3com Configuration Guide
3com Configuration Guide
Configuration Guide
http://www.3com.com/
All other company and product names may be trademarks of the respective companies with which they are
associated.
GETTING STARTED 1
SYSTEM MANAGEMENT 33
INTERFACE 121
ROUTING 423
MULTICAST 517
SECURITY 543
VPN 615
RELIABILITY 665
QOS 681
DIAL-UP 721
ABOUT THIS GUIDE
Conventions Table 1 and Table 2 list conventions that are used throughout this guide.
Convention Description
Screen displays This typeface represents information as it appears on the screen.
Keyboard key names If you must press two or more keys simultaneously, the key names are
linked with a plus sign (+), for example:
Press Ctrl+Alt+Del
The words “enter” When you see the word “enter” in this guide, you must type
and type” something, and then press Return or Enter. Do not press Return or
Enter when an instruction simply says “type.”
Words in italics Italics are used to:
Emphasize a point.
Denote a new term at the place where it is defined in the text.
Identify command variables.
Identify menu names, menu commands, and software button names.
Examples:
From the Help menu, select Contents.
Click OK.
Words in bold Boldface type is used to highlight command names. For example, “Use
the display user-interface command to...”
2 ABOUT THIS GUIDE
I GETTING STARTED
Overview of the 3Com The 3Com Router OS is the network operating system platform. With TCP/IP
Router System protocol stack as the core, the 3Com Router integrates data communication
essentials such as routing technology, multicast technology, QoS technology, VPN
technology, security technology in the operating system and provides excellent
data transmission capability.
The 3Com Router can run on multiple hardware platforms with consistent
network interface, user interface and management interface, providing flexible
and multiple application solutions for users.
This manual describes features and functions of the 3Com Router 1.x system
software platform series of low end and middle range routers. In this manual the
3Com Router is also referred to as the 3Com Router 1.x software version. You
should make sure that the 3Com Router you use is operating with the software
version documented in this manual.
Architecture of the With TCP/IP model as its reference, the 3Com Router implements data link layer,
3Com Router network layer, and application layer protocols, as per the architecture shown in the
following diagram:
6 CHAPTER 1: 3COM ROUTER INTRODUCTION
Configuration
management
System
IP forwarding engine SNMP
service
Features of the 3Com The following table lists the basic features of the 3Com Router 1.x:
Router Version 1.10 Table 3 List of the 3Com Router 1.x features
Attribute Description
Interconnection protocol LAN ■ Supports Ethernet_II and Ethernet_SNAP frame structure
■ Follows IEEE 802.2 and IEEE 802.3 regulations
WAN ■ Supports Frame Relay and Frame Relay switching
■ Supports FRoIP, FRoISDN
■ Supports Multi-link Frame Relay (MFR), FR compression
■ Supports FR Traffic Shaping (FRTS) to ensure even traffic over
the VCs on FR
■ Supports X.25 and X.25 switching, X.25 Over TCP (XOT)
■ Supports HDLC, SDLC and LAPB regulations
■ Supports SLIP, PPP and MP
■ Supports PPPoE Client
■ Supports ITU-T Q.921 and Q.931 regulations, ISDN (ITU-T
Q.921, Q.931) and ISDN semi-permanent connection
■ Supports bridging technology
Dial-up network ■ Manages Modem through the AT command and configures
script to dial up.
■ Supports dial demand Routing (dialer profiles and legacy
BDR)
■ Supports Callback (PPP callback and ISDN Calling Line
Identification callback)
■ Provides ISDN leased line, automatic dialing, and cyclic dial
queue backup
■ Provides Dial interface backup
VPN ■ Supports L2TP, implements VPDN (Supports DNIS user,
domain name user, and full name user)
■ Supports L3 channel protocol GRE
Features of the 3Com Router Version 1.10 7
Attribute Description
Network protocol IP service ■ Supports ARP
■ Supports Static domain name resolution
■ Supports IP Address Unnumbered
■ Supports DHCP Server and DHCP relay
■ Supports VLAN
■ Supports IP Accounting
Non-IP service ■ Supports Novell IPX protocol, provide RIP and SAP to
maintain the database of Internetwork routes and service
information
■ Supports DLSw of SNA system, implementing SNA through
WAN transmission
IP performance ■ Supports IP fast forwarding
■ Supports Van Jacobson TCP message header compression
IP routing ■ Supports Static route management
■ Supports Dynamic route protocol
■ RIP-1/RIP-2
■ OSPF
■ BGP
■ Supports IP routing policy
■ Supports IP policy-based routing
Multicast routing ■ Supports Internet Group Management Protocol (IGMP)
■ Supports Multicast routing protocol
■ PIM-DM
■ PIM-SM
8 CHAPTER 1: 3COM ROUTER INTRODUCTION
Attribute Description
Network security Authentication, ■ Provides PPP and login user authentication
Authorization and
■ Supports RADIUS, provides RADIUS
Accounting (AAA)
authentication/accounting
service
■ Provides local authentication
■ Supports CHAP and PAP authentication
Firewall ■ Supports standard access control list
■ Supports extended access control list
■ Supports interface-based access control list
■ Supports time segment based access control list
NAT ■ Supports the users in LAN to access external networks by
using the IP address in a configured address pool.
