This assumes that all three systems use an authentication protocol.)
Note: If you have trouble with passwords, you can disable authentication to simplify the process.
IPX = 456
0,39
(HQ)
SOHO
0,38 2 Virtual
Local Router (ISP) Circuits
Workstation/Server IP:192.168.254.254
PC/Client 192.168.254.3 255.255.255.0
192.168.254.2 255.255.255.0
255.255.255.0
DSL / ATM
Network
PPP/IP
192.168.200.20
Network Service
Provider
(ISP)
DNS: 192.168.200.1
DNS Domain: myISP.com Server NT Server/WINS Server
SERV312_FP, 172.16.0.2
1001 255.255.255.0
PC/Client
System Settings
System name SOHO system name SOHO
Message (optional) Configured_Dec_1998 system msg Configured_Dec_1998
Authentication SOHOpasswd system password SOHOpasswd
password
Ethernet IP address 192.168.254.254 eth ip addr 192.168.254.254 255.255.255.0
and subnet mask 255.255.255.0
(default IP address)
Ethernet IPX 456 eth ipx addr 456
network number
DHCP Settings
DNS Domain Name myISP.com dhcp set valueoption domainname myISP.com
DNS Server 192.168.200.1 dhcp set valueoption domainnameserver
WINS Server 172.16.0.2 192.168.200.1
Address dhcp set valueoption winsserver 172.16.0.2
Note: Fill in one worksheet for each remote router in the remote router database.
system list
MODEM STRINGS:
Reset: ATZ
Escape: +++
Init: ATS0=0Q0V1&C1&D2&K1X4&H1&I0
Off-Hook: ATH1
Dial: ATDT
Answer: ATA
Hangup: ATH0
remote list
• The Internet through an Internet Service Provider (ISP); it uses RFC 1483 as the link protocol with IP routing
as the network protocol. Network Address Translation (NAT) is enabled to the ISP because the ISP assigned
SOHO only one IP address.
• A central site (HQ) through a Network Service Provider. ( The NSP provides access to the DSL/ATM Wide
Area Network.) It uses RFC 1483 as the link protocol with bridging and IP routing as its network protocols.
Note: Names and passwords are not required with the RFC 1483 link protocol.
IP addresses are issued by the DHCP server. DHCP will be set up to issue DNS information to the SOHO LAN.
0,39
(HQ)
SOHO
0,38 2 Virtual
Local Router (ISP) Circuits
Workstation/Server IP:192.168.254.254
PC/Client 192.168.254.3 255.255.255.0
192.168.254.2 255.255.255.0
255.255.255.0
DSL / ATM
Network
RFC 1483 / IP
192.168.200.20
Remote Router
HQ IP:172.16.0.1
0.0.0.0 255.255.255.0
255.255.255.255
ISP
Network Service
Provider
(ISP)
DNS: 192.168.200.1
DNS Domain: myISP.com
NT Server/WINS Server
172.16.0.2
PC/Client 255.255.255.0
Bridging Application
system list
The router’s hub (ETH/0) belongs to the 192.168.254.0 subnet. The router’s ETH/1 belongs to the 192.168.253.0
subnet.
ETH/0 will route packets to ETH/1 at the address 192.168.253.254. DHCP is enabled for both subnets.
eth_router Configuration
Configuration
Item Commands
Section
System Settings
System Name eth_router system name eth_router
(optional)
Message (optional) Configured_Jan_1999 system msg Configured_Jan_1999
Ethernet Settings
Enable IP routing eth ip enable
Disable bridging eth br disable
Define ETH/0 IP 192.168.254.254 eth ip addr 192.168.254.254 255.255.255.0 0
address 255.255.255.0
Define ETH/1 IP 192.168.253.254 eth ip addr 192.168.253.254 255.255.255.0 1
address 255.255.255.0
TCP/IP default route ETH/0 sends all traffic to eth ip addroute 0.0.0.0 0.0.0.0 192.168.253.254 1 1
ETH/1
DHCP Settings
Define DHCP 192.168.253.0 dhcp add 192.168.253.0 255.255.255.0
network for ETH/1 255.255.255.0
Create an address 192.168.253.2 thru dhcp set addresses 192.168.253.2 192.168.253.20
pool for ETH/1 192.168.253.20
DNS domain name myISP.com dhcp set valueoption domainname myISP.com
DNS server 192.168.200.1 dhcp set valueoption domainnameserver
192.168.200.1
WINS server address 172.16.0.2 dhcp set valueoption winsserver 172.16.0.2
The features described in this chapter are advanced topics. They are primarily intended for experienced users and
network administrators to perform network management and more complex configurations.
• IP subnets
• Management security
Additional features can be purchased as software option keys. These features are described in Configuring
Software Options, page 124. To determine which software options are installed on your router, use the vers
command. (If a feature has not been enabled, it is listed with a ~ prefix.)
You may configure the router to provide access to multiple IP subnets on the Ethernet network. (This feature does
not apply to IPX or bridged traffic.)
Each IP subnet is referenced as a logical (or virtual) Ethernet interface. You may define multiple logical interfaces
for each physical Ethernet interface (that is, port) in the router. Each logical interface is referenced by its port
number and logical interface number (port #:logical#).
The default logical interface for each port is interface 0; this logical interface 0 always exists and cannot be
deleted. (Other logical interfaces may be deleted using the eth delete command [page 263].)
Note: When you stop or restart an interface, interface changes are discarded if they have not been saved.
• eth ip addRoute Adds an Ethernet IP route that uses the logical Ethernet interface. The route is added to
the default routing table (page 264).
• eth ip bindRoute Adds an Ethernet IP route that uses the logical Ethernet interface. The route is added to a
virtual routing table (page 266).
• eth ip filter Manages IP filters for the logical Ethernet interface. Lists of input, output, and forward
filters may be defined for the interface (page 270).
• eth ip options Sets RIP options for the logical interface; these options set IP routing information
protocol controls (page 276).
Note: In general, logical interface commands are not effective until you save the change and either restart the
logical interface or reboot the router. However, the eth ip bindRoute and eth ip filter commands are effective
immediately if the logical Ethernet interface is already active.
The virtual routing feature allows you to define multiple routing tables. This is also known as IP virtual router
support.
To define a new routing table, you must specify a name for the routing table and a range of IP source addresses
that use that table. The router determines which routing table to use based on the source address in the packet. For
example, if the router receives a packet whose source address is 192.168.254.10, it checks if that address is within
the address range defined for a virtual routing table. If it is, the virtual routing table is used to route the packet. If
it is not, the default routing table is used instead.
The address ranges assigned to the virtual routing tables may not overlap. All source IP addresses not assigned to
a virtual routing table are routed using the default routing table. You can add routes to the default routing table
using eth ip addroute (page 264) and remote addiproute (page 291).
The following commands define the names and address ranges of the virtual routing tables:
system addIPRoutingTable Adds a range of IP addresses to a virtual routing table. The virtual routing table
is defined if it does not already exist (page 232).
system delIPRoutingTable Deletes a range of IP addresses from the range defined for a virtual routing table
or deletes the entire table (page 243).
system moveIPRoutingTable Moves a range of IP addresses from their current assignment to the specified
virtual routing table. The virtual routing table is defined if it does not already
exist (page 250).
To add and remove routes from a virtual routing table, use these commands:
eth ip bindRoute Adds an Ethernet route to a virtual routing table (page 266).
eth ip unbindRoute Removes an Ethernet route from a virtual routing table (page 277).
remote bindIPVirtualRoute Adds a remote route to a virtual routing table (page 293).
remote unbindIPVirtualRoute Removes a remote route from a virtual routing table (page 324).
Note: Unlike changes to the default routing table, changes to IP virtual routing tables take effect immediately.
However, the changes are lost if they are not saved before the next reboot.
You can control the flow of packets across the router using bridge filtering. Bridge filtering lets you “deny” or
“allow” packets to cross the network based on position and hexadecimal content within the packet. This enables
you to restrict or forward messages with a specified address, protocol, or data content. Common uses are to
prevent access to remote networks, control unauthorized access to the local network, and limit unnecessary traffic.
For example, it might be necessary to restrict remote access for specific users on the local network. In this case,
bridging filters are defined using the local MAC address for each user to be restricted. Each bridging filter is
specified as a “deny” filter based on the MAC address and position of the address within the packet. To initiate
bridge filtering, “deny” filtering mode is then enabled. Every packet with one of the MAC addresses would not be
bridged across the router until “deny” filtering mode was disabled.
Similarly, protocol filtering can be used to prevent a specific protocol from being bridged. In this case, the
protocol id field in a packet is used to deny or allow a packet. You can also restrict, for example, the bridging of
specific broadcast packets.
• “Deny” mode will discard any packet matched to the “deny” filters in the filter database and let all other
packets pass.
• “Allow” mode will only pass the packets that match the “allow” filters in the filter database and discard all
others.
Up to 40 “allow” filters or 40 “deny” filters can be activated from the filter database.
Enter the filters, including the pattern, offset, and filter mode, into a filter database. If you intend to restrict
specific stations or subnetworks from bridging, then add the filters with a “deny” designation and then enable
“deny” filtering. If you wish to allow only specific stations or subnetworks to bridge, then add the filters with an
“allow” designation and enable “allow” filtering. Add each filter with the following command:
where [pos] is the byte offset within a packet (number from 0-127) to a [data] (a hex number up to 6 bytes). This
data and offset number can be used to identify an address, a protocol id, or data content. After entering your
filters, verify your entries with the following command:
filter br list
If you have entered an incorrect filter, delete the filter using the filter br del command. When you are satisfied
with the filter list, save the filtering database with the save filter command. You must reboot the router to load the
filtering database. Then enable bridging filtering with the following command:
To test the filtering configuration, access the remote destination identified in the filter.
Caution: This is a simple firewall check; it does not add much security. For more elaborate firewall features, see
IP Filtering, page 129 .
Initially, the Internet Firewall defaults to on, but it is active only when Ethernet LAN IP routing is on.Thus, at
initial configuration, to activate the Internet Firewall Filter, you need only enable IP routing.
eth ip enable
eth ip disable
To prevent IP Internet Firewall Filtering while IP routing is enabled, turn off the firewall filter. To turn off the
firewall filter, use the command:
eth ip firewall on
Note: Remember to save and reboot if you alter the IP routing status.
A network prefix-directed broadcast address is the broadcast address to a particular network. For example, if a
network’s IP address is 192.168.254.254 and its mask is 255.255.255.0, its network prefix-directed broadcast
addresses are 192.168.254.0 and 192.168.254.255.
This feature is independent of the IP firewall and IP filtering features. However, it does require that IP routing be
enabled (see eth ip enable, page 270). To see the current settings for IP routing and directed broadcasts, use the
command eth list, page 280.
To allow the forwarding of network-prefix-directed broadcast packets, use the following command:
eth ip directedBcast on
To, once again, prevent the forwarding of network-prefix-directed broadcast packets, use the command:
The RIP control options allows you to decide what routing information you want to receive and what routing
information you choose to share on the network.
For a remote interface, the default is to not send or receive IP RIP packets. If you choose to use this default, you
must use the remote addiproute command (page 291) to configure static routes for this WAN link.
You can configure the router to send and receive RIP packet information, respectively, to and from the remote
router. This means that the local site will “learn” all about the routes beyond the remote router and the remote
router will “learn” all about the local site’s routes. You may not want this to occur in some cases. For example, if
you are connecting to a site outside your company, such as the Internet, you may want to keep knowledge about
your local site’s routes private.
To see the current settings for a remote interface, use the command remote list and check the output lines:
• receive and process IP RIP-1 compatible and RIP-2 broadcast packets from the Ethernet LAN.
• receive and process RIP-2 packets that are multicast as defined by the eth ip ripmulticast command.
• transmit RIP-1 compatible broadcast packets and RIP-2 multicast packets over the Ethernet LAN.
To see the current settings for an Ethernet interface, use the command eth list and check the output lines:
To set or clear RIP options for a remote interface or an Ethernet interface, use these commands:
To see the current setting, enter the command remote list and check the output line:
To see the current setting, enter the command eth list and check the output line:
The forwarding of multicast packets by an interface depends on the setting of the multicast IP option for that
interface. To turn on multicast forwarding for a remote interface, use the command:
If any remote interface has multicast forwarding enabled, then multicast forwarding is automatically enabled on
all Ethernet interfaces. However, multicast forwarding can be turned off or turned on for an Ethernet interface
using the command:
To see the current setting, use the command eth list and check the output line:
The router supports DHCP and can act as the DHCP server. (The router’s DHCP server disables itself if it locates
other active DHCP servers on the network or if a DHCP server on the WAN has been explicitly specified.)
• As a server, IP addresses are assigned to workstations attached to the LAN that issue DHCP address requests.
• As a client, the router requests that an IP address be assigned to the WAN side port of the router.
• As a relay, the router passes through client requests from the LAN side onto the WAN asking for IP address
assignment and relays responses back to the appropriate client.
This section describes how to configure DHCP using the Command Line Interface. Configuring DHCP can be a
complex process; this section is therefore intended for network managers. For a complete list and explanation of
the DHCP commands, see DHCP Commands, page 350.
Note: Some DHCP values can be set using the Windows Quick Start application, the Windows Configuration
Manager, or the web-based EZ Setup application.
Using DHCP to automatically acquire initialization parameters translates into avoiding the more involved router/
PC manual initialization process. (The manual initialization requires reconfiguration of router and/or PC addresses
to be in the same network.)
To configure DHCP for a network, the network administrator defines a range of valid IP addresses to be used in
the subnetwork as well as options and other parameters. This process is described in the next section, DHCP
Administration and Configuration.
Note 1: DHCP is effective only if the TCP/IP stack is installed on the PCs.
Note 2: In Windows, DHCP is enabled by selecting it on your PC (under Settings, Control Panel, Network, and
TCP/IP on the Configuration tab page).
When the WAN link activates and the source IP address or mask is undefined (i.e. 0.0.0.0), the router places a
DHCP client request over the WAN link. The router may learn the following parameters:
• DNS address
• Default gateway
To see the gateway and source IP addresses that were returned, use the iproutes command.
The IP addresses and options assigned to a client are collectively called the “lease”. The lease is only valid for a
certain period of time and is automatically renewed by the client.
• Managing BootP
• Other information
Note: To save the DHCP configuration or changes to flash memory in the router, remember to use the command
dhcp save.
Examples:
To enable the subnetwork 192.168.254.0 if that subnetwork exists, enter:
To enable the client lease 192.168.254.17 if that client lease exists, enter:
To disable the client lease 192.168.254.18 if that client lease exists, enter:
• Adding a Subnetwork
The following commands are used to add/delete subnetworks. Only one subnetwork with one pool of IP
addresses may be defined for a subnet.
Note: All client leases associated with this subnetwork are automatically deleted.
Example 1:
The following command creates a subnetwork 192.168.254.0 with a subnet mask of 255.255.255.0:
dhcp add 192.168.254.0 255.255.255.0
Example 2:
The following command deletes the subnetwork 192.168.254.0 and deletes all client leases
associated with that subnetwork:
dhcp del 192.168.254.0
Client leases may either be created dynamically or explicitly. Usually client leases are created
dynamically when PCs boot and ask for IP addresses.
Example 1:
To explicitly add the client lease 192.168.254.31, type:
dhcp add 192.168.254.31
Example 2:
To delete the client lease 192.168.254.31, type:
dhcp del 192.168.254.31
• Concepts
The information given by the DHCP server (router) to your PC is leased for a specific amount of time.
The client lease has already been selected. The DHCP server will select the lease time based on the
option defined for the client lease as described by this algorithm:
1. If the client lease option is a specific number or is infinite, then the server uses the specified lease
time associated with this client lease.
2. If the client lease option is “default”, then the server goes up one level (to the subnetwork) and uses
the lease time explicitly specified for the subnetwork.
3. If the client and subnetwork lease options are both “default”, then the server goes up one level
(global) and uses the lease time defined at the global level (server).
4. Lease time:
The minimum lease time is 1 hour.
The global default is 168 hours.
• Commands
The following commands are used by network administrators to control lease time.
To set the lease time explicitly for the client lease, use:
dhcp set lease <ipaddr> <hours>
To set the lease time explicitly for the subnetwork lease, use:
dhcp set lease <net> <hours>
To set the lease time explicitly for the global lease, use:
dhcp set lease <hours>
Example 1:
To set the lease time to “default” for the client 192.168.254.17, type:
dhcp set lease 192.168.254.17 default
Example 2:
To set the subnetwork lease time to infinite for the subnet 192.168.254.0, type:
dhcp set lease 192.168.254.0 infinite
In general, administrators do not need to change client leases manually. However, if the need arises to do so,
the following two commands are used.
Warning: The client will not be aware that the administrator has changed or released a client lease!
Concepts
The server returns values for options explicitly requested in the client request. It selects the values to return
based on the following algorithm:
1. If the value is defined for the client, then the server returns the requested value for an option.
2. If the value for the option has not been set for the client, then the server returns the value option if it has
been defined for the subnetwork.
3. If the value option does not exist for the client and does not exist for the subnetwork, then the server
returns the value option if it has been defined globally.
4. If the value option is not defined anywhere, the server does not return any value for that option in its
reply to the client request.
• It does not return any option values not requested by the client.
• It does not return any non-default option values unless the client requests the option value and the server
has a value defined for that option.
• It does not return any non-default values on the clients subnet unless the client requests the value for that
option.
To set the value for an option associated with a specific client, use:
dhcp set valueoption <ipaddr> <code> <value>...
To clear the value for an option associated with a specific client, use:
dhcp clear valueoption <ipaddr> <code>
Example:
dhcp set valueoption 192.168.254.251 winserver 192.168.254.7
To list the values for global options as well as subnet and client lease information, use:
dhcp list
To list options that are set for that subnet/client lease as well as subnet/client lease information, use:
dhcp list <net>|<ipaddr>
This command lists all available options (predefined and user-defined options):
dhcp list definedoptions
This command lists all available options starting with the string “name”.
dhcp list definedoptions name
To list the lease time use:
dhcp list lease
Example:
Managing BootP
Administrators can enable and disable BootP and specify the BootP server. BootP can be enabled at the
subnetwork and at the client lease level.
Note: By default, the DHCP server does not satisfy BootP requests unless the administrator has explicitly enabled
BootP (at the subnetwork or lease level).
BootP and DHCP provide services that are very similar. However, as an older service, BootP offers only a
subset of the services provided by DHCP.
The main difference between BootP and DHCP is that the client lease expiration for a BootP client is always
infinite.
Note: Remember, when BootP is enabled, the client assumes that the lease is infinite.
Enable/Disable BootP
To allow BootP request processing for a particular client/subnet, use the command:
dhcp bootp allow <net>|<ipaddr>
To disallow BootP request processing for a particular client/subnet, type:
dhcp bootp disallow <net>|<ipaddr>
The following commands let the administrator specify the TFTP server (boot server) and boot file name. The
administrator should first configure the IP address of the TFTP server and file name (kernel) from which to
boot.
To set the IP address of the server and the file to boot from, use the commands:
dhcp bootp tftpserver [<net>|<ipaddr>] <tftpserver ipaddr>
dhcp bootp file [<net>|<ipaddr>] <file name>
To clear the IP address of the server and the file to boot from, use:
dhcp bootp tftpserver [<net>|<ipaddr>] 0.0.0.0
Example 1:
To set the global BootP server IP address to 192.168.254.7:
dhcp bootp tftpserver 192.168.254.7
Example 2:
To set the subnet 192.168.254.0 server IP address to 192.168.254.8:
dhcp bootp tftpserver 192.168.254.0 192.168.254.8
Example 3:
To set the client 192.168.254.21 server IP address to 192.168.254.9
dhcp bootp tftpserver 192.168.254.21 192.168.254.9
BootP/DHCP relays are used by system administrators when the DHCP configuration parameters are acquired
from a BootP/DHCP server other than the router’s DHCP server.
This feature allows configuration information to be centrally controlled. Enabling a BootP/DHCP relay disables
DHCP on the router because, by definition, only one policy mechanism can be supported.
However, multiple relays may be specified. BootP/DHCP requests are forwarded to every relay on the list. It is
assumed, in this case, that the multiple servers are configured to recognize the requests that they are to handle.
To remove a BootP/DHCP Relay address from the list, use the command:
Concepts
A DHCP option is a code, length, or value. An option also has a “type” (byte, word, long, longint, binary, IP
address, string).
The subnet mask, router gateway, domain name, domain name servers, NetBios name servers are all DHCP
options. Refer to RFC 1533 if you require more information.
Usually users will not need to define their own option types. The list of predefined option types based on RFC
1533 can be shown by typing dhcp list definedoptions.
Commands
• Some DHCP client will know about the option with code 128.
• The administrator will still need to set the option value either globally, specific to a subnetwork, or
specific to a client for the option to have any meaning.
The values for this option that have been set globally, specific to a subnetwork, or specific to a client will not
be removed. The administrator must remove those values explicitly. Well-known type option codes cannot be
changed or deleted.
save
Note: You cannot abbreviate the word records in the dhcp clear all records command.
Network Address Translation (NAT) allows devices on the LAN to use private IP addresses that aren’t recognized
on the Internet. The router supports both of the following NAT techniques:
Classic NAT One NAT IP address is assigned to one PC IP address (see page 99).
Masquerading One NAT IP address is assigned to many PC IP addresses (see page 95).
Note: Some applications that use IP or UDP protocols may have problems with Network Address Translation.
You may be able to avoid this problem by running in TCP mode or by disabling NAT and running as a
subnetwork to your ISP.
Supported applications include AOL chat, CUSeeMe, Doom, FTP, L2TP, HTTP, Kali Netbios over IP,
NetMeeting, PCanywhere, Quake, Quicktime Video, Real Audio, RTSP, SGI Media Base, SMTP, StreamWorks,
Telnet, TFTP, Unix commands (finger, rcp, rshell, rlogin, whois) and VDO. To read more about H.323 with NAT,
see NetMeeting (H.323) with NAT, page 100.
• Any number of PCs on the LAN may be going to the same or different remote routers at the same time. In
reality, the number of PCs on the LAN that can be supported is limited by how much memory the router
consumes maintaining table information and by how many connections are currently active.
• Some operations will not work. Specifically, services that place IP address/port information in the data may
not work until the router examines their packets and figures out what information in the data needs to be
changed. Remember that the router is remapping both IP addresses and ports.
• When using NAT with a remote router, either the remote ISP must supply the IP address for NAT translation
or the user must configure the IP address for NAT translation locally.
• Any number of PCs on the LAN may have a connection to the same or different remote routers at the same
time. In reality, the number of PCs on the LAN that can be supported is limited by the amount of memory
consumed by the router to maintain table information and by the number of connections the router “thinks”
are currently active. Theoretically, up to 64,000 active connections per protocol type—TCP/UDP—can be
concurrently running, if the table space is available.
Masquerading
With masquerading, multiple local (PC) IP addresses are mapped to a single global IP address. Many local (PCs)
IP addresses are therefore hidden behind a single global IP address. The advantage of this type of NAT is that
users only need one global IP address, but the entire local LAN can still access the Internet. This NAT technique
requires not only remapping IP addresses but also TCP and UDP ports.
Each PC on the LAN side has an IP address and a mask. When the router connects to an ISP, the router appears to
be a “host” with one IP address and mask. The IP address that the router uses to communicate with the ISP is
obtained dynamically (with PPP/IPCP or DHCP) or is statically configured. When the PC connects to the ISP, the
IP address and port used by the PC are remapped to the IP address assigned to the router. This remapping is done
dynamically.
• Enable NAT
The save command makes the above changes persistent across reboots; these changes turn NAT on when the
specified interface is used.
The IP address (the IP address “known” by the remote ISP) used for this type of NAT can be assigned in two
ways.
Server Configuration
This section is intended for users and network administrators who wish to allow WAN access to a Web server,
FTP server, SMTP server, etc., on their local LAN, while using NAT.
NAT needs a way to identify which local PC [local IP address(es)] should receive these server requests. The
servers can be configured on a per-remote-router and per-Ethernet-interface basis as well as globally.
• Interface-Specific Commands
You can specify servers for specific remote interfaces and for specific Ethernet interfaces. Servers can also be
designated for specific protocols and ports. To enable and disable a local IP address (on your LAN) as the
server for a specific remote interface, use these commands:
remote addServer <action> <protocol> <port> [<last port>[<first private port>]] <remoteName>
remote delServer <action> <protocol> <port> [<last port>[<first private port>]] <remoteName>
See the command descriptions on page 293 and page 298. To see all of the remote entries, use the command
remote list <remoteName>
To enable and disable a local IP address (on your LAN) as the server for a specific Ethernet interface, use
these commands:
eth ip delServer <action> <protocol> <port> [<last port>[<first private port>]] <interface>
Example 1:
Assume that the local LAN network is 192.168.1.0 255.255.255.0. The following commands enable a
Telnet server on the local LAN with the IP address 192.168.1.3, and an FTP server with the IP address
192.168.1.2.
remote addServer 192.168.1.3 tcp telnet router1
remote addServer 192.168.1.2 tcp ftp router1
When the local router receives a request from router1 to communicate with the local Telnet server, the
local router sends the request to 192.168.1.3. If router1 asks to talk to the local FTP server, the local
router sends the request to 192.168.1.2.
Example 2:
Assume that the local LAN network is 192.168.1.0 255.255.255.0. When the port value of 0 (zero) is
used, it directs all ports of the specified protocol to the IP address specified.
remote addServer 192.168.1.4 tcp 0 router1
Note: addserver commands using specific port numbers take priority over the port 0 setting.
192.168.1.4 will be asked to serve requests coming from router1 to the local router. If the local router
also has the same Telnet and FTP entries from the previous example, 192.168.1.3 will serve the Telnet
request, 192.168.1.2 will serve the FTP request, and 192.168.1.4 will serve any other request, including
HTTP, SMTP, etc.
Example 3:
An incoming request on TCP port 9001 will be sent to 192.168.1.11 with the port changed from 9001 to
the telnet port.
The error message Failed to add server indicates that a server entry could not be created. This can occur
either due to port overlap or due to not enough memory.
Port overlap
This condition should not ordinarily occur because the amount of memory needed for a server entry is
less than 30 bytes. Should this problem occur, it may cause many related problems or failures.
• System Commands
The following two commands are used to globally enable/disable a local IP address (on your LAN) as the
server for that particular protocol and/or port.
For more information, see the command descriptions on page 233 and page 244.
Examples:
As shown above, multiple system addserver, remote addserver, and eth ip addserver commands can designate
different servers for different protocols, ports, and interfaces. When handling a request from a remote router (to
which the local router has NAT enabled), the local router searches the server list for the appropriate server. The
following lists the order of search and the command that added the server to the list:
3. Protocol and any port for a specific interface remote addserver with port 0 or
eth ip addserver with port 0
4. Protocol and any port for any interface system addserver with port 0
5. Any protocol and any port for a specific interface remote addserver with protocol all and port 0
eth ip addserver with protocol all and port 0
6. Any protocol and any port for any interface system addserver with protocol all and port 0
Classic NAT
With classic NAT, one PC IP address is translated to one NAT IP address. This NAT technique is primarily used
to make certain hosts on a private LAN globally visible and give them the ability to remap these IP addresses as
well.
Client Configuration
Classic NAT requires that you first enable NAT Masquerading (as described in the previous section); thus,
for the Classic and Masquerading forms of NAT, the clients are configured in the same way. Refer to the
Client Configuration, page 96 section.
Host Remapping
• Interface-Specific Commands
You can enable and disable host remapping for specific remote interfaces and for specific Ethernet
interfaces. To enable or disable host remapping on a per-remote basis, use these commands:
remote addHostMapping <first private addr> <second private addr> <first public addr>
<remoteName>
remote delHostMapping <first private addr> <second private addr> <first public addr>
<remoteName>
Use the command remote addHostMapping whenever a host on the local LAN is known by different IP
addresses to different remotes.
eth ip delHostMapping <first private addr> <second private addr> <first public addr> <interface>
• System Commands
• IP Address Range
The range of local LAN IP addresses to be remapped is defined by <first private addr> to <second
private addr> inclusive. These addresses are mapped one-to-one to the public addresses.
Example:
remote addHostMapping 192.168.207.40 192.168.207.49 10.0.20.11 remote1
remote addHostMapping 192.168.207.93 192.168.207.99 10.0.20.4 remote1
remote addHostMapping 192.168.209.71 192.168.209.80 10.12.14.16 remote1
The above entries create three mappings:
• The per-interface commands, remote addHostMapping and eth ip addHostMapping have these
range overlap rules:
Private IP address ranges cannot overlap for an interface.
Public IP address ranges cannot overlap for an interface.
• The global command, system addHostMapping, has these range overlap rules:
• If a private IP address range for an interface and a private IP address range for the system overlap,
the private IP address range for the interface has precedence.
• If a public IP address range for an interface and the public IP address range for the system overlap,
the public IP address range for the interface has precedence.
For example, to enable IP/port translation to a remote router and make the IP addresses 10.1.1.7 through
10.1.1.10 globally visible, it is permissible to use either one of the following commands:
If the remapped host’s IP address (classic NAT, one-to-one IP address translation) and the masquerading
IP address (many-to-one IP address translation) are the same, then NAT masquerading has precedence
over classic NAT.
NAT prevents requests coming from outside the LAN from connecting to private addresses on the LAN unless
you specify the connections that are to be allowed.To receive NetMeeting audio and video connections from
outside the local LAN while NAT is enabled, you must enter commands to direct the outside connections. To do
this, you would enter commands to either:
• direct connections for TCP ports 1720 (h323) and 1503 (t120), or
Let’s suppose you want one private IP address on the local LAN to receive NetMeeting audio and video
connections from outside the LAN while NAT is enabled. To allow this, you specify the IP address on the
following command:
The NetMeeting options, Share Program, Chat, Whiteboard, and Transfer Files use the TCP protocol T.120. To
use these options, enter another command specifying the IP address, as follows:
All IP addresses on the LAN can continue to connect to addresses outside the LAN, but only the specified IP
address can receive the specified TCP connections from the outside.
Scenario 2 is the same as scenario 1, except that you want to limit the connections from outside to a specific
interface. For a remote interface, you specify the IP address and the remote name on the following commands:
For a dual-Ethernet router where the connection to the WAN is through an Ethernet interface, you would use these
commands that specify the IP address and the Ethernet interface that is connected to the WAN:
If the local LAN has more than one IP address visible from the WAN, you could map one of those visible IP
addresses to a private IP address on the LAN. The router would then direct all connections for the “outside” IP
address to the “inside” IP address. The command to do this is:
The first two parameters specify the first and last addresses in the address range. To remap just one address, you
specify the same private address twice and then the public IP address.
Address remapping can also be done for a specific interface. For a remote interface, you would specify the
addresses and the remote name on the following command:
For an Ethernet interface, you would specify the addresses and the Ethernet interface on this command:
PPPoE is a method of delivering PPP sessions over an Ethernet LAN connected to a DSL line, as defined in the
document RFC 2516. It was designed to maintain the established PPP interface for the end user and the service
provider, while improving service through use of a DSL line.
• PPPoE allows the user to connect to a service provider using the same PPP interface as for a dialup
connection, but the connection is through a DSL line, which provides greater speed and bandwidth.
• The service provider also perceives the connection as a standard PPP session, allowing for the same access
control and billing per user as before.
• Multiple PPP users share the same DSL line to connect to an access concentrator.
Our router provides additional advantages to PPPoE users and service providers, as follows.
• Using our router, no software changes are required in the user PCs. Because the router acts as the PPPoE
client, no PPPoE software is needed in the PC.
• Our router acts as both the PPPoE client and as the bridge connecting the Ethernet LAN to the DSL line. It
does all IP address translation.
• The PPPoE client information (user name, password, and domain) are configured into the router. Once
configured, the user does not need to enter them, ever.
The following diagram illustrates how our router connects an Ethernet LAN to a service provider by serving as
both the bridge and the PPPoE client.
Ethernet LAN
Router Service Provider
User
Serves as
DSL Line ATM/Frame PPPoE
User bridge and as
PPPoE client Network server
User
PPPoE Session
PPPoE Bridge
PPPoE requires a remote router entry defined for bridging. All PPPoE traffic must be bridged through the PVC or
DLCI of a remote router entry. The entry can use any protocol that supports bridging including PPP, RFC 1483, or
RFC 1490.
The remote entry must be enabled for bridging using the remote enabridge command.
The PPPoE bridge does not require the Spanning Tree Protocol. Turn off the protocol with this command:
In addition, if the remote entry should be used only for PPPoE traffic, define it as “PPPoE only” using this
command:
For a Dual-Ethernet router, an Ethernet interface can be designated as “PPPoE only” using this command:
PPPoE Client
PPPoE configuration requires creation of a new remote router entry to serve as the PPPoE client. The PPPoE
client provides the user name, password, and domain name required for each PPPoE session. In our router, we
refer to the PPPoE domain name as a “service name” as described later.
The user name and password can be the router name and password provided by the system name and system
passwd commands. Or a name and password can be specified for the remote router entry using the remote
setOurSysName and remote setOurPasswd commands.
The preceding two commands create a remote router entry that can be used to connect to all PPPoE services. To
create an entry for a specific PPPoE service, use the following two commands:
The service name is the domain name defined by your service provider.
After defining the remote entry with the remote add and remote setPPPoEservice commands, enter commands
to:
• Turn off authentication of the remote router by the target router (remote disauthen).
• Specify the user name and password for the service (remote setoursysname and remote setourpasswd).
• Define the IP route for the remote (remote addiproute). (IP routing must be enabled for the Ethernet interface
with eth ip enable.)
• Permanently allocate a channel or allocate a channel only when needed (remote setminline).
If your service provider charges by the hour, you may want a PPPoE session to timeout after a period of no
traffic. However, if you do use a timeout, bringing up a PPPoE session takes 2-3 seconds longer.
The following script is an example showing commands for a PPPoE configuration. The script assumes the
following:
• The CHAP user name is JaneDoe and the CHAP password is Secret.
# ifs
Interface Speed In % Out % Protocol State Connection
ETHERNET/0 10.0.mb 0%/0% 0%/0% (Ethernet) OPENED
DMT/0 8.0mb D 0%/0% (ATM) OPENED
800kb U 0%/0% (ATM) OPENED
ATM-VC/1 8.0mb D 0%/0% (ATM) OPENED to PPPoEbridge
800kb U 0%/0% (ATM) OPENED to PPPoEbridge
ATM-ECHO/2 8.0mb D 0%/0% (ATM) OPENED
800kb U 0%/0% (ATM) OPENED
CONSOLE/0 9600 b 0%/0% 0%/0% (TTY) OPENED
PPPoE/1 10.0 mb 0%/0% 0%/0% (PPP) OPENED to PPPoEuser
You can list more information about the current PPPoE sessions using the pppoe list command. The following is
an example:
# pppoe list
PPPoE Client Session ...... DialUpPPP.net
PPPoE/Ifs number..... 1
Access Concentrator.. 15021109931568-efficient
Peer MAC Address .... 00:10:67:00:66:E2
Session ID .......... 2
State ............... 2
Flags ............... 1
To close a PPPoE session before it terminates, use the pppoe close command. The session is specified by its
number. (Use the PPPoE/n number from the ifs output or the PPPoE/Ifs number from the pppoe list
output.)
With the following security control features, the user can control remote management of the router via Telnet,
HTTP, Syslog, and/or SNMP. Disabling SNMP stops the Configuration Manager from accessing the router, which
in some environments is desirable.
Router system event messages can be automatically sent to a Unix Syslog server. The system syslogport and
system addsyslogfilter commands control the port number and valid IP addresses. For more information, see
Syslog Client, page 168.
Validating Clients
The following commands are used to validate clients for Telnet, SNMP, HTTP, or Syslog. They define a range of
IP addresses that are allowed to access the router via that interface. Only the IP addresses in the range specified
for the interface can access the router via that interface. This validation feature is off by default.
Multiple address ranges can be specified for each filter. If no range is defined, then access to the router is through
the LAN or WAN.
Note: These commands do not require a reboot and are effective immediately.
system list
For example, the following commands redefine the Telnet, SNMP, HTTP, and Syslog ports:
The following example shows how this is done. It assumes there is no computer at 192.168.254.128.
The Dial Backup capability provides a backup asynchronous modem connection to the Internet when the default
DSL link goes down. The modem connection is provided through the console port. In this case, the console port is
used as a serial port and must be connected to an external modem.
Note: The Dial Backup feature is effective using either V.90 or ISDN modems.
Dial Backup is intended for customers with critical applications for which continuous Internet access is vital. If
the DSL link for those applications goes down, the router can automatically switch their traffic to the
asynchronous modem. Later, after determining that the DSL link is, once again, up and stable, the router
automatically switches the modem traffic back to the DSL link.
This feature may also be useful for a customer whose DSL line is not yet installed. The router can begin providing
service through an asynchronous modem and later automatically switch to the DSL link when it becomes
available.
Dial Backup can be used with a VoDSL (voice over DSL) router. However, when data traffic is switched to the
backup modem or restored to the DSL connection, all voice calls are terminated.
Dial Backup works with L2TP and IPSec tunneled connections. However, an IPSec tunnel from the backup
interface must use IKE aggressive mode, not IKE main mode, because, it is assumed that the ISP assigns an IP
address to the backup interface dynamically (see Main Mode and Aggressive Mode, page 152.)
You may wish to restrict an L2TP tunnel or IPSec tunnel to only the primary interface or only the backup
interface:
• If you do not want tunnel traffic to go through the backup asynchronous modem, you should restrict the
tunnel to use only the primary interface. With this restriction in place, if the primary interface fails, the tunnel
is terminated, and it is not re-established with the backup interface.
• Or, you might want a tunnel to be established only when the asynchronous modem is being used. In this case,
you would restrict the tunnel to the backup interface only.
To set either restriction for an L2TP tunnel, use the command l2tp set wanif (page 369). On the command, you
specify the remote name that the tunnel is restricted to and the tunnel name. To restrict the tunnel to the backup
interface, specify the remote name that you created for the dialup parameters as described in Specifying the
Dialup Parameters, page 110.
To set a restriction for an IPSec tunnel, use the command ike ipsec set interface (page 379). The interface that
you specify on the command is the remote interface that the tunnel is to be restricted to. To restrict the tunnel to
the backup interface, specify the remote name that you created for the dialup parameters as described in
Specifying the Dialup Parameters, page 110.
To begin Dial Backup configuration, you can select options using the web GUI or begin with the sample
configuration file included on the CD as dsl/samples/backup.txt. Further configuration may require the
CLI commands described in this section.
Note: Because Dial Backup uses the console port, you cannot enter CLI commands using the console port
while Dial Backup is enabled. While Dial Backup is enabled, you must access the command line via Telnet
(see Telnet Session for Remote Access, page 16).
The following is a general outline of the steps required to configure Dial Backup. These steps are detailed in the
following sections. To configure Dial-Backup:
1. Check that the Dial Backup feature is installed in the router. To do so, enter the vers command and look for
DIAL-BACKUP in the option list. For more information, see Software Option Keys, page 124.
2. Define a remote profile for Dial Backup that specifies the ISP phone number and other dialup parameters.
3. Specify the conditions that determine the status of the DSL link. Default values are provided for:
Optionally, Dial Backup can actively test the status of the DSL link by pinging IP addresses. For this option,
you must specify at least one IP address; default values are provided for:
4. Specify the modem parameters (if the default values are not appropriate).
• Check that the remote profile created in step 2 is enabled (use the command remote list).