■ Supports to configure relationship between access control
list and address pool.
■ Supports to configure relationship between access control
list and interface.
■ Supports the host of external network to access the internal
server
■ Supports to configure valid period for address translation
Data security ■ Supports terminal access security (user classification
protection, user login authentication)
■ Supports IPSec, provides tunnel and transmission
encapsulation modes and supports AH and ESP security
authentication
■ Supports network data encryption card and provide IPSec
encryption/decryption
■ Supports IKE, automatically negotiates on security key and
create the security federation
Network reliability Backup center ■ Can back up any physical interface or sub-interface on the
router and an X.25 or frame relay virtual circuit on the
interface as well.
■ Barring the Ethernet interface, any physical interfaces or
virtual interface templates on the router can be used as
backup interfaces. An X.25 or frame relay virtual circuit on
the interface or a dialer route on the dial interface can be
used as backup interface as well.
■ Provides multiple backup interfaces for one main interface.
These backup interfaces will be used according to their
priorities.
■ Backs up multiple main interfaces of the interfaces with
multiple physical channels
■ Supports to configure the conditions to switch the
main/standby interfaces
Hot backup ■ Supports VRRP
Features of the 3Com Router Version 1.10 9
Attribute Description
Quality of service Traffic classification ■ Supports CAR (Committed Access Speed) and packet
and flow control priority, monitoring the network traffic entering ISP
(QoS)
■ Supports LR (Line Rate of physical interface) to limit the total
speed of packet transmission on physical interface
Traffic shaping ■ Uses buffer and token bucket to support general traffic
shaping (GTS).
Congestion ■ Supports FIFO (first-in-first-out queue)
management
■ Supports PQ (priority queue)
■ Supports CQ (customization queue)
■ Supports WFQ (Weighted Fair queue)
Congestion ■ Supports WRED (Weighted Random Early Detection),
Avoidance implementing flow-based congestion avoidance
Configuration Command line ■ Prompts provide information in English
management interface
■ Prompt command line hierarchical protection, to ensure that
Terminal server the unauthorized users cannot access the router.
■ Prompt Detailed debugging information, helpful for
diagnosis of network faults
■ Provides network test tools such as tracert and ping
commands, to quickly diagnose whether the network is
normal.
■ Info-center loghost configuration
Terminal service ■ Performs local or remote configuration via the console port,
asynchronous serial port, X.25 PAD, Telnet and Reverse
Telnet etc.
■ Logs on the UNIX host via Rlogin
■ Configures router via the dumb terminal service
■ Provides dumb terminal service via PRI port
■ Supports the send function and provide the information
interaction between terminal subscribers
■ Terminal access via asynchronous serial port
■ Supports dial-up POS and network POS accessing based on
the shared POS access technology, which improves card
account processing
System ■ Supports to upload and download programs/configuration
Management files via FTP
■ Supports to upload and download programs/configuration
files via TFTP
■ Supports on-line upgrade of the cards.
Network ■ Supports SNMP (Simple Network Management Protocol)
management
■ Supports RMON (Remote Monitor)
10 CHAPTER 1: 3COM ROUTER INTRODUCTION
New Features of the New features have been added to the 3Com Router1.10.
3Com Router 1.x
E1-F/T1-F Interface
E1-F and T1-F interfaces refer to the fractional E1 and T1 interfaces, which are
equivalent to the simplified CE1/PRI and CT1/PRI interfaces. In essence, they are a
low-cost approach to E1/T1 access. In a simple E1 or T1 access application
requiring neither division of multiple channel groups nor ISDN PRI, either the E1-F
or T1/F interface will be a good choice.
Null Interface
The functions of the Null interface are similar to those of null devices supported by
many operating systems. It is always in UP status, but cannot forward data packets
or configure IP addresses or encapsulate other protocols. Null interface is a virtual
interface with software characteristics. Any network data packet sent to this
interface will be dropped.
The Frame Relay over ISDN is mainly used in the following two aspects:
■ The simplest application is to take Frame Relay over ISDN as the main
communications method. That is, all the routers support Frame Relay over
ISDN, and the individual routers can directly access the Frame Relay networks
(without TA adapters) to communicate.
New Features of the 3Com Router 1.x 11
■ Combined with BDR, Frame Relay over ISDN can be taken as the backup
communication method for Frame Relay.
Multilink Frame Relay The Multilink Frame Relay (MFR) feature introduces functionality based on the
Frame Relay Forum Multilink Frame Relay UNI/NNI Implementation Agreement
(FRF.16). This feature provides a cost-effective way to increase bandwidth for
particular applications by enabling multiple serial links to be aggregated into a
single bundle of bandwidth. MFR is supported on User-to-Network Interfaces (UNI)
and Network-to-Network Interfaces (NNI) in Frame Relay networks.
FR Compression FR compression technology is used to compress the FR packets for the purpose of
effectively saving the network bandwidth and decreasing the network load, and
hence to implement data transmission over FR networks with high efficiency.
3Com Routers follow the FRF.9 standard for FR compression. FR compression can
achieve a significant effect on a FR line with low bandwidth. FR interfaces fall into
two categories, namely, point-to-point interface and multipoint interface.