Note: The router determines only at reboot whether its serial port is to be used for console output or for Dial
Backup. If Dial Backup is enabled at reboot, then the serial port is assigned to Dial Backup and console
output is not sent to the serial port; this cannot change until the next reboot.
Dial Backup can be enabled only when a remote entry exists that:
The following is an example of commands that define a Dial Backup remote profile named backup.
# Specify the primary phone number to be used when dialing out. This phone
# number begins with 9 (to get an outside line), a comma (for a 2-second
# pause), and finally the seven-digit local number.
# Specify the alternative phone number to be used and its bit rate.
save
If you use an ISDN Terminal Adapter (TA) instead of a V.90 modem, the remote profile for the Dial Backup
should:
• if the two B channels require different phone numbers, specify both phone numbers on one remote setphone
command. The two phone numbers are separated by an & character. For example, the following command
specifies the two phone numbers 555-2000 and 555-4000:
remote setphone async 1 5552000&5554000 backup
Backup............................... yes
Retry Interval In Minutes.......... 30
Stability Interval In Minutes...... 3
By default, Dial Backup determines that the DSL link has failed if it detects No DSL link status signal. If the
signal remains down for a minimum time (the stability period), the DSL link is assumed to be physically
disconnected and down.
Optionally, you may also specify one or more IP addresses to ping to determine that the link is down. This is
discussed later under Addresses to Ping, page 113.
Stability Period
DSL link failure is indicated if the DSL link status signal remains down for a minimum time. This minimum time
is the stability period that guards against frequent switching back and forth between the DSL link and the backup
port.
The default stability period is three minutes. To change the stability period, use this command:
Once DSL link failure is determined, the router uses its console port as a serial port and data traffic is sent and
received through the asynchronous modem connected to that port. This backup port continues to be used until it is
time to check whether the DSL link has been restored. This time period between checks is called the retry period
(default, 30 minutes).
When the retry period expires, the router determines if the DSL link has been restored. To do so, it first
determines if the DSL link status signal has been up for the minimum stability period. If it has, then the router
stops the data traffic going through the backup asynchronous modem, and checks whether the DSL link can be
used instead.
If you have specified one or more ping addresses, the router pings those addresses via the DSL link. If the DSL
link fails the ping test, the router once again switches data traffic to the backup port until the retry period expires
again.
However, if the DSL link passes the ping test, the DSL link is assumed to be restored and it is used for data traffic
until another failure is detected.
The default retry period is 30 minutes. To change the retry period, enter this command:
Dial Backup can also actively determine whether the DSL link is up by pinging IP addresses. It does so only if
you provide it with one or more IP addresses.
You could choose to ping addresses that are vital to your application. The router pings these addresses at the
interval you specify (default, every 5 seconds). It compares a specified number of samples (default, 6) against the
specified minimum success rate (default, 50%). If the success rate is less than the minimum, the DSL link is
assumed to be down.
If you specify one or more addresses, the router pings those addresses to determine if the DSL link is up. You may
request that the router ping any or all of these:
If you specify more than one address to ping, you may want to assign the addresses to groups. Each group can be
assigned its own ping interval, number of samples, and success rate. For example, you might want the success rate
for the DNS address to be at least 95%, while a success rate of 50% would be reasonable for a heavily used
website. You can also disable and re-enable ping addresses by group. A group is identified by its number (0
through 65535).
After you enter a ping address, you can see the ping list using the command system list. For example, the
addresses in this ping list are the gateway (GW) address and the domain name server (DNS) address:
IP Address(es)................... GW
DNS
Note: If you clear the ping list of all addresses, pinging is not used to determine if the DSL link is down. Instead,
the state of the DSL physical layer is the only criterion used to determine failure and restoration.
After you enter an address in the ping list, the system list command lists the following Dial Backup information:
Backup............................... yes
Retry Interval In Minutes.......... 30
Stability Interval In Minutes...... 3
Backup Group....................... 0
Group Enabled.................... yes
Ping Interval In Seconds......... 5
Number Of Ping Samples........... 6
Target Success Rate.............. 50
Current Success Rate............. 100
IP Address(es)................... GW
By default, the router pings the addresses every 5 seconds until it has pinged each address 6 times; it requires a
minimum success rate of 50%. You may need to adjust these default values to fit your situation; for example, if
pings are failing, you may want to lower the required success rate. To change these values, use these commands:
Note: To disable a group of ping addresses, specify 0 for any of its three values— pinginterval, pingsamples, or
success rate.
The same ping interval, number of samples, and success rate apply to all addresses assigned to a group. (Any
address not assigned to a group is considered to belong to group 0.) All groups are tested in parallel. As soon as
any group fails its success rate test, the DSL link is assumed to have failed and the switchover to the backup is
performed.
During the ping test, every address in a group contributes to the current success rate of the group; as soon as the
current success rate falls below the minimum success rate, the group has failed. For example, if the minimum
success rate is 50% and the sample number is 6, the maximum sample size for a three-address group is 18 (6 times
3); thus, as soon as the group accumulates 10 failures (one more than 9 failures, which is 50% of 18), the group
fails.
# system defaultmodem
# system list
MODEM STRINGS:
Reset: ATZ
Escape: +++
Init: ATS0=0Q0V1&C1&D0X4S12=20
Off-Hook: ATH1
Dial: ATDT
Answer: ATA
Hangup: ATH0
system modem reset | escape | init | offhook | dial | answer | hangup <string>
For example, the following command changes the string for the init setting:
Init Setting
Use HyperTerminal directly connected to the modem to determine the modem init string before connecting the
modem to the router.
Dial Setting
The string for the dial setting can be either ATDT for tone dialing or ATDP for pulse dialing. The default is tone
dialing. To select pulse dialing, use this command:
This command stops Dial Backup. However, temporarily disabling Dial Backup does not change the use of the
console port (no console output is sent to the console port).
To re-enable Dial Backup after it has been temporarily disabled, either reboot without a save or enter this
command:
Note: You can change the setting of the Dial Backup enable switch at any time, but toggling the switch does not
immediately change the use of the console port. The use of the console port is determined only at reboot.
To disable Dial Backup across reboots and change the use of the console port, enter the following commands:
Assuming that the Dial Backup remote profile is enabled, you can re-enable the Dial Backup feature using the
following commands:
VRRP Backup
When a router is defined as a static default gateway and no other dynamic routing protocol or router discovery
protocol is used (such as RIP, page 83), the gateway becomes a critical link in the network. If that router fails, that
critical link would be broken. It, therefore, may be appropriate to set up other routers as backups that can serve as
the static default gateway if necessary.
The Virtual Router Redundancy Protocol (VRRP), as defined in RFC 2338, allows other IP routers in a LAN to
provide immediate and automatic backup to a failed IP router. VRRP is a protocol that defines how backup
routers monitor the status of a master router and take over its function if it fails. The new master router adopts the
IP and MAC address of the original master, so that the hosts configured with the single default gateway maintain
their network connection.
The following illustration shows two routers connecting a LAN to the Internet. By using VRRP, the backup router
can take over as the gateway if the master router fails.
Ethernet LAN
VRRP Routers
Master
Internet
Backup
Routers using VRRP send out advertisement packets at intervals to let the other VRRP routers on the LAN know
that they are still up. The other VRRP routers realize that a router is down when no advertisement packets have
been received for the minimum down interval. The VRRP router assigned the highest priority takes over for the
failed router. When the failed router is restored, it can automatically preempt the backup router and resume its
function in the network.
VRRP Configuration
To configure a LAN to use VRRP, you must enter configuration commands into every router that is to be
provided with backup or that is to serve as backup to another router. Certain values must be the same between the
master router and its backups; other values must differ (as discussed in the following sections).
4. Save the changes and either restart the VRRP interface or reboot the router.
The VRRP interface is for VRRP use only; it cannot be used for any other purpose. Unlike other logical
interfaces, the VRRP interface does not use the usual Ethernet MAC address associated with the router. Instead, it
uses the VRRP MAC address as defined in RFC 2338, that is, 00005e0001xx where xx is the VRID.
IP Address
Every logical interface is assigned its own IP address, or range of addresses, that is unique on the LAN. The
VRRP interface must be assigned the IP address that serves as the default static gateway for other devices on the
LAN.
For example, assume that the gateway IP address is 192.168.100.254. If the default logical interface (0:0) is to be
the VRRP interface, it is assigned the gateway address. Another logical interface (0:1) is defined to be the
management interface and is assigned another IP address.
Note: You must assign the same IP address to the VRRP interface in the master router and in every router that is
to serve as its backup. For example, if the VRRP interface is assigned IP address 192.168.100.254 in router A, the
VRRP interface in every backup router for router A must be assigned IP address 192.168.100.254.
RIP Processing
Routers using VRRP do not need RIP protocol processing to discover routes. (See RIP Controls, page 83.) You
may, therefore, turn off RIP processing using these commands:
For example, the following command assigns the VRID 7 to the logical interface 0:1 that is to serve as the VRRP
interface.
• Integer from 1 through 255; thus, a LAN can have up to 255 VRIDs.
• The same VRID must be defined in all routers that make up the Virtual Router, that is, the original router and
all routers that are to serve as its backups. For example, if VRID 7 is defined in router A, then VRID 7 must
also be defined in all backup routers for router A.
To see the effect of these commands, specify the logical interface on an eth list command. For example, the
defined VRID is listed in the following output:
Note: A logical interface does not become effective until you save your changes and either restart the logical
interface or reboot the router. The VRRP interface also requires the definition of its VRRP record before it
becomes effective. See Starting VRRP, page 120.
Note: The VRRP attribute commands do not require a restart or reboot to take effect. However, you do need to
save your changes if they are to persist after a restart or reboot.
To define a record to contain the attributes for a VRID in a router, use this command:
The port number is needed only if the router is an Ethernet hub router with two ports (port 0 and port 1).
To see the VRID attribute records currently defined, use the eth vrrp list command, as follows:
The priority value determines which backup router takes over when a router fails. The master router must be
assigned the highest priority (255). Lower priorities are assigned to its backup routers, that is, the other routers in
which the same VRID is defined.
For example, suppose routers A, B, and C all have VRID 7 defined. If router B should take over if router A fails
and if router C should take over if both A and B fail, you would assign priority 255 to A and lower priorities to B
and C, such as, priority 100 to B and priority 50 to C.
The priority command is: eth vrrp set priority <priority> <vrid> [<port#>]
The time interval value specifies how often VRRP advertisement packets are sent. It also determines how quickly
a backup router can recognize that another VRRP router is down.
If the backup does not receive a VRRP packet from another VRRP router during the master down interval, the
backup assumes the other router is down. The master down interval is:
Thus, the default skew time is (256 - 100) / 256, or .609375. The default master down interval is (3 * 1) +
.609375, or 3.609375 seconds.
Note: The time interval must be the same for every router in the Virtual Router, that is, for every router in the
LAN with the same VRID. For example, if a VRRP interface in routers A, B, and C has the VRID 7, routers A, B,
and C must all specify the same time interval for VRID 7.
The time interval command is:eth vrrp set timeinterval <seconds> <vrid> [<port#>]
You may specify an optional password of 1 to 8 characters. The password is only used to authenticate VRRP
advertisement packets. It is sent as clear text on the LAN. If you do not specify a password, no password
authentication is done.
Note: The password must be the same for every router in the Virtual Router, that is, for every router in the LAN
with the same VRID. For example, if a VRRP interface in routers A, B, and C has the VRID 7, routers A, B, and
C must all specify the same password for VRID 7.
The password command is: eth vrrp set password <string> <vrid> [<port#>]
The command to clear the password is: eth vrrp clear password <vrid> [<port#>]
Note: Our implementation does not validate the IP addresses in the advertisement packet or authenticate using an
authentication header.
The preemption option determines what the router does when it recovers from a failure, as follows:
• However, if the router is a backup router for the IP address and it determines that a router with a lower
priority is currently functioning as backup, the preemption option determines whether this router immediately
preempts the router with lower priority or waits for the lower priority router to go away before becoming the
active VRRP router.
The preemption setting may differ among the backup routers for a VRID.
The preemption command is: eth vrrp set option <preempt | nopreempt> <vrid> [<port#>]
Starting VRRP
After you have defined the VRRP logical interface, defined a VRID, and defined an attribute record for the VRID,
you are ready to start VRRP. To do so, you must both save your changes and either restart the VRRP interface or
reboot the router.
For example, these commands save all changes, restart the VRRP interface 0:1, and list the VRRP records:
# save
# eth restart 0:1
# 04/16/2001-07:49:04:VRRP: VRRP 7 on Interface ETHERNET/0 now active
eth vrrp list
VRRP Records for Ethernet Port .... 0
VRRP Record...................... VRID 7, Priority 100, Interval 1
Flags:preempt, No Authentication
Interface: ETHERNET/0:1
VRRP Router active
After you start VRRP, you can use the eth vrrp list or eth list commands to monitor the status of the VRRP
router.
This command deletes the VRRP attribute record defined for that VRID. It also disassociates the VRRP IP and
MAC addresses from the logical interface.
Note: To re-instate a deleted VRID, you need to redefine both the VRID and the VRRP attribute record.. For
example, the following commands disable VRID 7 and then re-enable it for the logical interface 0:0:
To change the VRRP interface for a VRID, you clear the VRRP interface designation and then re-assign it. For
example, to change the VRRP interface designation from 0:1 to 0:3 for VRID 7, use these commands:
Note: Remember, to make these changes permanent, you must save the changes before you restart or reboot.
# These commands define a logical interface 0:1 to serve as the management interface.
# It is assigned an IP address unique on the LAN, 192.168.254.252.
eth add 0:1
eth ip addr 192.168.254.252 255.255.255.0 0:1
#
# RIP is not needed for either interface so it is turned off.
eth ip options txrip off
eth ip options rxrip off
eth ip options txrip off 0:1
eth ip options rxrip off 0:1
#
# In this example, the VRRP interface is the default logical interface 0:0,
# (The VRRP interfaces for the master and backup routers may have different numbers.)
#
# The VRRP IP address must be the same as that of the master router.
eth ip addr 192.168.100.254 255.255.255.0
#
# The VRRP interface must be assigned the same VRID as in the master router.
eth ip vrid 7
#
# A VRRP attribute record is defined for VRID 7.
eth vrrp add 7
#
# The backup router must have a priority less than 255. Here, the default, 100,
# is used.
eth vrrp set priority 100 7
#
# The backup router must have the same password as the master router.
eth vrrp set password abcdefgh 7
#
# The backup router must have the same time interval as the master router. In this
# example, the default, 1 second, is used.
# The default preempt option is used; it is not required to be the same as the
# master router.
The features described in this chapter can be purchased as software option keys. To determine which software
options are installed on your router, use the vers command. (If a feature has not been enabled, it is listed with a ~
prefix.)
• Encryption
• IP filtering
• L2TP tunneling
• 3DES encryption
The router has several optional software features that can be purchased as software option keys (feature activation
keys) when ordering the router. These optional features are:
• IP routing
These options are usually ordered with the router. The options are controlled by the presence of a key file in flash
memory or a bit set in the CMOS. Both values are checked; if either is set, the option is enabled.
For example, the following vers command output shows that the L2TP and encryption options are disabled, but
all the other options are enabled. The IP Routing feature was enabled by a key.
Options: FRAME RELAY, SDSL, RFC1490, +IP ROUTING, IP FILTERING, WEB, ~L2TP,
~ENCRYPT, BRIDGE, IPX, CMMGMT
When using the web GUI, you select the Upgrade Features button and enter the key. When using the Command
Line Interface, you enter the key using the following command:
Note: The new feature is not activated until the router is rebooted.
The RSE option requires firmware at release 5.0.0 or later. If the RSE option is present, a message such as the
following appears at initialization:
Also, if present, the RSE hardware option appears in the vers command output as the option HW-DES.
Note: Encryption is a software option. The following section applies only to routers with the encryption option
enabled. For more information, see Software Option Keys, page 124. To read about IPSec encryption, see page
149.
Two variants of encrypted data links over PPP have been implemented:
• Diffie-Hellman
Caution: PPP DES and Diffie-Hellman encryption options may not be exported outside the United States or
Canada.
Configuration Commands
To configure PPP DES encryption, add these commands to your standard configuration:
• PPP DES can only be configured using the Command Line Interface (CLI).
• The choice of keys should be carefully considered. Each key must have eight hexadecimal digits. Values that
are considered cryptographically weak should be avoided. Consult a security expert for advice.
• Use the console port to view error messages and progress. If you see “Unknown protocol” errors, the router
receive key and sender Tx key don't match.
• For maximum security, Telnet and SNMP access should be disabled, and PPP CHAP authentication should
be used by both ends.
Sample Configuration
Suppose that the routers SOHO (the local router) and HQ (the remote router) described in Sample Configurations,
page 65 are to be configured to use PPP DES encryption. To add encryption to their configurations, you would
enter the following commands:
Remember that the transmit key (tx) of SOHO is the receive key (rx) of HQ. Inversely, the receive key of SOHO
is the transmit key of HQ.
Don’t forget to save the configuration and reboot the router (save and reboot commands).
Diffie-Hellman Encryption
With Diffie-Hellman encryption, each router has an encryption file that is associated with a public key providing
768-bit security. The predefined keys can be replaced by the user. By convention, the key files have the suffix
“num” (e.g., dh96.num).
Configuration Commands
• Specify DESE_1_KEY if the same key is to be used in both directions. Specify DESE_2_KEY if the keys are
to be different. Using the same keys in both directions can significantly reduce the time needed to compute
the DES keys from the Diffie-Hellman exchange.
• The optional file name on the command is the name of the file containing the Diffie-Hellman values. If a file
is not specified, default values built into the router’s kernel are automatically selected. The file format is
described later.
• The routers’ receive key and sender Tx key must not match.
• Different keys and key files may be used for different remote destinations.
• For maximum security, Telnet and SNMP access should be disabled, and PPP CHAP should be used. Use the
console port to view error messages and progress.
Sample Configuration
Suppose that the routers SOHO (the local router) and HQ (the remote router) described in Sample Configurations,
page 65 are to be configured to use Diffie-Hellman encryption. Also, assume that the same key is to be used in
both directions and that the values to be used to generate keys are in the file dh96.num. To add encryption to their
configurations, you would enter the following commands:
The default values used to generate keys are listed at the end of this section. If you want to use values other than
the defaults, you can create your own Diffie-Hellman number file. The file should follow these rules:
• The file should be 192 bytes, in binary format, consisting of two 96-byte numbers, with the most significant
byte in the first position. For example, the number 0x12345678 would appear as 000000...0012345678.
• The first 96 bytes form the modulus. In the equation x' = g^x mod n, n is the modulus. According to Diffie
and Hellman, the modulus should be prime, and (n-1)/2 should also be prime.
• The second 96 bytes form the generator, or g in the above equation. The generator should be a primitive root
mod n.
• The remaining pieces of the encryption key (x and y) are randomly generated at connection time and change
every time the device connects.
We recommend that you consult an encryption expert to obtain cryptographically sound generator and modulus
pairs.
Default Modulus:
00000000: c9 b4 ed 33 ba 7f 00 9e - ce e0 83 5d a5 4c 19 25
00000010: e0 2d 99 44 e8 8d cd 16 - 02 0e 6c 26 6d 15 7c 95
00000020: 82 9a 8c 2b 19 d0 56 da - 9b 5b a9 cd cf fb 45 2b
00000030: c9 6a 3c 26 e5 b8 1a 25 - 07 b8 07 22 ed 15 8a 56
00000040: 8b f4 30 f2 28 fc 6b f1 - bf a4 3e 87 f0 be d6 1c
00000050: 33 92 b9 5e d1 b7 20 8c - 92 02 cb e5 26 45 02 1d
Default Generator:
00000000: 90 f0 09 78 cc 23 79 a8 - 6c 23 a8 65 e0 dc 0f 6d
00000010: fb a7 26 e8 63 0a 21 67 - 5a f8 0f 59 84 09 5c da
00000020: ef af af fc d2 5f 83 e2 - a7 27 05 34 17 94 1a 4f
00000030: b2 87 76 97 e7 48 43 db - 62 29 70 9e 7f eb 2c 6e
00000040: 5d 25 1d a1 65 f0 b4 e6 - 47 4d 25 23 0b 20 b9 93
00000050: 27 f0 56 12 5a 97 f6 c5 - 31 b6 19 fc 67 22 93 f5
IP Filtering is a type of firewall used to control network traffic. The process involves filtering packets received by
an interface and deciding whether to forward or to discard them. Filtering is performed for each interface; each
Ethernet and WAN interface can have its own set of filters.
Note: IP Filtering is a software option; use the vers command to check that it is installed in your router.
When IP filtering is used, the router examines information for each IP packet, such as the source and destination
addresses, ports, and protocols, and then screens (filters) the packets based on this information. If the packet
matches the conditions of a filter, the router acts as directed by the filter, that is, it accepts, drops or rejects the
packet.
Note: To use IP filtering, IP routing must be enabled (see the command eth ip enable, page 270).
The four sets of filters offer four levels of security: maximum, medium, minimum, and none. You can select and
install any of these filter sets from the Set Firewall page of the Web graphic interface. (To learn how to access the
Web GUI, refer to the User Reference Guide that came in the box in which your router was shipped or find the
guide on the Technical Support web site, www.efficient.com.)
The four filter sets are also provided as script files in the samples directory on the Installation CD. The file names
are maxsec.txt (maximum security), medsec.txt (medium security), minsec.txt (minimum security) and nosec.txt
(no filters). To execute one of these files from the CLI, first copy the file to the router and then use the execute
command (see Batch File Command Execution, page 183). For example, to execute the medsec.txt file for
medium security, enter:
execute medsec.txt
Before executing any script file, you should check its content. Three of the filter sets are listed at the end of this IP
Filtering section (Example 3: Maximum Security Firewall, page 132, Example 4: Medium Security Firewall, page
133, and Example 5: Minimum Security Firewall, page 134). Be sure to edit the file to fit your specific
configuration and seek expert help if you are not familiar with security.
Note: IP filters only work if IP routing is enabled (see the command eth ip enable, page 270).
Receive filters
Network Address Translation
1. Input Filters
When a packet arrives at an interface, the router compares the packet to the list of input filters. The first filter that
matches the packet determines whether the packet is accepted, dropped, or rejected. If no filter matches the
packet, the packet is accepted.
If the packet is accepted, the next step is Network Address Translation, if NAT is enabled for the input interface.
For more information on Network Address Translation, see Network Address Translation (NAT), page 95.
2. Receive Filters
The router next compares the packet to the list of receive filters for this interface. Again, the first filter in the list
that matches the packet determines whether the packet is accepted, dropped, or rejected. If no filter matches the
packet, the packet is accepted.
Receive filters are applied before the packet destination is determined by the routing table. The packet may be
destined for the router itself and/or destined for output to another interface.
Note: If Network Address Translation is disabled, the Receive filter list is checked immediately after the Input
filter list. In this case, identical Input and Receive filters have the same effect (see the examples at the end of the
IP Filtering section.)
3. Transmit Filters
If the packet is destined for another interface, the router compares the packet to the list of transmit filters for this
interface. The first filter that matches the packet determines whether the packet is accepted, dropped, or rejected.
If no filter matches the packet, the packet is accepted.
If the packet is accepted, Network Address Translation is performed, if NAT is enabled for the output interface.
4. Output Filters
Note: If Network Address Translation is disabled, the Output filter list is checked immediately after the Transmit
filter list. In this case, identical Transmit and Output filters have the same effect
Filter Actions
A filter action can be applied to a packet at each of the four filtering points (Input, Receive, Transmit, and
Output). If, at that point, a given filter is the first filter in the list to match that packet, the action specified by that
filter determines the fate of the packet. The possible filter actions are:
Accept The router lets the packet proceed for further processing.
Reject The router sends an ICMP REJECT (Internet Control Management Protocol) to reject the packet.
Pass to IPSec Two actions—inipsec and outipsec—pass the packet to IPSec for further processing. The inipsec
action is for packets coming from the other IPSec gateway; it passes the packet to IPSec for
decrypting. The outipsecaction is for packets coming from the local protected network; it passes
the packet to IPSec so it can be encrypted and sent to the other IPSec gateway.
Although filters are the mechanism by which packets are passed to IPSec, it is recommended that
you use IKE, rather than your own filters, to manage your IP security (see IPSec (Internet Protocol
Security), page 149).
IP Filter Commands
To define and manage IP filters on an Ethernet interface, use the command eth ip filter. To define and manage IP
filters on the remote interface, use the command remote ipfilter. For more information on these commands, see
eth ip filter, page 270 and remote ipfilter, page 300.
ICMP Redirect
IP filters of Input type are checked before the IP packet is redirected by ICMP. This could adversely affect local
LANs that use ICMP redirect to dynamically learn IP routes. IP filters of Input type are checked before the IP
packet is sent to the router itself as a host.
Filter Examples
The following commands add a filter to the beginning of the Input filter list.
Consider, next, the following commands that add a filter identical to the above filter to the beginning of the
Receive filter list:
In the following cases, the Receive filter has the same effect as the Input filter:
• If Network Address Translation is enabled and the Telnet public port is mapped to the Telnet private port by
a remote addserver command, such as the following:
However, the Receive filter does not have the same effect as the Input filter in the following case:
• If Network Address Translation is enabled and another public port is mapped to the Telnet private port. For
example, the following command maps the public port 2000 to the Telnet private port:
In this case, Network Address Translation would translate the packets with port 2000 to the Telnet port and
the Receive filter would drop those packets.
For more information, see Network Address Translation (NAT), page 95 and remote addserver, page 293.
Suppose you wanted to allow Telnet packets destined for the router itself, but drop any Telnet packets destined for
another interface. This requires two filters. The first filter allows Telnet traffic to the IP address of the router (in
this example, 10.0.1.1). The second filter drops all other Telnet traffic.
remote ipfilter append input accept -p tcp -dp 23 -da 10.0.1.1 internet
The filter order is important; packets are compared to filters in the order that the filters appear in the filter list.
Any Telnet packet that doesn’t match the first filter is dropped by the second filter. Thus, command order is
important because each of these commands appends its filter to the end of the list.
The following lists the filters installed when you request maximum security via the graphic interface (file
maxsec.txt).
# L2TP
remote ipfilter insert input accept -p udp -sp 1701 internet
remote ipfilter insert output accept -p udp -dp 1701 internet
The following lists the filters installed when you request medium security via the graphic interface (file
medsec.txt).
# SSL accepted
remote ipfilter insert input accept -p tcp -sp 443 internet
remote ipfilter insert output accept -p tcp -dp 443 internet
The following lists the filters installed when you request minimum security via the graphic interface (file
minsec.txt).
# SSL accepted
remote ipfilter insert input accept -p tcp -sp 443 internet
remote ipfilter insert output accept -p tcp -dp 443 internet
# finger
# POP2 tcp/udp
remote ipfilter insert output accept -p tcp -sp 1024:65535 -dp 109 internet
# NNTP tcp
remote ipfilter insert output accept -p tcp -sp 1024:65535 -dp 119 internet
# IMAP2 tcp/udp
remote ipfilter insert output accept -p tcp -sp 1024:65535 -dp 143 internet
# NTP
remote ipfilter insert transmit accept -p udp -dp 123 internet
remote ipfilter insert receive accept -p udp -sp 123 internet
# who
remote ipfilter insert input accept -p udp -sp 513 -dp 1024:65535 internet
remote ipfilter insert output accept -p udp -dp 513 -sp 1024:65535 internet
remote ipfilter insert input accept -b -p udp -sp 2213 -dp 1024:65535 internet
remote ipfilter insert output accept -b -p udp -dp 2213 -sp 1024:65535 internet
remote ipfilter insert input accept -p udp -sp 6666 -dp 1024:65535 internet
remote ipfilter insert output accept -p udp -dp 6666 -sp 1024:65535 internet
remote ipfilter insert input accept -p udp -sp 7648 -dp 7648 internet
remote ipfilter insert output accept -p udp -dp 7648 -sp 7648 internet
# RealAudio
remote ipfilter insert input accept -p udp -dp 7070 internet
remote ipfilter insert output accept -p udp -sp 7070 internet
# traceroute
remote ipfilter insert input accept -p udp -sp 1024:65535 -dp 33434:33500 internet
remote ipfilter insert output accept -p udp -sp 1024:65535 -dp 33434:33500 internet
save
• The L2TP Concepts section explains LNS, L2TP client, LAC, dial user, tunnels, and sessions.
• Configuration describes preliminary configuration steps and verification steps and lists commands associated
with the configuration of L2TP and PPP sessions.
• The Sample Configurations section provides two examples with step-by-step instructions: a simple L2TP
client configuration example and a complete LNS and L2TP client configuration example.
The installation CD also contains sample configuration files. These files can be edited for your installation
and copied to the router using TFTP or the Windows Quick Start application. For more information on TFTP
use, see Batch File Command Execution, page 183.
Advantages of Tunneling
L2TP (Layer 2 Tunneling Protocol) is used to forward a PPP link from a remote site to a corporate site across the
Internet, thus creating virtual paths called tunnels. Because tunneling involves encapsulating data, packets can be
transported across networks using different protocols. The advantages for tunneling the PPP protocol are listed
below:
• Different network protocols such as NetBEUI, IPX, and Appletalk can be transported through the Internet
using a tunnel. The protocol packets are encapsulated and routed across the network through the Internet.
• Tunnels provide a way to reduce costs and complexity associated with remote dial-up networking by using a
local ISP: users connect to the remote site by dialing into their local ISP and letting the Internet handle the
long-distance connections, thus avoiding long-distance phone charges.
• Tunneling PPP allows compression of data through the entire tunnel, which translates into greater throughput.
• By allowing encryption over the PPP link, L2TP contributes to more secure networks over the Internet.
• Remote users can access the company network, even if there is a company firewall (provided, of course, that
tunnels can come through the firewall).
Note: This feature can interoperate with any vendor that supports L2TP - Draft II.
L2TP Concepts
This section defines the major L2TP concepts and illustrates them with L2TP client examples. It also describes
the creation and destruction of tunnels and sessions.
An L2TP tunnel is created between an L2TP client and an L2TP network server (LNS). The client and server
control the tunnel using the L2TP protocol.
Dial User
The remote system or router that is either placing the call to the LAC or receiving the call from the LAC.
The dial user does not actually dial in to the LNS or receive a call from the LNS, since this is a virtual
connection. The dial user is one end of a PPP session. The LNS is the other end of the PPP session.
L2TP Client
The dial user and LAC combined in the same hardware device. In this case, the PPP session is between
the LAC and the LNS.
As shown in the following illustration, an L2TP client is used to tunnel a PPP session between a small
office (our router) and a corporate office through the Internet.
The tunnel uses UDP/IP traffic as the transport medium over IP. This implementation of L2TP as illustrated
below shows a tunnel from a remote user’s perspective.
Note: There is one PPP session over ISDN and another PPP session over the tunnel.
The LNS acts as the supervising system. The L2TP client acts both as the dial user and the LAC.
One end of the tunnel terminates at the L2TP client. The other end of the tunnel terminates at the LNS.
One end of the PPP session going through the tunnel terminates at the L2TP client acting as the dial user; the
other end terminates at the LNS.
Tunnels are virtual paths that exist between an L2TP client and an L2TP server.
An L2TP server can communicate simultaneously with more than one L2TP client.
An L2TP client can communicate simultaneously with more than one L2TP server.
Some L2TP implementations including the one discussed in this section allow the same router to act as both
an L2TP client and an L2TP server simultaneously, if so configured.
Caution: Verify that the IP address of the other end of the tunnel is correctly routed through the right, local
interface/remote and will not appear to be routed through the tunnel. An attempt to route the tunnel endpoint
within itself will fail.
Sessions
Sessions can be thought of as switched virtual circuit “calls” carried within a tunnel and can only exist within
tunnels. One session carries one “call”. This “call” is one PPP session. Multiple sessions can exist within a
tunnel. The following briefly discusses how sessions are created and destroyed.
• Session creation
Traffic destined to a remote entry (located at the end of the tunnel) initiates a tunnel session. When the
L2TP client wishes to establish a session to an LNS, the L2TP client assumes the role of a LAC and
sends control packets containing incoming call information to the LNS over the tunnel.
• Session destruction
A tunnel session automatically times out after the data session stops. When instructed to destroy a
session, the L2TP client closes any PPP session associated with that session. The L2TP client may also
send control messages to the LNS indicating that the L2TP client wishes to end the PPP session.
When the LNS wants to hang up the call, it sends control messages destroying the session.
Configuration
2. Decide if one side or both sides of the connection should be allowed to initiate a tunnel.
• A Tunnel CHAP secret (both sides of the connection must use the same secret)
4. Create a remote entry for the PPP session. Associate the remote entry with the Tunnel.
Verification Steps
1. Verify that the IP address of the other end of the tunnel is correctly routed through the right, local
interface/remote and will not appear to be routed through the tunnel. An attempt to route the tunnel
endpoint within itself will fail.
a.“Pinging” from the L2TP client or LNS to the opposite tunnel endpoint should succeed (this tests the
tunnel path).
b.“Pinging” from a tunnel endpoint IP address to an IP address within the tunnel will probably fail due to
the existence of the IP firewall.
Configuration Commands
• Tunnels
For additional information, see L2TP — Virtual Dial-Up Configuration Commands, page 363.
CHAP secret:
l2tp set CHAPSecret <secret> <TunnelName>
Tunnel authentication:
l2tp set authen on | off <TunnelName>
Note: Verify that the IP address of the other end of the tunnel is correctly routed. It should not be routed
through the tunnel itself, but over a physical link.
You may also specify the source IP address for the tunnel as an address other than the WAN interface IP
address, such as the Ethernet IP address.
Other commands:
Commands are also available to delete a tunnel, close a tunnel, or set up advanced L2TP configuration
features such as traffic performance fine-tuning (see L2TP — Virtual Dial-Up Configuration
Commands, page 363).
Two commands are used to extend a PPP link from a remote site to a corporate site across the Internet
and establish a tunnel. For more information, see L2TP — Virtual Dial-Up Configuration Commands,
page 363.
Sample Configurations
Two sample configurations are described in this section:
• A simple configuration. This example describes the information needed to configure one side of the tunnel
(the client side).
• A complete configuration. This example describes the information needed to configure both sides of the
tunnel (client and server sides).
This example shows how a telecommuter working at home (client side) can configure his/her router SOHO to
tunnel to the company’s LAN (server side).
The information given in the Configuration Process section below provides a framework reference for this
type of L2TP Client configuration.
• Assumptions
• The server side (the company) has an LNS router connected to the Internet.
• The client side has an existing route to the Internet with the remote “Internet” (refer to the following
Note, if you need sample configuration commands).
• IP routing is enabled (refer to the following Note, if you need sample configuration commands).
Note: Below is an example of configuration commands that can be used to enable IP routing and
establish a route to the Internet.
• Configuration Process
The following sets of questions, answers, and configuration commands specific to the L2TP tunnel and
the PPP remote will assist you in configuring the client side router SOHO (also referred to as home
router). Note that the server side is referred to as either company router or router at work.
2. What is the host name of the company router at work to which the user will tunnel?
3. What is the shared CHAP secret used for tunneling between the home router (client) and the
company router (server)?
4. What is the IP address of the company router to which the user will tunnel?
L2TP tunnel answers. For our example, let’s assume the answers to the above tunnel-specific questions
are as follows:
1. Home_Router
2. Work_Router
3. Shared_Secret
4. 10.0.0.1
L2TP tunnel configuration commands. These commands would be used to set up the L2TP tunnel
information for our example:
l2tp add Work_Router
l2tp set ourtunnel Home_Router Work_Router
3. Does the home router need PPP authentication for the remote router (company router)?
If yes:
a. Use the command remote disauthen <remoteName> where <remoteName> is the name used to
refer to the company’s router.
4. Does the remote router dynamically assign an IP address for this PPP session?
If yes:
Use IP address translation (NAT)
5. Which IP and network addresses does the home router access at work through this PPP session?
PPP remote answers. For our example, let us assume the answers to the above PPP remote-specific
questions are as follows:
1. ppp_soho
2. ppp_soho_secret
3. We assume that this router will authenticate the router at work with the following information:
4. We assume that the company’s router will dynamically assign an IP address to the home router.
PPP remote configuration commands. For our example, these commands would be used to set up the
PPP remote information for tunneling to work:
remote add ppp_work
remote setlns Work_Router ppp_work
remote setpasswd ppp_work_secret ppp_work
remote setiptranslate on ppp_work
remote addiproute 172.16.0.0 255.240.0.0 1 ppp_work
The following information and illustration (Figure 1) provide a configuration example of an LNS and L2TP
Client.
• Assumptions
IP Addresses
The LNS server’s LAN IP address is 192.168.100.1 (LNSserver) with a mask of 255.255.255.0.
The LNS has a WAN IP address of 192.168.110.1, which is used as the tunnel endpoint.
The L2TP Client’s LAN IP address is 192.168.101.1 (soho) with a mask of 255.255.255.0. Additionally,
192.168.101.1 is also the tunnel endpoint within the L2TP client. The router soho connects to the remote
isp.
Secret/password
A shared tunnel secret of “tunnelsecret” will be used.
PPP Authentication
The LNS will authenticate the client using PPP. The client will not try to authenticate the LNS using
PPP. For PPP authentication, the L2TP client will be known as “lacclient” with a password of
“clientpassword”.
Tunnel
Only the L2TP client (soho) will initiate the tunnel and make the connection. The tunnel is routed
through the remote internet which is the default route. The LNS server never calls the L2TP client
(soho).
Figure 1
isp
router internet
172.16.0.254 INTERNET router
CO end:
172.16.0.1
Note 3: No CHAP secret is needed; the client does not authenticate the LNS server.
Configuration Process
The following sample scripts list the commands used to configure the routers soho (L2TP client), LNSserver
(LNS), internet, and isp.
Define soho:
system name soho
system passwd sohopasswd
system msg configured_12/15/98
system securitytimer 60
Note: internet is a DSL router. The router internet establishes a link to the LNS.
Define internet:
system name internet
system passwd internet
system msg configured_12/15/98
system securitytimer 60
Note: isp is an ISDN router. The router soho calls the router isp.
Define isp:
system name isp
system passwd isppasswd
system msg configured_12/15/98
system securitytimer 60
Enable IP routing:
eth ip enable
eth ip addr 172.16.0.254 255.255.255.0
Disable DHCP:
dhcp disable all
Define LNSserver:
system name lnsserver
system passwd serverpassword
system msg Script_for_LNS_called_HQ
system securitytimer 60
Enable IP routing:
eth ip enable
eth ip addr 192.168.100.1 255.255.255.0
Note: IPSec security is a software option for your router. The option becomes available after purchase and
installation of the software option key (see Software Option Keys, page 124). Use the vers command to check that
IPSec is available on your router.
Note: Almost all IPSec capabilities can be selected using the graphic interface. However, a few policy selections
are available only through the Command Line Interface described in this section. (The graphic interface is
described in the User Reference Guide that came with your router and is also available on the web site
www.efficient.com.)
IPSec is an open standard that defines optional authentication and encryption methods at the IP packet level. It is a
true network layer protocol that provides authentication, privacy, and data integrity. Its protocol suite is comprised
of:
• ESP (Encapsulated Security Payload)—a security protocol that completely encapsulates and optionally
encrypts and/or authenticates user data.
• IKE (Internet Key Exchange)—a security protocol used to establish a shared security policy and
authenticated keys before an IPSec data transfer begins.
IPSec sessions are initiated through Security Associations (SAs), which allow peers to negotiate a common set of
security attributes. In a nutshell, IPSec assures source authenticity, data integrity and confidentiality of IP packets,
providing the level of security required by Virtual Private Networks (VPNs).