Bridge Bridges are a type of network devices that connect LANs at the data link layer for
data transmission among them. For some small or remote networks, a bridge can
reduce the network maintenance cost and free the network terminal subscribers
from making special settings for the devices. In addition, its network connection is
no difference from a HUB.
3Com Routers support transparent bridging and are compatible with IEEE 802.1d.
The routers support the STP and bridging functions defined in IEEE 802.1d and
support bridging on the links encapsulated with PPP, HDLC, X.25, or Frame Relay,
as well as bridging on VLAN sub-interfaces and BDR. Furthermore, the routers can
implement multi-port binding and load sharing.
IP Count IP count implements accounting on the incoming and outgoing packets as well as
the packets denied by the firewall on the routers. When implementing IP count,
whether the packets match the count list rules and whether the packets are
denied by the firewall, are two standards by which the router sorts the
bidirectional packets for count. When making data statistics, both the number of
packets and the total bytes are recorded.
Virtual Router Virtual Router Redundancy Protocol (VRRP) is a fault tolerant protocol. Normally,
Redundancy Protocol the default route set for a host in a network takes the GW route of the network as
(VRRP) the next hop. Through the default route, the host can carry out the
communications with the external networks. If the GW route fails to work, all the
hosts that take it as the next hop on the segment will be unable to communicate
with the outside. VRRP can fulfill the router redundancy by assigning multiple
routers into a router group. Thus, whenever a member fails to work, a backup
router will take up the work of the failed router and thus can ensure the normal
communications between the hosts on the network and the outside.
12 CHAPTER 1: 3COM ROUTER INTRODUCTION
2 3COM ROUTER USER INTERFACE
Establish The 3Com Router 1.x supports local and remote configuration, and the
Configuration configuration environment can be established in the following ways:
Environment
Local Configuration The local configuration environment can be established via the console port
Environment via Console (configuration interface).
Port
1 As shown in Figure 2, the local configuration environment can be established via
the console port just by connecting the serial port of the computer with the
console port of the router via a standard RS-232 cable.
RS-232 serial
port
Router
Workstation
On 3Com modular routers the CONSOLE port and AUX port are on the front of
the unit, while other ports are on the rear of the unit. The above diagram shows
the rear of the unit. For details, please refer to the 3Com Installation Guide.
2 Run a terminal emulator application such as HyperTerminal of Win9X on the
computer to establish a new connection. Select an RS-232 serial port on the
computer, set the terminal communication baudrate parameters as 9600 bps, 8
data bits, 1 stop bit, no parity and no flow control, and select the terminal
emulation type as VT100, as shown in the following diagram (“HyperTerminal”
setting interface in Windows 9X).
14 CHAPTER 2: 3COM ROUTER USER INTERFACE
3 Power on the router to display the self-test information of the router. Press Enter
after the self-test to display the prompt “Username:” and “password:”. Type in
the correct username and the password, then enter the system view of Router.
16 CHAPTER 2: 3COM ROUTER USER INTERFACE
4 Enter the command to configure the router or view the running status of the
router. Enter “?” to get help when necessary. For details of specific commands,
please refer to the following chapters.
Remote Configuration The router powers on, then creates a remote configuration environment by
Environment via Async connecting to the asynchronous serial ports of the router (including
Serial Port synchronous/asynchronous serial port, AUX interface, i.e., auxiliary interface, etc.)
via modem dial-up. Detailed below is the description on how to establish a remote
configuration environment via asynchronous serial port, with AUX interface as an
example.
Workstation
Modem
PSTN
Tel No.660000
Modem
AUX interface
Router
4 If a dial-up connection is established, then press Enter after the self-test to display
the prompt “Username:” and “password:”. Enter the correct username and the
password, then enter the system view of Router.
5 Enter command to configure the router or view running status of the router. Enter
? to get help when necessary. For details of specific commands, please refer to the
following chapters.
Local/Remote Telnet After the router powers on, and IP addresses of the interfaces have been properly
Connection configured on the router, you can use the Telnet client program to establish a
Configuration connection with the router and log in the router via LAN or WAN. Then configure
Environment the router.
1 As shown in the following two figures, connect the Ethernet port adapter on the
computer with the Ethernet interface of the router. To establish a remote
18 CHAPTER 2: 3COM ROUTER USER INTERFACE
configuration environment, connect the computer with the router via the WAN
interface.
Workstation
Ethernet
LAN
Workstation Router
LAN
Ethernet
WAN
Local workstation running
Telnet client
Ethernet
Remote router to be
configured
Workstation
2 As shown in the following two figures (Telnet client program interface in Windows
9X), run the Telnet client program on the computer and set its terminal emulation
type as VT100.
Command Line Interface (CLI) 19
The host name in the above figure is the name or IP address of a router interface
of the remote connection.
3 If connection is established, press Enter after the self-test to display the prompt
“Username:” and “password:”. Enter the correct username and the password,
then enter the system view of the router. If the prompt of Too many users!
appears, try to connect later. Usually, there should be no more than five Telnet
users at any one time.
4 Enter the command to configure the router or view running status of the router.
Enter ? to get help if necessary. For details of specific commands, please refer to
the following chapters.
Command Line The 3Com Router 1.x provides a series of configuration commands for the user to
Interface (CLI) configure and manage network equipment via command line interface. The
command line interface can accomplish the following:
■ Perform local or remote configuration via the console port.