IPSec can be used in conjunction with L2TP (see L2TP Tunneling — Virtual Dial-Up, page 137). IPSec offers
greater security than L2TP, but it does not support as many network protocols. However, bridged and lower layer
protocol traffic may be transmitted across an IPSec network if packets are first encapsulated by L2TP, and then by
IPSec.
IPSec does not require modification of individual applications or devices for secure data transport. Although it
does require global IP addresses for all peers, Network Address Translation (NAT) may be used with IPSec. (See
Network Address Translation (NAT), page 95.)
The router supports both IPSec encapsulation methods. It can serve as the endpoint of a tunnel mode connection
or as the endpoint of a transport mode connection. Also, while operating in tunnel mode, the router does allow
transport mode traffic to flow through it.
Tunnel mode is the default encapsulation mode for the router. It is used when the IPSec packet comes from either
another device or from the encrypting device. In tunnel mode, the IP header is encrypted as part of the payload,
and an entirely new IP header is added to the packet. Tunnel mode prevents network traffic analysis. A network
attacker could determine the tunnel endpoints (the gateway addresses), but not the true source and destination of
the tunneled packets, even if they are the same as the tunnel endpoints
The router should be configured for transport mode when a client is communicating directly with the router. For
example, use transport mode when a remote user wants to access the HTML setup pages or Telnet into the router.
It can also be used for L2TP over IPSec. The routers at either end of the L2TP tunnel do both the IPSec and L2TP
encapsulations so the routers can use transport mode for communications.
Tunnel Mode:
Secure Packet Traffic
Between Routers
Transport Mode:
Secure Data Traffic Between Devices
Device Device
Router Router
or router or router
If ESP encryption is selected, ESP automatically encrypts the data portion (payload) of each packet using the
chosen encryption method, DES (56-bit keys) or 3DES (168-bit keys).
Caution: Restrictions may exist on the export of the DES and 3DES encryption options outside the United States
or Canada.
Although encryption cannot be specified for individual applications, a server could be partitioned to achieve the
same effect. Given that packets can be encrypted using any combination of security association (SA), protocol,
source port, and destination port, you could specify that traffic to and from one database be encrypted while
allowing unencrypted traffic to pass freely to and from other databases on the server.
Both the ESP and AH protocols support authentication and replay detection. Replay detection uses sequence
numbers to reject old or duplicate packets. The packet is authenticated using a message digest derived from either
of two hashing algorithms—SHA-1 (Secure Hashing Algorithm 1) or MD5 (Message Digest 5).
The ESP protocol can authenticate the data origin and data integrity; it does not authenticate the entire packet.
More specifically, the message digest is inserted following, not before, the payload. Both the message digest and
payload are sandwiched between the ESP header and ESP trailer.
The following figure shows the transformed IP packet after the ESP or AH protocol has been applied in tunnel
mode.
ESP Protocol:
Encrypted
Authenticated
AH Protocol:
Authenticated
IKE Management
Internet Key Exchange (IKE) management makes encryption key exchange practical, even in large networks
where there are many unknown intermediate links between sending and receiving nodes. Unlike protocols that
allow only one key exchange per session, IKE can generate and transfer multiple keys between peers during a
single tunnel session. Users may specify the duration for which keys are valid. This dynamic type of Diffie-
Hellman key exchange greatly reduces the chances of a network attacker finding an entry into a tunnel.
If you wish, you may also select Perfect Forward Secrecy (PFS) to increase the security of the key exchange. PFS
ensures that the compromise of a single key permits access to only data protected by that particular key. However,
PFS requires use of a Diffie-Hellman group for each rekey, adding overhead to the process and causing IKE to run
more slowly. Thus, PFS is not always desirable.
Because VPN users are likely to be using a variety of protocols, a common set of security attributes must be
negotiated at the beginning of any tunnel session. Phase 1 IKE is responsible for negotiating these security
attributes and establishing peer identities. A secure tunnel for the exchange of encryption keys is also created
Main mode is used when both source and destination IP addresses are known. In main mode, only two options
require definition initially—the remote peer IP address and the shared secret.
Aggressive mode is used when either the source or destination IP address could change, as with a remote modem
or DSL connection. In aggressive mode, additional information must be specified at the beginning of a session.
This additional information includes the remote gateway’s IP address, the local and remote peer IDs, and an ID
type. This information is checked against the router’s Security Association (SA) database. If a match is found, a
tunnel session can be established.
• Session authentication
After an IKE SA is established, any number of IPSec SAs may be created. Although IPSec SAs can be configured
manually, most networks rely on IKE to set them up. IKE negotiates and establishes SAs on behalf of IPSec. SAs
are negotiated between the two endpoints of the tunnel and contain information on sequence numbering for anti-
replay.
IPSec SAs are unidirectional so a set of SAs is needed for a secure connection. For each security protocol used,
one SA is needed for each direction (inbound and outbound). Usually, only one protocol (ESP or AH) is used so
the connection would use two SAs (one inbound and one outbound). However, it is possible for a connection to
use four SAs if it uses two proposals and policies, one requiring the ESP protocol and the other requiring the AH
protocol.
Phase 1 IKE:
The session initiator creates a cookie and sends it to the responder, with a zero placeholder in the responder
cookie area. The responder then creates a cookie and fills in the zeros. All packets will contain these two
cookies until the Phase 1 SA expires. IKE Peer commands next establish the identity of local and remote
peers. Then IKE Proposal commands specify how packets will be encrypted and/or authenticated for the
initial exchange.
Phase 2 IKE
IKE IPSec Proposal commands specify how packets will be encrypted/authenticated for the final SA. Then
IKE IPSec Policy commands specify which packets will be encrypted/authenticated for the final SA.
Use the following command to clear all IKE configuration information from the router.
ike flush
The other IKE commands relate to the four categories of information required to set up IKE in the router.
1. IKE Peer commands establish the identity of the local and remote peers.
2. IKE Proposal commands define the proposals exchanged during the Phase 1 exchange.
3. IKE IPSec Proposal commands specify the parameters for the final SA.
4. IKE IPSec Policy commands specify the filtering parameters for the final SA.
ike peers add <PeerName> Defines the name of a new IKE peer.
Sets the peer connection to either main or aggressive mode. Main mode is used when the IP addresses of
both ends are known. Aggressive mode is used when the address of one end can change, as with a typical
modem or DSL connection.
For a main mode connection, set only the IP address and the secret:
Sets the IP address of the other endpoint. In a main mode configuration, the other endpoint is constant.
Sets the shared secret for the peer. The secret must be identical for both ends. It can be up to 256
characters long; do not use spaces or non-printable characters.
For an aggressive mode connection, you must set the IP address and secret and several more options.
Sets the shared secret for the peer. The secret must be identical for both ends.It can be up to 256
characters long; do not use spaces or non-printable characters.
Sets the local ID. This must match the peer ID on the other end.
Sets the type of the local ID (IP address, domain name, or e-mail address). This must match the peer ID
type on the other end.
Sets the peer ID. This must match the local ID on the other end.
Sets the type of the peer ID (IP address, domain name, or e-mail address).This must match the local ID
type on the other end.
ike proposals add <ProposalName> Defines the name of a new IKE proposal.
Proposes the session authentication; preshared key is currently the only option.
3DES Encryption using three 56-bit keys, thus, producing 168-bit encryption.
Proposes the Diffie-Hellman (DH) key generation group used (no group or group 1 or 2).
Proposes the length of time (in seconds) before the Phase 1 SA expires; the recommended value is 86400
(24 hours). When the time limit expires, IKE renegotiates the connection.
ike ipsec proposals add <ProposalName> Defines the name of a new IKE IPSec proposal.
ike ipsec proposals delete <ProposalName> Deletes an existing IKE IPSec proposal.
The followings proposals set commands specify the contents of the proposals exchanged.
Note: The next three commands (set espenc, set espauth, and set ahauth) determine the encapsulation
method (AH or ESP) used and the authentication and/or encryption requested by the proposal.
You cannot request both AH and ESP encapsulation in the same proposal. (It is possible for a connection
to use two proposals, one that requests AH and the other that requests ESP.)
In any one proposal, you can request any one of the following:
ike ipsec proposals set espenc <DES | 3DES | NULL | NONE> <ProposalName>
Determines whether ESP encryption is requested and, if it is requested, the encryption method used.
NULL No encryption, but use ESP encapsulation. Headers are inserted as though the data was
encrypted. This allows verification of the source, but sends the data in the clear, increasing
throughput.
NONE No encryption and no ESP encapsulation. (If you select this option, the encapsulation method
must be requested by a set espauth or set ahauth command.)
Determines whether ESP message authentication is requested and, if it is requested, the hash algorithm
used.
MD5 Use ESP encapsulation and authenticate using hash algorithm Message Digest 5.
SHA1 Use ESP encapsulation and authenticate using hash algorithm Secure Hash Algorithm-1.
Determines whether AH message authentication is requested and, if it is requested, the hash algorithm
used.
Note: The proposal cannot request both AH encapsulation and ESP encapsulation.
MD5 Use AH encapsulation and authenticate using hash algorithm Message Digest 5.
SHA1 Use AH encapsulation and authenticate using hash algorithm Secure Hash Algorithm-1.
NONE No AH encapsulation and no AH message authentication. (If you select this option, the encap-
sulation method must be requested by a set espenc or set espauth command.)
Proposes the length of time (in seconds) before the IPSec SA expires; the recommended value is 86400
(24 hours). When the time limit expires, IKE renegotiates the connection.
Proposes the maximum number of kilobytes for the IPSec SA; 0 means unlimited. After the maximum
data is transferred, IKE renegotiates the connection. By limiting the amount of data that can be
transferred, you reduce the likelihood of the key being broken.
ike ipsec policies add <PolicyName> Defines the name of a new IPsec policy.
ike ipsec policies enable <PolicyName> Indicates that the specification of this IPSec policy is complete and
enables use of the policy.
The following commands define the filtering parameters for the policy.
Specifies an IKE peer that may be used for the connection. (The peer must have been defined by IKE
peer commands.)
Specifies the encapsulation mode (tunnel or transport) that may be used for the connection. The default is
tunnel mode.
Specifies an IKE IPSec proposal that may be used for the connection. (It must have been defined by IKE
IPSec proposal commands.) The policy may allow more than one value for the proposal parameter. For
example, two set proposal commands could specify two proposals, either of which could be used by the
connection.
Sets the Perfect Forward Secrecy negotiation and specifies the Diffie-Hellman group used for each rekey
(none or group 1 or 2). Perfect Forward Secrecy increases the security of the key exchange; compromise
of a single key permits access to only the data protected by that particular key. However, the additional
encryption slows the IKE process so it is not always desirable.
Requires that the data come from the specified source IP address and mask.
Requires that the data be intended for the specified destination IP address and mask.
Determines whether the router applies NAT (network address translation) before the packets are
encrypted by IPSec. If translate is set to on, the packets are sent using the host router’s public IP
address. The remote must have IP address translation enabled (see NAT on page 95). The address that
NAT translates to should be the source or destination address for the policy (use the set source or set
dest commands).
ike ipsec policies set protocol <ProtocolNumber | TCP | UDP | *> <PolicyName>
Requires a specific protocol that must be used or allows any protocol (*).
ike ipsec policies set sourceport <PortNumber | TELNET | HTTP | SMTP | TFTP | *> <PolicyName>
Requires a specific source port for the data or allows any source port (*) (Because port numbers are TCP
and UDP specific, a port filter is effective only when the protocol filter is TCP or UDP.)
ike ipsec policies set destport <PortNumber | TELNET | HTTP | SMTP | TFTP | *> <PolicyName>
Requires a specific destination port for the data or allows any destination port (*). (Because port numbers
are TCP and UDP specific, a port filter is effective only when the protocol filter is TCP or UDP.)
Requires a specific interface that must be used or allows all interfaces (all). The policy is only used when
the specified interface is connected. The specified interface must be the interface to the IKE peer.
The first example in this section shows an IKE configuration that uses main mode for a secure connection
between two routers with fixed IP addresses. The second example shows how the first configuration must change
when one of the routers no longer has a fixed IP address thus, requiring aggressive mode.
192.168.16.X 192.168.19.X
192.168.17.200 192.168.18.201
Home Branch
Office Public Network Office
Home Office Branch Office
Private Private
Router Router
Network Network
The configuration sets up a secure connection between the two routers across a public network, thus, the routers
are identified by their public IP addresses on the ike peers commands. The packets that are transmitted through
this secure connection are from devices in the home office and branch office networks. These networks use
private addresses, and thus the packets contain private IP addresses. The ike ipsec policies commands specify
these private source and destination addresses.
192.168.16.X 192.168.19.X
(No fixed IP address)
192.168.17.200 Domain: branchoffice.big.com
Home Branch
Office Public Network Office
Home Office Branch Office
Private Private
Router Router
Network Network
To change the main mode configuration to an aggressive mode configuration, you only need to change the ike
peers commands. All the other IKE commands remain the same. Change the mode to aggressive and change the
address of the router that has no fixed address to 0.0.0.0, and specify either its e-mail address or domain name.
Note: Remember to save and reboot each router after entering the configuration changes.
Change the ike peers commands in the home office router configuration to the following:
Change the ike peers commands in the branch office router configuration to the following:
IPSec Commands
The following commands allow you to define an IPSec connection without IKE.
Note: If you define a tunnel using IPSec commands, the keys will remain static. This could pose a security risk
and is not recommended. Use of IKE for key management is recommended.
The following commands define parameters for the specified Security Association (SA).
Requests the encapsulation mode (tunnel or transport) for the SA. The default is tunnel mode.
Selects authentication using either SHA-1 (Secure Hashing Algorithm 1) or MD5 (Message Digest 5)
Specifies the encryption key (in hexadecimal, 64 bits for DES or 192 bits for 3DES).
Selects the authentication and/or encryption services used: AH authentication, ESP encryption, or both
ESP encryption and ESP authentication (encryption applied first and then authentication).
This chapter describes facilities for managing, monitoring, and securing the router. The options discussed include:
• Booting software
• Password recovery
• Script execution
SNMP Support
SNMP (Simple Network Management Protocol), a member of the TCP/IP protocol suite, was designed to provide
network management interoperability among different vendors’ management applications and equipment. SNMP
provides for the exchange of messages between a management client and a management agent. The messages
contain requests to get or set variables that exist in network nodes, thus allowing a management client to obtain
statistics, set configuration parameters and monitor events. These variables (or objects) are defined in
Management Information Bases (MIBs), some of which are general or standard SNMP-defined bases. Other
bases, such as Enterprise Specific MIBs are defined by different vendors for specific hardware.
The router provides SNMP agent support and support for standard as well as Enterprise Specific MIBs. SNMP is
also used internally for configuration of the router. The active SNMP agent within the router accepts SNMP
requests for status, statistics, and configuration updates. Communication with the SNMP agent occurs over the
LAN or WAN connection.
The supported MIBs and a description of their contents are listed in the following table:
Bridge MIB State/statistics (including spanning tree states) within bridging system
Any management application using SNMP over UDP/IP has access to the local SNMP agent. SNMP network
management tools vary but often have features to display network maps of SNMP nodes, poll nodes at intervals,
An example of useful information that can be obtained from a remote SNMP client would be the current status of
the router’s WAN link and Ethernet interfaces, including protocol (PPP, CSMA-CD), line speed, maximum frame
(transmission unit) size, physical address, operating status, or packet traffic rates.
The router supports Telnet access. Telnet allows you to log in to the router as if you are directly connected
through the console port. You can issue commands, using the command line interface, to configure the router and
perform status monitoring from any remote location.
To access the router using Telnet, use one of the available TCP/IP packages containing the Telnet application.
Issue the appropriate command syntax and assign the IP address of the router. You are then directly connected to
the router and can issue commands. (For an example, see Telnet Session for Remote Access, on page 16.) To end
the Telnet session, exit the application by entering logoff or another appropriate command.
By default, a system security timer logs out a Telnet session after 10 minutes of inactivity. To change the timer
period, use the system securitytimer command, page 252.
To disable and re-enable Telnet access, use the command system telnetport, page 259. For more information on
controlling Telnet access to the router, see page 107.
A client Trivial File Transfer Protocol (TFTP) facility is built into the router that is capable of reading from and
writing to the network. A TFTP server must be properly configured to communicate with the router for file
transfers to be successful. The client TFTP facility can be used to boot software from a TFTP server, perform
software upgrades and copy configuration files to a TFTP server. A TFTP server is integrated into the Windows’
Configuration Manager and can also be used as a stand-alone application.
TFTP Server
The TFTPD (Trivial File Transfer Protocol Daemon) program is installed on your PC as part of the DSL Tools
software. TFTPD waits for incoming TFTP requests from TFTP clients. It can put a file on your computer’s hard
disk or get one from it.
Because there is no security built into TFTPD, it is important to specify a root directory where all accessible files
are located. When a file is requested, it must be at or below the level of this root directory on your directory tree or
the request is denied. If a TFTP client attempts to put a file on your PC, the file must already exist for writing.
The Options menu of the TFTPD program allows the user to configure additional parameters, such as the number
of retries and the time between retries. The root directory can also be specified from the Options menu.
The TFTPD operational parameters are kept in file ROUTER.INI in the form:
rootdir=rootdirectory
retries=maxtries
timeout=timeout
TFTPD is automatically called by BootP and Configuration Manager.
BootP Service
This section first discusses what BootP is and then describes the BootP service available from the router.
BootP Concepts
BootP refers to the Bootstrap Protocol. In general, BootP requests have these purposes:
• To obtain a TFTP server address and file information to continue the booting up process.
For example, a diskless workstation could use a BootP request to get an IP address for itself, the TFTP server
address where it is to get the kernel it is to load and run, and the file name of that kernel.
A BootP server waits for incoming BootP broadcasts from BootP clients. The server looks up the MAC addresses
of the incoming BootP request in its database. If the MAC address is found, the server normally responds to the
requestor with an IP address. It may also respond with boot information, that is, the IP address of a TFTP server,
and the name of a file.
If the DHCP server in the router is disabled, it, of course, cannot process BootP requests even if BootP processing
is enabled. The DHCP server in the router disables itself if one of the following occurs:
While the relay list contains at least one address, the DHCP server in the router is disabled, and the router
forwards all DHCP requests and BootP requests to all servers in the relay list. It forwards every reply received
from any of the servers in the relay list to the appropriate LAN.
If you remove all addresses from the DHCP relay list, the DHCP server is re-enabled and resumes processing
DHCP requests and also BootP requests if BootP processing is enabled.
Syslog Client
The router can act as a Syslog client, automatically sending system event messages to one or more Unix Syslog
servers. (For example, if you request an IP filter watch, the messages are sent to the Syslog servers; see ETH IP
FILTER, on page 270.) Messages generated by the router and sent to a Syslog server are sent to facility local0
with priority notice.
To disable, re-enable, or redefine the Syslog port, use the command system syslogPort (page 259).
The router can learn the IP addresses of Syslog servers in two ways:
• Via DHCP. The router can, under certain circumstances, send out a DHCP message and learn the IP
address(es) of Syslog servers. For more information, see DHCP Client Requests, on page 85.
• By explicit configuration. To configure the IP address of a Syslog server, use the command system
addSyslogServer (page 235).
You can limit the Syslog server addresses that the router learns through DHCP. To do so, set a filter for valid
Syslog server addresses using the command system addSyslogFilter (page 234).
• You can boot from the router’s flash memory, the most common option.
• Or, you can boot across the LAN network from a TFTP server, perhaps to test a new level of router software
before downloading it to flash memory.
• You can also boot through a gateway to a WAN. The router allows you to set permanent network boot
parameters used during network booting, and it enables you to temporarily override those parameters.
• Finally, the router lets you define the order in which the router boot procedures are performed. You can make
changes to the boot procedures and specify network boot parameters by entering manual boot mode.
The next section describes the purpose and functions of the boot code. The section following it, Manual Boot
Mode, on page 170, describes a menu of manual boot options.
Note: For routers with a reset button, see Recovering Kernels for Routers with a Reset Button, on page 181.
• Reads flash memory and does a CRC check and magic number before proceeding
• Reports to the console: CRC check, flash memory and RAM sizes, DSL type, and POST results
• Checks whether the reset switch is depressed and skips ASIC load if requested
• Reports to the console: the MAC address, WAN modem ID, date/time and the reason for the reboot
• If no response, displays the boot menu (see Manual Boot Mode, on page 170).
The boot code communicates to the application it launches (usually, the kernel) information about the hardware
capabilities of the router model, including the amount of RAM, the flash memory available for the file system,
The router enters manual boot mode if either the kernel is not found in flash memory or a Bootp load from the
network fails.
Note: If the router has configuration (dip) switches on its back panel, you can select manual boot mode by setting
switch 6 down and rebooting or powering up the router. To return to automatic boot mode, set switch 6 up and
reboot by selecting menu option 1, 2, 3, or 4.
1. Retry start-up
2. Boot from Flash memory
3. Boot from network
4. Boot from specific file
5. Configure boot system
6. Set date and time
7. Set console baud rate
8. Start extended diagnostics
Enter selection:
Select option 1. Retry start-up to reboot the router in the boot procedure order. The boot procedure order is
either the one you have specified or the default order. The default order is to boot from flash memory and
then from the network (if defined). If you wish to boot from the network and/or alter the boot procedure
order, refer to Option 3: Boot from Network, on page 170.
Select option 2. Boot from Flash memory to perform a manual boot from flash memory. If the boot is
unsuccessful, the router returns to manual boot mode. (When you first receive the router, it defaults to booting
from flash during power-up or automatic reboot.)
If you have not defined network boot parameters, the router attempts to locate a BOOTP or RARP server on
the network.
• BOOTP can be used to supply an IP address, a TFTP server IP address, and a file name.
• RARP can obtain an IP address, if it knows the MAC address. The router assumes that the RARP server
is also capable of performing the duties of a TFTP server and so the router requests the file
KERNEL.F2K (or the filename assigned when permanent network boot parameters are set.)
If a BOOTP or RARP server exists and is properly configured with the router’s MAC address, the router
boots from the network.
If the boot from the network is unsuccessful, the router returns to manual boot mode.
Select option 4 to temporarily override permanent network boot parameters when you perform a network
boot.
1. After you select option 4, the current default (permanent) parameters are shown.
3. Press the return key and the router boots from the network using the temporary boot parameters.
Select option 5 to specify permanent network boot parameters. This menu is displayed:
Enter selection:
1. Select options 2, 3, and 4 to set the three boot parameters (boot IP address, TFTP boot server address,
and router software file name on the server). To reset any parameter, press enter following the prompt.
The boot IP address is the router LAN IP address used during the boot procedure. This address may
differ from the LAN IP address that the router is ultimately assigned. This address is different so that a
system can be booted from one subnetwork and then moved to its operational network, if necessary.
Note: Once you have set a TFTP server address, it is assigned to the router software TFTP facility. This
server address is then used whenever a server address is not explicitly specified, including when the copy
command is in the form: copy tftp:filename kernel.f2k
The router software file name must be in the format: yyyyyyyy.yyy (similar to the DOS filename format).
2. Set the boot procedure order. You can specify whether the router boots from flash memory first, from a
network TFTP server first, or never automatically reboots.
3. Select option 4 to Boot through the IP gateway. In this procedure, the router on the local LAN can
boot from a boot server that is not connected directly. Instead, the path to the boot server can include
other networks (including the WAN, if adequate routers exist). The gateway must be located on the local
LAN and be reachable by the local router.
4. (Model 5950 only). On the model 5950, you can boot from either of two files in flash memory. This can
be used to run a test kernel and back up the previous version. Thus, if you select option 5, you see this
prompt:
Enter the file name after the prompt (for example, test.bin).
Select option 6 to set the current time and date. Set the new date in the format mm[/dd[/yy (or yyyy)]]. Set the
new time in military format hh[:mm[:ss]]). You are shown the current date and time.
Note: Your router is Y2K compliant. If you choose to enter only two digits to specify the year, values greater
than 93 translate to 19xx. Values less or equal to 93 translate to 20xx. The router has a one-hundred-year date
range (from 1994 to 2093).
If the date is set to zero (0/0/00), the real-time clock is disabled for long-term storage.
When the router is configured by a PC, the GUI overwrites the time and date fields. The router time and date
values are copied from the PC time and date values.
Select option 7 to alter the baud rate that the router uses to communicate over the console port with a terminal
emulation program. You can override the default rate of 9600. Remember to set the identical baud rate in
your terminal emulation program.
Enter the number of each test that you would like to run, or select all tests (+). Then enter . (period) to begin
diagnostic testing.
The debugging mode (option #) is available for use primarily when you encounter a serious problem, in
consultation with customer support services.
Non-fatal errors are not indicated by the LEDs, but they do prompt the system to send an explanatory message to
the console port.
Normal LED states are described in the Hardware Specifications section of the User Reference Guide. (A copy of
the Guide comes with your router and is available on the web site www.efficient.com.) The normal progression of
LED states during startup are described in Using LEDs, on page 184.
Normally, during ready state, the TEST LED flashes every two seconds. If this normal “heartbeat” stops, it
indicates that the router is locked up and you need to cycle power to reset it.
If your router has four LEDs, the pattern of the three LEDs (except the POWER LED) may indicate a fatal error.
Note: On some router models, the LINK LED is labeled LAN or RX0/TX0 and/or the WAN LED is labeled
VOICE or RX1/TX1.
VOICE or
TEST WAN LAN Fatal Error
If your router has six LEDs, the pattern of the four LEDs labeled TEST, LINK, WAN, and LANT may indicate a
fatal error. The error patterns are listed in the following table. (Any other pattern of flashing LEDs indicates an
internal error. Should this occur, return the router to the factory for repair or replacement.)
Fast blink Off Off On, off, or Wait stuck in the boot menu;
green blinking kernel file could be missing.
You can upgrade the software kernel by downloading a new version from the LAN or from the WAN.
• Task Scheduler
• Memory Management
• Buffer Management
Note: We strongly recommend that you use the Configuration Manager’s Upgrade/Backup tool to upgrade or
back up the kernel. The Configuration Manager’s tool is more convenient to use than the Command Line
Interface.
Upgrade Instructions
Read the following steps very carefully before you perform an upgrade:
1. Warning: Before performing this procedure, make sure that you can successfully boot from the network
using the manual boot procedure option 3 or 4. Refer to the section Option 3: Boot from Network, on
page 170.
2. Copy the router software file KERNEL.F2K (or KERNEL.FPL for an IDSL router) to a directory where
it can be accessed by a TFTP server. The TFTP server must be on the same LAN as the target router; i.e.,
there must not be a router or gateway between the target system and the TFTP server. If the TFTP sever
is not on the same network as the target router, enter the gateway from the boot menu as described in the
previous section.
4. Enter the reboot command to synchronize the file system and reboot the router. Because the kernel is no
longer stored in flash memory, the router tries to boot from the network. If you have never set permanent
boot parameters, the router attempts to locate a BOOTP or RARP server. If the router successfully
reboots from the server, go to step 7.
5. Select option 4 to boot router software from the TFTP server using temporary network boot parameters.
You are prompted for:
Enter selection: 4
Enter my IP address:
128.1.210.65
Enter server IP address:
128.1.210.70
Enter load address [80100]:
Enter file name: kernel.f2k
Alternatively, select option 5 to set permanent network boot parameters and then boot from the network
using option 3. You would use this option if you wish to boot from the network for a period of time
before copying the software to flash memory.
7. After the boot is complete, verify that the kernel is running successfully.
8. When you are satisfied that the new kernel is performing as expected, copy the kernel into flash
memory in the router by typing the two following commands:
where xxx.xxx.xxx.xxx is the TFTP server IP address, SFILENAME is the server filename of the kernel,
and KERNEL.F2K is the name of the file loaded from flash memory by the boot procedure. If you do not
specify the server address, a permanent or more recent override TFTP server address will be used, if you
have previously defined one. Enter the sync command to commit the changes to flash memory.
Warning: After the kernel is copied, do not power down the router until you have issued either a sync or
reboot command to reboot the router. Otherwise, the file will not be written to flash memory.
9. After successfully copying the kernel to the router, reset configuration switch 2 or 6 to the up position (if
the router has configuration switches). Then reboot the router from flash memory with the reboot
command. If you have altered the boot procedure order in any way, reset to boot from flash memory first.
Verify the software revision number with the vers command.
Warning: Before performing this procedure, make sure that you can successfully access the software from the
TFTP server.
1. Copy router software KERNEL.F2K to a directory where it can be accessed by a TFTP server.
Warning: After the kernel is copied, do not power down the router until you have either issued a sync
command or rebooted the router. Otherwise, the file is not written to flash memory.
4. After successfully copying the kernel to the router, reboot the router from flash memory via the reboot
command. If a problem occurs during the upgrading process, try the command again (do not reboot until you
have successfully copied the kernel). If you have altered the boot procedure order in any way, be sure to reset
the router system to boot from flash memory first. Verify the software revision number by issuing the vers
command.
The router system is now ready to be re-configured if necessary. The configuration files are unchanged by the
upgrade process.
To successfully save configuration files to the server, those files must already exist and be writeable by everyone.
This restriction is part of the TFTP protocol. Moreover, all the files accessed by the TFTP server must be under a
single root directory. Multiple sub-directories can exist below this root directory, but they must be created
manually at the server. Neither the sub-directories nor the files can be created remotely.
Note: Remember to start the TFTP server from the DSL Tools menu.
The copy command lets you upload configuration files to the TFTP server where the destination is in the form:
[email protected]:filename.ext
2. Create files called SYSTEM.CNF, DHCP.DAT, and FILTER.DAT in this subdirectory. The files can be
empty or not, but should be writeable by everyone.
Note: SYSTEM.CNF, FILTER.DAT, and DHCP.DAT are three key files that should be backed up. To see
other files that you may also want to save, type the command dir.
where xxx.xxx.xxx.xxx is the IP address of the TFTP server and myname is the router name.
1. Try to repair the file system by issuing the msfs command. While logged in, issue a sync command followed
by an msfs command. If the display shows that the file system is corrupted, verify that no other console (via
Telnet) is currently modifying the file system with the ps command. Then attempt to repair the file system
typing the following commands:
msfs fix
sync
2. If the file system is still corrupted (i.e., you cannot write a file), you will have to reformat the file system.
First, attempt to save your configuration files as explained in the section Backup and Restore Configuration
Files, on page 179. Then, while logged in, enter the following commands:
format disk
save
copy [email protected]:kernel.f2k kernel.f2k
sync
The above command sequence assumes that the software presently running from RAM is correctly configured
and is still functional. The save command re-creates all the configuration files (except the FILTER.DAT file,
which you may re-create manually by typing save filter). The copy command reinstalls the operational
software on the flash file system, and sync commits all this information to disk.
3. In the event that the software running from RAM is not sufficiently functional to perform those steps, you
will have to boot from the network using a TFTP server, as explained in the section Software Kernel
Upgrades, on page 176.
If you cannot issue the format command (as explained in the previous step), you will have to erase the flash
file system from the boot code.
a. Flip configuration switch 6 to the down position and reboot the router (by powering down and up again,
for example).
b. At the manual boot menu, select 5. “Configure boot system”, and enter the “magical” number 98. Then,
move switch 6 back to its up position.
c. Reboot from the network following the steps described in the Software Upgrade Procedure. You will
notice error messages indicating that the file system is not formatted. Then log in and enter:
format disk
d. Recreate the configuration files either by re-entering the information or by restoring them from a TFTP
server. Re-install the operational software by entering the command:
copy [email protected]:kernel.f2k kernel.f2k
This assumes that TCP/IP routing is enabled and that an IP address has been assigned to the Ethernet
interface.
• If the reset button is depressed during the power on sequence, the router attempts to download a kernel from a
BootP server as described in Recovery Steps Using BootP, on page 181. (The BootP server must be
configured to recognize the router.) The existing configuration file (SYSTEM.CNF) is written to file
SYSTEM.BAK (overwriting the existing SYSTEM.BAK file). The firmware creates a new SYSTEM.CNF
file that can be accessed using the default password admin.
Note: Use this function only if other recovery methods have failed and you need to start over with a new
kernel image.
• If the reset button is depressed after the TEST LED turns green and until after all the LEDs flash, it bypasses
the loading of the FPGA (Field Programmable Gate Array) file that provides the logic that customizes the
router hardware. The actual file name is ASIC.AIC. This function is useful if a mismatch occurs between the
hardware, the kernel, and the FPGA file because it forces a error that allows you to continue and replace the
ASIC.AIC file.
• If the reset button is depressed while running the kernel, the router enters a ten-minute recovery period.
During this period, the router password is the router serial number and DHCP is temporarily changed to the
default subnet 192.168.254.0. (This reset function is described in Recovering Passwords and IP Addresses, on
page 182.)
A router that fails to boot may be an indication that the kernel has been corrupted. To recover, you need a kernel
for your particular router model. If you installed the DSL Tools and successfully connected to the router, an
automatic backup process was started that saved a copy of the kernel and other files to the PC in a subdirectory
under DSL Tools called Sxxxxxx, where xxxxxx is the serial number of the unit. The file needed for this recovery
is called KERNEL.F2K.
Before you proceed with the recovery steps described below, make sure that the router has a good Ethernet
connection to the PC. If a console cable is available, you may want to connect it and start a terminal emulator
session so you can see the router’s console messages. You can also check the LEDs’ blinking patterns (on the
front panel of the router) to help you identify the state of the router.
1. Make sure that the PC path and directory information to a valid kernel are correct.
2. Start the Configuration Manager or Quick Start application (refer to your User Reference Guide).
Note: This IP address needs to belong to the same subnet as your PC and not be used by another device. For a
simple configuration, the IP address 192.168.254.254 will work if your PC already received an IP address
from the router when it was still functioning.
7. Insert a a small pen or pointed object into the small reset switch (unlabeled hole) on the back panel of the
router (to the right of the Ethernet hub connector). With the object still inserted in the reset switch, power up
the router. Wait until all the LED lights flash (about 10 seconds).
8. Once this is accomplished, the BootP server should receive a BootP request and start the TFTPD server. The
TFTPD server will send the kernel to the router.
9. Restart Configuration Manager and try to connect to the router. Using the following instructions, you will
attempt to write a new kernel to the flash system.
10. From the Configuration Manager’s Main Menu, select Tools and Upgrade/Backup.
13. Wait until the file is copied, and click Yes to reboot the rooter.
Recover an IP address: Connect to the console terminal and type the eth list command to find out what the
router’s IP address is.
Push the reset button and hold it for 3 seconds while the router is running. With this step, the following features
are enabled for a period of 10 minutes:
• The system password can be overridden by using the router’s serial number as the password.
• A DHCP client address is enabled or created, so that a connected PC can obtain an IP address from the router.
This feature is used to load batch files of configuration commands into the router. This allows the user to
customize and simplify installation of the router. A script file can contain commands, comments (lines introduced
by the # or ; characters), and blank lines.
• A group of commands that can be executed at any time from the command line by entering the execute
<filename> command.
One-time scripts are useful to execute the complete configuration process from a default (unconfigured) state.
The following steps describe how to proceed in order to create and execute a one-time script from the Quick Start
application.
• Create the script on your PC using Notepad or another text editor. The command syntax can be found in the
Command Line Reference manual or enter ? on the router command line (assuming you have access to the
command line with the console or with Telnet).
• Select the Tools | Execute Script menu item and choose the script file you just prepared. When you click
OK, the script file is loaded to the router (under the name AUTOEXEC.BAT) and the router is restarted, thus
executing the script.
Alternatively, you can manually transfer the script file from your PC to the router using the following method:
• Start the TFTP server on your PC and set the root directory where the script file is located.
• Use the following command to copy the script file to the router file system:
copy tftp@ <PC_IP_address>:<PC_file> <router_file>
• To process the commands in the script file, you can either reboot your router (if the script file was copied
under the name AUTOEXEC.BAT onto the router) or use the command execute <filename>.
Note: If present, the file AUTOEXEC.BAT is renamed AUTOEXEC.OLD before it is executed, so that it is only
run once. If you clear the router configuration with the Reset Defaults button of the Upgrade/Backup tool or the
reboot default command, the AUTOEXEC.OLD is renamed back to AUTOEXEC.BAT and re-run after the boot
up, thus restoring your configuration.
Do not include the commands rename autoexec.old autoexec.bat and reboot in the same one-time script file
(copied to the router under the name AUTOEXEC.BAT). This will result in an endless loop of starting the
router, executing the script, restarting the router, re-executing the script.
The rename autoexec.old autoexec.bat command is useful if you need the script to execute on every
startup.
The reboot command is useful to apply changes and have them take effect (almost) immediately.
Software problems usually occur when the router’s software configuration contains incomplete or incorrect
information. This chapter discusses:
• Diagnostic tools that are available to help identify and solve problems that may occur with your router
• System messages
Diagnostic Tools
Using LEDs
The specific pattern of LEDs on your router model are described in the User Reference Guide that came with the
router. Certain hardware problems can be diagnosed and solved by checking the LEDs.
For the LED patterns that indicate fatal boot errors, see Identifying Fatal Boot Failures, on page 173.
The normal LED startup sequence involves the LEDs labeled PWR (power), TEST (self-test indicator), and LINK
(modem link).
• Check that the power cord is firmly plugged into the back panel of the router and the other end into an active
AC wall or power-strip outlet.
The following table summarizes the normal LED sequence in the left column (five consecutive states) from
Power On to Ready State. The right column suggests problems reflected by an “abnormal” LED state (no
progression to the next state).
PWR - green 5 sec 1. Check that the DIP switches are all up.
State 3
TEST - green 2. Check that the correct software was loaded.
LINK or WAN - off
PWR - green 5 to 10 sec 1. Check your DSL cable.
TEST - green 2. Check the physical connection from your router
State 4 LINK or WAN - to the DSLAM (Central Office).
amber (no signal), 3. Possible problem with DSLAM card.
blinking amber (signal),
blinking green (training)
PWR - green Ready State
State 5
TEST - green
LINK or WAN - green
Once the router is in Ready State, the LEDs may blink as follows:
• The TEST LED blinks every two seconds to show that the router remains ready and active.
• The LINK or WAN LED blinks to indicate that the WAN is transmitting.
• If present, the LANT LED blinks to indicate that the Ethernet LAN is transmitting.
• If present, the LANR LED blinks to indicate that the Ethernet LAN is receiving.
If the normal “heartbeat” of the TEST LED stops, it indicates that the router is locked up and you need to cycle
power to reset it.
To read about SDSL router LEDS, see SDSL Line Activation, on page 342.
History Log
The History Log utility is a troubleshooting tool which displays the router’s activity. It can be accessed from a
terminal emulation session (including Configuration Manager) or from Telnet.
To see message explanations, refer to the System Messages section, page 199.
3. Click Connect.
2. Log in with your administration password into the router (e.g. “admin”).
• If you wish to monitor your router activity at all times, use the command system log start to view a
continuous log, using Telnet. (This command will not work in a Terminal Window session; it only works
from Telnet.)
• The command system log status is used to find out if other users, including yourself, are using this
utility.
• To discontinue the log at the console, use the command system log stop.
When you exit Telnet, you automatically stop any logging programs running in that session.
Note: History Log is preserved across reboots, but not across power outages or power down.
Ping Command
You can verify IP connectivity to the router by running a ping command. You will probably find a ping utility
bundled with your TCP/IP stack. In Microsoft Windows, the command is called PING.EXE and can be found in
your Windows directory. The ping command provided with the Command Line Inerface is discussed on page 217.
Note: Before using the ping command to troubleshoot, make sure that the PWR, TEST, and LINK lights are
green, indicating the ready state.
b. Select Programs.