■ Log in the router through modem dial-up with asynchronous serial port and
perform remote configuration.
■ Perform local or remote configuration via Telnet connection
■ Provide terminal access service.
■ Configure command hierarchical protection to reject the illegal users.
20 CHAPTER 2: 3COM ROUTER USER INTERFACE
View View is the interface of the 3Com Router command. Different commands are
implemented in different views, and different views are realized according to
different function requirements. For example, the RIP view can configure
corresponding commands.
The views in the 3Com Router are in a hierarchical structure. You can enter the
function views in system view and the sub-function views in the function views.
The following figure shows the view structure of the 3Com Router.
Command Line Interface (CLI) 21
RIP view
OSPF view
BGP view
PIM view
System view
The following table gives some details of the functionality features of the
command views as well as the commands for entering these views.
The command line prompt character consists of the network device name (Router
by default) and the command view name, such as [Router-rip].
The commands are divided according to view. In general, in a certain view, only
the commands defined by the view can be executed, but some widely used
commands (including ping, display, debugging, reset, save, interface,
logic-channel, and controller) can be executed in all views
For some views listed in the above table, you must enable the corresponding
functions before you can enter the views. To enter some other views, however,
you should configure the related restriction conditions. For more information, see
the related chapters in this manual.
In all views, you can use the quit command to return to the superior-level views,
and the return command to the system view directly.
Command Line The command line interface of the 3Com Router provides the following online
Online Help helps:
■ Full help
■ Partial help
24 CHAPTER 2: 3COM ROUTER USER INTERFACE
2 Partial help: Enter a command followed by “?” separated with the space key, and
if parameters are available, descriptions of related parameters will be listed.
[Router]display ?
aaa AAA information
aaa-client Display the buffered voice information
acl Display access-list information
arp ARP table information
bgp BGP protocol information
bridge Remote bridge information
......
3 Partial help: Enter a character string followed by “?”, and descriptions of all the
commands beginning with this character string will be listed.
[Router]di?
dialer dialer-rule display
4 Partial help: Enter a command and a character string, followed by “?”, and all the
key words beginning with this character string will be listed.
For example:
[Router]display a?
aaa aaa-client acl arp
Command Line Error In the 3Com Router, all the commands entered by users will be accurately
Message executed if they pass the syntax check. Otherwise, users will be informed by an
error message. The following table shows common error messages.
Table 5 List of common command line error messages
Common error
message Causes
Incorrect command No command has been found.
No key word has been found.
Wrong parameter type
Incomplete command The command input is incomplete.
Invalid parameters Parameter value beyond limit
Too many parameters Too many parameters are input.
Command Line Interface (CLI) 25
History Command The command line interface of the 3Com Router 1.x provides a function similar to
DOSKey by automatically saving the history of commands inputted users. Users
can check the history of commands saved in the command line to repeat
execution. 10 history commands can be saved at the most for each user. The
configuration steps are shown in the following two tables.
1 Display history command
The following command can be used in all views to display the command recently
input:
Table 6 Display history command
Operation Command
Display history command display history-command
Edit Features of The command line of the 3Com Router 1.x provides basic command edit functions
Command Line and supports multi-line editing. The maximum length of each command is 256
characters, as shown in the following table:
Key Function
Any key on board If the edit buffer is not full, insert the character at the cursor and
move the cursor to the right.
Backspace key: Delete the character to the left of the cursor and move the cursor
BackSpace back one character. If the cursor gets to the beginning of the
command line, the alarm rings.
Delete key: Delete Delete the character at the cursor and the alarm rings when the
cursor gets to the end of the command line.
Left cursor key The cursor moves one character to the left, and the alarm rings when
the cursor gets to the beginning of the command line.
Right cursor key The cursor moves one character to the right, and the alarm rings
when the cursor gets to end of the command line.
Display Features of The command line interface of the 3Com Router 1.x provides the following display
Command Line features:
Provide pause function when the information displayed exceeds one screen page,
and three options are available for users.
26 CHAPTER 2: 3COM ROUTER USER INTERFACE
User Identity The 3Com Router sets three kinds of router management users: administrator
Management user, operator user and guest user. Different kinds of users have different rights to
execute commands.
1 An administrator user has the right to execute all the commands of the router.
Only the administrator user can configure all the functions and parameters and
can enter all views.
2 An operator user can monitor and maintain the router, they can also obtain the
debugging information of the router. The operator user can only execute the
following commands.
debugging Enable system debugging functions
display Display system running information
language Switch language mode (English)
logout logout
pad Try to open a PAD connection
ping Send ICMP ECHO_REQUEST packets to network hosts
reboot Reboot the router under certain condition
reset Reset operation
rlogin Log in remote UNIX host
send Send a message to other terminals
telnet Telnet to a remote host
tracert Trace the route taken by packets to reach a network host
undo Cancel current setting
3 A guest user has no right to manage the router, but only has the right to perform
a remote test on the router. The guest user can only execute the following
commands.
language Switch language mode (English, Chinese)
logout logout
pad Try to open a PAD connection
ping Send ICMP ECHO_REQUEST packets to network hosts
rlogin log in remote UNIX host.
telnet Telnet to a remote host
tracert Trace the route taken by packets to reach a network host
Operation Command
Configure a user local-user user-name service-type type [ password {
simple | cipher } password ]
Delete a user undo local-user user-name
User Identity Management 27
By default, no user is set on the router. In this case, the user can log onto the
router without username and password, operating as the administrator user and
have the right to execute all commands.