To isolate a problem with the TCP/IP protocol, perform the following three tests:
1. Try to ping the IP address of your PC. If you get a response, proceed directly with step 2. If you don’t get a
response, check that:
2. Try to ping the IP address of your router. If you get a response, proceed directly to step 3. If you don’t get a
response, the problem lies between your PC and router:
3. Try to ping the DNS server. Write down the results and call your Network Service Provider.
When investigating a hardware installation problem, first check the LEDs on the front panel of the router. Many
common hardware problems can be easily diagnosed by the LED indicators. For more information, refer to this
chapter’s section entitled Diagnostic Tools, Using LEDs, page 184.
• Check the configuration parameters for speed, parity, etc. Make sure the console is not in an XOFF state. Try
entering a “ctrl q”.
• Verify that the RS232 device attached to the console is configured as a DTE. If not, a crossover or null
modem adapter is required.
• Verify that the model number is correct (the number is displayed during the boot procedure). The model
number and serial number are also displayed on the main window of Configuration Manager.
• log in.
• download software.
• L2TP tunnels
• Dial Backup
Connection Problems
If you cannot connect your PC to the target router for configuration:
• For a LAN connection, verify that the router’s IP address matches the IP address previously stored into the
router’s configuration. You must have previously set the router’s Ethernet LAN IP address and subnet mask,
saved the Ethernet configuration changes, and rebooted the router for the new IP address to take effect.
• Check that your LAN cable is pinned correctly and each pin end is securely plugged in.
Note: If you are using a straight-through cable, the colors for pins 1, 2, 3, and 6 should match on both
connectors. If you are using a crossover cable, the colors for pins 1, 2, 3, and 6 on one connector should
match respectively 3, 6, 1, and 2 on the other connector.
• Make sure the PC and target router are on the same IP subnetwork or the target router is reachable through a
router on your LAN. They can, however, be on different networks if IP routing is off.
• Check Network TCP/IP properties under Windows 95 and the control panel of the TCP/IP driver installed
under Windows 3.1.
• Check if the LAN LED on the router’s front panel blinks when “pinged”.
• Check your Ethernet board IRQ settings: the PC’s table may have become “confused”. If so, reboot your PC.
• Type the correct password and press enter. Remember that the password is case-sensitive. If the password is
admin, check that you are entering it in lowercase and that the Caps key is not active.
• If you have forgotten the password, you must reset the login password. Refer to Recovering Passwords and IP
Addresses, on page 182. If the router has configuration switches, perform the following procedure:
4. Complete any configuration update that caused the prompt for login.
Note: If you do not reset switches 5 and 6 to the up position and then reboot, the router is placed in maintenance
mode. Set switches 5 and 6 up and turn the power off and then on again.
• Make sure to reboot if you have made any bridging destination or control changes.
• Check that a bridging default destination has been configured and is enabled.
• Check that bridging is enabled locally (use the remote listBridge command, page 305).
• Verify that bridging is enabled by the remote router (use the remote list command, page 304).
• In Windows 95, do not forget to declare shared disk directories. Check the sharing properties on your C:
drive.
• In the Terminal Window, check that calls are answered from the remote router.
• Check also for any PAP/CHAP errors for the remote router.
TCP/IP Routing
• Check that Ethernet LAN TCP/IP Routing has been enabled (eth list command, page 280).
• The IP addresses of the local and remote networks belong to different IP subnetworks.
• Make sure that there is a route back from the remote network.
• There must be a source WAN IP address defined if you are using NAT.
• Check that, if required, the source and remote WAN IP addresses are on the same subnetwork
• Reboot if you have made any IP address or control or protocol option changes.
• If the remote router WAN IP address and subnet mask are required, check that they have been specified
correctly.
• Be sure to reboot if IP addresses or control or protocol option changes have been made.
• The IP address must be within the valid range for the subnet.
• Verify that the IP and gateway addresses are correct on the PC.
• Windows 95 may remember MAC addresses: if you have changed MAC addresses, reboot the router and
the PC.
• In Windows 3.1., check that the TCP driver is installed correctly. Ping (ping command) your PC’s IP
address from the PC. Successful “pinging” results let you know that the TCP driver is working properly.
• If you have changed an IP address to map to a different MAC device, and ping or IP fails, reboot your
PC.
• Use the iproutes command (page 215) to verify which router’s name is the default gateway (this cannot
be 0.0.0.0).
IPX Routing
• Check that IPX routing has been enabled and that the remote end is enabled for IPX routing.
• Validate that the IPX WAN network number matches the remote router’s WAN network number.
• Check that IPX SAPs correctly identify the servers and applications on the remote network and have
valid network numbers, node numbers, etc.
• Validate that the IPX WAN network number matches the remote router’s WAN network number.
• Check that the IPX routes (network numbers, hops, and ticks) seeded into the routing table for network
segments and servers beyond the remote router are correct.
• Check that IPX SAPs correctly identify the servers and applications on the remote network and have
valid network numbers, node numbers, etc.
• Be sure to reboot if IPX addresses, routes, SAPs or control has been changed.
• Make sure that at least one WAN number is not equal to zero at one end of the link.
• Check the frame types using the eth list command (page 280) and ensure that they are the same on
both routers.
If you are given an incorrect VCI/VPI number or none at all to use for the remote, and you need to determine
what the possible value might be, use the atom findpvc command (see ATM Debug Commands, on page
204).
• Verify that the router is loading from the network and not from FLASH memory.
If you hear clicking during heavy data downloads, check that the DSLAM supports quality of service (QoS) and
that the ATM switch has the voice PVC provisioned for vRT and the data at a lower priority. You may also be
able to reduce or eliminate clicking by adjusting the jitter buffer (see Adjusting the Jitter Buffer, on page 193.)
The Port Monitor GUI program can show you the voice PVC and the last event message. Use the Web GUI to
verify the VPI/VCI or DLCI numbers for the data and voice connections. Also check loop start (standard phone
set) or ground start. These values must match your Network Service Provider’s values.
ifs Shows whether the data and voice PVC’s are configured and percent loading.
dsp tritone < on | off > Turns tritone on or off. When the DSL link is down and a phone goes off-hook,
the DSP provides tritone to indicate 'no service'. Turning off tritone allows testing
of DSP Ploop without a DSL link.
For standalone phone verification. (This is for lab or bench verification only.)
To test a 7461 router, (4-port IAD over ADSL) and disable the failover pots interface type, enter these
commands:
dmt to 3600
dsp failover 1
dsp ploop 2-3
dsp tritone off
dsp ring 2
atom voicepvc <x*y> Changes the voice PVC to the specified x*y.
remote setpvc <x*y> <remote> Changes the PVC for data (usually 0*38).
frame voice <x> Changes the voice DLCI to the specified number x.
frame stats Shows LMI statistics. (For a frame stats example, see page 334.)
voice ip gateway Displays the voice gateway IP address, as set by the gateway.
voice profile See Changing Your ATM Standard Voice Profile, on page 23.
The following commands allow you to trace all signaling cells sent and received and all encoding changes for
voice ports.
The jitter buffer shapes data to overcome the problem of latency, that is, the time delay between packets of voice
data that can cause gaps in or loss of traffic in a voice call. The default is 15 milliseconds. A command is available
that allows you to adjust the size of the jitter buffer. The command is as follows:
# dsp jitter
Jitter Buffer: 15 ms
usage: dsp jitter <milliseconds 0-60>
Note: Before changing the jitter buffer size, hang up any active phones and close all data transfers.
Use this command if you hear clicks or distortion. Increase the buffer size until the problem is corrected.
However, do not set the buffer unnecessarily large because that would introduce unnecessary latency and voice
delay.
The jitter buffer should be set to the best estimate of the effective worst-case jitter in the voice-packet arrival time
from the voice gateway. Be aware of the granularity of the setting: for G.711 voice compression, only integer
multiples of 5.5 ms can be realized; for G.726, only integer multiples of 11 ms can be realized. Thus, the
following table illustrates the difference between the value you specify and the actual holding time for G.711 and
G.726. The numbers in parentheses are the number of voice frames held in the jitter buffer.
Enter these commands at the LNS end (corporate site) for each teleworker:
ping 192.168.110.1
2. If this fails, enter the command traceroute to display the route and then fix the problem. It could be that your
service provider or a firewall blocks the ping (port 15xx and 15xx need to be open). Or your company router
might need a route defined back to the LNS-defined network.
3. Have someone monitor the LNS router to see if your tunnel call is coming in. Look for password errors or
lack of "call from" messages. For example:
4. To bring up a tunnel, use the command l2tp call tunnelname, or ping an address on the tunneled network. For
the example above, you would enter:
ping 192.168.101.1
5. If the tunnel starts, but you see password errors, fix them and then either restart the remote or reboot the
router.
If messages like these are not present, a firewall may be blocking the call.
# iproutes
IP route / Mask --> Gateway Interface Hops Flags
0.0.0.0 /00000000 --> 172.17.1.200 ETHERNET/0 1 NW FW PRM RP1 RP2
172.17.1.0 /ffffff00 --> 0.0.0.0 ETHERNET/0 1 NW FW DIR PRM RP2
172.17.1.5 /ffffffff --> 0.0.0.0 ETHERNET/0 0 ME
172.17.19.2 /ffffffff --> Chuck MLPPORT/50 1 FW PRM DOD PRV
172.17.19.7 /ffffffff --> jeff [down] 1 FW PRM DOD PRV
224.0.0.18 /ffffffff --> 0.0.0.0 [none] 0 ME
224.0.0.122 /ffffffff --> 0.0.0.0 [none] 0 ME
255.255.255.255/ffffffff --> 0.0.0.0 [none] 0 NW PRM
Each L2TP client should have a line in this table. In this example, the L2TP clients are jeff and Chuck. Note
that Chuck's tunnel is up and jeff is down.
4. If the route table appears correct, ping the client L2TP address. For example:
ping 172.17.19.7
5. You can call the client router with the l2tp call command, but you need to set an IP address for the client first
in the LNS using the command l2tp set address <ipAddr> <TunnelName>. For example:
Use the iproutes command to check the new entry in the route table:
6. Use a traceroute command to the client WAN address to check that your company routers can access the
public address of the client router.
# traceroute 192.168.53.225
1: 172.17.1.200
2: 172.17.1.100
3: 12.39.98.101
4: 12.124.40.65
5: 12.123.13.170
6: 12.122.5.150
7: 12.123.13.65
8: 12.123.221.2
9: 207.88.240.113
10: 64.220.0.17
11: 64.0.0.98
12: 198.68.76.55
13: 205.158.11.26
14: reply from 192.168.53.225: bytes=56 (data), time=54 ms
traceroute: packets sent 14, packets received 14
7. If you have another tunnel, ping that address to check that the company LAN is ok.
8. This worked so, something is wrong with Jeff's configuration. Telnet to the box to check his settings. Do a
save and reboot on all routers to be saved.
9. Enter the command l2tp list. The following shows the display for an active tunnel:
Use Hyperterminal directly connected to the modem to check the modem init string before connecting the modem
to the router. The following are some example init strings.
Operational Stability
If pings are failing, lower the success rate. For example, the following command lowers the success rate to 25%:
Note that a Dial Backup session on the modem should time out after the PPP timer expires. When the Dial Backup
retry timer expires the modem is disconnected even if there is traffic on the modem.
Debugging Procedures
When Dial Backup is enabled, the console port cannot be used to view log messages. So, to see messages, Telnet
to the unit and enter the command:
Use the Windows GUI Port Monitor to display the line status. Other useful commands for monitoring Dial
Backup status include:
remote disable <remoteName> Stops modem dialing (specify the Dial Backup remote entry).
System Messages
System messages are displayed on the terminal and sent to a log file (if you have opened one). The messages
listed in this section are time-stamped informational and error messages. The messages are in the following
format:
message message
Time-Stamped Messages
Explanation: The remote router did not negotiate the IP address options as was expected by the local router.
Explanation: IP failed to negotiate. Try to change the remote or the source WAN IP address.
Explanation: Message about the average signal quality for the remote router. This information appears during
modem startup and should be ignored unless requested by Technical Support.
Authorization failed
Explanation: The IP address entry for the remote router in the remote router database does not match what the
local router expects.
Can't obtain an IP address from <router/user>: one is needed in single user mode
Informative message.
Explanation: The remote end requests an IP address from the local end, which cannot supply it.
Informative message.
Explanation: The local router is trying to connect to the specified remote destination.
Data Mode
Explanation: There exist two routes to the same IPX destination. Remove one of the routes.
Explanation: There exist two IPX SAPs for the same IPX destination. Remove one of the SAPs.
Explanation: There exist two IP routes to the same IP destination. One route needs to be removed.
Explanation: On one end of the connection, remote entries have been configured for numbered mode. On the other
end, remote entries have been configured for unnumbered mode. Neither end cab communicate with the other.
Explanation: (SDSL-specific error message) Your SDSL router cannot establish connectivity. Check your
physical line.
Explanation: The router does not have a system name. For PAP/CHAP negotiation, the router will use a default
name and password.
Informational message.
PPP: Peer not negotiating <IP | BNCP | IPX | CCP> right now
Explanation: One end of the network is not negotiating the same protocol as the other end.
Informational message.
Informational message.
Explanation: The remote end negotiated PAP while its minimum security level in the remote database was set to
CHAP.
Explanation: The router attempted CHAP security authentication but the remote end rejected the password.
Informational message.
Informational message.
Explanation: The remote destination refused to participate in the PAP/CHAP authentication process.
Startup failed
Explanation: The ATM modem could not synchronize with the remote end. Call Technical Support.
Explanation: The ATM modem could not synchronize with the remote end. Call Technical Support
TelnetD
Informative message.
The following commands may be available for debugging purposes. Please use them with caution because they
are not fully supported.
Shows which interfaces are configured or active. For an example of its output, see page 214.
mlp debug <LCP | NCP | BNCP | IPCP | IPXCP | CCP | ECP | MLP | AUTH | NCPSTATES> [<0>]
BNCP is for bridging, CCP is for Compression Control Protocol, ECP for encryption, and NCPSTATES for
state table changes.
To turn off the trace, enter the command with the optional 0 at the end.
ipdebug icmp 1
ipdebug nat 1
These commands show data received. The ipdebug icmp 1 command is useful for showing the router can
receive cells ok.
dod whycall 80
Prints out the packet that is causing the link to come up. This is useful when system onewan on is set. (This
command makes PVC’s look like dial-up links, that is, the link comes up only if user traffic exists and the
link times out on inactivity.) For more information, see SYSTEM ONEWANDIALUP, on page 251.
Shows trace of when we bring up the link or time out link on inactivity. Specify 1 to turn on the trace; specify
0 to turn off the trace.
ping [-c count] [-i wait] [-s | -l size] [-I sourceipaddr] <ipaddr> | <domainname>
Sends an echo message to the specified IP address or domain name. You cannot ping your own LAN address;
you can ping your own WAN address.
You can set the length of user data down to 0 bytes (-s 0 or -l 0) so in routing mode it fits in one ATM cell.
(See page 217.)
traceroute [-c count] [-i wait] [-s | -l size] [-I sourceipaddr] [-n] <ipaddr> | <domainname>
Traces the route taken by packets sent from the local router to the specified IP address or domain name. A
packet is sent for each hop in the route. The output lists the IP addresses of the hops that returned packets.
(See page 224.)
Starts event logging when logged in via Telnet. Otherwise, you don’t see any event messages. It is not needed
if you are using a console cable. (See page 249.)
Dumps all tables. If you capture and send this output to Technical Support, it can be useful in debugging
problems. For more information, see SYSTEM SUPPORTTRACE, on page 253.
The information dumped includes the history log and information about the version, memory, processes, the
file system, general system information, Ethernet, DHCP, Voice, remote database, interfaces, bridging, the
ARP table, IP routes, IPX routes, IPX SAPs, L2TP tunnels, and IP filters.
Shows VPI*VCI of cells received. This command is normally used to find the ATM VPI*VCI number
necessary for configuring a remote when the Service Provider either has supplied the wrong value or simply
is not able to supply one.This command should only be used when there are no remotes defined or when the
remote entries are disabled.
The command output is directed to the console. If Telnet is used to log into the router, then issue the system
log start command to direct the console output to the Telnet session.
Example:
# atom findPVC on
No remote entry found with PVC (VPI*VCI) 1*2
In this case, an ATM VPI*VCI is found for which there is no remote defined. 1 is the number of the VPI as
found in the ATM stream. 2 is the number of the VCI as found in the ATM stream. The discovered number
may be used as the VPI*VCI value in the remote, for determining whether communications are possible.
Enables an echo PVC (use atom echo 0*21). This is configured automatically and can be disabled with atom
echo 0*0. The echoPVC will echo back any ATM cell received on the PVC exactly as received. This is useful
when an administrative service wishes to ensure ATM connectivity but cannot use ATM OAM F5 cells to
achieve this function.
Without its parameter, the command indicates whether unknown cell tracing is on or off. Set to on, the trace
looks at the content of an ATM cell. It will not affect normal operation performance.
Changes type of ATM empty cell sent or expected. It is useful if ATM sync delineation errors when
combined with atom stats command.
# sdsl btstat
Available status:
SLM ........................... Input Signal Level
DC_METER ...................... Input DC Offset
FELM .................. Far-End Signal Attenuation (Cal’d at 1168 Kbs)
NMR ........................... Noise Margin
TIMING_RECOVERY_CONTROL ....... Timing Recovery Control
STARTUP_STATUS ................ Bit-Pump Status
BIT_PUMP_PRESENT .............. Bit-Pump Present
SELF_TEST ..................... Self Test
REGISTER ...................... Read Register
CONFIGURATION ................. Big-Pump Configuration
STAGE_NUMBER .................. Stage Number
AAGC_VALUE .................... AAGC
sdsl bts felm Displays Far-End Signal Attenuation. It gives an estimate of the length of the loop.
sdsl bts nmr Displays noise margin. Large values are symptoms of a bad or excessively lengthy loop.
Turns on trace of line changes. To turn off the trace, append all to the command.
Example:
Example:
# sdsl huh
SDSL:
Bitpump: 8973
CPE -- ACTIVATING
Line Rate: [AUTO] 192 Kb/s [3072 KHz]
Activation Interval: 99 [AUTO:20] [symbol_rate: 24]
AutoSpeed:
FastSearchAttemptsPerPass: 2
FastSearchPasses.........: 2
SlowSearchAttemptsPerPass: 5
SaveDelayInSeconds.......: 45
Two Symbol Time: 23 uS
FW: V4.3 CS 5: BR = 80000401 OR = fffff8f66
Ints -- On : 1228462 Mask: 0b00 IRQ: 02
BP Status Reads: 0
BT assumed on other end!
BT - Self Test will run
SDSL CONFIGURATION: 0x03f9 20 LOST: 10 [0x0a] Sym Rate: 24 [0x18]
Sets the link type. It is used to force the CPE into ANSI (T1.413), G_DMT, or G_LITE mode.
DEFAULT and MULTIMODE are the same. The link type survives reboots.
dmt vers Displays the code version of line driver. The following is an output example :
Version:
FW: dmt-nt.bin -- 28 May 100 10:05 [249176] 3.6.70
ATU-R: 255 [0xff] ATU-C: Not Available
The timer is started when the modem tries to activate and is stopped after a successful activation, or when it
expires, whichever comes first. This “stuck” condition increments the retry counter. If this "stuck" condition
occurs the allowed number of retries (consecutive, or not), the modem is reset (and the retry count reset to 0.)
dmt retries <n> Sets number of activation failures before the modem is reset (1 - 10000). The default is 10.
dmt to <sec> Sets timeout timer (30 to 3600 seconds). The default is 45 seconds.
The timeout changes take effect immediately and are not saved to flash memory. Save your changes if you want to
keep them after the next power cycle.
atom promisc on Turns on promiscuous mode (rx ATM cells no matter what VPI*VCI).
atom stats <n> Prints the ATM statistics every n seconds. It shows good and bad cells and frames.
ike commit on
Setting the commit bit makes sure that no IPSec traffic arrives at the router before the router is ready for it.
The following commands allow you to start and stop an IPSec policy.
Before you contact Technical Support, please have the following information ready:
• Router model number
• Date of purchase
• Type of operating system (Windows 95, 98, NT, or Windows for Workgroups)
• List of other equipment such as personal computers, modems, etc. and third-party software you are using,
including revision levels.
To determine how to contact Technical Support, see the User Reference Guide and Customer Release Notes that
came with your router or refer to the web site www.efficient.com.
This chapter lists the formats of the commands you can enter on the router command line.
To see a specific command description, use the command index at the end of the manual (page 411).
• Status commands
• DHCP commands
• L2TP commands
• PPPoE commands
Command Conventions
• The Command Line Interface is not case-sensitive except for passwords and router names.
• All parameters are positional; i.e., each keyword/parameter must be entered in the correct order, as shown in
the command format in this manual.
• Items that appear in bold type must be typed exactly as they appear.However, commands can be shortened to
just those characters necessary to make the command unique.
• Items that appear in italics are placeholders representing specific information that you supply.
? OR HELP
To see the available top-level commands, enter ? or help. To see the subcommands for a top-level command,
enter the top-level command followed by a ?. To see the syntax of a subcommand, enter the subcommand
followed by a ?.
Note: If the first parameter for a command is a character string, the ? will be taken as the character string if
entered in that position.
? or help
Examples:
# ?
Top-level commands:
? help version
filter logout exit
reboot mem ps
copy dir delete
rename execute format
sync msfs ifs
date time ipifs
iproutes arp ipxroutes
pxsaps bi system
eth save erase
key remote call
ping traceroute tcp
dhcp l2tp pppoe
ipsec ike atom
dmt
# time ?
Usage: time HH:MM:SS
Status Commands
The commands in this section are online action and status commands. They allow you to perform the following
functions:
ARP LIST
Lists Address Resolution Protocol (ARP) table entries in an IP routing environment. ARP is a tool used to find
the appropriate MAC addresses of devices based on the destination IP addresses.
ipaddr IP address associated with a MAC address for a device on the local interface in the format of 4
decimals separated by periods.
InterfaceUnit For an Ethernet interface, this can be a 1 or 0. For a DSL interface, this is a VPN number.
Response:
IP Addr Mac Address Interface
192.84.210.148 00:05:02:00:80:A8 ETHERNET/0
BI
Lists the root bridge, and indicates whether the router is learning, listening, or forwarding.
bi
Response:
# bi
GROUP 0Our ID=8000+00206f0249fc Root ID=8000+00206f0249fc
Port ETHERNET/0 00+00 FORWARDING
Each MAC address in the table is listed with its corresponding bridge port as learned by the bridge function. The
line also shows the number of seconds elapsed since the last packet was received by the MAC address followed by
flags. Possible flags include:
bi list
Example:
# bi list
BRIDGE GROUP 0:
00206F024C34: P US SD A
0180C2000000: P A MC
FFFFFFFFFFFF: P FLD A BC MC
02206F02E70D: ETHERNET/0 325 FWD
00C04F2E1AEB: ETHERNET/0 143 FWD
0060081BD761: ETHERNET/0 95 FWD
CALL
Dials a remote router. This command can be used to test the ISDN link or L2TP secession and the configuration
settings for the remote router.
call <remoteName>
Response:
# Request Queued
DATE
Displays or changes the current date on the router’s clock. To change the current time, use the command time
(page 224).
Automatic SNTP requests are generated if the system needs to get the time. You can specify an SNTP server
using the command sntp server (page 223) and a UTC offset with the command sntp offset (page 221).
To see the current date and time on the router clock, enter date with no parameters.
date <mm/dd/yy>
yy Year (1-4 digits, indicating a year from 1968 through 2034). Thus, 1/1/4 is January 1, 2004, 1/1/33 is
January 1, 2033, and 1/1/78 is January 1, 1978.
Example:
# date
BootTime: 5/1/2001 at 15:42:42
Current time: 5/1/2001 at 15:52:49
# date 5/2/1
Time set to UTC-420, 5/2/2001 at 15:52:49
Time adjusted for (-) 0 days 11 hours 49 minutes 34 seconds
ERASE
The erase command erases the entire router’s configuration or parts of it from FLASH memory.
You will need to completely reconfigure any part of the configuration that you erase.
Note: An erase command does not take effect until after a reboot without a save command
Note: There is a time lag between the response issued by the erase command and the time that the data is actually
deleted from FLASH memory. Issue a sync command after an erase command before powering off the router.
This commits the changes to FLASH memory.
erase all | keys | dod | sys | eth | filter | ipsec | ike | atom | sdsl | idsl | frame | dhcp | atm25 | l2tp | sntp
Examples:
erase all Erases the entire router configuration from FLASH memory, including settings for the
system, Ethernet LAN, DSL line, DHCP, and remote router database.
erase dhcp Erases the DHCP configuration settings from FLASH memory. To clear all DHCP
information without erasing FLASH memory, use the command dhcp clear all records
(page 354).
erase dod Erases the current state of the remote router database.
erase eth Erases the configuration settings for the Ethernet LAN from FLASH memory.
erase filter Erases the current bridging filtering database from FLASH memory.When you issue this
command you must reboot (without a save).
erase keys Erases the software option keys from FLASH memory.
erase sys Erases the name, message, and authentication password system settings from FLASH
memory.
exit
IFS
Lists the communication interfaces installed in the router and the status of the interfaces.
ifs
Example:
ifs
Interface Speed In % Out % Protocol State Connection
ETHERNET/0 10.0mb 0%/0% 0%/0% (Ethernet) OPENED
SHDSL/0 384kb 50%/50% 50%/50% (ATM) OFF
ATM-VOICE/1 384kb 45%/45% 0%/0% (ATM) OFF
BACKUP/0 57kb 0%/0% 0%/0% (AHDLC/PPP) OPENED to backup
CONSOLE/0 9600 b 0%/0% 0%/0% (TTY) OFF
VOX-STRM/0 0 b (CLEAR) OFF
In% Out% Downstream and upstream percentages. The first percentage is an instantaneous value taken
every second. The second percentage is the weighted average over 5 seconds using the formula:
Protocol Protocol in use, such as frame relay (FR), asynchronous PPP (AHDLC/PPP), and serial (TTY).
OFF Down
STANDBY Being negotiated.
OPENED Physical interface operational.
CONNECTED Logical interface operational.
IPIFS
Lists the IP interface.
ipifs
Response:
ATM_VC/1 192.168.254.1 (FFFFFF00) dest 192.168.254.2 sub 192.168.254.0
net 192.168.254.0 (FFFFFF00) P-2-P
ETHERNET/0 192.84.210.12 (FFFFFF00) dest 0.0.0.0 sub 192.84.210.0
net 192.84.210.0 (FFFFFF00) BROADCAST mtu 1500
IPROUTES
Lists the current entries in the IP routing table.
iproutes
Response:
# iproutes
IP route / Mask --> Gateway Interface Hops Flags
Where: NW Network
PERM Permanent (static)
DOD Initiate link dial-up
FW Forward
DIR Direct
ME This router
IPXROUTES
Lists the current entries in the IPX routing table.
Response:
# ipxroutes
Network Gateway Interface Hops Ticks Flags
00001001: HQ [down] 1 4 STATIC FORWARD DOD
00000456: (DIRECT) ETHERNET/0 0 1 FORWARD
IPXSAPS
Lists the current services in the IPX SAPs table.
ipxsaps
Response:
# ipxsaps
Service Name Type Node number Network Skt Hops
SERV312_FP 4 000000000001:00001001:045 1
LOGOUT
Logs out to reinstate administrative security after you have completed changing the router’s configuration.
logout
MEM
The mem command report the amount of ram installed in the router.
mem
Response:
# mem
Small buffers used.......18 (7% of 256 used)
Large buffers used.......41 (16% of 256 used)
Buffer descriptors used..59 (7% of 768 used)
Number of waiters s/l....0/0
MLP SUMMARY
Lists the status of the protocols negotiated for an active remote connection. The following are the most common
protocols:
mlp summary
PING
Sends an echo message, available within the TCP/IP protocol suite. The echo message is sent to a remote node
and returned; the echo tests connectivity to the remote node. It is particularly useful for locating connection
problems on a network.
The remote node can be specified by IP address or by domain name. If a domain name is specified, the address of
the domain is requested from the domain name server (DNS).
Note: You cannot ping your own LAN address; you can ping your own WAN address.
To fit the echo message into one ATM cell in routing mode, set the length of user data down to 0 bytes (-s 0 or -l
0).
ping [-c count] [-i <wait>] [- s | -l <size>)] [-I <srceaddr>] <ipaddr> | <domainname>
-i wait Wait period between packets in seconds (from 1 to 10). The default is 1 second.
-s size Packet data length in bytes (from 0 to 1648). The default is 56 bytes.
-I srcaddr Source IP address contained in the echo message (4 decimals separated by periods). Use this
option to force packets into a tunnel or to force use of the management address as the source
address.
ipaddr Remote node to which the echo message is sent. It can be specified by its domain name or by its
domainname IP address (4 decimals separated by periods).
Examples:
# ping www.yahoo.com
The command attempts a DNS (domain name server) lookup to find the address of the domain. If the DNS server
address is not known, it returns the following message:
If the DNS lookup is successful, the ping sends five packets, one second apart, with a packet length of 56 bytes.
The following command requests 2 echo messages sent 7 seconds apart with a packet length of 34 bytes. The
messages are sent to IP address 192.168.254.2.
# ping -c 2 -i 7 -s 34 192.168.254.2
ping: reply from 192.168.254.2: bytes=34 (data), time<5 ms
ping: reply from 192.168.254.2: bytes=34 (data), time<5 ms
ping: packets sent 2, packets received 2
The following command sends packets with the source IP address 192.168.254.254 to the IP address
192.4.210.122. Default values are used for the other options.
The following command uses management address 192.168.1.2 as the source address when pinging destination
address 192.168.100.100.
PS
Lists all of the tasks (processes) running in the system and the status of the tasks.
ps
Response:
# ps
REBOOT
This command causes a reboot of the system.
Caution: A reboot erases any configuration changes that have not been saved. Remember to enter a save
command before the reboot command.
Certain configuration settings require a reboot before the setting becomes effective, including:
• IPX changes
Other configuration changes become effective following either a reboot or a restart of the Ethernet or remote
interface. These changes include:
• System settings
• Ethernet IP address
• TCP/IP routing
reboot [<option>]
option If no option is specified, the router is rebooted using the existing configuration file.
default This option deletes the system configuration file and restores the router to its original defaults
(before any configuration was entered).
factory This option deletes all files except AUTOEXEC.OLD if it exists. AUTOEXEC.OLD is renamed
AUTOEXEC.BAT; it is re-executed by the reboot. This option also resets the non-volatile RAM;
thus deleting the IP address of the router and the TFTP server during the boot process and also
forcing the router to boot from FLASH instead of from the network.
SAVE
The save command saves the entire router’s configuration or parts of it to FLASH memory. The keyword in the
command determines what is saved.
Note: There is a time lag between the response issued by the save command and the time when the data is actually
stored in FLASH memory. Issue a sync command after a save command before powering off the router. This
commits the changes to FLASH memory.
save all | keys | dod | sys | eth | filter | ipsec | ike | atom | sdsl | idsl | frame | dhcp | atm25 | l2tp | sntp
Examples:
save all Saves the configuration settings for the system, Ethernet LAN, DSL line, and remote
router database into FLASH memory.
save dhcp Saves the DHCP configuration settings into FLASH memory.
save dod Saves the current state of the remote router database.
save eth Saves the configuration settings for the Ethernet LAN into FLASH memory.
save filter Saves the bridging filtering database to FLASH memory. A reboot must be executed to
load the database for active use.
save sys Saves the name, message, and authentication password system settings into FLASH
memory.
To see a list of SNTP servers or change the servers in the list, use the command sntp server. To display or change
the preferred SNTP server, use the command sntp prefServer.
sntp active
Example:
# sntp active
Active SNTP server is 1 (192.6.38.127)
SNTP DISABLE
Disables SNTP requests.
To enable SNTP requests, use the command sntp enable (page 221).
sntp disable
Example:
# sntp enable
Current offset from UTC is 0 minutes
Use <system sntp offset> to set time zone
SNTP ENABLE
Enables SNTP requests.
To disable SNTP requests, use the command sntp disable (page 221).
sntp enable
Example:
# sntp enable
Current offset from UTC is 0 minutes
Use <system sntp offset> to set time zone
SNTP OFFSET
Specifies the SNTP offset from the Universal Time Coordinate (UTC).
The offset is specified in minutes. A positive offset is an offset to the east of the Greenwich meridian; a negative
offset is to the west of the Greenwich meridian.
minutes Number of minutes east or west of the Greenwich meridian. A positive number is east; a
negative number is west.
Example:
# sntp offset
Current offset from UTC is 0 minutes
usage: sntp offset <Minutes from UTC>
(offset is negative for west, positive for east of Greenwich meridian)
SNTP PREFSERVER
Displays or changes the preferred SNTP server. (The preferred server is the server that should be attempted first
when a request is made.)
To specify a server preference, specify the number of the preferred server within the SNTP server list. To see the
SNTP server list, enter sntp server.
To see the current preferred SNTP server, enter sntp prefServer with no parameter.
To see the active SNTP server (that is, the server that last responded to an SNTP request), use the command sntp
active.
Note: To make a change permanent, you must save the change before you reboot.
number Number of a server within the SNTP server list. To see the server numbers, enter sntp server.
Example:
# sntp server
Current server (1) IP addr: 192.6.38.127
Current server (2) IP addr: 192.5.41.40
Current server (3) IP addr: 192.6.38.127
Current server (4) IP addr: 209.81.9.7
Current server (5) IP addr: 129.7.1.66
Usage: sntp server <IP address>|default [server number]
# sntp prefserver
The preferred SNTP server is 1 (192.6.38.127)
# sntp prefserver 3
Preferred SNTP server is set to 3 (192.6.38.127)
SNTP REQUEST
Requests the time from an SNTP server. (SNTP is the Simple Network Time Protocol defined by RFC 1769.)
Note: A request is performed only if SNTP is enabled (see sntp enable, page 221).
sntp request
Example:
# sntp request
SNTP is currently disabled
# sntp enable
# sntp request
Time server IP address not set, use "sntp server w.x.y.z"
# sntp server
Current server (1) IP addr = 0.0.0.0
usage: sntp server <IP address>|default [server number]
SNTP SERVER
Displays or changes the SNTP server list.
• To see the current SNTP server list, specify sntp server with no parameter.
• To change the address of a server, specify sntp server with the server IP address and the existing entry
number.
• To remove a server from the list, specify sntp server 0.0.0.0 and the number of the server to be removed.
Note: To make a change permanent, you must save the change before you reboot.
IPaddress IP address of an SNTP server (4 decimals separated by periods). (To remove a server, specify
0.0.0.0 as the IP address.)
default Requests the default server list (see the example below).
number Number of the server in the list. If that server number is already in the list, the IP address is
changed; otherwise, a new entry is added to the list. If you omit a number, the IP address of the
active server is changed.
Example:
TCP STATS
Displays the TCP statistics and open connections.
tcp stats
TIME
Displays or changes the current time on the router’s clock. To change the current date, use the command date
(page 212).
Automatic SNTP requests are generated if the system needs to get the time. You can specify an SNTP server
using the command sntp server (page 223) and a UTC offset with the command sntp offset (page 221).
To see the current date and time on the router clock, enter time with no parameters.
time <hh:mm:ss>
hh Hour (0 - 23).
mm Minute (0 - 59).
ss Second (0 - 59).
Example:
# time
BootTime: 5/18/2001 at 11:57:12
Current time: 5/18/2001 at 12:00:01
# time 1:01:01
Time set to UTC-420, 5/18/2001 at 1:01:01.074
Time adjusted for (-) 0 days 11 hours 49 minutes 34 seconds
TRACEROUTE
Traces the route taken by packets sent from the local router to the specified IP address or domain name. A packet
is sent for each hop in the route. The output lists the IP addresses of the hops that returned packets.
Unless the -n option is specified, traceroute also attempts to look up the name of each gateway in the route. If the
DNS lookup is successful, the name is included in the output message.
traceroute [-c count] [-i <wait>] [- s | -l <size>)] [-I <srceaddr>] [-n] <ipaddr> | <domainname>
-i wait Wait period between packets in seconds (from 1 to 2000000000). The default is 1 second.
-s size Packet data length in bytes (from 0 to 1648). The default is 56 bytes.
-I srcaddr Source IP address contained in the echo message (4 decimals separated by periods). Use this
option to force packets into a tunnel or to force use of the management address as the source
address.
-n Eliminates the DNS lookup for each hop. Only the IP address of the hop is listed in the output
message.
ipaddr The end of the route, specified by a domain name or IP address (4 decimals separated by
domainname periods).
Examples:
The following two commands trace the same route. The first specifies the domain name; the second specifies the
IP address.
# traceroute www.yahoo.com
# traceroute 204.71.200.68
Both commands send up to thirty packets with a wait period of one second and a packet length of 56 bytes. The
following is an example of the command output:
1: 172.17.20.122 l2tp-router.flowpoint.com
2: 172.17.20.1 checkpoint.flowpoint.com
3: 12.39.98.136 csco2.efficient.com
4: 12.124.40.65
5: 12.123.13.166 gbr5-p56.sffca.ip.att.net
6: 12.122.5.142 gbr3-p100.sffca.ip.att.net
7: 12.122.5.253 gbr2-p60.sffca.ip.att.net
8: 12.123.13.61 gar1-p370.sffca.ip.att.net
10: 206.132.150.250
11: 206.132.254.37 ge0-0-1000M.hr8.SNV.gblx.net
12: 206.178.103.62 baslr-ge3-0-hr8.snv.yahoo.com
13: reply from 204.71.200.68: bytes=56 (data), time=18 ms
traceroute: packets set 13, packets received 12
For a faster route trace, specify the -n option to eliminate the domain name lookup.
# traceroute -n 204.71.200.68
1: 172.17.20.122
2: 172.17.20.1
3: 12.39.98.136
4: 12.124.40.65
5: 12.123.13.166
6: 12.122.5.142
7: 12.122.5.253
8: 12.123.13.61
10: 206.132.150.250
11: 206.132.254.37
12: 206.178.103.62
13: reply from 204.71.200.68: bytes=56 (data), time=79 ms
VERS
Displays the software version level, source, software options, and amount of elapsed time that the router has been
running.
All software options are listed. If the option has a + prefix, the option was enabled using a key. If the option has a
~ prefix, the option is disabled in this router. For more information, see Software Option Keys, on page 124.
vers
Example:
# vers
Efficient 5851 SDSL [ATM] Router
FlowPoint-2000 BOOT/POST V5.3.0 (19-Mar-99 15:25)
Software version v4.0.0 built Mon Apr 17 09:30:26 PDT 2000
Maximum users: unlimited
Options: SDSL, RFC1483, IP ROUTING, IP FILTERING, WEB, +IPSEC, +3DES, L2TP,
ENCRYPT, BRIDGE, IPX
Up for 79 days 19 hours 57 minutes (started 9/8/2000 at 17:11)
The file system commands allow you to perform maintenance and recovery on the router. These commands allow
you to:
The router file system is DOS-compatible, and the file system commands are similar to the DOS commands of the
same name.
COPY
Copies a file from the source to the destination. This command allows you to update the router software level or to
write configuration files to a TFTP server
Issue a sync command after a copy command to commit the changes to FLASH memory.
srcfile Filename of the source file to be copied.It can be either the name of a local file or a file accessed
remotely via a TFTP server.
A local filename is in the format: name.ext.