The router should be configured with at least one administrator user. This is
because any user can log onto the router as the administrator user if no user is set
on the router which could lead to a breach in network security.
If a user is configured on the router, no matter what type of user they are, when
that user logs onto the router, it will prompt them to input the username and
password. Only after the username and password are input correctly can the user
log onto the router, and the system will give the user the corresponding access
rights.
The router can only be configured with the operator user and guest user after an
administrator user has been configured.
If an operator user forgets their password, the administrator user can help them to
modify the password. Also, they can enter into the boot menu (only on the
HyperTerminal connected to the Console port) to clear the application password,
and then reboot the router. At this time, the operator user can log onto the router
without username and password.
If an administrator user forgets their password, they can modify the password
through another administrator user identity. If there is no other administrator user,
they can only enter into the boot menu (only on the HyperTerminal connected to
the Console port) to clear the application password, and then reboot the router. In
this case, the router will restore the default configuration, that is, no user is set on
the router. Because the operation clears the configuration, the administrator must
reconfigure all the functions and parameters.
Basic Configuration and Basic configuration and management of the system includes:
Management of the ■ Configure the router name
System
■ Set the system clock
■ Reboot the system
1 Configure the router name
Please perform the following command in all views.
Table 11 Configure the router name
Operation Command
Configure the router name sysname sysname
Operation Command
Set the system clock clock hour:minute:second day month
year
28 CHAPTER 2: 3COM ROUTER USER INTERFACE
The system clock will reset to the initial number when the configuration is deleted
by using the delete command or is deleted at the boot menu.
3 Reboot the system
Please perform the following commands in all views.
Table 13 Reboot the system
Operation Command
Reboot the system right now reboot [ reason reason-string ]
Reboot the system after a specified time reboot mode interval { hh:mm | time }
[string ]
Reboot the system at the specified time reboot mode time hh:mm [ dd/mm/yy ]
[string ]
Cancel the reboot task reboot cancel
Before rebooting the system, make sure to save the current configuration by using
the save command, or some configuration may lost.
Storage Media and The 3Com Router series has three types of storage media:
File Types Supported ■ DRAM (Dynamic Random Access Memory), where the 3Com Router main
by the System program executes.
■ Flash memory, to save the 3Com Router main program/configuration file, etc.
■ NVRAM (Non-Volatile Random Access Memory) can be used to save
configuration file but not program file.
Upgrade Boot ROM This section contains information to assist you with upgrading the Boot ROM
Software software.
Upgrade router software carefully and under the guidance of technical support
personnel. In addition, please refer to the release notes (in the software upgrade
file packet) to make sure that the Boot ROM software version matches the 3Com
Router main software version.
Router software includes Boot ROM software and the 3Com Router main program
software, both of which can be upgraded by XModem only when the router is
powered on for self-test. In Boot ROM software upgrade, first connect a computer
external to the Console port of the router and run the terminal emulator on the
computer. The specific upgrading procedure is:
1 Power on the router for self-test, and the following information displays:
3Com Router start booting
32 CHAPTER 3: SYSTEM MANAGEMENT
Quickly input Ctrl+D to enter the Boot ROM menu. If Ctrl+D is not input within
three seconds, the system will restart the router and the following prompt
information displays:
******************************************
* *
* 3Com Router Series Bootrom, V4.25 *
* *
******************************************
5 Example: if you select baud rate 115200 bps, the system will prompt you to
modify the baud rate and select XMODEM transfer protocol:
Download speed is 115200 bps. Change the terminal's speed to 115200
bps, and select XMODEM protocol. Press ENTER key when ready.
According to the above prompt, change the baud rate setting at the terminal to
the number equal to the baud rate of the software selected to download. After
having set the baud rate of the terminal, disconnect and then reconnect the
terminal, then press Enter to begin downloading.
After having set the terminal baud rate, make sure to disconnect and then
reconnect the terminal emulator. Otherwise, the new baud rate will not be
effective.
6 The router outputs the following information to indicate waiting for download:
Now Downloading Program File.
Please Start Transfer Program File Use Xmodem Protocol.
If You Want To Exit Press <Ctrl+X>.
Downloading...CCCCCCCCCC
Select Transfer/Send File from the terminal emulator menu to select the file to be
downloaded, the following dialog box displays:
8 After downloading, the router will save the file into Flash or NVRAM, display the
following information, and prompt restoring of the baud-rate setting of the
terminal emulator.
Download completed.
Writing to flash memory...
Please waiting, it needs a long time ##############
Write Bootrom Success.
Please return to 9600 bps. Press ENTER key to reboot the system.
The above information indicates that the information is downloaded. Boldface
characters prompt the user to restore the baud rate setting of the terminal
emulator. Click [Disconnect] in the terminal menu, and then click [Connect] once
again. If the download fails, the system displays the following information, and
reboot the router:
Download failed.