To force use of a specific source address when copying a file from a TFTP server, use this format:
tftp@serveraddr-sourceaddr:filename.ext
DELETE
Removes a file from the file system.
delete <filename>
filename Name of the file to be deleted. The filename is in the format xxxxxxxx.xxx.
Response:
kernel.f2k deleted.
DIR
Displays the directory of the file system. The size of each file is listed in bytes.
dir
Example: dir
EXECUTE
This command loads batch files of configuration commands into the router. This allows for customization and
simpler installation of the router. A script file can contain commands, comments (lines introduced by the # or ;
characters), and blank lines.
• A group of commands that can be executed at any time from the Command Line Interface with the execute
<filename> command.
One-time scripts are useful to execute the complete configuration process from a default (unconfigured) state.
execute <filename>
FORMAT DISK
Erases and reformats the router file system. This command should only be used when the file system is unusable.
If the router does not execute the POST test and software boot successfully, and the result of the dir command
indicates the file system is corrupted, you may wish to reformat the disk, reboot the router, and recopy the router
software.
format disk
Response:
NEWFS: erasing disk...
NEWFS: fs is 381k and will have 762 sectors
NEWFS: 128 directory slots in 8 sectors
NEWFS: 747 fat entries in 3 sectors
NEWFS: writing boot block...done.
NEWFS: writing fat tables...done.
NEWFS: writing directory...done.
Filesystem formatted!
MSFS
Checks the structure of the file system. This command performs a function similar to the DOS chkdsk command.
The router analyzes the File Allocation Table (FAT) and produces a file system status report.
Warning: When you specify fix, make sure that no other operation is being performed on the configuration files
at the same time by Configuration Manager or by another user.
msfs [fix]
fix If fix is specified, errors are corrected in the FAT. This option should only be used when an
msfs command results in a recommendation to apply the fix option.
Response:
Filesystem 0, size=825k:
Checking filesystem...
Checking file entries...
SYSTEM CNF ... 2304 bytes .. ok.
ATM25 DAT ... 20 bytes .. ok.
DHCP DAT ... 1536 bytes .. ok.
KERNEL F2K ... 257014 bytes .. ok.
IDL_7 AIC ... 14828 bytes .. ok.
ASIC AIC ... 14828 bytes .. ok.
FILTER DAT ... 1284 bytes .. ok.
1097 fat(s) used, 0 fat(s) unused, 0 fat(s) unref, 534 fat(s) free
561664 bytes used by files, 9728 bytes by tables, 273408 bytes free
RENAME
Renames a file in the file system.
oldName Existing name of the file. The filename is in the format xxxxxxxx.xxx.
newName New name of the file. The filename is in the format xxxxxxxx.xxx.
Response:
‘ether.dat’ renamed to ‘oldeth.dat’
SYNC
Commits the changes made to the file system to FLASH memory.
sync
Example: sync
Response:
Syncing file systems...done.
Warning: Syncing is not complete until you see the message “done”.
All commands in this section begin with the word system. The commands set basic router configuration
information, such as the following:
• authentication password
• management security
• IP address translation
• NAT configuration
• host mapping
• WAN-to-WAN forwarding
• filters
• SNTP parameters
SYSTEM ?
Lists the supported keywords. To see the syntax for a command, enter the command followed by a ?.
system ?
Example:
# sys ?
System commands:
? msg name
passwd authen community
list admin history
log addHostMapping delHostMapping
addServer delServer bootpServer
supportTrace telnetport snmpport
httpport syslogport addTelnetFilter
delTelnetFilter addSNMPFilter delSNMPFilter
addHTTPFilter delHTTPFilter addSyslogFilter
delSyslogFilter wan2wanforwarding OneWANdialup
blockNetBIOSDefault addUDPrelay delUDPrelay
securityTimer addIPRoutingTable delIPRoutingTable
moveIPRoutingTable
While the BootP server list has at least one address, the router disables its own DHCP server and, instead,
forwards all DHCP/BootP requests to all servers in the list. It forwards every reply received from any of the
servers in the list to the appropriate LAN. To read about BootP service, see page 167.
Addresses can also be added to the list using the dhcp addrelay command (page 352). To remove an address
from the list, use the dhcp delrelay command (page 355).
To see the current BootP server address, enter the command dhcp addrelay or system addBootPServer with no
parameters. To remove a BootPserver address, use the command dhcp delrelay or system delBootPServer (page
242).
Example:
SYSTEM ADDHOSTMAPPING
This command is used to remap a range of local-LAN IP addresses to a range of public IP addresses on a system-
wide basis. These local addresses are mapped one-to-one to the public addresses.
Note: The range of public IP addresses is defined by <first public addr> only. The rest of the range is computed
automatically (from <first public addr> to <first public addr> + number of addresses remapped - 1) inclusive.
system addHostMapping <first private addr> <second private addr> <first public addr>
first private addr First IP address in the range of IP addresses to be remapped, in the format of 4 decimals
separated by periods.
second private addr Last address in the range of IP addresses to be remapped, in the format of 4 decimals
separated by periods.
first public addr Defines the range of public IP addresses, in the format of 4 decimals separated by periods.
Note 1: This command does not require a reboot and is effective immediately.
Note 2: To list the range of allowed clients, use the command system list when you are logged in with read and
write permission (be sure to log in with password). To delete addresses from the HTTP filter, use the command
system delHTTPfilter (page 243).
last ip addr Last IP address of the range. May be omitted if the range contains only one IP address.
SYSTEM ADDIPROUTINGTABLE
Defines a new virtual routing table. Once defined, you can add routes to the table using the commands eth ip
bindRoute (page 266) and remote bindIPVirtualRoute (page 293).
The command specifies the name of the new routing table and the range of IP addresses that reference the table
for their routing. When the router receives a packet, the source address of the packet determines which routing
table is used. For example, if the range of addresses for the virtual routing table ROSA includes address
192.168.25.25, then every packet with the source address 192.168.25.25 is routed using virtual routing table
ROSA.
If the source address of a packet is not within the address ranges for any virtual routing table, the default routing
table is referenced to route the packet.
If an IP routing table has been defined, you can see its range of addresses using the command system list.
last ip addr Last IP address of the range (4 decimals separated by periods). This parameter may be omitted if
the range contains only one IP address. The specified address range may not overlap the address
range defined for any other virtual routing table.
tablename Name of the virtual routing table to which the addresses are assigned (character string).
The following command defines a virtual routing table named ROSA (if it does not already exist) and assigns
it the IP address range 192.168.1.5 through 192.168.1.12.
After routing table ROSA has been defined, the following line appears in the output for the command system
list:
SYSTEM ADDSERVER
This Network Address Translation (NAT) command is used to configure a local IP address as the selected server
on the LAN (FTP, SMTP, etc.) for the global configuration. To learn more, see Network Address Translation
(NAT), on page 95.
Multiple system addserver, remote addserver (page 293), and eth ip addserver (page 265) commands can
designate different servers for different protocols, ports, and interfaces. When a request is received, the router
searches the server list for the appropriate server. The order of search for a server is discussed in Server Request
Hierarchy, on page 98.
To delete a server designation, use the command system delserver (page 244).
system addServer <action> <protocol> <first port> [<last port> [<first private port>]]
first port First or only port as seen by the remote end. Port used by the selected server
portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port.
dns DNS port (Domain Name Server).
ftp FTP port (File Transfer Protocol).
h323 H.323 port.
http HTTP port (Hypertext Transfer Protocol used on the Internet).
login rlogin port (port 513).
rsh Remote Shell port.
smtp SMTP port (Simple Mail Transfer Protocol).
snmp SNMP port (Simple Network Management Protocol).
t120 T.120 port.
telnet Telnet port.
tftp TFTP port (Trivial File Transfer Protocol).
all All ports.
last port Optional last port in the range of ports as seen by the remote end for the server on the LAN.
Example:
SYSTEM ADDSNMPFILTER
This command is used to validate SNMP clients by defining a range of IP addresses that are allowed to access the
router via SNMP. This validation feature is off by default.
Note 1: This command does not require a reboot and is effective immediately.
Note 2: To list the range of allowed clients, use the command system list when you are logged in with read and
write permission (be sure to log in with password). To delete addresses from the SNMP filter, use the command
system delSNMPfilter (page 244).
last ip addr Last IP address of the client range. May be omitted if the range contains only one IP address.
SYSTEM ADDSYSLOGFILTER
Limits the Syslog server addresses that may be returned by DHCP. By default, this validation feature is off.
The Syslog filter can comprise one or more ranges of IP addresses that DHCP may return for Syslog servers. To
delete addresses from the Syslog filter, use the command system delsyslogfilter (page 245).
This command does not affect the Syslog server addresses that you specify explicitly. For more information on the
router as Syslog client, see page 168.
Note: This command does not require a reboot and is effective immediately.
Note 2: To list the range of allowed clients, use the command system list when you are logged in with read and
write permission (be sure to log in with password).
last ip addr Last IP address of the valid server range. May be omitted if the range contains only one IP
address.
Example:
SYSTEM ADDSYSLOGSERVER
Adds an address to the list of Syslog servers. The router sends system event messages to all Syslog servers in the
list, unless the Syslog port has been disabled. For more information about the router as Syslog client, see page
168.
To see the server addresses, use the command system list. To remove a Syslog server address from the list, use
the command system delSyslogServer (page 245).
Note: The new server address becomes effective after you save and reboot.
ipaddr IP address to be added to the Syslog server address list (4 decimals separated by periods).
Example:
SYSTEM ADDTELNETFILTER
This command is used to validate Telnet clients by defining a range of IP addresses that are allowed to access the
router via Telnet. This validation feature is off by default. For more information, see Controlling Remote
Management, on page 107.
Note 1: This command does not require a reboot and is effective immediately.
Note 2: To list the range of allowed clients, use the command system list when you are logged in with read and
write permission (log in with password). To delete addresses from the Telnet filter, use the command system
delTelnetfilter (page 245).
last ip addr Last IP address of the client range. May be omitted if the range contains only one IP address.
Example:
ipaddr IP address of the server to which the UDP packet will be forwarded.
all Incorporates all the available UDP ports in the new range.
SYSTEM ADMIN
Sets the administration password that is used to control write access to the target router configuration.
SYSTEM AUTHEN
Forces the target router authentication protocol that is used for security negotiation with the remote routers when
the local side authentication is set. You should not need to issue this command as the best security possible is
provided with the none default.
To see the current authentication override (none, pap, or chap), enter the command system authen with no
parameters. To read about PAP/CHAP authentication, see page 25.
none The authentication protocol is negotiated, with the minimum best security level as defined for each remote
router in the database.
pap Negotiation begins with PAP (instead of CHAP) for those entries that have PAP in the remote database
and only when the call is initiated locally.
chap Overrides all the remote database entries with CHAP, that is, only CHAP is performed.
Example:
DNS Domain Name Server address. The router determines the actual DNS address.
group Optional number of a group to which the address is assigned (integer, 0 through 65535). The default is
group 0.
Examples:
The following command adds the address 192.168.1.5 to group 0 of the addresses to be pinged.
The following command adds the gateway address to group 1 of the addresses to be pinged.
• Request that the router delete the gateway or DNS address from the list.
To see the addresses in the current list, use the command system list. For more information about Dial Backup,
see page 109.
ipaddr IP address to be deleted from the list (four decimals separated by periods).
GW Gateway address. The router determines the actual gateway address and deletes it.
DNS Domain Name Server address. The router determines the actual DNS address and deletes it.
group Optional number of a group from which the specified address or all addresses are deleted (integer, 0
through 65535). The default is group 0.
Examples:
Note: Because Dial Backup uses the console port, you cannot access the command line via the console port while
Dial Backup is enabled. You must use the Web GUI interface or a Telnet session to disable Dial Backup.
Note: If you do not use the save command to save this change, Dial Backup is only temporarily disabled and it is
re-enabled at the next reboot. Temporarily disabling Dial Backup stops Dial Backup, but it does not change the
use of the console port.
To disable Dial Backup across reboots and change the use of the console port, enter the following commands:
To re-enable the Dial Backup option, use the system backup enable command.
• If Dial Backup has been temporarily disabled, this command restarts its use.
• If Dial Backup has been disabled across one or more reboots, it can be re-enabled by the command sequence:
Note: Dial Backup cannot be enabled unless the remote containing its dialup parameters is also enabled. (Check
this using the command remote list).
To see the current setting of the Dial Backup switch, use the system list command. To disable Dial Backup, use
the system backup disable command.
Note: If you change the ping interval to 0, you disable the group of addresses.
To see the current ping intervals, use the system list command. For more information about the ping interval and
Dial Backup, see Ping Interval, Number of Samples, and Success Rate, on page 114.
seconds Number of seconds in the ping interval for the group (integer). The default is 5 seconds.
group Optional number of a group (integer, 0 thru 65535). The default is group 0.
Examples:
The following command changes the ping interval to 10 seconds for group 0.
Note: If you change the ping samples value to 0, you disable pinging for that group of addresses.
To see the current ping sample values, use the system list command. For more information about ping samples
and Dial Backup, see Ping Interval, Number of Samples, and Success Rate, on page 114.
group Optional number of a group (integer, 0 through 65535). The default is group 0.
Examples:
The following command changes the number of ping samples to 10 for addresses in group 0.
The default retry period is thirty minutes. The minimum retry period is two minutes. To see the current retry
value, use the system list command
Note: When the Dial Backup retry timer expires, the modem is disconnected even if there is traffic on the
modem.
minutes Number of minutes in the retry period (integer). The default is 30; the minimum is 2.
Example:
The following command changes the retry period to 2 minutes because the minimum is 2 minutes.
The default stability period is three minutes. The minimum stability period is one minute.
To see the current stability value, use the system list command.
minutes Number of minutes in the stability period (integer). The default is 3; the minimum is 1.
Example:
Note: If you change the success rate to 0, you disable pinging for that group of addresses.
Note: A minimum success rate of 100% is not recommended; this would require a reply from every ping sent.
To see the current success rate values, use the system list command. For more information about success rates and
Dial Backup, see Ping Interval, Number of Samples, and Success Rate, on page 114.
percentage Minimum success rate required during a ping test of the addresses in the group (integer, 0 thru 99).
The default is 50.
group Optional number of a group (integer, 0 thru 65535). The default is group 0.
Examples:
The following command changes the success rate to 75% for addresses in group 0.
SYSTEM BLOCKNETBIOSDEFAULT
The router can block all NetBIOS and NetBUI requests from being sent over the WAN. This command sets the
default value used when a remote router entry is defined.
The command remote blockNetBIOS (page 294) can change the NetBIOS setting for a specific remote router. To
see the current NetBIOS default, use the command system list.
yes Sets the default to block all NetBIOS and NetBUI requests.
Example:
Note: The command system community (with no value) will display the current community name.
SYSTEM DEFAULTMODEM
Lists the default modem settings. The modem settings are for the backup V.90 modem connected to the console
port.
To change the modem settings, use the system modem command (page 249). For more information on the Dial
Backup option, see page 164.
system defaultmodem
SYSTEM DELBOOTPSERVER
Removes an address from the BootP server list. (The BootP server list is also the DHCP relay list.)
To remove all addresses from the list, use system delbootpserver all.
Addresses can also be removed from the list using the dhcp delrelay command (page 355). To add an address to
the list, use the dhcp addrelay command (page 352).
Examples:
SYSTEM DELHOSTMAPPING
Undoes an IP address/host translation (remapping) range that was previously established with the command
remote addHostMapping on a per-systemwide basis.
first private addr First IP address in the range of IP address, in the format of 4 decimals separated by periods.
second private addr Last address in the range of IP address, in the format of 4 decimals separated by periods.
first public addr Defines the range of public IP addresses, in the format of 4 decimals separated by periods.
SYSTEM DELHTTPFILTER
Deletes an address filter created by the system addHTTPFilter command. To see the address range of the filter,
use the command system list.
last ip addr Last IP address of the range. May be omitted if the range contains only one IP address.
Example:
SYSTEM DELIPROUTINGTABLE
Deletes a range of addresses that reference a virtual routing table or deletes the entire virtual routing table.
To list the virtual routing tables, use the iproutes command (page 215).
ALL Deletes the virtual routing table. Both the table definition and all routes in the table are deleted.
first ip addr First IP address of the range to be deleted (4 decimals separated by periods).
last ip addr Last IP address of the range to be deleted (4 decimals separated by periods). This parameter
may be omitted if the range contains only one IP address.
Examples:
Deletes two IP addresses from the address range that references routing table ROSA:
system delIPRoutingTable 192.168.1.5 192.168.1.6 ROSA
SYSTEM DELSERVER
Deletes an entry created by the system addServer command (page 233).
system delServer <action> <protocol> <first port> [<last port> [<first private port>]]
first port First or only port as seen by the remote end. Port used by the selected server
portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port.
dns DNS port (Domain Name Server).
ftp FTP port (File Transfer Protocol).
h323 H.323 port.
http HTTP port (Hypertext Transfer Protocol used on the Internet).
login rlogin port (port 513).
rsh Remote Shell port.
smtp SMTP port (Simple Mail Transfer Protocol).
snmp SNMP port (Simple Network Management Protocol).
t120 T.120 port.
telnet Telnet port.
tftp TFTP port (Trivial File Transfer Protocol).
all All ports.
last port Optional last port in the range of ports as seen by the remote end for the server on the LAN.
first private port If specified, this is a port remapping of the incoming request from the remote end.
Example:
SYSTEM DELSNMPFILTER
Deletes the client range previously defined by the command system addsnmpfilter.
Note 1: This command does not require a reboot and is effective immediately.
Note 2: To list the range of allowed clients, use the command system list when you are logged in with read and
write permission (be sure to log in with password).
last ip addr Last IP address of the client range; may be omitted if the range contains only one IP address.
SYSTEM DELSYSLOGFILTER
Deletes the Syslog address filter.To see the address range of the filter, use the command system list. To define a
new Syslog address filter, use the command system addSyslogFilter (page 234).
Note: This command does not require a reboot; it takes effect immediately.
last ip addr Last IP address of the range. May be omitted if the range contains only one IP address.
Example:
SYSTEM DELSYSLOGSERVER
Removes an address from the list of Syslog servers. To see the server addresses, use the command system list. To
specify a new Syslog server address, use the command system addSyslogServer (page 235).
Note: This command does not require a reboot; it takes effect immediately.
Example:
SYSTEM DELTELNETFILTER
Deletes the client range previously defined by the command system addTelnetFilter.
Note 1: This command does not require a reboot and is effective immediately.
Note 2: To list the range of allowed clients, use the command system list when logged in with read and write
permission (be sure to log in with password).
last ip addr Last IP address in the client range; may be omitted if the range contains only one IP address.
SYSTEM DELUDPRELAY
Deletes the port range that was previously enabled by the command system addUDPrelay.
SYSTEM HISTORY
Displays the router’s most recent console log.
system history
Example:
# system history
Begin System History.
loading ....................................................................don
e.
Verifying CRC (77D79D92)..........................................done.
SYSTEM HTTPPORT
This command manages HTTP port access. It can:
• Disable HTTP for this router (sets the HTTP port to 0).
• Request the default HTTP port (80). This re-enables HTTP after it is disabled.
To see the current setting, use the command system list. For more information, see Controlling Remote
Management, on page 107.
default Restores the port value to the default value 80 and re-enables the port.
port Defines a new HTTP port number. Use this option to restrict remote access.
Examples:
SYSTEM LIST
Lists the system settings for the target router.
system list
Example:
# system list
GENERAL INFORMATION FOR <SOHO>
System started on................... 9/8/2000 at 13:29
Authentication override............. none
WAN to WAN Forwarding............... no
Block NetBIOS Default............... no
BOOTP/DHCP Server address........... none
Telnet Port......................... default (23)
Telnet Clients...................... all
SNMP Port........................... default (161)
SNMP Clients........................ all
HTTP Port........................... default (80)
HTTP Clients........................ all
Syslog Port......................... default (514)
248 Chapter 8. Command Reference
Allowed Syslog Servers.............. all
Default Syslog Servers.............. none
System message:
Security timer...................... 30 minutes
One WAN Dial Up..................... no
Backup.............................. no (no valid remote profile is enabled)
Retry Interval In Minutes......... 30
Stability Interval In Minutes..... 3
SYSTEM LOG
Allows logging of the router’s activity in a Telnet session.
status Used to find out if other users (yourself included) are using this utility.
SYSTEM MODEM
Changes the selected modem setting. The modem settings are for the backup asynchronous modem connected to
the console port.
For more information on the Dial Backup option, see page 164.
system modem reset | escape | init | offhook | dial | answer | hangup <string>
dial The two possible strings for the dial setting are ATDT for tone dialing or ATDP for pulse dialing.
The default is tone dialing.
<string> New setting for the option selected by the first parameter
Examples:
The following command changes the string for the init setting:
To list the routes in the virtual routing tables, use the iproutes command (page 215) or the remote listiproutes
command (page 305).
first ip addr First IP address of the range to be moved (4 decimals separated by periods).
last ip addr Last IP address of the range to be moved (4 decimals separated by periods). This parameter
may be omitted if the range contains only one IP address.
tablename Name of the virtual routing table to be assigned the address range (character string). The virtual
routing table may be new or it may already exist.
Example:
Suppose you want all packets with source addresses in the range 192.168.254.11 through 192.168.254.20 to
be routed using virtual routing table MIGUEL. Addresses in that range may already be assigned to other
virtual routing tables. Therefore, to delete the addresses from any other virtual routing tables and assign the
address range to MIGUEL, you enter this command:
SYSTEM MSG
Sets or changes the message saved in the local router you are configuring. To see the current message, enter
system msg with no parameters or use the command system list.
message Message (up to 255 characters). Space characters are not allowed; use underscore characters
instead. If you do not enter a message, the current message is displayed.
Example:
SYSTEM NAME
Sets or changes the name of the local router being configured. To see the current router name, enter system name
with no parameters.
SYSTEM ONEWANDIALUP
This command can force the router to have no more than one remote connection active at a time. (Multiple links to
the same remote are allowed.) To see the current setting, use the command system list and check the One WAN
Dial Up line.
This command is useful when security concerns dictate that the router have only one connection active at a time.
For example, if set to on, the router cannot connect to both the Internet and another location (such as your
company) at the same time.
A connection is only generated when data is forwarded to the remote router (dial-on-demand); Permanent links
cannot be automatically generated.
The command allows multiple connections to the SAME location and supports the PPP Multi-Link protocol. To
do so, at system startup time, the router examines each remote entry. If if finds only one remote enabled, it leaves
the remote enabled. If it finds more than one remote enabled, it disables every entry that does not have a protocol
of PPP or PPPLLC. It sets the minimum number of active links (remote minLink) to 0 (zero) on the enabled
entries; if the command did not perform this function, connections to multiple destinations would not be possible
(since the link to the destination with minLink=non-zero would be active).
This system oneWANdialup command complements the system wan2wanforwarding command (page 261).
That command allows multiple connections to different locations to be active at the same time but stops traffic
from passing from one WAN connection to another.
Example:
system oneWANdialup on
SYSTEM SECURITYTIMER
This command allows the user to change the 10-minute default security timer to another value. The router
automatically logs out a Telnet or console user out of privileged mode when no typing has occurred for the length
of time set for the security timer.
To see the current security timer value, use the command system list.
minutes Timer length in minutes. To disable the automatic logout, set the value to 0.
SYSTEM SNMPPORT
This command manages SNMP port access. It can:
• Disable SNMP for this router (sets the SNMP port to 0).
• Request the default SNMP port (161). This re-enables SNMP after it is disabled.
To see the current setting, use the command system list. For more information, see Controlling Remote
Management, on page 107.
default Restores the port value to the default value 161 and re-enables the port.
Examples:
SYSTEM SUPPORTTRACE
Lets you capture to a file all the configuration data that Technical Support may need to investigate configuration
problems. This exhaustive list command incorporates the following commands:
• system history
• vers
• mem
• system list
• eth list
• remote list
• ifs
• ipifs
• iproutes
• ipxroutes
system supporttrace
Example:
# system supporttrace
MODEM STRINGS:
Reset: ATZ
Escape: +++
Init: ATS0=0Q0V1&C1&D0X4S12=20
Off-Hook: ATH1
Dial: ATDT
Answer: ATA
Hangup: ATH0
SYSTEM SYSLOGPORT
This command manages Syslog port access. It can:
• Disable Syslog for this router (sets the Syslog port to 0).
• Request the default Syslog port (514). This re-enables Syslog after it is disabled.
To see the current setting, use the command system list. For more information on configuring the router as a
Syslog client, see page 168. For more information on restricting port access, see Controlling Remote
Management, on page 107.
default Restores the port value to the default value 514 and re-enables the port.
port Defines a new Syslog port number. Use this option to restrict remote access.
Examples:
SYSTEM TELNETPORT
The router has a built-in Telnet server. This command can:
• Request the default TCP port (23). This re-enables the Telnet server after it is disabled.
disabled Disables the Telnet server. The router will not accept any incoming TCP request.
port Port number of the Ethernet LAN. It is recommended that this number be > 2048 if not 0
(disabled) or 23 (default).
To see the current setting for WAN to WAN forwarding, use the command system list.
This system wan2wanforwarding command complements the system oneWANdialup command (page 251).
That command allows you to limit WAN connections to just one remote location at a time.
on Allows data to be forwarded from one WAN link to another WAN link.
off Stops data from being forwarded from one WAN link to another WAN link.
The commands in this section begin with the word eth. The commands configure the Ethernet interfaces in your
router. You can:
• Manage the contents of the default routing table and any virtual routing tables
Note: In general, these commands require a save and reboot before they take effect. However, changes made to
IP filters and to virtual routing tables take effect immediately; the changes are lost, though, if they are not saved
before the next reboot.
ETH ?
Lists the supported keywords.
eth ?
Example:
# eth ?
Ethernet commands:
? add delete
br ip ipx
list mtu
# eth ip ?
eth ip sub-commands
? addr ripmulticast
options enable disable
firewall directedBcast addroute
delroute defgateway bindRoute
unbindRoute filter
ETH ADD
Adds a logical interface onto an Ethernet port so that the router can provide service to multiple IP subnets. The eth
add command defines the port number and logical interface number. You should then use an eth ip addr
command to define the IP subnet that uses the logical interface. For more information, see IP Subnets, on page 79.
A logical interface 0 always exists for Ethernet port 0 (and for port 1 in a dual-port router); logical interface 0
cannot be deleted.
Note: This command requires a save and reboot before it takes effect.
logical# New logical interface number. It cannot be 0 because logical interface 0 always exists.
ETH DELETE
Deletes a logical interface from an Ethernet port. For more information, see IP Subnets, on page 79
When you delete a logical interface, all information defined for that interface, such as routes and filters, is deleted
automatically.
To list all currently defined logical interfaces, use the eth list command (page 280).
Note: This command takes effect immediately; however, if the change is not saved before the next reboot, the
deletion is lost and the deleted interface reappears after the reboot.
ETH IP ADDHOSTMAPPING
Remaps a range of local LAN IP addresses to a range of public IP addresses on a per-interface basis. These local
addresses are mapped one-to-one to the public addresses. For more information, see Host Remapping, on page 99.
Note: The range of public IP addresses is defined by <first public addr> only. The rest of the range is computed
automatically (from <first public addr> to <first public addr> + number of addresses remapped - 1) inclusive.
eth ip addHostMapping <first private addr> <second private addr> <first public addr> <interface>
first private addr First IP address in the range of IP address (4 decimals separated by periods).
second private addr Last address in the range of IP address (4 decimals separated by periods).
first public addr Defines the range of public IP addresses (4 decimals separated by periods). The rest of the
range is computed automatically.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number
(0 or 1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number
and the logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
ETH IP ADDR
Defines the IP address and subnet mask for an Ethernet port or logical interface.
interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Examples:
The following command sets the IP address and subnet mask for the default Ethernet interface (0:0).
The following command sets the IP address and subnet mask for logical interface 1 on Ethernet port 0.
ETH IP ADDROUTE
Adds a route to the default routing table for the Ethernet interface.
This command is needed only if the system does not support RIP (see RIP Controls, on page 83 and the eth ip
options command, on page 276).
Note: This command requires a save and reboot before it takes effect.
hops Number of routers through which the packet must go to get to its destination.
interface Ethernet interface through which the packet is sent out. This parameter may be omitted if the
router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Examples:
The following command adds a route to the default routing table for the default Ethernet interface (0:0).
The following command adds a route to the default routing table for logical interface 1 on Ethernet port 0.
ETH IP ADDSERVER
This Network Address Translation (NAT) command adds a server’s IP address (on the LAN) associated with this
interface for a particular protocol. For more information, see Network Address Translation (NAT), on page 95.
To delete a server designation, use the command eth ip delserver (page 268).
eth ip addServer <action> <protocol> <first port> [<last port> [<first private port>]] <interface>
first port First or only port as seen by the Ethernet interface. Port used by the selected server
portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port.
ftp FTP port.
h323 H.323 port.
http HTTP port.
smtp SMTP port.
sntp SNTP port.
t120 T.120 port
telnet Telnet port.
tftp TFTP port.
last port Optional last port in the range of ports as seen by the Ethernet interface for the server on the
LAN.
first private port If specified, this is a port remapping of the incoming request from the Ethernet interface.
interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
ETH IP BINDROUTE
Adds an Ethernet route to the named IP virtual routing table.
Duplicate routes are not allowed within a routing table. However, identical routes may be added to different
routing tables. For example, the same route may be added to a virtual routing table and to the default routing table.
To list the routes, use the iproutes command, page 215. To remove an Ethernet route from a virtual routing table,
use the eth ip unbindRoute command, page 277.
Note: A route change in an IP virtual routing table takes effect immediately. However, the change is lost if it is
not saved before the next reboot.
hops Number of routers through which the packet must go to get to its destination.
interface Ethernet interface through which the packet is sent out. This parameter may be omitted if the
router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
ETH IP DEFGATEWAY
Assigns an Ethernet default gateway for packets whose destination address does not have a route defined.
This setting is most useful when IP routing is not enabled, in which case the system acts as an IP host (i.e., an end
system, as opposed to an IP router).
Note: This command requires a save and reboot before it takes effect.
Note: The following command is recommended instead of the eth ip defgateway command. It sends packets for
all IP addresses to the specified gateway:
interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and
the logical interface number (<port #>:<logical #>, for example, 0:1).
ETH IP DELHOSTMAPPING
Undoes an IP address/ host translation (remapping) range that was previously established with the command eth
ip addHostMapping on a per-interface basis (page 263). For more information, see Host Remapping, on page 99.
eth ip delHostMapping <first private addr> <second private addr> <first public addr> <interface>
first private addr First IP address in the range of IP address (4 decimals separated by periods).
second private addr Last address in the range of IP address (4 decimals separated by periods).
first public addr Defines the range of public IP addresses (4 decimals separated by periods). The rest of the
range is computed automatically.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number
(0 or 1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number
and the logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
ETH IP DELROUTE
Removes a route from the default routing table that was added using the eth ip addroute command.
The route to be deleted is identified by its IP address and mask and its Ethernet interface. To see the remaining
routes, use the iproutes command (page 215).
Note: This command requires a save and reboot before it takes effect.
interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Examples:
The following command deletes the route for IP address 10.9.2.0/255.255.255.0 for the default Ethernet
interface (0:0).
The following command deletes the route for IP address 10.1.3.0/255.255.255.0 for the Ethernet interface 0:1.
ETH IP DELSERVER
Deletes an entry created by the eth ip addServer command (page 265).
eth ip delServer <action> <protocol> <first port> [<last port> [<first private port>]] <interface>
first port First or only port as seen by the Ethernet interface. Port used by the selected server
portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port.
ftp FTP port.
h323 H.323 port.
http HTTP port.
smtp SMTP port.
sntp SNTP port.
t120 T.120 port
telnet Telnet port.
tftp TFTP port.
all All ports.
last port Optional last port in the range of ports as seen by the Ethernet interface for the server on the
LAN.
first private port If specified, this is a port remapping of the incoming request from the Ethernet interface.
interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
ETH IP DIRECTEDBCAST
Enables or disables the forwarding of broadcast packets directed to a specific network prefix. When forwarding is
disabled, the router silently discards all packets broadcast to a subnet. The default is off; thus, by default, all
network prefix-directed broadcast packets are discarded. This applies to all broadcast interfaces, including all
Ethernet interfaces.
A network prefix-directed broadcast address is the broadcast address to a particular network. For example, if a
network’s IP address is 192.168.254.254 and its mask is 255.255.255.0, its network prefix-directed broadcast
addresses are 192.168.254.0 and 192.168.254.255.
This feature is independent of the IP firewall and IP filtering features. However, it does require that IP routing be
enabled (see eth ip enable, page 270). To see the current settings for IP routing and directed broadcasts, use the
command eth list, page 280.
off Disables the forwarding of packets broadcast to a subnet. The default setting is off.
ETH IP DISABLE
Disables IP routing across the Ethernet LAN. This commands acts as a master switch allowing you to disable all
IP routing for testing or control purposes.
eth ip disable
ETH IP ENABLE
Enables IP routing across the Ethernet LAN. This command acts as a master switch allowing you to re-enable all
IP routing.
eth ip enable
ETH IP FILTER
Manages the IP filters for the Ethernet interface(s). The filters are used to screen IP packets.
Each Ethernet interface can have its own set of filters. The intended interface is designated at the end of the filter
command. If the router has two physical Ethernet interfaces (an Ethernet hub router), the interface is designated
by its port number (0 or 1). If logical interfaces have been defined to provide service to multiple IP subnets, the
logical interface number is also specified (port #:<logical #, for example, 0:1).
Each interface can have filter lists that are applied at up to four points in the process: Input, Receive, Transmit,
and Output. For more information on how and when the filter types are applied, refer to IP Filtering, on page 129.
Note: IP filters take effect immediately upon entry. They can even affect the current connection that you are using
to enter commands. Unlike other configuration changes, you do not need to save and reboot or restart.
The following commands are provided for managing IP filters for an Ethernet interface:
Appends a filter to the list of filters for this <type> and <interface>. The filter is specified by the
<action> and optional <parameters>.
If no line number is specified, the filter is appended to the end of the list; otherwise, it is appended after
the specified line. For example, “append 0” appends the filter after line 0. Filters are used in the order
they appear in their list.
Inserts a filter in the list of filters for this <type> and <interface>. The filter is specified by the <action>
and optional <parameters>.
If no line number is specified, the filter is inserted at the beginning of the list; otherwise, it is inserted
before the specified line. For example, “insert 0” inserts the filter before line 0 so it is the first filter in the
list. Filters are used in the order they appear in their list.
Deletes the first filter that matches the filter specified on the command.
Deletes a range of filters from the list for this <type> and <interface>.
If no line numbers are specified, all filters in the list are deleted. If only the first line number is specified,
all filters from that line to the end are deleted. To see the current filter list, use the eth ip filter list
command. Filters are used in the order they appear in their list.
eth ip filter clear [<first line> [<last line>]] [<type>] <clear arg> [<interface>]
Resets the counters for the specified filters. A filter has a counter if the -c parameter was specified when
the filter was defined.
You can specify the filters whose counters are to be reset by their line number range and type (input,
output, or forward). If no type is specified, the counters for all filters for the interface are reset. If no line
numbers are specified, the counters for all filters for that type and interface are reset. If only the first line
number is specified, all counters for filters from that line to the end of the list are reset. To see the line
numbers and counters, use the eth ip filter list command.
Checks the action that would be taken if a packet with the specified parameters was compared with the
list of filters defined for the specified type and interface. For example, the command
eth ip filter check input -p TCP 1
would check what action (accept, drop, reject, inipsec, outipsec) would be taken for a TCP packet after it
was compared with the list of input filters defined for port 1.
Lists all filters of the specified <type> defined for the specified <interface>.
Turns on or turns off the console watch for the interface. If the watch is on, a message is printed to the
console serial port when a packet is dropped or rejected. (The message is also sent to any Syslog servers;
see Syslog Client, on page 168.)
However, if the parameter -q (quiet) was specified for a filter, no message is printed when that filter
matches a packet. If the parameter -v (verbose) was specified for a filter, a message is printed whenever
that filter matches a packet, regardless of the filter action.
To see the messages, Telnet to the router and enter system log start. The watch does not continue after a
reboot; to resume the watch after a reboot, you must enter the eth ip filter watch on command again.
The filter type specifies at which point the filter is compared to the IP packet (see the illustration under Filters and
Interfaces, on page 129):
input When the packet enters the interface, before any network address translation is performed.
receive When the packet enters the interface, after any network address translation, but before routing
table processing.
transmit After routing table processing, before any network address translation before the packet is sent
out.
output After routing and network address translation, just before the packet is sent out.
drop The packet is discarded, without sending an ICMP (Internet Control Management Protocol)
error message.
reject The packet is discarded and an ICMP error message is returned to the sender.
inipsec The packet is passed to IPSec for decrypting. The filter is intended to match packets coming
from the other IPSec gateway. Although filters are the mechanism by which packets are passed
to IPSec, it is recommended that you use IKE to manage your IP Security (see IPSec (Internet
Protocol Security), on page 149).
outipsec The packet is passed to IPSec so it can be encrypted and sent to the other IPSec gateway. The
filter is intended to match packets coming from the local protected network. Although filters are
the mechanism by which packets are passed to IPSec, it is recommended that you use IKE to
manage your IP Security (see IPSec (Internet Protocol Security), on page 149).
The following parameters specify the characteristics that an IP packet must have in order to match the filter. A filter
can require any or all of these characteristics.
-p <protocol> | TCP | UDP | ICMP
The packet must have the specified protocol. If no protocol is specified, the filter matches every protocol.
Note: You may specify more than one -tcp option for the IP filter.
The -tcp rst setting is independent of the others; if you specify -tcp rst for the filter, the filter matches every
TCP packet with the TCP RESET flag set, regardless of the other flag settings. For example, for the filter to
match packets for “established” connections, you would specify both -tcp rst and -tcp ack so that the filter is
applied to every TCP packet that has either the RESET flag or the ACK flag set.
-b
This option requests that this filter be compared twice with each packet. The first time the source filter
information is matched against the source information in the IP packet and the destination filter information is
matched against the destination information in the IP packet. The second time the source filter information is
matched against the destination information in the IP packet and the destination filter information is matched
against the source information in the IP packet.
Use this option when the action specified is inipsec or outipsec. It specifies the IPSec Security Association
that uses the filter.
-q or -v
Specify one of these options to determine when watch messages are sent for this filter. The messages are sent
to the console serial port (and to any Syslog servers; see page 168).
If neither -q or -v are specified for the filter, and an eth ip filter watch on command is entered for the
interface, a message is sent each time this filter causes a packet to be dropped or rejected.
If -q (quiet) is specified, no messages are printed for this filter, even if the filter causes a packet to be dropped
or rejected.
If -v (verbose) is specified, a message is printed every time this filter matches a packet, regardless of the filter
action.
The optional interface determines which Ethernet interface the filter applies to.
If the router has only one Ethernet interface, <interface> may be omitted.
If the router has two physical Ethernet interfaces (that is, a dual-port router), you must specify the port by its
number (0 or 1).
If logical interfaces have been defined for the physical Ethernet interface, the port number and the logical
interface number are specified (<port #>:<logical #>, for example, 0:1).
Examples:
This command clears all filters from the Input filter list for Ethernet interface 0. Use this command as the first
command in a list of commands starting a new Input filter list.
These commands prevent the forwarding of all IP traffic. If you put these filters at the end of the filter lists, they
will stop all packets that have not matched filters earlier in the lists.