Upgrade the 3Com This section contains information to assist you with upgrading the 3Com Router
Router Main Program Main Program software.
Software
CAUTION: You are recommended to upgrade the software only when necessary
and under the guidance of technical support personnel. The router software
package includes the Boot ROM software and the 3Com Router main program
software. When upgrading the software, remember to match the version of the
Boot ROM software with that of the main software.
Upgrade the 3Com Router Main Program Software 35
You can load the 3Com Router main software with XModem or TFTP (Trivial File
Transfer Protocol) approach when powering on the router. Alternatively, you can
load the software with the FTP (File Transfer Protocol) approach after the router is
booted.
XModem Approach
1 Power on the router. The router performs a Power-On Self-Test (POST), and the
following information displays:
3Com Router start booting
******************************************
* *
* 3Com Router Series Boot rom, V4.32 *
* *
******************************************
3Com Corporation Copyright(C) Reserved.
Compiled at 17:47:11 , Mar 21 2003.
Now testing memory...OK!
256M bytes SDRAM
8192k bytes flash memory
Press Ctrl-B to enter Boot Menu
Press Ctrl+B, and the system enters the menu for upgrading the 3Com Router
main software.
The system will enter the menu for upgrading the 3Com Router main software
unless you press Ctrl+B within three seconds of displaying “Press Ctrl-B to
enter Boot Menu...” on the screen. Otherwise, the system will start
decompressing the program. Reboot the router if you want to enter the 3Com
Router main software upgrade menu after program decompression is started.
2 The system prompts the following information after you press Ctrl+B:
Please input Bootrom password:
Enter the Boot ROM password behind the prompt. If no default ex-factory Boot
ROM password was set on the router, directly press Enter. If the user has modified
the password, make sure to enter the correct one. If attempts for password
authentication failed three times, the system will terminate the upgrading process.
3 After the correct Boot ROM password is entered, the following information
displays:
Boot Menu:
1: Download application program with XMODEM
2: Download application program with TFTP
3: Clear application password
4: Clear configuration
5: Exit and reboot
Enter your choice(1-5):
Choose an option as required. Notice that option 3 is used for entering the system
view from the user password.
4 Select 1, and the system prompts you to choose a baud rate for software loading:
Please choose your download speed:
1: 9600 bps
2: 19200 bps
36 CHAPTER 3: SYSTEM MANAGEMENT
3: 38400 bps
4: 57600 bps
5: 115200 bps
6: Exit and Reboot
Enter your choice(1-6):
Make your selection as needed.
5 After a baud rate (115200 bps for example) is selected, the system displays the
following information to prompt you to modify the baud rate and select the
XModem protocol:
Download speed is 115200 bps. Change the terminal's speed to
115200 bps, and select XMODEM protocol. Press ENTER key when ready.
Perform the operation as prompted to change the baud rate set on the terminal
into the baud rate selected for software downloading.
Click OK after setting the new terminal baud rate. Click Disconnect and then
Connect in the terminal interface to proceed to the next step.
You must disconnect and connect the terminal emulation program after modifying
the baud rate of the terminal. Otherwise, the new baud rate cannot take effect.
6 The router displays the following, indicating that the system is waiting for loading:
Now Downloading Program File.
Please Start Transfer Program File Use Xmodem Protocol.
If You Want To Exit Press <Ctrl+X>.
Downloading...CCCCCCCCCC
Select [Transfer File] in the terminal emulation program menu and the following
dialog box displays:
Upgrade the 3Com Router Main Program Software 37
7 Click Browse to open the folder containing the Boot ROM software, select the file,
change the download protocol to XModem, click Send, and the system will start
downloading and the following dialog box displays:
8 Upon the completion of the loading operation, the router writes the Boot ROM
into the Flash or NVRAM, and the following prompts display:
Download completed.
Writing into flash memory...
Please wait,it needs a long time (about 1 min)
Writing into Flash Succeeds.
9 Restore the baud rate of the terminal emulation program to 9600 bps and press
Enter for rebooting the router so that the new 3Com Router main program
software can be run.
TFTP Approach TFTP is a protocol used for transferring trivial files between clients and servers in
the TCP/IP suite. It provides low-cost and simple file transfer service. Carried in
UDP, TFTP provides only the unreliable traffic transmission service without any
access authorization and authentication mechanism. It ensures data will reach
destinations with the approach of timeout retransmission. Compared with FTP, the
TFTP software is much smaller. At present, TFTP Version 2 (RFC 1350) is the most
popular version.
The 3Com Router can provide you with TFTP client service. That is, the router
works as a TFTP client, and the file server as the TFTP server. You can enter the
corresponding commands on the router to upload its configuration files to the file
server or download the configuration files from the file server into the Flash or
NVRAM of the local router.
Before using TFTP, you should purchase and install a TFTP server application as the
3Com Router does not come with a TFTP server application.
b Set the directory for the TFTP server files. After enabling the TFTP server,
redefine a TFTP file directory and copy the desired 3Com Router main program
software into this directory. Alternatively, you can set the directory containing
the 3Com Router main program files as the directory for TFTP server files.
Specifically, click Settings in the TFTPD32 interface, and the Tftpd32: Settings
for the interface as shown in Figure 21 are displayed.