ETH IP FIREWALL
The router supports IP Internet Firewall Filtering to prevent unauthorized access to your system and network
resources from the Internet. This filter discards packets received from the WAN that have a source IP address
recognized as a local LAN address. This command sets Ethernet Firewall Filtering on or off and allows you to list
the active state.
Note 1: This command requires a save and reboot before it takes effect.
Note 2: To perform Firewall Filtering, IP routing must be enabled. For more information, see Internet Firewall
Filtering, on page 82.
on Sets firewall filtering on. IP routing must also be enabled for filtering to be performed.
ETH IP MGMT
This command assigns to an Ethernet interface an IP address which is to be used for management purposes only
and not for IP address translation. This management IP address is generally a private network address used solely
by the ISP.
The management IP address is separate from the IP address used for IP address translation. The IP address used
for address translation is generally a public IP address valid on the Internet. It is set by the eth ip addr command
(page 264).
Note: The management address is not effective until after the next save and reboot.
Note: To use the management address as the source address for a ping, you must specify it using the -I option on
the ping command (page 217). For example, to use management address 192.168.1.2 when pinging destination
address 192.168.100.100, specify:
ping -I 192.168.1.2 192.168.100.100
Note: To use the management address as the source address for a copy, you must specify both the source and
destination addresses on the copy command (page 226).
To list the current management address for the Ethernet interface, if any, use the eth list command (page 280). To
set a management address for the WAN interface, see remote setMgmtIpAddr (page 314).
interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
ETH IP OPTIONS
Turns on or turns off an IP option for the specified Ethernet interface. The IP options include:
• Options to transmit or receive RIP-1 and/or RIP/2 packets. (See RIP Controls, on page 83.)
Note: This command requires a save and reboot before it takes effect.
rxrip Receive and process IP RIP-1 compatible and RIP-2 broadcast packets from the
Ethernet LAN. Also receive and process RIP-2 packets that are multicast as defined
by the eth ip ripmulticast command. Set this option if the local router is to discover
route information from the Ethernet LAN. The default is on.
rxdef Receive the default route address from the Ethernet LAN. The default is on. This
option is useful if you do not want to configure your router with a default route.
txrip Transmit RIP-1 compatible broadcast packets and RIP-2 multicast packets over the
Ethernet LAN. The default is on.
txdef Advertise this router as the default router over the Ethernet LAN (provided it has a
avdfr default route). The default is on. Set this to off if another router on the local LAN is
the default router.
interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or 1)
must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
ETH IP RIPMULTICAST
Changes the multicast address for RIP-1 compatible and RIP-2 packets. The default address is 224.0.0.9.
ETH IP TRANSLATE
This command is used to control Network Address Translation on a per-interface basis. It allows several PCs to
share a single IP address to the Internet. To read more about Network Address Translation (NAT), see page 95.
on | off Indicates whether Network Address Translation is on or off for this Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
eth ip translate on 0
This command disables Network Address Translation for logical interface 0:1
ETH IP UNBINDROUTE
Removes an Ethernet route from the named IP virtual routing table.
To list the routes, use the iproutes command, page 215. To add an Ethernet route to a virtual routing table, use the
eth ip bindRoute command.
Note: A route change in an IP virtual routing table takes effect immediately. However, the change is lost if it is
not saved before the next reboot.
interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
The following commands remove Ethernet routes from virtual routing table ROSA. The first deleted route is
for IP address 10.1.2.0 and the default Ethernet interface (0:0). The second deleted route is for IP address
10.1.3.0 and the logical Ethernet interface 0:1.
ETH IP VRID
Assigns a virtual router ID (VRID) to an Ethernet interface. The same VRID must be assigned to the master router
and its backup routers. For more information, see VRRP Backup, on page 116.
This command designates the interface as the VRRP interface for the router. You must use another logical
Ethernet interface as the management interface for the router. To create a new logical Ethernet interface, use the
command eth add (page 262) and then assign it an IP address with an eth ip addr command (page 264).
Note: The assignment takes effect after you save the change and restart the interface or reboot the router.
After you assign the VRID, you specify its attributes with the eth vrrp commands (see page 282).
If you delete the VRID (eth vrrp delete), the VRRP interface designation is cleared. You can also clear the VRRP
interface designation by entering the eth ip vrid command with 0 as the VRID.
If you specify 0 as the VRID, the Ethernet interface is no longer the VRRP interface.
To specify a logical interface other than 0:0, specify both the port number (0 or 1) and the
logical interface number using the format <port #>:<logical #> (for example, 0:1).
Examples:
This command clears the VRRP interface designation from interface 0:1.
This command assigns VRID 1 to the default logical Ethernet interface 0:0.
eth ip vrid 1
port# Port number of the Ethernet LAN. This number must be 0 or 1, or it may be omitted.
port# Port number of the Ethernet LAN. This number must be 0 or 1, or it may be omitted.
port# Port number of the Ethernet LAN. This number must be 0 or 1, or it may be omitted.
ETH LIST
Lists information about the Ethernet interfaces including the status of bridging and routing, IP protocol controls,
and IP address and subnet mask.
interface Ethernet interface for which information is listed. If the parameter is omitted, information is
listed for all Ethernet interfaces in the router.
For a dual-port router, you may specify the port number (0 or 1).
If logical interfaces are defined, you may specify a port and logical interface number
(<port #>:<logical interface #>, such as 0:1).
Example:
# eth list
GLOBAL BRIDGING/ROUTING SETTINGS:
Bridging enabled..................... no
Exchange spanning tree with dest... yes
IP Routing enabled................... yes
Multicast forwarding enabled....... no
Firewall filter enabled............ yes
Directed Broadcasts Allowed........ no
RIP Multicast address.............. default
IPX Routing enabled.................. no
ETH MTU
Sets the maximum transfer unit for the Ethernet interface. The default is 1500 bytes.
You can set the MTU size to less than 1500 bytes, but you cannot set the MTU to greater than 1500 bytes, even if
you specify a larger value on an eth mtu command. (RFC 1042 recommends 1500 bytes as the maximum MTU
for an Ethernet network.)
To see the current MTU size for an interface that has IP enabled, use the ipifs command (page 215).
interface Ethernet interface. This parameter may be omitted if the router has only one Ethernet interface.
If the router has two physical Ethernet interfaces (an Ethernet hub router), the port number (0 or
1) must be specified.
To specify a logical interface other than logical interface 0, specify both the port number and the
logical interface number (<port #>:<logical #>, for example, 0:1).
Example:
The following command decreases the MTU size for Ethernet interface 0:1 to 1400 bytes.
ETH RESTART
Stops and restarts a logical Ethernet interface. To read about logical Ethernet interfaces, see page 79.
Certain configuration changes for a logical Ethernet interface become effective only after the logical interface is
restarted or the router is rebooted. Remember to save the changes before the restart or reboot.
Note: Use restart instead of reboot whenever possible. A restart does not affect other interfaces, allowing their
traffic to continue. For example, using restart, you can add an IP route without killing voice traffic.
interface Logical Ethernet interface. Specify both the port number and the logical interface number using
the format <port #>:<logical #> (for example, 0:1).
Example:
A logical Ethernet interface is stopped using the command eth stop (page 282). To stop and immediately restart a
logical Ethernet interface, use the command eth restart (page 281).
interface Logical Ethernet interface. Specify both the port number and the logical interface number using
the format <port #>:<logical #> (for example, 0:1).
Example:
ETH STOP
Stops a logical Ethernet interface. To read about logical Ethernet interfaces, see page 79.
Note: To keep certain configuration changes, you must enter a save command before stopping the logical
interface.
The stopped interface is disabled until it is started again. To start a logical Ethernet interface, use the command
eth start (page 282). To stop and immediately restart a logical Ethernet interface, use the command eth restart
(page 281).
interface Logical Ethernet interface. Specify both the port number and the logical interface number using
the format <port #>:<logical #> (for example, 0:1).
Example:
Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the
interface or reboot the router.
To see the contents of the VRRP attribute records, use the command eth vrrp list (page 284). You can change the
attribute values using other eth vrrp commands (see Defining VRRP Attributes, on page 118.)
port# Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be
omitted if the router has only one port.
If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified.
Examples:
This command defines an attribute record for VRID 7 for the default port 0.
Note: If the VRRP attribute record has no password, no VRRP authentication is performed.
Note: If you clear the password for one VRRP router, you must clear the password for every router for that VRID
on the LAN. For example, if VRID 7 is defined in routers A, B, and C in the LAN and you clear the password for
router A, you must clear the password for routers B and C as well.
To see the current password, use the command eth vrrp list (page 284). To set a new password, use the command
eth vrrp set password (page 286).
Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the
interface or reboot the router.
vrid Virtual router ID of the VRRP attribute record (integer, 1-255). The attribute record was created
by the command eth vrrp add (page 282).
port# Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be
omitted if the router has only one port.
If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified.
Example:
This command clears the password for VRID 7 using default port 0.
When removing a VRRP configuration from a router, you would delete both the VRRP attribute record and the
extra logical interface. To do so, use the commands eth vrrp delete and eth delete (page 263).
Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the
interface or reboot the router.
port# Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be
omitted if the router has only one port.
If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified.
Example:
This command deletes the attribute record for VRID 7 for the default port 0.
port# Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be
omitted if the router has only one port.
If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified.
Example:
This command lists the attribute records for the default port 0.
Interface: ETHERNET/0:3
Primary WAN inteface is down
Note: This command is not usually needed for VRRP configuration. Do not use this command unless you clearly
understand its impact.
Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the
interface or reboot the router.
ipaddr IP address that is to be the new multicast address (4 decimals, separated by periods).
Example:
The preemption option determines what the router does when it recovers from a failure, as follows:
• If the router is the master router for the IP address (it has priority 255), it always immediately preempts the
backup router and resumes its function in the network.The preemption option cannot change this.
• However, if the router is a backup router for the IP address and it determines that a router with a lower
priority is currently functioning as backup, the preemption option determines whether this router immediately
preempts the router with lower priority or waits for the lower priority router to go away before becoming the
active VRRP router.
To read more about VRRP Backup, see page 116.
The preemption setting may differ among the backup routers for a VRID.
Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the
interface or reboot the router.
vrid Virtual router ID of the VRRP attribute record (integer, 1-255). The attribute record was created
by the command eth vrrp add (page 282).
If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified.
Example:
To see the current password, use the command eth vrrp list. To clear a password, use the command eth vrrp
clear password (page 283).
Note: The password must be the same for every router in the Virtual Router, that is, for every router in the LAN
with the same VRID. For example, if a VRRP interface in routers A, B, and C has the VRID 7, routers A, B, and
C must all specify the same password for VRID 7.
Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the
interface or reboot the router.
vrid Virtual router ID of the VRRP attribute record (integer, 1-255). The attribute record was created
by the command eth vrrp add (page 282).
port# Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be
omitted if the router has only one port.
If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified.
Example:
This command specifies the password “AbCdEfGh” for VRID 7 using default port 0.
Note: If you do not specify a priority value for a VRRP attribute record, the default priority, 100, is used.
The priority values must differ for each router that uses the same VRID. For example, the master router for VRID
7 must have priority 255 while the first backup router for VRID 7 could have the default priority 100 and a second
backup router for VRID 7 could have priority 50.
Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the
interface or reboot the router.
priority Priority value (integer, 1-255). The priority for the master router must be 255; the priority for
each backup router must be less than 255.
vrid Virtual router ID of the VRRP attribute record (integer, 1-255). The attribute record was created
by the command eth vrrp add (page 282).
port# Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be
omitted if the router has only one port.
If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified.
Examples:
This command specifies the maximum priority for the master router for VRID 7 using default port 0.
This command defines priority 50 for a backup router for VRID 7 using port 1.
Note: If you do not specify a time interval value for a VRRP attribute record, the default time interval, 1 second,
is used.
If the backup does not receive a VRRP packet from another VRRP router during the master down interval, the
backup assumes the other router is down. The master down interval is calculated as follows:
Thus, the default skew time is (256 - 100) / 256, or .609375. The default master down interval is (3 * 1) +
.609375, or 3.609375 seconds.
Note: This command takes effect immediately, but you must save the change if it is to persist after you restart the
interface or reboot the router.
vrid Virtual router ID of the VRRP attribute record (integer, 1-255). The attribute record was created
by the command eth vrrp add (page 282).
port# Physical Ethernet interface (port) number (0 or 1). The default is 0; the parameter may be
omitted if the router has only one port.
If the router has two ports (an Ethernet hub router), the port number (0 or 1) must be specified.
Example:
This command specifies two seconds as time interval for VRID 7 using default port 0.
The commands in this section begin with the word remote. The commands allow you to add, delete, and modify
remote routers to which the target router can connect. Remote router information that can be configured includes:
• PVC numbers
• IP routes
• Host mapping
REMOTE ?
Lists the supported keywords. (The list varies depending on the router model.)
remote ?
st
Example:
# remote ?
Sub-commands for remote:
? help add
del delete list
enable disable start
stop restart setAuthen
enaAuthen disAuthen setPasswd
setOurPasswd delOurPasswd setOurSysName
delOurSysName listPhones setLNS
setL2TPClient setProtocol setPVC
REMOTE ADD
Adds a remote router entry into the remote router database.
remoteName Name of the remote router (character string). The name is case-sensitive.
REMOTE ADDBRIDGE
Defines the remote router entry as the default bridging destination for outbound bridging. The command can
define either the default bridging destination for all MAC addresses or the default bridging destination for a
specific MAC address.
When you specify a MAC address on this command, a permanent entry for that address is created in the bridging
table. Thereafter, packets that contain that MAC address are bridged using the specified remote router entry. (To
see the entries in the bridging table, use the bi list command.)
Note: Bridging using the specified remote is effective only after it has been enabled using the remote enabridge
command (page 300). To see the current bridge settings for a remote, use the remote listbridge command (page
305). To remove the default designation from a remote, use the remote delbridge command (page 295).
If IP and IPX routing are disabled, all packets, with an unknown destination, are bridged to the default bridging
destination. If IP and/or IPX routing is enabled, bridging occurs only for packets that are not routed.
MAC_addr MAC address (six bytes, specified as six hexadecimals, separated by colons).
remoteName Name of the remote router (character string). The name is case-sensitive.
Example:
REMOTE ADDHOSTMAPPING
Remaps a range of local LAN IP addresses to a range of public IP addresses on a per-remote-router basis. These
local addresses are mapped one-to-one to the public addresses.
Note: The range of public IP addresses is defined by <first public addr> only. The rest of the range is computed
automatically (from <first public addr> to <first public addr> + number of addresses remapped - 1) inclusive.
second private addr Last address in the range of local IP address to be remapped, in the format of 4 decimals
separated by periods.
first public addr Defines the range of public IP addresses, in the format of 4 decimals separated by periods.
REMOTE ADDIPROUTE
Adds an IP address route to a network or station on the LAN connected beyond the remote router. The route is
added to the default routing table.
The local router’s routing table must be seeded statically to access networks and stations beyond this remote
router. After the connection is established, standard RIP update packets can dynamically add routes to the routing
table. Setting this address is not required if the local router never connects to the remote router and the remote
router supports RIP.
Note: Changes to the default routing table require a save and a remote restart or reboot before they take effect.
ipnetmask IP network mask of the remote network or station (4 decimals separated by periods).
hops Perceived cost to reach the remote network or station by this route (number between 1 and 15).
Examples:
The first two addresses in the list represent subnetworks, the third is a class B network, the fourth is a host, and
the fifth address is the default route. The fifth command adds the default route when the WAN interface is a point-
to-point interface; the sixth command adds the default route when the WAN interface is a broadcast interface.
Note: A reboot command must be performed on the target router for the addition of a static route to take effect.
metric Number of routers through which the packet must go to get to the network/station.
ticks Number in 1/8 seconds which is the estimated time delay in reaching the remote network or
station.
REMOTE ADDIPXSAP
Adds an IPX SAP to the server information table for a service on the LAN network connected beyond the remote
router. The target router’s SAP table must be seeded statically to access services beyond this remote router. After
the connection is established, standard SAP broadcast packets will dynamically add to the table.
Note: A reboot must be performed on the target router for the addition of a SAP to take effect.
remote addIpxSap <servicename> <ipxNet > <ipxNode> <socket> <type> <hops> <remoteName>
socket Socket address of the destination process within the destination node. The processes include
services such as file and print servers.
hops Number of routers through which the packet must go to get to the network/station.
Multiple system addserver (page 233) and remote addserver commands can designate different servers for
different protocols, ports, and interfaces. When a request is received, the router searches the server list for the
appropriate server. The order of search for a server is discussed in Server Request Hierarchy, on page 98.
To delete a server designation, use the command remote delserver (page 298).
remote addServer <action> <protocol> <first port> [<last port> [<first private port>]] <remoteName>
first port First or only port as seen by the remote end. Port used by the selected server
portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port.
ftp FTP port.
h323 H.323 port.
http HTTP port.
smtp SMTP port.
sntp SNTP port.
t120 T.120 port
telnet Telnet port.
tftp TFTP port.
all All ports.
last port Optional last port in the range of ports as seen by the remote end for the server on the LAN.
first private port If specified, this is a port remapping of the incoming request from the remote end.
Example:
REMOTE BINDIPVIRTUALROUTE
Adds a remote route to the named IP virtual routing table.
To list the remote routes, use the remote listIProutes command, page 305. To remove a route from a virtual
routing table, use the remote unbindIPVirtualRoute command, page 324.
ipnetmask IP network mask of the remote network or station (4 decimals separated by periods).
hops Perceived cost in reaching the remote network or station by this route (number between 1 and
15).
Example:
The following command adds a route to virtual routing table FRANCISCO. The route is to IP address
10.1.2.0/255.255.255.0 and goes through remote router HQ.
REMOTE BLOCKNETBIOS
This command turns on or turns off a filter that blocks all NetBIOS packets over this WAN connection.
REMOTE DEL
Deletes a remote router entry from the remote router database.
REMOTE DELATMNSAP
This command deletes an ATM mapping set by the remote setATMnsap command (page 307).
To remove a designation as the default bridging destination for a specific MAC address, specify that address on
the command. The entry is then removed from the bridging table. To see the entries in the bridging table, use the
bi list command (page 212).
MAC_addr MAC address (six bytes, specified as six hexadecimals, separated by colons).
remoteName Name of the remote router (character string). The name is case-sensitive.
Example:
REMOTE DELENCRYPTION
Deletes encryption files associated with a remote router.
REMOTE DELHOSTMAPPING
Undoes an IP address/host translation (remapping) range that was previously established with the command
remote addhostmapping on a per-remote-router basis.
remote delHostMapping <first private addr> <second private addr> <first public addr> <remoteName>
first private addr First IP address in the range of IP address, in the format of 4 decimals separated by periods.
second private addr Last address in the range of IP address, in the format of 4 decimals separated by periods.
first public addr Defines the range of public IP addresses, in the format of 4 decimals separated by periods.
The rest of the range is computed automatically.
Note: Changes to the default routing table require a save and remote restart or reboot before they take effect.
REMOTE DELIPXROUTE
Deletes an IPX address for a network on the LAN connected beyond the remote router.
Note: The reboot command must be issued on the target router for a deleted static route to take effect.
REMOTE DELIPXSAP
Deletes an IPX service on the LAN network connected beyond the remote router.
Note: The reboot command must be issued on the target router for a deleted service to take effect.
REMOTE DELOURSYSNAME
Removes the unique CHAP or PAP authentication system name entries established by the command remote
setOurSysName.
REMOTE DELPHONE
Deletes a phone number that was specified by the command remote setPhone (page 316).
phone# Decimal number representing the exact digits to be dialed. Digits, the asterisk, and the #
characters are accepted; use a comma to specify a 2-second pause.
Example:
remote delServer <action> <protocol> <first port> [<last port> [<first private port>]]
first port First or only port as seen by the remote end. Port used by the selected server
portid Numeric value between 0 and 65,535. A numeric value of 0 matches any port.
ftp FTP port.
h323 H.323 port.
http HTTP port.
smtp SMTP port.
sntp SNTP port.
t120 T.120 port
telnet Telnet port.
tftp TFTP port.
all All ports.
last port Optional last port in the range of ports as seen by the remote end for the server on the LAN.
first private port If specified, this is a port remapping of the incoming request from the remote end.
Example:
REMOTE DISABLE
Disables the remote. The remote remains disabled even after a reboot. To enable the remote, you must enter the
command remote enable (page 299).
Note: You may enter and save information and settings for a disabled remote entry. However, the remote entry
cannot be used until it is enabled.
Note: If the remote is currently active when the remote is disabled, the active session is not stopped. To stop the
active session, use the remote stop command (page 324).
REMOTE DISAUTHEN
This command is intended for situations where third-party routers cannot be authenticated; the target router will
not attempt to authenticate the remote router.
REMOTE DISBRIDGE
Disables bridging from the target router to the remote router.
Note: This command requires rebooting the target system for the change to take effect.
REMOTE ENAAUTHEN
With this command the target router will try to negotiate authentication as defined in the remote router's database.
REMOTE ENABLE
Enables use of an entry in the remote router database. Although the command makes it possible to use the remote
entry, it does not start an active session for the remote.
Note: The entry remains enabled across reboots. The entry remains enabled until it is disabled by a remote
disable command (page 298).
REMOTE ENABRIDGE
Enables bridging from the target router to the remote router. This command requires rebooting the target system
for the change to take effect.
REMOTE IPFILTER
This command manages the IP filters on the WAN interface. The filters screen IP packets at the interface level.
You can define filters for any entry in the remote router database. To see the names of the remote entries, use the
command remote list.
A remote entry can have up to four lists of filters; the list types are Input, Receive, Transmit, and Output. For
more information on how these filter types are applied, refer to IP Filtering, on page 129.
Note: IP filters take effect immediately upon entry. They can even affect the current connection that you are using
to enter commands. Unlike other configuration changes, you do not need to save and restart or reboot.
The following commands are provided for managing IP filters for the WAN interface:
Appends a filter to the list of filters for this <type> (Input, Receive, Transmit, or Output) for this remote
entry.
If no line number is specified, the filter is appended to the end of the list; otherwise, it is appended after
the specified line. For example, “append 0” appends the filter after line 0. Filters are used in the order
they appear in their list.
Inserts a filter in the list of filters for this <type> (Input, Receive, Transmit, or Output) for this remote
entry.
If no line number is specified, the filter is inserted at the beginning of the list; otherwise, it is inserted
before the specified line. For example, “insert 0” inserts the filter before line 0 so it is the first filter in the
list. Filters are used in the order they appear in their list.
Deletes the first filter that matches the filter specified on the command.
Deletes a range of filters of this <type> (Input, Receive, Transmit, or Output) for this remote entry.
If no line numbers are specified, all filters in the list are deleted. If only the first line number is specified,
all filters from that line to the end are deleted. To see the current filter list, use the remote ipfilter list
command. Filters are used in the order they appear in their list.
remote ipfilter clear [<first line> [<last line>]] [<type>] <clear arg> <remoteName>
Resets the counters for the specified filters. A filter has a counter if the -c parameter was specified for the
filter.
You can specify the filters whose counters are to be reset by their line number range and type (input,
receive, transmit, or output). If no type is specified, the counters for all filters for the interface are reset.
If no line numbers are specified, the counters for all filters for that type and interface are reset. If only
the first line number is specified, all counters for filters from that line to the end are reset. To see the
filter lists and counters, use the remote ipfilter list command.
Checks the action that would be taken if a packet with the specified parameters was compared with the
list of filters defined for the specified type and remote entry.
Lists all filters of the specified <type> (input, receive, transmit, or output) for this remote entry.
Turns on or turns off the console watch for this remote router entry. If the watch is on, a message is
printed to the console serial port when a packet is dropped or rejected. (The message is also sent to any
Syslog servers; see Syslog Client, on page 168.)
However, if the parameter -q (quiet) was specified for a filter, no message is printed when that filter
matches a packet. If the parameter -v (verbose) was specified for a filter, a message is printed whenever
that filter matches a packet, regardless of the filter action.
To see the messages, Telnet to the router and enter system log start. The watch does not continue after a
restart or reboot; to resume the watch, you must enter the remote ipfilter watch on command again.
The filter type specifies at which point the filter is compared to the IP packet (see the illustration under Filters and
Interfaces, on page 129):
input When the packet enters the interface, before any network address translation is performed.
receive When the packet enters the interface, after any network address translation, but before routing
table processing.
transmit After routing table processing, before any network address translation before the packet is sent
out.
drop The packet is discarded, without sending an ICMP (Internet Control Management Protocol)
error message.
reject The packet is discarded and an ICMP error message is returned to the sender.
inipsec The packet is passed to IPSec for decrypting. The filter is intended to match packets coming
from the other IPSec gateway. Although filters are the mechanism by which packets are passed
to IPSec, it is recommended that you use IKE, rather than your own filters, to manage your IP
Security (see IPSec (Internet Protocol Security), on page 149).
outipsec The packet is passed to IPSec so it can be encrypted and sent to the other IPSec gateway. The
filter is intended to match packets coming from the local protected network. Although filters are
the mechanism by which packets are passed to IPSec, it is recommended that you use IKE to
manage your IP Security (see IPSec (Internet Protocol Security), on page 149).
The following parameters specify the characteristics that an IP packet must have in order to match the filter. A filter
can require any or all of these characteristics.
-p <protocol> | TCP | UDP | ICMP
The packet must have the specified protocol. If no protocol is specified, the filter matches every protocol.
Note: You may specify more than one -tcp option for the IP filter.
The -tcp rst setting is independent of the others; if you specify -tcp rst for the filter, the filter matches every
TCP packet with the TCP RESET flag set, regardless of the other flag settings. For example, for the filter to
match packets for “established” connections, you would specify both -tcp rst and -tcp ack so that the filter is
applied to every TCP packet that has either the RESET flag or the ACK flag set.
-b
This option requests that this filter be compared twice with each packet.The first time the source filter
information is matched against the source information in the IP packet and the destination filter information is
matched against the destination information in the IP packet. The second time the source filter information is
matched against the destination information in the IP packet and the destination filter information is matched
against the source information in the IP packet.
Use this option when the action specified is inipsec or outipsec. It specifies the IPSec Security Association
that uses the filter.
-q or -v
Specify one of these options to determine when watch messages are sent for this filter. The messages are sent
to the console serial port (and to any Syslog servers; see page 168).
If neither -q or -v are specified for the filter, and an remote ipfilter watch on command is entered for the
interface, a message is sent each time this filter causes a packet to be dropped or rejected.
If -q (quiet) is specified, no messages are printed for this filter, even if it causes a packet to be dropped or
rejected.
If -v (verbose) is specified, a message is printed every time this filter matches a packet, regardless of the filter
action.
The remote name specifies the entry in the remote router database that the command applies to. To see the remote
names, use the command remote list.
Examples:
The following two commands have the same effect: they deny all IP traffic for the remote interface internet from
the specified destination addresses. The addresses can be specified as 192.168.0.0 masked with 255.255.0.0 or as
the range 192.168.0.0 through 192.168.255.255.
remote ipfilter append receive drop -da 192.168.0.0 -dm 255.255.0.0 internet
This command lists all IP filters of type Input for the remote interface internet.
REMOTE LIST
Lists the remote router entry (or all the entries) in the remote router database. The result is a complete display of
the current configuration settings for the remote router(s), except for the authentication password/secret.
remoteName Name of the remote router to be listed (character string).If you omit the name, all remote router
entries are listed.
Example:
REMOTE LISTBRIDGE
Lists the current bridge settings for the specified remote router entry.
remoteName Name of the remote router (character string). If a name is omitted, the bridge settings for all
remote router entries are listed.
Example:
# remote listbridge
BRIDGING INFORMATION FOR <internet>
Bridging enabled.................... yes
Exchange spanning tree with dest... no
Bridge only PPPoE with dest........ no
REMOTE LISTIPROUTES
Lists IP information for a remote router or, if the router name is omitted, for all routers in the remote router
database. The IP information includes all network or station IP addresses defined for the LAN connected beyond
the remote router.
This command lists all routes defined for the remote router, including those defined in the default routing table
and in any virtual routing tables.
Example:
The following command lists routing information for remote router HQ. It lists five routes that use HQ, the first
four are in the default routing table and the fifth is in virtual routing table FRANCISCO.
# remote listIproutes HQ
IP INFORMATION FOR <HQ>
REMOTE LISTIPXROUTES
Lists all network IPX route addresses defined for the LAN connected beyond the remote router. The network
number, hop count, and ticks are displayed. If the remote name is not specified, a list of IPX routes is displayed
for each remote router in the database.
Response:
IPX ROUTE INFORMATION FOR <HQ>
Total IPX remote routes ...............1 00001001/1/4
REMOTE LISTIPXSAPS
Lists all services defined for the LAN connected beyond the remote router. Each service includes the server name,
network number, node number, socket number, server type, and hop count. If the remote name is not specified, a
list of IPX SAPs is displayed for each remote router in the database.
Response:
IPX SAP INFORMATION FOR <HQ>
Total IPX SAPs ................... 1
SERV312_FP 00001001 00:00:00:00:00:01 0451 0004 1
Response:
PHONE NUMBER(s) FOR <HQ>
Connection Identifier (VPI*VCI)...... 0*38
Note: If the remote name is not specified, a list of phone numbers is displayed for each remote router in the
database.
REMOTE RESTART
Stops the current active session and starts a new active session for a remote.
Certain configuration changes for a remote become effective only after the remote is restarted or the router is
rebooted. Remember to save the changes before the restart or reboot.
Note: Use restart instead of reboot whenever possible. A restart does not affect other interfaces, allowing their
traffic to continue. For example, using restart, you can add an IP route without killing voice traffic.
Example:
The following command restarts the active session for remote HQ.
remote restart HQ
REMOTE SETATMNSAP
RFC1577 (Classical IP over ATM) specifies a mechanism to map an ATM Name (called an NSAP) to a PVC.
NSAP's are normally not needed, but if they are used, they have a syntax defined by using either the ATM or
E164 encodings. By convention, octets 2-7 contain a unique identifier for the router, such as a MAC address.
In the command remote setATMnsap, the complete 20 octets of the NSAP are specified. If Partial mode is
selected, the router substitutes the MAC address of the router for octets 2-7. In Full mode, no change is made to
the NSAP.
To see an ATM NSAP that has been set, use the remote list command.
partial The MAC address of the router is substituted for octets 2-7 of the NSAP.
<nsap> NSAP specified as 40 hex digits or 20 octets (2-digit pairs separated by colons).
Example:
# remote list
REMOTE SETAUTHEN
Sets the authentication protocol used communicate with the remote router. The authentication protocol is the
minimum security level that the target router must use with the remote router; this level is verified during security
negotiation. The router will always attempt to negotiate the highest level of security possible (CHAP). The router
will not accept a negotiated security level less than this minimum authentication method.
The parameter in the remote router database is used for the local side of the authentication process; this is the
minimum security level used by the target router when it challenges or authenticates the remote router.
REMOTE SETBOD
Sets the bandwidth on demand (BOD) management option for a DOD (dial on demand) connection, that is, a
connection where the link goes up and down. These links include those for ISDN, L2TP tunnels, IPSec tunnels,
and dial backup.
The bandwidth on demand management option can be set to apply to incoming, outgoing, or both incoming and
outgoing traffic. The bandwidth threshold set by the remote setBWthresh command (page 309) applies to the
direction of traffic set by this command.
in | out | both Incoming traffic, outgoing traffic, or both. The default is both.
Example:
REMOTE SETBROPTIONS
Sets controls on bridging for the remote router entry.
To see the current bridging settings for remote router entries, use the remote listbridge command (page 305).
Warning: Do not change the stp setting without approval from your system administrator.
option stp
Set this option to on to use the Spanning Tree Protocol (STP). The default is on.
STP is used to detect bridging loops. Set this option to off only if the bridging peers do not support
the Spanning Tree Protocol or if you are certain that no bridging loops could exist. When STP is
disabled on an interface, any STP packets received on that interface are ignored.
Note: The Spanning Tree Protocol adds a 40-second delay each time the ADSL or ATM link
comes up while the interface determines if there is a bridging loop.
pppoeOnly
Set this option to on to limit this remote router entry to bridging PPPoE traffic only. If the option
is set to off, then the entry can bridge any traffic, including PPPoE traffic. The default is off.
Examples:
The following command requests the spanning tree protocol for remote router HQ.
The following command configures remote router PPPoEbridge as the remote through which only PPPoE
traffic is bridged.
REMOTE SETBWTHRESH
Sets the bandwidth threshold for a DOD (dial on demand) connection, that is, a connection where the link goes up
and down. These links include those for ISDN, L2TP tunnels, IPSec tunnels, and dial backup.
Both channel are utilized until the bandwidth utilization drops below the threshold. The default is 0% utilization,
in which case, both channels are always used for data transmission.
If you wish, you can have the bandwidth threshold apply only to incoming or outgoing traffic; see the remote
setBOD command (page 308).
threshold Percentage of bandwidth utilization (0 through 100). The default is 0, in which case, whenever
data transmission occurs, the maximum number of links is allocated.
Example:
remote setBWthresh 75 HQ
REMOTE SETCOMPRESSION
Enables or disables negotiation of the Stac LZS compression of the payload (RFC 1974). The CCP (Compression
Control Protocol, RFC 1962) negotiates and handles any compression between the local router and the remote
router.
The default setting is off because LZS compression has a negative effect with high bit rates (greater than 768 Kb/
s).
To see the current setting for payload compression, enter remote list and check the Compression Negotiationline.
If desired, you can follow the negotiation of the Stac LZS compression within CCP using the debug command
mlp debug ccp.
on Enables compression negotiation between the local and the remote router if both routers are set to
perform compression and if they both share a common compression protocol.
Example:
remote setCompression on HQ
RX Receive key
TX Transmit key
filename Name of the file containing the Diffie-Hellman values. If the file is not specified, default values
built into the router’s kernel are automatically selected.
REMOTE SETIPOPTIONS
Turns on or turns off the selected IP option for the WAN interface. To select IP options for the Ethernet interface,
use the command eth ip options (page 276).
Several RIP options are available. RIP is a protocol used for exchanging IP routing information among routers.
The RIP options allow you to set IP routing information protocol controls over a point-to-point WAN. For more
information, see RIP Controls, on page 83.
rxrip Receive and process IP RIP-1 compatible packets and RIP-2 broadcast packets from the remote
site. Also receive and process RIP-2 multicast packets. Set this option if the local router is to
discover route information from other sites connected to the remote router. This is useful for
hierarchical organizations. If you are connecting to another company or an Internet Service
Provider, you may wish to set this option off. The default is off.
rxdef Receive default IP route address. When this option is set on, the local router receives the remote
site’s default IP route. The default is off.
txrip Transmit IP RIP-1 compatible broadcast packets and RIP-2 multicast packets to the remote site.
When this option is set on, the local router sends routing information packets to the remote site.
The default is off.
txdef Transmit the local router’s default IP route. When this option is set to on, the local router sends
the default route to the remote site. The default is off.
private Keep IP routes private. Used to prevent advertisement of this route to other sites by the remote
router. Used as a security mechanism when the remote site is outside your company (an Internet
Service Provider, for example), or whenever you want to keep the identity of the site private.
The default is on.
LANconfig Accept LAN configuration information. Indicates that this PPP remote can receive IPCP
information for dynamically reconfiguring the Ethernet interface.
Example:
REMOTE SETIPSLAVEPPP
Sets the IP Slave PPP mode. If the slave mode is yes, the router accepts the IP address that the remote end informs
the router that it has; the router disregards any IP address specified in its own configuration. If the mode is no, the
router tries to use the address in its configuration.
Normally there is no need to change the default (no) value of this option. However, in certain situations where the
router is managed by another party, (as part of a managed service), you could set this value to yes to ensure that
the central management site always specifies the IP address of the router.
Example:
REMOTE SETIPXADDR
Sets the IPX network number for the remote WAN connection. For more information about IPX configuration,
see IPX Routing Concepts, on page 408.
Example:
REMOTE SETIPXOPTIONS
Turns on or turns off the IPX option RIPSAP for the remote WAN connection.
Example:
REMOTE SETMAXLINE
Sets the maximum links (1 or 2) for a DOD (dial on demand) connection, that is, a connection where the link goes
up and down. These links include those for ISDN, L2TP tunnels, IPSec tunnels, and dial backup.
1|2 Maximum number of links to be used for the connection (1 or 2). The default is 1.
Example:
remote setMaxLine 2 HQ
REMOTE SETMGMTIPADDR
This command assigns to the remote router entry an IP address which is to be used for management purposes only
and not for IP address translation. This management IP address is generally a private network address used solely
by the ISP.
The management IP address is separate from the IP address used for IP address translation. The IP address used
for address translation is generally a public IP address valid on the Internet. It is set by the remote setSrcIpAddr
command (page 322).
Note: The management address is not effective until after the next save and remote restart or reboot.
Note: To use the management address as the source address for a ping, you must specify it using the -I option on
the ping command (page 217). For example, to use management address 192.168.1.2 when pinging destination
address 192.168.100.100, specify:
ping -I 192.168.1.2 192.168.100.100
Note: To use the management address as the source address for a copy, you must specify both the source and
destination addresses on the copy command (page 226).
To list the current management address for the remote router, if any, use the remote list command (page 304). To
set a management address for an Ethernet interface, see eth ip mgmt (page 275).
Example:
REMOTE SETMINLINE
This command is used for dial-up connections and other connections that behave like dial-up connections, such as
L2TP and PPPoE sessions. The command sets the minimum number of channels to be continually allocated to the
connection. The default is 0, in which case a channel is allocated only when needed.
minlines Minimum number of channels to be continually allocated for the connection (0, 1, or 2). If you
specify 0, a channel is allocated for the connection only when needed. The default is 0.
Examples:
The following command keeps a channel allocated for the session even when there is no traffic.
The following commands set up a timeout period so that, if there is no traffic for 10 minutes (600 seconds), the
channel is deallocated.
REMOTE SETMTU
Sets the maximum transfer unit for the remote interface.
To see the current MTU size for an active remote that is doing IP routing, use the ipifs command (page 215). To
change the MTU for an Ethernet interface, use the command eth mtu (page 281).
If the protocol in use is PPP, you can see the MRU and MTU sizes using the command mlp show. The MRU is
the maximum receive unit. Other information in the mlp show output includes the maxtu (the maximum packet
size that can be sent; it is based on the peer’s MRU size), the ourmru (the maximum PPP packet size that can be
received if multilink is not running), and ourmrru (the maximum PPP packet size that can be received if multilink
is running).
Example:
The following command decreases the MTU size for remote interface HQ to 1400 bytes.
REMOTE SETOURPASSWD
Sets a unique CHAP or PAP authentication password for the local router that is used for authentication when the
local router connects to the specified remote router. This password overrides the password set in the system
passwd command. A common use is to set a password assigned to you by Internet Service Providers.
password Authentication password of the local router for use in connecting to the remote router.
REMOTE SETOURSYSNAME
Sets a unique CHAP or PAP authentication system name for the local router that is used for authentication when
the local router connects to the specified remote router. This system name overrides the system name set in the
system name command. A common use is to set a password assigned to you by Internet Service Providers.
Note: The system name is case-sensitive and may be no more than 255 characters.
REMOTE SETPASSWD
Sets the CHAP or PAP authentication password that is used when the remote router establishes a connection or is
challenged by the target router.
password Authentication password of the remote router. Note that the password is case-sensitive and its
maximum length is 40 characters.
REMOTE SETPHONE
Specifies the phone number to be used for the dial on demand (DOD) connection, that is, a connection where the
link goes up and down. These links include those for ISDN, L2TP tunnels, IPSec tunnels, and dial backup.
phone# Decimal number representing the exact digits to be dialed. Digits, the asterisk, and the #
characters are accepted; use a comma to specify a 2-second pause.