Upgrade the 3Com Router Main Program Software 39
Enter the file directory in the field of Base Directory, and click OK for
confirmation.
The setting interface may vary with different TFTP server program software.
2 Connect the router
a Select an Ethernet interface for downloading on the router.
3Com Router series support application loading on a particular Ethernet
interface.
■ Select Ethernet0 for 5231 Routers.
■ On an Router 5640, check the slots for a 1-port 10/100Base-TX Fast
Ethernet interface module (1FE) card in the order of 0, 2, 1, and 3. The
Ethernet interface thus found will be used as the downloading network
interface. If the router is not available with a 1FE card, check the slots for
the available 2FE card in the same order, and the Ethernet interface 0 of the
2FE module found first will be used as the downloading network interface.
■ On an Router 5680, check the slots for a 1FE card in the order of 0, 2, 4, 6,
1, 3, 5 and 7. The Ethernet interface thus found will be used as the
downloading network interface. If the router is not available with a 1FE
card, check the slots for the available 2FE cards in the same order, and the
Ethernet interface 0 of the 2FE card found first will be used as the
downloading network interface.
b After the Ethernet port for downloading is determined, connect the port to the
PC running the TFTP server program through an Ethernet cable. Assume that
the IP address of the PC is 10.110.10.13.
Upgrade the 3Com Router Main Software with TFTP when Powering on
the Router
1 Run the terminal emulation program on the PC connected to the console port,
start the router, quickly press N upon the display of 3Com Router start booting
on the screen and the following prompt will be displayed:
(M)odify any of the 3Com router configuration or (C)ontinue? [M]
Press Enter and the following prompts will be displayed:
For each of the following questions, you can press <Return> to select
the value shown in braces, or you can enter a new value.
40 CHAPTER 3: SYSTEM MANAGEMENT
The system enters the 3Com Router main software upgrade menu unless you
press Ctrl+B within three seconds of displaying “Press Ctrl-B to enter Boot
Menu...” on the screen. Otherwise, the system will start decompressing the
program. Reboot the router if you want to enter the 3Com Router main software
upgrade menu after program decompression is started.
4 Enter Ctrl+B and the system prompts:
Please input Bootrom password:
Upgrade the 3Com Router Main Program Software 41
Input the Boot ROM password at the prompt. (By default, no ex-factory Boot ROM
password is set on the router. Simply press Enter in this case.) If the Boot ROM
password has been modified, enter the correct password. The system terminates
the process if the password authentication attempts fails three times.
5 The system displays the following prompts upon input of the correct Boot ROM
password:
Boot Menu:
1: Download application program with XMODEM
2: Download application program with TFTP
3: Clear application password
4: Clear configuration
5: Exit and reboot
Enter your choice(1-5):
Make the selection as desired. Notice that option 3 is used for entering the system
view from the user password.
6 Select 2 for loading the 3Com Router main program with TFTP, and the following
prompt displays:
Please start TFTP server then press ENTER key to get start
7 Press Enter for loading.
Starting the TFTP download...
...............................................................
TFTP download completed...
read len=[03713478]
Writing program code to FLASH...
Please waiting,it needs a long time (about 1 min)
WriteFlash Success.
Press ENTER key to reboot the system.
8 Press Enter upon the completion of the loading and the router reboots and the
3Com Router main program directly decompresses and loads into the memory for
execution.
Upgrade the 3Com Router Main Software with TFTP after Booting the
Router
This approach implements upgrading by executing the get command to load the
3Com Router main software from the TFTP server after the router is booted.
Start the TFTP server and connect it with the router before using this method to
upgrade the 3Com Router main software. Then, execute the following command
in system view.
Operation Command
Downloads the 3Com Router main get ip-addr file-name system
software from a TFTP server
FTP Approach An application layer protocol in the TCP/IP suite, File Transfer Protocol (FTP), is
mainly used for file transfer between remote hosts. Carried on TCP, FTP can
provide reliable and connection-oriented data traffic transmission without access
authorization and authentication mechanisms.
42 CHAPTER 3: SYSTEM MANAGEMENT
The 3Com Router can provide you with the FTP server service. That is, the router
works as a TFTP server, and a subscriber can run the FTP client application to log in
the router for accessing the files on the router.
Before using FTP, you should purchase and install a FTP client application, as the
3Com Router is not supplied with this software.
Operation Command
Enable AAA aaa-enable
Operation Command
Add an FTP-authorized user name Local-user username password { 0 | 7 }
and the authentication password password service-type ftp password
{simple | cipher } password
Delete the FTP user undo user username
For the details of the command, refer to the AAA and RADIUS Configuration
contained in the Security section of this manual.
3 Enable the FTP service
The FTP service can be enabled after configuring the authentication and
authorization on the FTP server. The FTP server supports multi-user access. A
Upgrade the 3Com Router Main Program Software 43
remote FTP user sends a request to the FTP server, and the server will perform
actions accordingly and return the execution result to the subscriber.
Perform the following configuration in system view.
Table 18 Enable FTP server
Operation Command
Enables the FTP server ftp-server enable
7 At the prompt ftp>, appearing after the file uploading is completed, enter the dir
command to display the file name and size on the router. If the uploading
operation is successful, the program or configuration file on the router and the
uploaded file on the host should have the same size.