Example:
The following is an example of phone numbers and bit rates for an asynchronous interface used for Dial Backup.
# The phone number begins with 9 (to get an outside line), a comma (for a 2-second
# pause), and finally the 7-digit local number.
remote setphone async 1 9,3801100 backup
remote setspeed 115200 async 1 backup
# Specifies the alternative phone number to be used and its bit rate.
remote setphone async 2 9,3801101 backup
remote setspeed 115200 async 2 backup
The following is an example of a command specifying two ISDN phone numbers, 555-2000 and 555-4000.
REMOTE SETPPPOPTIONS
Turns on or turns off a PPP option.
The default settings vary with the option. To see the current settings of the PPP options, use the command remote
list (page 304).
compression Van Jacobson compression of TCP/IP headers (RFC 1144), also known as
IPCP compression.
Example:
The following command forces the router to always request a new IP address whenever the PPP session is
terminated. (This could be useful if the other PPP system does not completely support IP address negotiation.)
REMOTE SETPPPRETRYTIMER
Turns on or turns off the PPP retry timer for a remote. The default is off (0).
The PPP retry timer is useful in a network where several routers are connected to the same PPP server. If the link
to the PPP server goes down, all PPP sessions on the connected routers go down. Then, when the link comes back
up, all routers attempt reconnection at the same time and this could crash the PPP server. To solve this problem,
turn on the PPP retry timer for each remote. Then, when the link comes back up, each router waits a random time
before attempting reconnection.
To see the current setting of the retry timer for a remote, use the remote list command and check the output line:
Note: A change is effective immediately; save the change if it is to persist across restarts and reboots.
timerValue Timer setting. To turn off the retry timer, specify 0; this is the default value.
To turn on the retry timer, specify a value from 1 to 60. The value is the maximum number of
seconds before the router attempts reconnection. For example, if you enter 60, the router waits
from 1 to 60 seconds before attempting reconnection.
Example:
remote setPPPRetryTimer 60 HQ
REMOTE SETPREFER
Changes the interface for the remote entry. Normally, a new remote profile defaults to the type of the WAN port
present in the router: FR for Frame-Relay WANs (IDSL and some SDSL routers) or HSD for all ATM routers.
To see the current setting for a remote profile, use the remote list command and check the Interface in use
line. Changing the interface preference changes the lines presented in the display; phone numbers are displayed
only for asynchronous. See the example below.
async Asynchronous. This preference allows you to specify phone numbers and bit rates in the remote
profile.
fr Frame Relay.
hsd High-Speed Data. Use this option for ATM virtual circuits; in this case, phone numbers take the
form <VPI>*<VCI>.
Example:
The information displayed by a remote list command changes depending on the interface preference. The
following example shows how the information displayed changes from asynchronous to frame relay:
REMOTE SETPROTOCOL
Sets the link protocol for the remote router.
Note: The link protocol and encapsulation option must match those at the other end of the connection (the settings
in the DSLAM).
The encapsulation options are described in Encapsulation Options, on page 29. Protocol configuration is described
in Protocols to be Used, on page 35.
PPLLC PPP protocol with LLC SNAP encapsulation (used with frame relay internetworking units).
FRF8 This protocol implements ATM to frame relay as defined in the Frame Relay Forum FRF.8
Interworking Agreement.
Example:
REMOTE SETPVC
Specifies the PVC number for connecting to the remote router.
vpi number Virtual Path ID — number that identifies the link formed by the virtual path.
vci number Virtual Circuit ID — number that identifies a channel within a virtual path in a DSL/ATM
environment.
ipaddr IP address of the remote router, in the format of 4 decimals separated by periods.
mask IP network mask of the remote router, in the format of 4 decimals separated by periods.
REMOTE SETSPEED
Specifies the speed to be used when dialing out using the backup V.90 modem connected to the console port.
Specify a speed for each phone number you provide (primary and alternative).
For more information specifying phone numbers for the Dial Backup feature, see Specifying the Dialup
Parameters, on page 110.
bitrate Bit rate to be used for the phone number. Possible speeds are 38400, 57600, 115200, or 230400.
Example:
# Specifies the alternative phone number to be used and its bit rate.
ipaddr Target IP address of the WAN connection to the remote router, in the format of 4 decimals
separated by periods.
REMOTE SETTIMER
This command is used for dial-up connections and other connections that behave like dial-up connections, such as
L2TP and PPPoE sessions. The command sets the length of the timeout period before disconnection.
When the connection has had no traffic for the timeout period, the channel is deallocated. A channel is re-
allocated when it is needed.
A timeout period is desirable if your service provider charges by the hour. However, the connection has to wait a
few seconds each time a channel is re-allocated.
Note: The timeout period set by this command is not effective if a remote setMinLines command has changed
the minlines value from its default (0) to 1 or 2.
Example:
The following commands set up a timeout period so that, if there is no traffic for 10 minutes (600 seconds), the
channel is deallocated.
REMOTE START
If the remote is not currently active, this command attempts to start an active session.
Note: A reboot ends the active session; to start a session after the reboot, you must enter another remote start
command.
Example:
remote start HQ
REMOTE STATS
Shows the current status of the connection to the remote router, including the bandwidth and data transfer rate.
Response:
STATISTICS FOR <HQ>:
Current state ....................... currently connected
Current output bandwidth ............. 0 bps
Current input bandwidth .............. 0 bps
Current bandwidth allocated .......... 25600000 bps
On port ATM_VC/1 ..................... 0+01:02:36 (0%/0% of 25600000 bps)
Total connect time ................... 0+01:11:48
Total bytes out ...................... 15896
Total bytes in ....................... 0
where:
Current state: connected, not connected, currently connecting, currently attempting to connect, currently
closing, out of service, or not known.
REMOTE STOP
If the remote is active, this command stops the active session.
Note: To keep certain configuration changes, you must enter a save command before stopping the remote
interface.
The stop command does not disable the remote entry so another session can be started for the remote.To start an
active session for the remote, use the command remote start (page 322). To stop and immediately restart a
session for a remote, use the command remote restart (page 307).
Example:
The following command stops the active session for remote HQ.
remote stop HQ
REMOTE UNBINDIPVIRTUALROUTE
Removes a remote route from the named IP virtual routing table.
To list the remote routes, use the remote listIProutes command, page 305. To add a remote route, use the
remote bindIPVirtualRoute command, page 293.
Note: A route change in an IP virtual routing table takes effect immediately. However, the change is lost if it is
not saved before the next remote restart or reboot.
tablename IP virtual routing table from which the route is removed (character string).
Example:
This section contains subsections of commands applicable to specific WAN interfaces. The subsections are:
adsl ADSL (Asymmetric Digital Subscriber Line) commands See page 326.
ADSL ?
Lists the supported keywords.
adsl ?
Response:
ADSL commands:
? restart stats speed
ADSL RESTART
Resynchronizes the modem with the CO (Central Office) equipment.
adsl restart
Response:
# 12/02/1997-12:47:46:ADSL: Idle
12/02/1997-12:47:46:ADSL: Startup initiated
12/02/1997-12:47:48:ADSL: Startup training in progress
12/02/1997-12:47:54:ADSL: Modem started successfully
12/02/1997-12:47:54:ADSL: Near Avg SQ #: 44 dB [ 3]
12/02/1997-12:47:54:ADSL: Far Avg SQ #: 44 dB [ 3]
12/02/1997-12:47:54:ADSL: Downstream rate: 6272 Kb/s, Upstream rate:
1088 Kb/s
12/02/1997-12:47:54:DOD: connecting to internet @ 0*38 over ATM_VC/1
12/02/1997-12:47:56:ADSL: Data Mode
DUM: BR CHG ATM_VC/1 - to internet now forwarding
ADSL SPEED
Displays the current downstream and upstream rates.The actual speed is set by the DSLAM.
adsl speed
Response:
downstream rate: 6272 Kb/s, upstream rate: 1088 Kb/s
Response:
ASDL Statistics:
Out of frame errors ..... 0
HEC errors received ..... 0
CRC errors received ..... 0
FEBE errors received .... 0
Remote Out-of-frame ....... 0
Remote HEC errors ......... 0
atm pcr Sets the upstream data rate in cells per second (pcr) or kilobits per second (speed).
atm speed
Commands available to help debug ATM problems are listed on page 204 and page 207.
ATM ?
Lists the supported keywords.
atm ?
Example: atm ?
Response:
ATM commands:
? save speed
pcr
ATM PCR
Sets the speed of the ATM link in cells per second.
The default upstream speed is 768 cells/second. Generally, your Network Service Provider should provide you
with your speed value. If your service provider states your speed value in kilobits per second, enter the value using
the command atm speed (page 329).
Note: The speed value you enter may not be the actual upstream speed you get. When the command changes the
processor clocks, only certain discrete values are allowed. The speed you get is the allowed speed value that is
equal to or the next lower value to the value you entered (see the example below).
cells/second Upstream speed in cells/seconds as provided by your service provider (integer, 294 through
18867). If you omit this value, a message states the current upstream speed.
Examples:
# atm pcr
ATM Upstream Rate: 326 Kb/sec or 768 cells/sec
ATM SAVE
Saves the ATM configuration settings.
atm save
ATM SPEED
Sets the speed of the ATM link in kilobits per second.
The default upstream speed is 326 Kb/s. Generally, your Network Service Provider should provide you with your
speed value. If your service provider states your speed value in cells per second, enter the value using the
command atm pcr (page 328).
Note: The speed value you enter may not be the actual upstream speed you get. When the command changes the
processor clocks, only certain discrete values are allowed. The speed you get is the allowed speed value that is
equal to or the next lower value to the value you entered (see the example below).
Kb/s Upstream speed in kilobits/second as provided by your service provider (integer, 125 three
8000). If you omit this value, a message states the current upstream speed.
Examples:
# atm speed
ATM Upstream Rate: 326 Kb/sec or 768 cells/sec
The following command requests a speed of 512 kilobits/second. However, 512 is not one of the discrete speed
values allowed, so the next lower value, 500 kilobits/second, is set, as indicated by the message.
REMOTE SETATMTRAFFIC
Sets ATM traffic-shaping on a remote router. ATM traffic-shaping allows the user to set the average rate at which
cells are sent, that is, the Sustained Cell Rate (SCR), to a value lower than the ATM link speed, the Peak Cell Rate
(PCR).
If no ATM traffic values are set, ATM traffic for the remote is shaped using UBR (unspecified bit rate).
If a CBR (constant bit rate) is required, then specify 1 as the Maximum Burst Size (MBS). If a VBR (Variable Bit
Rate) is required, specify a value greater than 1 as the Maximum Burst Size (MBS).
mbs Maximum Burst Size (cells). For a constant bit rate (CBR), specify 1; for a variable bit rate
(VBR), specify a value greater than 1.
Examples:
Assuming that the ATM link speed (upstream) is 200 Kb/s 471 cells/s and an average upstream data rate of 20
Kbps (47 cells/s) is desired, you would issue the following command:
remote setATMtraffic 47 31 HQ
remote setATMtraffic 47 1 HQ
remote setATMtraffic 0 0 HQ
DMT LINK
Selects the link type for the ADSL DMT router. The link type survives reboots.
Normally, the CO and CPE negotiate the link type to be used. Use the dmt link command when you do not want
the CO and CPE to negotiate the link type, but instead want to specify the type of data link required.
Caution: This command forces the CPE into the specified mode. It is not for normal use.
DEFAULT Default value. The CO and CPE negotiate the link type used.
DMT MODE
The dmt mode command can request one of three modes: ANSI, no_Trellis_ANSI, and UAWG.
No Trellis encoding for T1.413 ANSI ADSL is only needed where auto-negotiation is not supported for Trellis.
• This Dual-Ethernet router may be configured via the Web Browser GUI or from the Command Line Interface
(CLI). To set up any DHCP options and to configure optional features like IP filtering, you must use the CLI.
• For configuration information, refer to Dual-Ethernet Router Configuration, on page 47 and the Customer
Release Notes provided with the Dual-Ethernet router.
• If you use the Boot from Network option from the boot menu to perform a boot code update, the boot
request is sent from the ETH/0 interface only.
ETH BR ENABLE
Enables bridging in a Dual-Ethernet environment. This command requires rebooting the router for the change to
take effect.
eth br enable
ETH BR DISABLE
Disables bridging in a Dual-Ethernet environment.
Note: This command requires rebooting the router for the change to take effect.
eth br disable
ETH BR OPTIONS
Sets controls on bridging for the Ethernet interface To see the current bridge settings for the Ethernet interface,
use the eth list command.
Warning: Do not change the stp setting without approval from your system administrator.
Set this option to on to use the Spanning Tree Protocol (STP). The default is on.
STP is used to detect bridging loops. Set this option to off only if the bridging peers do not support
the Spanning Tree Protocol or if you are certain that no bridging loops could exist. When STP is
disabled on an interface, any STP packets received on that interface are ignored.
Note: The Spanning Tree Protocol adds a 40-second delay each time the ADSL or ATM link
comes up while the interface determines if there is a bridging loop.
pppoeOnly
Set this option to on to limit this Ethernet port to bridging PPPoE traffic only. If the option is set to
off, then the port can bridge any traffic, including PPPoE traffic. The default is off.
Examples:
The following command turns off the spanning tree protocol for Ethernet port 0.
The following command configures Ethernet port 1 so that only PPPoE traffic is bridged through it.
FRAME ?
Lists the frame commands.
frame ?
Example:
# frame ?
Frame Commands:
? help lmi
cmpPlay voice
FRAME CMPPLAY
Selects activation in routing or bridge mode. The default is routing mode. This command is applicable only when
the router is configured using Copper Mountain Plug & Play (see Bridge or Router?, on page 49).
Example:
FRAME LMI
Turns frame LMI either on or off.
Example:
# frame lmi on
LMI is on
FRAME STATS
Displays frame relay statistics.
frame stats
Example:
# frame stats
FR/0 Frame Relay Statistics
ANSI LMI:
Protocol Errors........................ 0
Unknown Msg Recv....................... 0
T391 Timeouts.......................... 0
PVC Status Changes..................... 0
StatusEnq Sent......................... 0
Status Recv............................ 0
StatusEnq Recv......................... 0
Unconfigured DLCIs recv in Status Msgs. 0
FRAME VOICE
Displays the voice DLCI for voice routers.
frame voice
Example:
HDSL Commands
Use the following commands to manage the HDSL (High-Speed Digital Subscriber Line) link for an HDSL
router.
• Line activation
Line activation is independent of network settings. During activation, the Link light (on the front panel of
the router) first is yellow and then turns green when the link becomes active.
The router at the CPE end will try auto-speed detection, starting at 384 and then try to detect the next
higher speed (for about 30 seconds per speed). The WAN light should turn yellow, then green, when the
link has activated.
Auto-speed detection can be turned off with the command hdsl speed noauto.
If the line was previously set to “no auto-speed” (noauto), the Link light will be amber instead, when the
line tries to activate.
The ifs command displays the Link as either off or opened when successfully activated. Following is a
sample output.
Sample:
ifs
Interface Speed In % Out % Protocol State
Connection
ETHERNET/0 10.0mb 0%/0% 0%/0% (Ethernet) OPENED
HDSL/0 384kb 0%/0% 0%/0% (HDSL) OPENED
CONSOLE/0 9600 b 0%/0% 0%/0% (TTY) OPENED
• Auto-speed sequence
Auto-speed starts with the lower speed (384) and then tries to activate for 30 seconds. If no activation
takes place, it attempts the next higher speed. The time intervals between activation may change if the
modems don’t activate as expected. Following is a correct activation output.
03/09/1998-17:11:59:HDSL: Deactivated
03/09/1998-17:12:22:HDSL: CPE is Activating at 384 Kb/s
03/09/1998-17:13:00:HDSL: Deactivated
03/09/1998-17:13:01:HDSL: CPE is Activating at 1168 Kb/s
03/09/1998-17:13:32:HDSL: Deactivated
03/09/1998-17:13:32:HDSL: CPE is Activating at 1168 Kb/s
03/09/1998-17:14:11:HDSL: Deactivated
03/09/1998-17:14:12:HDSL: CPE is Activating at 384 Kb/s
03/09/1998-17:14:51:HDSL: Activated
03/09/1998-17:14:53:FRAMER: The framer is synchronized
hdsl ?
Example: hdsl ?
Response:
HDSL commands:
? help terminal
save speed
HDSL SAVE
Saves the HDSL-related changes across restarts and reboots.
hdsl save
HDSL SPEED
Manages the line speed for the HDSL interface, as follows
CO end: Sets the speed manually on the Central Office (CO) end only.
CPE end: The router on the Customer Premises End (CPE) is always in auto-speed mode: it uses an auto-speed
algorithm to attempt to match the CO speed. The command hdsl speed noauto is used to override auto-speed.
Note 1: The command hdsl speed (with no option) displays the current speed if the modem has activated
successfully.
Note 2: hdsl speed noauto should be followed by the command hdsl save to be persistent across restarts and
reboots.
Note 3: During auto-speed search, use the command hdsl speed <speed> to stop the search and restart it at the
speed you just entered.
HDSL TERMINAL
The router is by default configured as the Customer Premises Equipment (CPE). Use this command if you intend
to configure the router as the Central Office equipment (CO).
Response:
Customer Premises
• Your IDSL switch setting indicates your committed bandwidth (FR64, FR128, or FR144).
• The IDSL router can support several DLCI virtual circuits over a Frame-Relay IDSL link. However, a typical
connection to the Internet requires only one DLCI. The DLCI number must match the DLCI of the remote
end.
This section describes the following commands used to manage your IDSL router:
idsl list Lists the current Frame Relay switch type (FR64, FR128, or FR144).
idsl set speed Changes the IDSL speed (64, 128, or 144).
remote setdlci Specifies the DLCI for the remote router entry.
remote setprotocol Selects the link protocol for the remote router entry (PPP, Frame Relay, or MER).
IDSL LIST
Lists the current switch type. To change the switch type, use the idsl set switch command.
idsl list
Example:
# idsl list
Switch type is FR128
IDSL SAVE
Saves IDSL-related changes across restarts and reboots. Changes that are not saved are discarded.
idsl save
Example:
# idsl save
Example:
Example:
REMOTE SETDLCI
This command sets the DLCI for the remote router entry. The DLCI (Data Link Connection Identifier) is an
address identifying a logical connection in a Frame Relay environment. The DLCI is generally provided by the
Network Service Provider.
The IDSL router can support several DLCI virtual circuits over a Frame-Relay IDSL link. However, a typical
connection to the Internet requires only one DLCI. The DLCI number must match the DLCI of the remote end.
Line activation is independent of network settings. During activation, the LINK LED (on the front panel of
the router) is first amber and then turns green when the link becomes active. The WAN LED should turn
amber, then green, when the link has activated.
If auto-speed detection was turned off for the line (sdsl speed noauto), the Link LED is red when the line
tries to activate.
The ifs command displays the Link as either off or opened when it has successfully activated. The following
is a sample output.
Sample:
ifs
Interface Speed In % Out % Protocol State
Connection
ETHERNET/0 10.0mb 0%/0% 0%/0% (Ethernet) OPENED
SDSL/0 384kb 0%/0% 0%/0% (ATM) OPENED
CONSOLE/0 9600 b 0%/0% 0%/0% (TTY) OPENED
In general, the line activates at the speed it was last activated. The line speed can be changed by several
means depending on the router model. One way is by setting the speed manually with an sdsl speed
command.
In general, if the speed is not set otherwise, the router at the CPE end will try auto-speed detection (unless it
has been disabled).
Auto-speed detection attempts to activate the line at different speeds (for about 30 seconds per speed) until
the line is activated. The LINK LED may flash more rapidly when faster speeds are being attempted. The
following is output from a successful activation.
03/09/1998-17:11:59:SDSL: Deactivated
03/09/1998-17:12:22:SDSL: CPE is Activating at 768 Kb/s
03/09/1998-17:13:00:SDSL: Deactivated
03/09/1998-17:13:01:SDSL: CPE is Activating at 1152 Kb/s
03/09/1998-17:13:32:SDSL: Deactivated
03/09/1998-17:13:32:SDSL: CPE is Activating at 1152 Kb/s
03/09/1998-17:14:11:SDSL: Deactivated
03/09/1998-17:14:12:SDSL: CPE is Activating at 384 Kb/s
03/09/1998-17:14:51:SDSL: Activated
03/09/1998-17:14:53:FRAMER: The framer is synchronized
Autobaud pre-activation
The previous section showed an example in which auto-speed detection attempted several speeds, before
settling on the best speed for the connection. In some cases, this process can require substantial time. The
autobaud feature, if available for your router and DSLAM, can shorten the connection set-up time by
determining the probable optimal speed before the connection begins.
If the autobaud feature is available and selected, its pre-activation phase automatically determines the
maximum speed that can be supported by a specific loop. It probes the channel and characterizes the line to
allow the connection to begin at a speed closer to the optimal speed.
Later, after activation, the autobaud feature checks the line quality to determine the optimal speed. If the
autobaud feature is used, the auto-speed detection described in the previous section is not performed;
however, you may still set the speed manually with an sdsl speed command if you wish.
A command is available to turn off autobaud pre-activation (sdsl preact off, page 344). A message is sent
before line activation indicating whether autobaud pre-activation was used. The following example shows the
message sent when pre-activation is available and the response to the sdsl speed command:
The next example shows the message sent when pre-activation is not available:
SDSL ?
Lists the supported keywords for the sdsl command.
sdsl ?
Example:
# sdsl ?
SDSL commands:
? help speed
save stats terminal
The default status is on. However, to be effective, autobaud pre-activation must also be enabled at the Central
Office (CO) end of the connection.
Note: Remember to enter an sdsl save or save command to save SDSL changes across restarts and reboots.
For more information on the autobaud feature, see Autobaud pre-activation, on page 343.
on Enables pre-activation at the customer premises (CPE) end. (To be effective, pre-activation must also be
enabled at the CO end.)
Example:
The first command displays the current pre-activation status. The second command disables pre-activation.
# sdsl preact
Preactivation enabled
# sdsl preact off
Preactivation disabled
SDSL SAVE
Saves SDSL configuration changes across restarts and reboots.
sdsl save
SDSL SPEED
Manages the speed of the SDSL line.
At the Central Office (CO) end, the command sets the speed manually only.
• Display the current speed setting and list the available speeds (sdsl speed)
speed Speed in kbps. To see the speeds available for the model type, enter sdsl speed. If the auto-speed
search is in progress, this command stops the search and sets the line speed as specified on the
command.
noauto Overrides auto-speed detection. If auto-speed detection is disabled, the Link light on the front panel
is amber when the line tries to activate.
Example:
The example shows three commands:
1. Displays the current line speed, indicates that the line speed is set by auto-speed detection [AUTO], and
lists the available speed options.
2. Requests a line speed of 1152 Kb/s.
3. Shows that the line speed has been changed to 1151 Kb/s and that auto-speed detection is no longer in
effect (the [AUTO] indicator is not displayed).
# sdsl speed
SDSL Current Speed: [AUTO] 768 Kb/s
usage: sdsl speed <value in Kb/s> [ 192 384 768 1152 1536 ] | noauto
# sdsl speed 1152
# sdsl speed
SDSL Current Speed: 1152 Kb/s
usage: sdsl speed <value in Kb/s> [ 192 384 768 1152 1536 ] | noauto
SDSL STATS
Displays SDSL frame statistics. It can also clear the SDSL statistic counters.
Example:
# sdsl stats
FRAMER Statistics:
Framer Interrupts...... 2118
Out of frame errors.... 1
HEC errors received.... 16
CRC errors received.... 3
FEBE errors received... 2
Remote Out-of-frame.... 16
Remote HEC errors...... 0
SDSL TERMINAL
Displays and/or changes the router’s status as CO or CPE.
Example:
# sdsl terminal
Customer Premises
# sdsl terminal co
Central Office
SHDSL Commands
The commands in this section manage the WAN link for a G.shdsl router.
SHDSL ?
Lists the supported keywords for the shdsl command.
shdsl ? | help
Example:
# shdsl ?
SHDSL commands:
? help terminal
restart stats speed
ver annex rateMode
SHDSL ANNEX
Selects annex A or annex B of the G.shdsl standard. The annex used depends on the DSLAM the router is to
connect to. In general, annex B is used in Europe and annex A is used in the rest of the world.
To see the current annex selection, enter shdsl annex without a parameter.
shdsl annex [ A | B]
Example:
# shdsl annex
Annex A
# shdsl annex B
SHDSL LIST
Lists the current configuration of the G.shdsl interface.
shdsl list
Example:
# shdsl list
G.SHDSL INTERFACE CONFIGURATION:
Terminal ..................... CPE
GTI SHDSL version ............ R1.2
Requested speed .............. 2312 Kb/s
Actual speed ................. 0 Kb/s
Startup margin ............... 6 dB
Rate mode .................... Adaptive
Annex ........................ B
SHDSL MARGIN
Specifies the acceptable noise margin in decibels. If the connection is unstable, you may need to increase the
margin.
To see the current noise margin, enter shdsl margin without a parameter.
shdsl margin [ dB ]
Example:
# shdsl margin
Margin = 6
# shdsl margin 7
To see the current rate mode, enter shdsl rateMode without a parameter.
Example:
# shdsl ratemode
Adaptive
# shdsl ratemode fixed
SHDSL RESTART
Restarts the G.shdsl WAN interface. (Unlike a reboot, a restart does not discard unsaved changes.)
Note: The WAN interface is restarted automatically when you change the speed (shdsl speed) or change the CO
or CPE designation (shdsl terminal).
shdsl restart
SHDSL SAVE
Saves SHDSL configuration changes across restarts and reboots.
(To save SHDSL changes and all other configuration changes, use the command save.)
shdsl save
SHDSL SPEED
Manages the speed of the SHDSL line.
Note: By default, it is assumed that the router is Customer Premises Equipment (CPE) and the line speed desired
is the maximum allowed by the central office (CO).
• Display the current requested speed and actual speed (shdsl speed with no parameter).
• Manually set the speed (shdsl speed <speed>) (You might request a lower speed to improve stability.)
Note: A speed change automatically restarts the G.shdsl WAN interface. Remember to save the speed change
if you want it to persist across reboots.
speed Requested speed in kbps. The possible speeds range from 72 kbps to 2312 kbps in increments of 64
kbps. If you specify a value between steps, the speed is set to the next lower step.
auto Selects auto-speed detection. Enter the command shdsl restart to carry out this change.
Example:
# shdsl speed
Requested speed: 2312 Kb/s
Actual speed: 2312 Kb/s
# shdsl speed 1096
SHDSL STATS
Displays SHDSL statistics. The statistics are kept for 24 hours and then cleared. You can also manually clear the
statistics with the clear option.
Statistics kept include: line signal quality (SQ), loss of sync word (LOSW), far end bit error (FEBE), and loop
attenuation (Loop Attn).
Example:
# shdsl stats
SHDSL 24hr statistics displayed in time period of 15 minutes:
By default, the router is assumed to be CPE. Use this command if you intend to use the router as CO.
To determine the current CO/CPE setting, enter shdsl terminal without a parameter.
Example:
# shdsl terminal
We are in CPE mode
Usage: shdsl terminal [co|cpe]
# shdsl terminal co
SHDSL VER
Displays the G.shdsl version level of the modem firmware.
shdsl ver
Example:
# shdsl ver
GTI SHDSL Version R1.2
DHCP Commands
The following DHCP (Dynamic Host Configuration Protocol) commands allow you to:
• Enable/disable BootP.
To read about DHCP concepts and the DHCP configuration process, see DHCP (Dynamic Host Configuration
Protocol), on page 85.
dhcp ?
Response:
Sub-commands for dhcp
? help set
list bootp clear
enable add addrelay
del delrelay disable
DHCP ADD
Provides one of three types of DHCP definitions: subnetwork, client lease, or option type.
To delete any of these DHCP definitions, use the command dhcp del (page 355).
Defines a subnetwork:
Example:
Example:
Example:
The code, 128, allows IP addresses, the server has a minimum of one, up to a maximum of four, IP addresses,
and the type is “ipaddress”).
DHCP ADDRELAY
Adds an address to the DHCP relay list. (This list is also the BootP server list.) To see the current server address,
use the command dhcp addrelay with no parameters.
While the relay list contains at least one address, the DHCP server in the router is disabled, and the router
forwards all DHCP requests and BootP requests to all servers in the relay list. (A DHCP request is issued
whenever a device attempts to acquire an IP address). It forwards every reply received from any of the servers in
the relay list to the appropriate LAN.
To remove an address from the list, use the dhcp delRelay command (page 355). For further discussion, see
Configuring BootP/DHCP Relays, on page 92.
Example:
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
Note: Be sure to specify the TFTP server IP address when you specify the file using the command dhcp bootp
tftpserver (page 355).
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
name Name of the file to boot from; the default name for this file is KERNEL.F2K.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
tftpserver ipaddr IP address of the TFTP server in the format of 4 decimals separated by periods. To clear the
IP address of the server, use 0.0.0.0.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
Unlike erase dhcp, this command clears all DHCP information from memory, but leaves the DHCP.DAT file
intact. If you want to clear the information in the DHCP.DAT file as well, enter a save command after dhcp clear
all records.
Example:
Note: The client is not updated; it still has the old value.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
code Code can be a number between 1 and 61 or a keyword. Use the command dhcp list
definedoptions to list the codes and keywords.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
DHCP DELRELAY
Removes an address from the DHCP relay list. (This list is also the BootP server list.)
To remove all addresses from the list, use dhcp delRelay all. If you remove all addresses from the DHCP relay
list, the DHCP server is re-enabled and resumes processing DHCP requests and also BootP requests (if BootP
processing is enabled).
To add an address to the list, use the dhcp addRelay command (page 352). For further discussion, see
Configuring BootP/DHCP Relays, on page 92.
Examples:
DHCP DISABLE
Disables a subnetwork or a client lease.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
DHCP ENABLE
Enables a subnetwork or a client lease.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
DHCP LIST
Lists global, subnetwork, and client lease information.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
Example 1:
The following command lists global information:
#dhcp list
bootp server............... none
bootp file.................
DOMAINNAMESERVER (6)....... 192.168.210.20 192.84.210.21
DOMAINNAME (15)............ efficient.com
WINSSERVER (44)............ 192.168.254.73
Subnet 192.168.254.0, Enabled
Mask....................... 255.255.255.0
first ip address........... 192.168.254.2
last ip address............ 192.168.254.253
lease...................... Default
Example 2:
Note: For description of the predefined options listed below, refer to RFC 1533. A predefined code can be a
number between 1 and 61 or a keyword. A user-defined code can be a number between 128 and 254 or a keyword.
Example 1: To list all available options (they may be predefined as in the list below, and/or user-defined),
enter:
dhcp list definedoptions
Example 1:
The following command lists all available options (predefined and user-defined):
Example 2:
The following command lists options starting with the string “ga”:
Response:
Default lease time ......... 168 hours
Note 2: The client information does not get updated. It will still have the old value.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
hours Lease time; minimum is 1 hour; the global default is 168 hours.
default Lease time that has been specified at the subnetwork or global level.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
ipaddr IP address of the client lease in the format of 4 decimals separated by periods.
hours Lease time; minimum is 1 hour; the global default is 168 hours.
default Lease time that has been specified at the subnetwork or global level.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
net IP address of the subnetwork lease in the format of 4 decimals separated by periods.
continue The router’s DHCP server continues sending DHCP requests, even if another DHCP server is
detected on the LAN.
stop The router’s DHCP server stops sending DHCP requests when another DHCP server is detected
on the LAN.
ipaddr Specify the client IP address if the option value applies only to the client lease (4 decimals
separated by periods).
net Specify the subnetwork IP address if the option value applies only to the subnetwork lease (4
decimals separated by periods).
code Code specifying the option to be set. It can be a number between 1 and 61 or a keyword. Use
the command dhcp list definedoptions to list the codes and keywords (see DHCP LIST
DEFINEDOPTIONS, on page 357.)
value Value to be assigned to the specified option. It could be a byte, word, signed long, unsigned
long, binary, IP address, or string depending on the option.
Example 1: This command does not specify an client or subnetwork address, and thus sets a global value
for the domainnameserver option.
dhcp set valueoption domainnameserver 192.168.254.2 192.168.254.3
Example 3: This command sets a value for the winserver option associated with a specific client.
dhcp set valueoption 192.168.254.251 winserver 192.168.254.7
Example 4: This command sets a static route (option 33) to IP address 192.168.253.253 through router
192.168.254.254. (No mask is specified.)
This section contains L2TP command descriptions. For a complete discussion of L2TP tunneling, see L2TP
Tunneling — Virtual Dial-Up, on page 137.
• Names
• Addresses
• Restrict a tunnel so it can be established only with a specific remote interface (l2tp set wanif).
Note: Two remote commands specific to L2TP are included in this section.
L2TP ?
Lists the supported keywords.
l2tp ?
Response:
L2tp Sub-commands:
? add del
forward list set
call close
L2TP ADD
Creates a tunnel entry.
TunnelName Name of the tunnel (character string). The name is case sensitive.
L2TP CALL
This command is primarily used for debugging purposes and it establishes a tunnel without creating a session.
TunnelName Name of the tunnel (character string). The name is case sensitive.
L2TP CLOSE
Closes an L2TP tunnel and/or session.
-n TunnelName Name of the tunnel (character string). The name is case sensitive.
L2TP DEL
Deletes a tunnel entry.
L2TP FORWARD
The router can be configured to forward all incoming calls to an LNS without answering the incoming call. This
feature is normally used when the router is acting as a LAC or both a LAC and LNS.
Note: Only one tunnel entry can have this option set.
L2TP LIST
Provides a complete display of the current configuration settings for tunnel(s), except for the authentication
password/secret.
TunnelName Name of the tunnel (character string). The name is case sensitive.
# l2tp list
INFORMATION FOR <pacingAtWork>
type ........................... L2TPClient (LAC-will not dial)/LNS
All Incoming Calls Tunneled here . no
CHAP challenge issued .......... yes
hidden AVPs used ............... yes
sequencing/pacing .............. window pacing
sequencing/pacing is ......... required
window size for sequencing/pacing 10
ip address ..................... 10.0.0.1
Our host name .................. pacingAtHome
Note 1: When a remote router tries to create a tunnel, the remote router’s IP address is not authenticated .
Note 2: If this command is not used, then <ipaddr> defaults to 0.0.0.0, and this end cannot initiate the tunnel.
on Enables authentication.
secret CHAP secret (character string) used to authenticate the creation of the tunnel.
TunnelName Name of the tunnel (character string). The name is case sensitive.
no This option prevents the router from placing outgoing calls.The default is no.
yes This option lets the router hide AVPs. The default is yes.
TunnelName Name of the tunnel (character string). The name is case sensitive.
Use this command when you want to specify a source IP address other than the WAN interface IP address. For
example, if NAT (network address translation) is not being used, all IP addresses on the Ethernet LAN would be
visible. You could then specify, as the source IP address, the Ethernet IP address of the router (which would be
visible) instead of the WAN interface IP address.
ipaddr Source IP address used for this tunnel (four decimals separated by periods).
password Router’s secret/password used for authentication when challenged by another router.
name Name of the router that is used for authentication when challenged by another router.
TunnelName Name of the tunnel (character string). The name is case sensitive.
Note: If this command is not used, then, if it has been specified, the <name> from the l2tp set ourSysName
command or the <name> from the command system name <name> is used.
name Host name of the local router. This is the fully qualified domain name of the local router.
TunnelName Name of the tunnel (character string). The name is case sensitive.
Note: If this command is not used, then <TunnelName> of the tunnel entry is used.
name Host name of the remote tunnel. This is the fully qualified domain name of the remote host.
all The router is configured to act as both a LAC/L2TP client and an LNS server.
l2tpclient The router is configured to act as an L2TP client for this tunnel.
If this command is not used, no remote interface restriction is enforced. For example, no restriction would be
enforced when the Dial Backup feature is used (see page 109). Thus, the tunnel would be terminated and re-
established when switching back and forth between the primary interface and the backup interface. If the tunnel is
to established only with the primary interface or only with the backup interface, you must specify that restriction
with this command.
To clear the remote restriction for a tunnel, enter the l2tp set wanif command with a hyphen (-) as the remote
name.
remote Name of the remote router profile that must be used when establishing the L2TP tunnel. To list the
remote routers, use the command remote list.
For the dual-Ethernet router, specify the physical interface name, that is, either ETHERNET/0 or
ETHERNET/1.
To clear the remote restriction for a tunnel, enter a hyphen (-) as the remote name.
Examples:
This command restricts the tunnel named OfficeTunnel to the remote interface named officertr.
This command clears the remote interface restriction for the tunnel named OfficeTunnel.
This command restricts the tunnel named OfficeTunnel to the physical interface ETHERNET/1.
sequencing Sequence numbers are placed in the L2TP payload packets. With this option, one end instructs
the other end to send sequence packets. No acknowledgments are issued for received packets.
pacing Sequence numbers are placed in the L2TP payload packets. When a session is created, the
router specifies a window size. Acknowledgments for received packets are issued.
nosequencing No sequence numbers are placed in the L2TP payload packets carrying the PPP packets. If the
remote end carries out sequencing or pacing, the router can still send and receive sequenced
packets.
size Controls the size of the receive window for receiving packets for sequencing or pacing, when a
session is created. Size can be 0 for packet sequencing. Must be a non-zero value for window
pacing. Size must be less than or equal to 30.
REMOTE SETL2TPCLIENT
With this command, this remote is the path to the L2TP client and accepts tunnel calls. Use this command if your
router acts as an LNS. You must also specify PPP authentication and IP routes for this remote.
remoteName Name of the remote entry (character string). The name is case sensitive.
REMOTE SETLNS
With this command, this remote is the path to the LNS, and it will forward the incoming call (which matches this
remote entry) through the tunnel named <TunnelName> if your router is the client.
Note: The remote entry must also have appropriate information such as PPP authentication, IP routing, IPX
routing, bridging, or Caller ID.
Bridge filtering allows you to control the packets transferred across the router. This feature can be used to enhance
security or improve performance. Filtering is based on matched patterns within the packet at a specified offset.
Two filtering modes are available.
• Deny mode will discard any packet that matches the deny filter database and let all other packets pass.
• Allow mode will only pass the packets that match the allow filter database and discard all others.
Up to 40 deny and 40 allow filters can be activated from the filter database.
FILTER BR ?
Lists the supported keywords.
filter br ?
Response:
Bridge filter commands:
? add del
use list
FILTER BR ADD
Adds a bridging filter to the filtering database. The filter can allow or deny the forwarding of packets based on
the contents of the packets. The command specifies the position within the packet that is checked and the data that
must appear in that location in order for the packet to match this filter.
Example:
This filter prevents forwarding of RARP packets across the bridge. The data at byte offset 12 in each packet is
checked and, if the data is hex 8035, the packet is denied forwarding.
FILTER BR DEL
Deletes a bridging filter from the filtering database. The parameters on the command identify the filter to be
deleted.
Example:
This command deletes the filter which denies the forwarding of packets that have the hex value 8035 at byte offset
12.
FILTER BR LIST
Lists the bridging filters in the filtering database.
filter br list
Response:
Allow Filter:
Deny Filter:
pos:12, len=2, <80><35>
FILTER BR USE
Sets the mode of filtering to either deny, allow, or none.
This section contains the commands that are specific to PPPoE (PPP over Ethernet). To learn more about PPPoE
configuration and management, see page 103.
REMOTE SETPPPOESERVICE
Defines the remote router entry as a PPPoE remote entry. It also specifies the service to which PPPoE users
connect through this remote entry.
Note: Enter this command immediately after the remote add command that defines the remote router entry.
service Name of the PPPoE service to which this remote connects PPPoE users. The service provider
defines the name of its service. The name is case-sensitive.
Example:
The following commands define the remote router used to connect to the PPPoE service DialUpPPP.net. Note that
the remote setPPPoEservice command is entered immediately after the remote add command.
PPPOE CLOSE
Closes a currently active PPPoE session. To see the currently active PPPoE sessions, enter pppoe list.
ifsnumber Session to be closed. Specify the PPPoE/Ifs number for the session as shown in the ifs or pppoe
list command output.
Example:
# pppoe list
PPPoE Client Session ...... DialUpPPP.net
PPPoE/Ifs number..... 1
Access Concentrator.. 15021109931568-efficient
Peer MAC Address .... 00:10:67:00:66:E2
Session ID .......... 2
State ............... 2
Flags ............... 1
# pppoe close 1
PPPOE LIST
Lists information about the currently active PPPoE sessions.
pppoe list
Output Fields:
PPPoE/Ifs number. . . . . Number identifying the session. It is used on the pppoe close command.
Access Concentrator . . . Identification of the access concentrator to which the session is connected.
Session ID. . . . . . . . . . . Identification of the session by the access concentrator. The service provider
needs this ID to find the access concentrator log for the session.
Flags . . . . . . . . . . . . . . . Internal flag. Currently, the only defined value is 1, indicating that this is a client
PPPoE session.
Example:
# pppoe list
PPPoE Client Session ...... DialUpPPP.net
PPPoE/Ifs number..... 1
Access Concentrator.. 15021109931568-efficient
Peer MAC Address .... 00:10:67:00:66:E2
Session ID .......... 2
The IKE software option and the IKE commands are described in IPSec (Internet Protocol Security), on page 149.
Additional IKE debug commands are listed in IKE Debug Commands, on page 208.
IKE COMMIT
Determines whether the IKE commit bit is set. By default, the commit bit is not set (off). To see the current
setting, enter ike commit with no parameter.
If packets are not being processed correctly across an IPSec tunnel, try ike commit on so that the commit bit is
set. Setting the commit bit makes sure that no IPSec traffic arrives at the router before the router is ready for it.
For more information about IKE, see IPSec (Internet Protocol Security), on page 149.
IKE FLUSH
Clears all IKE configuration information from the router. For more information about IKE, see IPSec (Internet
Protocol Security), on page 149.
ike flush
PolicyName New name for an IPsec policy. To see the policy names in use, use the ike ipsec policies list
command.
PolicyName Name of an existing IPsec policy. To see the policy names, use the ike ipsec policies list
command.
PolicyName Name of an existing IPsec policy. To see the policy names, use the ike ipsec policies list
command.
PolicyName Name of the IPsec policy. To see the policy names, use the ike ipsec policies list command.
Example:
IPaddress IP address allowed to be the destination of the data (4 decimals separated by periods).
PolicyName Name of the IPsec policy to which the destination parameter value is added. To see the policy
names, use the ike ipsec policies list command.
ike ipsec policies set destport <PortNumber | TELNET | HTTP | SMTP | TFTP | *> <PolicyName>
PortNumber Destination port whose data is allowed by the policy. The port can be specified by one of
TELNET the listed names or by its number. To allow data through for any destination port, specify an
HTTP asterisk (*).
SMTP
TFTP
*
PolicyName Name of the IPsec policy to which the destination port parameter value is added. To see the
policy names, use the ike ipsec policies list command.
Note: The specified interface must be the interface to the IKE peer.
Otherwise, if the policy can be used regardless of the connected interface, specify the string none.
This command is intended to allow the user to choose when to apply IPSec/IKE filters and incur the resulting
encryption and authentication costs. With this command, you can limit a policy to a specific interface.
interface Interface that must be connected when the policy is used. This is usually referenced by a
remote name, although it could be another interface such as “ethernet/0”. If no interface
restriction is to be set for this policy, specify the string all.
PolicyName Name of the IPsec policy to which the interface parameter value is added. To see the policies,
use the ike ipsec policies list command.
Examples:
This command requires that, when the remote interface backup comes up, IKE is enabled for packets
described by policy corporate. The specified interface (backup) must be the interface to the IKE peer.
This command specifies that IKE is enabled for packets described by policy mypolicy regardless of the
interface the peer is on.
TUNNEL Encapsulation method required for the connection. The default is TUNNEL.
TRANSPORT
PolicyName Name of the IPsec policy to which the encapsulation mode parameter value is added. To see
the policy names, use the ike ipsec policies list command.
PeerName Name of an IKE peer. To see the IKE peer names, use the ike peers list command.
PolicyName Name of the IPsec policy to which the peer parameter value is added. To see the policy
names, use the ike ipsec policies list command.
If you specify 1 or 2, Perfect Forward Secrecy is performed using the specified Diffie-Hellman group (1 or 2). If
you specify none, then Perfect Forward Secrecy is not required for this connection and no Diffie-Hellman group
is used to encrypt the keys during rekey. To read more about PFS, see IKE Management, on page 151
none Perfect Forward Secrecy negotiation is not required for this connection.
PolicyName Name of the IPsec policy to which the pfs parameter value is added. To see the policy names,
use the ike ipsec policies list command.
Unlike the other filtering parameters, the policy may allow more than one value for the proposal parameter. For
example, two set proposal commands could specify two proposals, either of which could be used by the
connection. See IKE IPSec Policy Commands, on page 157.
PolicyName Name of the IPsec policy to which the proposal parameter value is added. To see the policy
names, use the ike ipsec policies list command.
ike ipsec policies set protocol <ProtocolNumber | TCP | UDP | *> <PolicyName>
ProtocolNumber Protocol required by the policy. The protocol can be specified by number or by name
TCP (TCP or UDP). To allow data through for any protocol, specify an asterisk (*).
UDP
*
PolicyName Name of the IPsec policy to which the protocol parameter value is added. To see the
policy names, use the ike ipsec policies list command.
IPaddress IP address allowed to be the source of the data (4 decimals separated by periods).
PolicyName Name of the IPsec policy to which the source parameter value is added. To see the policy
names, use the ike ipsec policies list command.
ike ipsec policies set sourceport <PortNumber | TELNET | HTTP | SMTP | TFTP | *> <PolicyName>
Note: The remote must have IP address translation enabled (see NAT on page 95 and the remote setIpTranslate
command on page 313).
Note: The address that NAT translates to should be the source or destination address for the policy (use the set
source or set dest commands).
Use this option when several remote sites have the same IP subnet, making it impossible to tunnel those sites
unchanged to the corporate network.
When the router’s public IP address is not the desired choice for the network address translation, you can define a
virtual Ethernet interface. A virtual Ethernet interface can be created to translate to an arbitrary IP address (see IP
Subnets, on page 79). Again, be sure that the virtual Ethernet interface has IP address translation enabled (eth ip
translate, page 277), and use the virtual Ethernet interface as the gateway to the other end of the protected
network. (See the example below.) You can use the eth ip addhostmapping command (page 263) to map a range
of NAT addresses to private addresses so the IKE tunnel can be initiated from either end.
on | off Sets the translate option on or off. If translate is set to on, translation is applied before
encryption, and the packets are sent using the host router’s public IP address.
PolicyName Name of the IPsec policy to which the source port parameter value is added. To see the
policy names, use the ike ipsec policies list command.
Example:
The following commands suggest how a virtual interface could be defined for use with Network Address
Translation and an IPSec tunnel.
# Later, when you set up the IKE tunnel, include these commands
# when defining a policy. (The policy name is corporate.)
# The source address must be the virtual interface address.
# The destination address must be the corporate backbone address.
# ike ipsec policies set source 10.0.0.1 255.255.255.255 corporate
# ike ipsec policies set dest 192.168.0.0 255.255.0.0 corporate
# ike ipsec policies set translate on corporate
ProposalName New name for an IPsec proposal. To see the proposal names in use, use the ike ipsec
proposals list command.
ProposalName Name of the IPsec proposal to be deleted. To see the proposal names in use, use the ike
ipsec proposals list command.
Example:
Note: The proposal must select either the AH or ESP encapsulation methods. It cannot request AH authentication
if it requests ESP encryption and/or ESP authentication.
For more information, see ESP and AH Security Protocols, on page 150 or IKE IPSec Proposal Commands, on
page 156.
NONE No AH encapsulation and no AH message authentication. (If you select this option, ESP
encapsulation must be requested by a set espenc or set espauth command.)
ProposalName Name of the IPsec proposal to which the AH authentication parameter is added. To see the
proposal names in use, use the ike ipsec proposals list command.
For more information, see ESP and AH Security Protocols, on page 150 or IKE IPSec Proposal Commands, on
page 156.
NONE No ESP encapsulation and no ESP message authentication. (If you select this option, the
For more information, see ESP and AH Security Protocols, on page 150 or IKE IPSec Proposal Commands, on
page 156.
ike ipsec proposals set espenc <DES | 3DES | NULL | NONE> <ProposalName>
NULL No encryption, but use ESP encapsulation. Headers are inserted as though the data was
encrypted. This allows verification of the source, but sends the data in the clear, increasing
throughput.
NONE No encryption and no ESP encapsulation. (If you select this option, the encapsulation
method must be requested by a set espauth or set ahauth command.)
ProposalName Name of the IPsec proposal to which the ESP encryption parameter is added. To see the
proposal names in use, use the ike ipsec proposals list command.
For more information on proposal parameters, see IKE IPSec Proposal Commands, on page 156.
ProposalName Name of the IPsec proposal to which the lifedata parameter is added. To see the proposal
names in use, use the ike ipsec proposals list command.
For more information on proposal parameters, see IKE IPSec Proposal Commands, on page 156.
ProposalName Name of the IPsec proposal to which the lifetime parameter is added. To see the proposal
names in use, use the ike ipsec proposals list command.
PeerName New name for an IKE peer. To see the peer names in use, use the ike peers list command.
Example:
If the mode is main mode, the other endpoint of the peer connection is constant, and you specify its IP address.
If the mode is aggressive mode, one end of the connection, the gateway, has a fixed IP address. The other end, the
client, has a changing address. When configuring the client, set the peer IP address to the fixed gateway address.
When configuring the gateway for an aggressive mode connection, set the peer IP address to 0.0.0.0.
IPaddress IP address (4 decimals separated by periods). When configuring a gateway for an aggressive
mode connection, set the IP address to 0.0.0.0.
PeerName Name of the IKE peer whose address is specified. To see the peer names, use the ike peers list
command.
The local ID must match the peer ID on the other end of the connection. The local ID can be an IP address,
domain name, or e-mail address as specified by the set localidtype command. For more information, see IKE Peer
Commands, on page 154.
PeerName Name of the IKE peer whose local ID is specified. To see the peer names, use the ike
peers list command.
The local ID type must match the peer ID type on the other end of the connection. The possible ID types are IP
address, domain name, or e-mail address. For more information, see IKE Peer Commands, on page 154.
The peer ID must match the local ID on the other end of the connection. The peer ID can be an IP address, domain
name, or e-mail address as specified by the set peeridtype command. For more information, see IKE Peer
Commands, on page 154.
PeerName Name of the IKE peer whose peer ID is specified. To see the peer names, use the ike
peers list command.
The peer ID type must match the local ID type on the other end of the connection. The possible ID types are IP
address, domain name, or e-mail address. For more information, see IKE Peer Commands, on page 154.
PeerName Name of the IKE peer whose peer ID type is specified. To see the peer names, use the
ike peers list command.
PeerName Name of the IKE peer whose secret is specified. To see the peer names, use the ike peers list
command.
ProposalName Name for the new IKE proposal. To see the proposal names in use, use the ike proposals
list command.
ProposalName Name of the IKE proposal to be deleted. To see the proposal names in use, use the ike
proposals list command.
Example:
3DES Use 3DES (168-bit) encryption (if 3DES is enabled in the router; see Software Option Keys,
on page 124).
ProposalName Name of the IKE proposal to which the encryption parameter is added. To see the proposal
names in use, use the ike proposals list command.
ProposalName Name of the IKE proposal to which the lifetime parameter is added. To see the proposal
names in use, use the ike proposals list command.
ProposalName Name of the IKE proposal to which the session authentication parameter is added. To see
the proposal names in use, use the ike proposals list command.
IPSec Commands
The following commands allow you to define an IPSec connection without IKE. To read about IPSec Security,
see IPSec (Internet Protocol Security), on page 149.
Note: If you define a tunnel using IPSec commands, the keys will remain static. This could pose a security risk
and is not recommended. Use of IKE for key management is recommended.
IPSEC ADD
Defines an IPSec security association (SA) name.
SAname Name for the new IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
SAname Name for the IPSec SA to be deleted.To see the IPSec SA names in use, use the ipsec list
command.
IPSEC DISABLE
Disables a defined IPSec SA entry.
SAname Name for the IPSec SA to be disabled.To see the IPSec SA names in use, use the ipsec list
command.
IPSEC ENABLE
Enables a defined IPSec SA entry, indicating it is complete and ready to be used. The command can also re-enable
a disabled SA entry.
SAname Name for the IPSec SA to be enabled.To see the IPSec SA names in use, use the ipsec list
command.
IPSEC FLUSH
Clears all IPSec definitions.
ipsec flush
IPSEC LIST
Lists one or all IPSec SA entries.
Example:
# ipsec list
IPSec security associations:
SAname Name of the IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
key Hexadecimal encryption key (64 bits for DES or 192 bits for 3DES).
SAname Name of the IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
SAname Name of the IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
SAname Name of the IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
SAname Name of the IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
SAname Name of the IPSec SA.To see the IPSec SA names in use, use the ipsec list command.
To configure the target (local) router, fill out the blank worksheet(s) that corresponds to the desired Link Protocol
and Network Protocol:
Fill out one set of information for each remote router in the Remote Routers section of the worksheet.
Use a mirror image of the information listed in your target router worksheet to configure the router on the other
end of the WAN link.
Note: You may want to review the Sample Configurations, on page 65.
To establish IPX Routing, you will need to enter all remote routers in the remote router database to which your
router will connect.
1. For each remote router, enter the network addresses and services that may be accessed beyond the remote
router.
3. After you have specified the route addressing and services, you can then enable IPX routing across the
Ethernet LAN.
Static Seeding: When IPX traffic is destined for network segments and servers beyond the remote router, the
target router’s routing information table must be statically seeded. Static seeding ensures that the target router
connects to the appropriate remote router. After the link is established, RIP broadcast packets will dynamically
add to the target router’s routing table. Seeding the routing table is not necessary for target routers that never
connect; they will discover remote networks beyond the calling router as soon as RIP updates arrive (provided the
remote router supports RIP). However, for watchdog spoofing to work, you will need to define the remote IPX
routes for network segments and servers.
Configuring your router for IPX routing can be rather complex. The following section will guide you through the
configuration process. Remember that PPP authentication configuration must be completed before you attempt
IPX routing configuration. The full router configuration for simple IPX routing includes the following:
• PPP authentication
The following section, Step 1: Collect Your Network Information for the Target (Local) Router, on page 409,
provides a configuration diagram and a command table to assist you with the configuration of the target router.
Step 2: Review your Settings, on page 410 lists the commands used to review the IPX configuration and provides
a configuration example.
6
Node #
Ex: 00:00:00:00:00:01
Novell Client
Workstation
ISDN or DSL Internal Network #
IPX router IPX Router Ex: 2002
Novell Client Novell file
(Target Router) (Remote Router)
Workstation server
Name: "ipx_client" Name: "ipx_server"
Novell Client
Workstation
WAN Network # Route to server
Ex: 456 7 through the remote
5 router
Ref
IPX Commands with examples Comments
#
eth ipx enable 1 Enable IPX Routing
eth ipx addr 123 2 Set the local ‘wire’ address
eth ipx frame 802.2 3 Set the Frame Type
remote add ipx_server 4 Add a connection name
remote setIpxaddr 456 ipx_server 5 Set the WAN network # (common to both
sides)
remote addIpxsap SERVER2 2002 00:00:00:00:00:01 0451 4 1 6 Add a file server (SAP)
ipx_server
remote addIpxroute 2002 1 4 ipx_server 7 Add a route to the server
save 8 Save your settings
reboot 9 Reboot for changes to take effect
> eth list Commands used to set and modify your IPX
ETHERNET INFORMATION FOR <ETHERNET/0> settings:
Hardware MAC address................. 00:20:6F:02:4C:35
Bridging enabled..................... no
IP Routing enabled................... no
Firewall filter enabled ........... yes
Process IP RIP packets received.... yes
Send IP RIP to the LAN............. yes
Advertise me as the default router. Yes
Receive default route using RIP.... yes 1 eth ipx enable
IP address/subnet mask............... 192.84.210.123/255.255.255.0
IP static default gateway............ none
IPX Routing enabled.................. yes
eth ipx addr <ipxnet> [port#]
External network number............ 00000123 2 Ex: eth ipx addr 123
Frame type......................... 802.2
SERVER2 4 000000000001:00002002:0451 1
411
E execute, 227
erase, 213 exit, 214
eth ?, 262
eth add, 262 F
eth br disable, 332 filter br ?, 372
eth br enable, 332 filter br add, 372
eth br options, 332 filter br del, 372
eth delete, 263 filter br list, 373
eth ip addHostMapping, 263 filter br use, 373
eth ip addr, 264 format disk, 228
eth ip addRoute, 264 frame, 334
eth ip addServer, 265 frame cmPPlay, 334
eth ip bindRoute, 266 frame lmi, 334
eth ip defGateway, 267 frame stats, 334
eth ip delHostMapping, 267 frame voice, 193, 335
eth ip delRoute, 268
eth ip delServer, 268
eth ip directedBcast, 269
H
eth ip disable, 270 hdsl ?, 337
eth ip enable, 270 hdsl save, 337
eth ip filter, 270 hdsl speed, 337
eth ip firewall, 274 hdsl terminal, 338
eth ip mgmt, 275 help, 210
eth ip options, 276
eth ip ripMulticast, 277 I
eth ip translate, 277 idsl list, 339
eth ip unbindRoute, 277 idsl save, 339
eth ip vrid, 278 idsl set speed, 339
eth ipx addr, 279 idsl set switch, 340
eth ipx disable, 279 ifs, 214
eth ipx enable, 279 ike commit, 376
eth ipx frame, 280 ike flush, 376
eth list, 280 ike ipsec policies add, 376
eth mtu, 281 ike ipsec policies delete, 377
eth restart, 281 ike ipsec policies disable, 377
eth start, 282 ike ipsec policies enable, 377
eth stop, 282 ike ipsec policies list, 377
eth vrrp add, 282 ike ipsec policies set dest, 378
eth vrrp clear password, 283 ike ipsec policies set destport, 378
eth vrrp delete, 283 ike ipsec policies set interface, 379
eth vrrp list, 284 ike ipsec policies set mode, 379
eth vrrp set multicast, 285 ike ipsec policies set peer, 380
eth vrrp set option, 285 ike ipsec policies set pfs, 380
eth vrrp set password, 286 ike ipsec policies set proposal, 380
eth vrrp set priority, 286 ike ipsec policies set protocol, 381
eth vrrp set timeinterval, 287
412
ike ipsec policies set source, 381 ipsec set encryption, 395
ike ipsec policies set sourceport, 381 ipsec set gateway, 396
ike ipsec policies set translate, 382 ipsec set ident, 396
ike ipsec proposals add, 383 ipsec set mode, 396
ike ipsec proposals delete, 383 ipsec set service, 396
ike ipsec proposals list, 383 ipxRoutes, 215
ike ipsec proposals set AHauth, 384 ipxSaps, 216
ike ipsec proposals set ESPauth, 384
ike ipsec proposals set ESPenc, 385 K
ike ipsec proposals set IPcomp, 385
key add, 125
ike ipsec proposals set lifedata, 386
ike ipsec proposals set lifetime, 386
ike peers add, 386 L
ike peers delete, 386 l2tp ?, 363
ike peers list, 387 l2tp add, 363
ike peers set address, 387 l2tp call, 363
ike peers set localID, 388 l2tp close, 367
ike peers set localIDtype, 388 l2tp del, 364
ike peers set mode, 388 l2tp forward, 364
ike peers set peerID, 389 l2tp list, 365
ike peers set peerIDtype, 389 l2tp set address, 365
ike peers set secret, 389 l2tp set authen, 366
ike proposals add, 390 l2tp set chapSecret, 366
ike proposals delete, 390 l2tp set dialout, 367
ike proposals list, 390 l2tp set hiddenAVP, 367
ike proposals set dh_group, 391 l2tp set ourAddress, 367
ike proposals set encryption, 391 l2tp set ourPassword, 367
ike proposals set lifetime, 391 l2tp set ourSysName, 368
ike proposals set message_auth, 392 l2tp set ourTunnelName, 368
ike proposals set session_auth, 392 l2tp set remoteName, 368
ike start, 208 l2tp set type, 369
ike stop, 208 l2tp set wanif, 369
ipdebug, 203 l2tp set window, 370
ipifs, 215 logout, 216
ipRoutes, 215
ipsec add, 392
M
ipsec del, 393
ipsec disable, 393 mem, 216
ipsec enable, 393 mlp, 203
ipsec flush, 393 mlp show, 315
ipsec list, 393 mlp summary, 217
ipsec set authentication, 394 msfs, 228
ipsec set authKey, 394
ipsec set compression, 395 P
ipsec set direction, 395 ping, 217
ipsec set encKey, 395 pppoe close, 374
413
pppoe list, 375 remote setBrOptions, 309
ps, 218 remote setBWthresh, 309
remote setCompression, 310
R remote setDLCI, 340
remote setEncryption (Diffie-Hellman), 311
reboot, 219
remote setEncryption (PPP DES), 310
remote ?, 289
remote setIpOptions, 311
remote add, 290
remote setIpSlavePPP, 312
remote addBridge, 290
remote setIPTranslate, 313
remote addHostMapping, 290
remote setIpxAddr, 313
remote addIpRoute, 291
remote setIPXoptions, 313
remote addIpxRoute, 292
remote setL2tpClient, 370
remote addIpxSap, 292
remote setLNS, 371
remote addServer, 293
remote setmaxline, 313
remote bindIPVirtualRoute, 293
remote setMgmtIpAddr, 313, 314
remote blockNetBios, 294
remote setMinLine, 314
remote del, 294
remote setmtu, 315
remote delATMnsap, 294
remote setOurPasswd, 315
remote delBridge, 295
remote setOurSysName, 316
remote delEncryption, 295
remote setPasswd, 316
remote delHostMapping, 295
remote setPhone, 316
remote delIpRoute, 296
remote setPPPoEservice, 374
remote delIpxRoute, 296
remote setPPPoptions, 317
remote delIpxSap, 296
remote setPPPRetryTimer, 318
remote delOurPasswd, 297
remote setPrefer, 318
remote delOurSysName, 297
remote setProtocol, 320
remote delPhone, 297
remote setProtocol (for IDSL), 341
remote delServer, 298
remote setPVC, 320
remote disable, 298
remote setpvc, 193
remote disAuthen, 299
remote setRmtIpAddr, 321
remote disBridge, 299
remote setSpeed, 321
remote enaAuthen, 299
remote setSrcIpAddr, 322
remote enable, 299
remote setTimer, 322
remote enaBridge, 300
remote start, 322
remote ipFilter, 300
remote stats, 323
remote list, 304
remote statsClear, 324
remote listBridge, 305
remote stop, 324
remote listIpRoutes, 305
remote unbindIPVirtualRoute, 324
remote listIpxRoutes, 306
rename, 229
remote listIpxSaps, 306
remote listPhones, 307
remote restart, 307 S
remote setATMnsap, 307 save, 220
remote setATMtraffic, 329 sdsl ?, 343
remote setAuthen, 308 sdsl btstat, 205
remote setBOD, 308 sdsl huh, 206
414
sdsl preact, 344 system blockNetBIOSDefault, 241
sdsl save, 344 system community, 242
sdsl speed, 344 system defaultmodem, 242
sdsl states trace, 206 system delBootpServer, 242
sdsl stats, 345 system delHostMapping, 242
sdsl terminal, 345 system delHTTPfilter, 243
shdsl ?, 346 system delIpRoutingTable, 243
shdsl list, 347 system delServer, 244
shdsl margin, 347 system delSNMPfilter, 244
shdsl rateMode, 348 system delSysLogFilter, 245
shdsl restart, 348 system delSysLogServer, 245
shdsl save, 348 system delTelnetFilter, 245
shdsl speed, 348 system delUdpRelay, 246
shdsl stats, 349 system history, 246
shdsl terminal, 347, 350 system httpPort, 247
shdsl ver, 350 system httpport, 247
sntp active, 221 system list, 247
sntp disable, 221 system log, 249
sntp enable, 221 system modem, 249
sntp offset, 221 system moveIpRoutingTable, 250
sntp prefserver, 222 system msg, 250
sntp request, 222 system name, 250
sntp server, 223 system oneWanDialup, 251
sync, 229 system passwd, 252
system ?, 230 system securityTimer, 252
system addBootpServer, 231 system snmpPort, 252
system addHostMapping, 231 system supportTrace, 253
system addHTTPfilter, 232 system syslogPort, 259
system addIpRoutingTable, 232 system telnetPort, 260
system addServer, 233 system wan2wanForwarding, 261
system addSNMPfilter, 232, 234
system addSysLogFilter, 234 T
system addSyslogServer, 235
tcp stats, 224
system addTelnetFilter, 235
time, 224
system addUdpRelay, 236
traceroute, 224
system admin, 236
system authen, 236
system backup add, 237 V
system backup delete, 237 vers, 226
system backup disable, 238 voice ip, 193
system backup enable, 238 voice l2clear, 193
system backup pinginterval, 239 voice l2stats, 193
system backup pingsamples, 239 voice lestrace, 193
system backup retry, 240 voice profile, 24
system backup stability, 240 voice refreshcas, 24
system backup successrate, 241
415
Topic Index
Numerics manual boot mode (for models with a re-
3DES encryption, 150 set button), 181
IKE proposal command, 156 manual boot mode (for models with con-
7461 router, 192 figuration switches), 170
options, 169
A boot failures, 173
address translation, 95 boot options
ADPCM voice encoding, 23 baud rate for console, 172
ADSL DMT router commands, 331 booting from the network, 171
debug commands, 206 extended diagnostics, 173
ADSL modem timer commands, 207 manual boot mode, 170
AH IPSec protocol, 149, 150 time and date, 172
alaw encoding, 24 BootP service, 167
ASIC.AIC file, 181 bridge filtering, 20, 81
ATM commands, 372
configuration commands, 328 bridging
debug commands, 204 bridge-only units, 20
tracing commands, 207 configuration information (for dual-
authentication, 25 Ethernet router), 47
ESP message, 156, 157, 384 configuration information (with RFC
ESP protocol, 150 1483), 43
IKE, 153 configuration table (with PPP), 55
IKE message, 155 configuration table (with RFC 1483/RFC
IKE session, 155 1490), 58
levels, 27 general information, 19
passwords, 27 test, 63
Authentication Header protocol, 149 bridging loops
autobaud pre-activation, 343 Ethernet interface, 333
remote router entry, 309
bridging options
B Ethernet interface, 332
backing up configuration files, 179 remote router entry, 309
backup router for a static default gateway, broadcast packets, filtering, 82
116 built-in firewall filters, 129
backup V.90 modem capability, 109
batch file execution, 183
C
baud rate for terminal emulation program,
CAS refresh signaling, 24
172
CCP, 310
binding a virtual route
CHAP, 25
for a remote interface, 293
clearing the configuration, 213
for an Ethernet interface, 266
CLI, 209
BLES, 23
clock setting
boot code
command, 224
definition, 169
416
date command, 212 RFC 1483MER/RFC 1490MER + IP
manual boot mode option, 172 routing, 59
command index, 411 configuredforCMPPlay remote, 49
command line access, 14 console baud rate, 172
Command Line Interface conventions, 209 contacting technical support, 208
commands conventions for commands, 209
debugging Copper Mountain Plug & Play, 48
See also Command Index, 203
communication interface status command, D
214 date setting
compression command, 212
IKE IP compression command, 385 manual boot mode option, 172
IPCP compression, 317 debugging commands, 203
IPSec compression command, 395 DES encryption, 150
Stac LZS payload compression, 310 DH. See Diffie-Hellman
Van Jacobson compression of TCP/IP DHCP, 85
headers, 317 BootP management, 91
voice compression, 23 clearing, 93
configuration examples commands, 350
dual-Ethernet router with IP, 77 concepts, 85
IKE aggressive mode, 162 configuration, 85
IKE main mode, 159 relays, 92
PPP with IP and IPX, 65 TFTP server, 91
RFC 1483 with IP and Bridging, 72 diagnostics, 173
VRRP, 121 dial backup, 109
configuration files, backup/restore, 179 troubleshooting, 194
configuration information Diffie-Hellman encryption, 127
Dual-Ethernet router, 47 for IKE key exchange, 151
FRF8 + IP, 46 for IKE Perfect Forward Secrecy, 380
PPP + IP, 36, 38, 40 group used for IKE key exchange, 156
RFC 1483 + bridging, 43 directed broadcast filtering, 82
RFC 1483 + IP, 41 DLCI
RFC 1483 + IPX, 42 for an IDSL Frame Relay connection,
RFC 1483MER + IP, 44 340
RFC 1490 + IP, 38, 41, 42, 43 dmt commands, 206, 331
RFC 1490 + IPX, 42 DNS, 37
RFC 1490MER + IP, 44 DHCP address request, 85
configuration tables server, 233
dual-Ethernet router +IP routing, 62 dod command, 203
FRF8 + IP routing, 60 Domain Name Service, 37
mixed network protocols, 61 dual-Ethernet router, 47
PPP + bridging, 55 commands, 332
PPP + IPX routing, 54 sample configuration, 77
RFC 1483/RFC 1490 + bridging, 58
RFC 1483/RFC 1490 + IP routing, 56 E
RFC 1483/RFC1 490 + IPX routing, 57 Encapsulated Security Payload, 149
417
encapsulation methods, IPSec, 150 FRF8, 46
encapsulation modes, IPSec, 149
encapsulation options, 29 G
encoding digital audio, 24 G.Lite DMT link type, 331
encryption G.shdsl commands, 346
Diffie-Hellman, 127 G_DMT mode setting, 206
ESP protocol for IPSec, 150 G_LITE mode setting, 206
hardware option, 125 GUI debug commands, 205
PPP DES, 126
PPP DES (RFC 1969), 126 H
erasing the configuration, 213 H.323 protocol, 100
error messages, 199 hardware diagnostics, 173
ESP IPSec protocol, 149 header compression, 317
Ethernet commands, 332 history log, 185
Ethernet configuration commands, 262 host mapping, 99
Ethernet IP address assignment, 264 HSD interface, 318
Ethernet subnets, 79 HTTP access control, 107
export restriction, 150 HTTP port access, 247
extended diagnostics, 173 HW-DES, 125
HyperTerminal, 15
F
fail over pots interface, 192 I
fatal boot failures, 173 IAD, 22
feature activation keys, 124 IDSL router commands, 339
file system commands, 226 IKE
files, 32 command formats, 376
filters commit bit, 376
bridge filtering, 81 debug commands, 208
IKE policies, 157 IPSec policy commands, 157
Internet firewall filtering, 82 IPSec proposal commands, 156
IP filtering option, 129 peer commands, 154
Ethernet interface command, 270 proposal commands, 155
WAN interface command, 300 proposal exchange, 153
firewall protocol, 149
IP filtering, 129 IKE configuration examples
IP Internet firewall filtering, 82 aggressive mode, 162
scripts main mode, 159
maximum security, 132 Integrated Access Device, 22
medium security, 133 interface status command, 214
minimum security, 134 Internet Key Exchange protocol, 149
flash memory IP address assignment, 264
recovery procedures, 180 IP address recovery, 182
FPGA file, 181 IP filtering, 129
Frame commands, 334 debug commands, 207
frame relay debug commands, 207 Ethernet interface command, 270
Frame relay statistics command, 334
418
WAN interface command, 300 1490), 42
IP firewall configuration, 82 configuration table (with PPP), 54
IP interface list command, 215 configuration table (with RFC 1483/RFC
IP RIP packets, 83 1490), 57
IP routing test, 64
configuration information (for dual- ISDN, 339
Ethernet router), 47 ISDN phone numbers, 111
configuration information (with FRF8),
46 J
configuration information (with RFC Jetstream troubleshooting, 193
1483), 41 jitter buffer adjustment, 193
configuration information (with RFC
1483MER), 44 K
configuration information (with RFC kernel
1490), 38, 41, 42, 43 upgrade from the LAN, 176
configuration information (with RFC upgrade from the WAN line, 178
1490MER), 44
configuration table (with FRF8), 60
configuration table (with MAC Encapsu-
L
lated Routing), 59 L2TP, 137
configuration table (with RFC 1483/RFC commands, 363
1490), 56 configurations, 139
configuration table (with RFC over IPSec, 150
1483MER/RFC 1490MER), 59 LCP, 26
test, 63 LEDs
IP routing table, 80 fatal error patterns, 173
defining, 232 ready state, 185
deleting, 243 startup sequence, 184
moving, 250 LLC multiplexing, 30
IP slave mode, 317 LMI command, 334
IP subnets, 79 logical Ethernet interfaces, 79
IP virtual router support, 80 for VRRP, 117
IP virtual routing, 266, 277, 293, 324 login procedure, 14
IPCP, 5, 312 LZS compression, 310
IPCP compression, 317
ipdebug command, 203 M
IPSec MAC Encapsulated Routing, 43
command formats, 392 management IP address
connection without IKE, 163 for a remote router, 314
RFCs, 29 for Ethernet interface, 275
security, 149 management security, 107
IPX routing mapping IP addresses with NAT, 95
concepts, 408 maxsec.txt, 132
configuration information (with RFC medsec.txt, 133
1483), 42 MER, 43
configuration information (with RFC MIBs, 165
419
minsec.txt, 134 IP option, 312
mlp debug command, 203 PPP option, 317
modem settings for dial backup, 114 PFS, 151
sample init strings, 198 ping command, 186, 217
MTU command Plug & Play, 48
for Ethernet interface, 281 policy commands, IKE, 154
for WAN interface, 315 port translation, 95
multicast PPP encapsulation options, 30
address for RIP, 277 PPP Link Protocol, 36
address for VRRP, 285 PPP options command, 317
multiple Ethernet subnets, 79 PPP retry timer, 318
multiple IP subnets, 79 PPPoE, 103
multiple routing tables, 80 bridge entry, 103
client, 104
N close session command, 374
naming the router, 250 commands, 374
NAT, 95 domain name, 104
NetBIOS and NetBUI request block, 241 list command, 375
NetMeeting, 100 sample configuration script, 105
Network Address Translation, 95 session management, 106
classic NAT, 99 timeout, 104
configuration, 95 pre-activation, 343
masquerading, 95 proposal commands, IKE, 154
network information protocol standards, 28
example, 73 pulse dialing, 115
sample worksheets, 73
R
P Rapid Secure Encryption, 125
PAP, 25 RARP server, 171
PAP/CHAP authentication reboot command, 219
naming the router, 251 recovering passwords and IP addresses, 182
password command remote commands, 289
for local router when connecting to re- remote routers, 34
mote, 315 commands, 289
for remote, 316 Remote Shell server, 233
for the target router, 252 replay detection, 150
password example, 65 reset button, 181
passwords, 27 restarting a remote, 35
recovering the administrative password, restoring configuration files, 179
182 retry timer, 318
passwords for sample configuration, 65 RFC 1483, 36, 41
payload compression, 310 RFC 1483MER, 43
PCM voice encoding, 23 RFC 1490, 36, 41
peer commands, IKE, 154 RFC 1490MER, 43
Perfect Forward Secrecy, 151 RFCs supported, 28
periodic echo RIP packet controls, 83
420
PPP option, 318 software option keys, 124
rlogin port, 233 software options
route tracing command, 224 encryption, 126
RSE hardware option, 125 IP filtering, 129
keys, 124
S L2TP tunneling, 137
sample configurations software version, 226
dual-Ethernet router with IP, 77 source routing, 80
IKE, 159 Spanning Tree Protocol
PPP with IP and IPX, 65 Ethernet interface, 333
VRRP, 121 remote router entry, 309
SAs, 149 Stac LZS compression of the payload, 310
save dod, 220 standards conformance, 28
saving configuration files, 179 status commands, 210
saving the configuration, 220 STP protocol
script execution, 183 Ethernet interface, 333
SDSL commands, 342, 346 remote router entry, 309
autobaud pre-activation, 343 subnet broadcasts, 82
autospeed detection, 342 subnets, 79
debug commands, 205 subscription, 23
secure VPN support, contacting, 208
IPSec tunnels, 149 Symmetric Digital Subscriber Line, 342
L2TP tunnels, 137 Syslog client, 168
security system commands, 230
authentication, 25 system files, 32
authentication passwords, 27 system messages, 199
IKE, 149
IPSec, 149 T
Security Associations, 149 T.120 protocol, 101
security timer, 252 T1.413 mode setting, 206
server configuration for NAT, 96 target router, 34
request hierarchy, 98 TCP port, 260
setting a management address TCP/IP routing
for a remote router, 314 source and remote addresses, 42
for Ethernet interface, 275 technical support, contacting, 208
SHDSL commands, 346 telephony services, 22
signaling cells, 193 trouble-shooting, 191
SNMP Telnet, 166
access control, 107 command line access, 16
client validation, 107 controlling router access, 107
support, 165 Telnet client validation, 107
supported MIBs, 165 terminal access to the command line, 14
SNTP server commands, 221 terminal emulation program baud rate, 172
SNTP server request, 222 TFTP
software kernel, 32 client facility, 166
upgrades, 176 server, 166
421
time setting ers, 317
command, 224 VC multiplexing, 30
manual boot mode option, 172 version level, 226
timeout period for a dial-up connection, 322 virtual Ethernet interface, 79
time-stamped messages, 199 Virtual Private Network security, 149
Tollbridge troubleshooting, 193 virtual route binding, 266
tone dialing, 115 virtual router ID, 117
traceroute command, 224 virtual routing table, 80
tracing signaling cells, 193 adding, 232
transport mode, 149 deleting, 243
tritone, 192 moving, 250
command, 192 VoDSL router, 22
troubleshooting voice encoding, 24
bridging, 189 voice gateways, 22
console, 187 voice profile, 23
factory configuration, 187 voice routing, 22
hardware problems, 187 alaw encoding command, 24
history log, 185 CAS refresh command, 24
IP routing, 189 debug commands, 192
IPX routing, 190 frame voice command, 335
login password, 188 trouble-shooting, 191
normal LED sequence, 185 voice profile command, 24
PC connection, 188 VPI/VCI
power light off, 184 find value, 191
remote network access, 189 VPN, 137
terminal window display, 187 security, 149
using LEDs, 184 VRID, 117
using ping, 186 VRRP, 116
troubleshooting voice routing, 191, 194 clearing the VRRP interface designation,
tunneling 278
IPSec, 149 multicast address, 285
L2TP, 137
L2TP configurations, 139 W
with Dial Backup, 109 web GUI debug commands, 205
U Y
ulaw encoding, 24 Y2K compliance, 172
unbind IP virtual route command
for a remote interface, 324
for an Ethernet interface, 277
upgradable bridges, 20
upgrading the software kernel, 176
V
V.90 backup modem, 109
Van Jacobson compression of TCP/IP head-
422