8 At the prompt ftp>, enter the quit command to exit the FTP client program.
9 The router writes the files into the Flash after receiving all of them, and the
following information displays on the terminal:
Now saving the program file.
Please wait for a while
Start the TFTP server and connect it with the router before using this method to
back up the 3Com Router main software. Then, execute the following command
in system view.
Operation Command
Copies the 3Com Router main software to a copy ip-addr file-name system
TFTP server for redundancy
FTP Approach
The procedure of backing up the 3Com Router main program software with FTP is
the same as loading the software with FTP, except for step 6. See “FTP Approach”
on page 41 for reference. When backing up the software with FTP, however, the
step 6 described in “FTP Approach” on page 41 should be modified as follows:
At the prompt ftp>, use the get RemoteFile [LocalFile] command to upload
the specified file to the router. RemoteFile should use the name of the system file
on the router, and the name is case sensitive. You can use the ftp-server
config-name command to modify the file name on the router. For details, refer to
“FTP Approach” on page 44.
Configure On-Line The 3Com Router 1.x supports on-line upgrading of such cards as 2SA/4SA, E1VI
Upgrading of the Card and 6AM/12AM. While upgrading, the host acts as FTP Server and the router to be
upgraded as the FTP Client. The host and the router coordinate to download the
card upgrading files.
When you complete the installation of the FTP application, you can execute
Serv-u.exe and configure the serv-u FTP according to the following steps:
1 Click Setup/Users and the Setup Users dialog box displays as shown below:
2 Click Edit to pop up the Edit Users/Group dialog box. Enter user name and
password in the first two boxes respectively, and the path of the serv-u FTP in the
Home Directory box.
3 Click Add to pop up the Path Name dialog box. Enter the path of the serv-u FTP
and click OK to return.
46 CHAPTER 3: SYSTEM MANAGEMENT
Select the check boxes Read, Write and Delete in FILES and click OK to return.
4 The cards can be upgraded on-line after the on-line upgrading files are copied to
the path of the serv-u FTP.
Perform the following configuration in the system view.
Table 20 Configure on-line upgrading of the card
Operation Command
Configure on-line update slot slot-number ftpserver { host-name |
upgrading of the card ip-address } filename file-name [ port
software port-number | user user-name | password
password ]
5 The system will display the following information according to different situations:
If the on-line upgrading succeeds, the Console displays the following prompt
information:
End of programming successful! Total 131072 bytes written.
If the on-line upgrading fails, the Console periodically displays the following
prompt information:
Please enter the update request command for slot number
Configuration File Management 47
After the display version command is used, the information on the slot
displays:
card name Driver need to be updated
On-line upgrading uses the upgrading program of other cards and this card will
not be upgraded on-line. The Console displays the following prompt information:
%Error: File ID error!
If the on-line upgrading file is damaged, the card cannot be upgraded on-line. The
Console displays the following prompt information:
%Error: File CRC error!
If another user on the same card is using the on-line upgrading command input,
this user cannot execute the command. The Console displays the following
prompt information:
The indicated board is at updating status
Content and Format of The configuration file is a text file, with the following format:
the Configuration File ■ Saved in command format.
■ To save space, only the parameters are saved but the defaults are not saved
(Please refer to the following chapters for the default values of configuration
parameters.).
■ Commands are organized by views. Commands in the same view are organized
together, forming a section, and sections are separated with a blank line or a
comment line (beginning with “!”).
■ Sections are usually arranged in the following order: global configuration,
physical interface configuration, logical interface configuration, route protocol
configuration, etc.
■ Ended with “return”.
Download You can edit the configuration files offline following the specified format and then
Configuration File load them onto the router. Three methods are available for loading configuration
files, which are:
■ XModem approach
■ TFTP approach
■ FTP approach
XModem Approach
With this approach, configuration files can be loaded using the download config
command in the terminal emulation program after booting the router. This
command can only be executed in the terminal emulation program. If executing
the command in Telnet, the following prompt will be displayed:
Download can only be executed by the serial terminal client.
Operation Command
Loads configuration files download config
When performing offline editing and loading of configuration files, you are
recommended to do it under the guidance of technical support personnel. If a
wrong configuration file is loaded, restore the default configuration by erasing the
configuration file in the Flash or NVRAM (depending on the equipment).
TFTP Approach
With this approach, you can use the get command to download the configuration
files from the TFTP server after booting the router.
Like the preparation done before loading the 3Com Router main program with
TFTP, the TFTP server application should be enabled on the PC, and the transferring
path for downloading the configuration files, IP address of the server host, and the
number of the port to be used should be set. After all these preparation tasks have
been completed, you can perform the following configuration on the router. For
the procedure, refer to Upgrading with TFTP.
Operation Command
Loads configuration files from a TFTP server get tftp-server-ip-addr file-name
config
FTP Approach
The procedure of loading configuration files with FTP is the same as loading the
main 3Com Router program software with FTP, except for the files to be loaded.
When loading configuration files with FTP, however, the step 6 described in “FTP
Approach”on page 41 should be modified as follows:
Configuration File Management 49
Back up Configuration You can back up configuration files in the following ways:
Files ■ The display current-configuration command output backup approach
■ The TFTP approach
■ The FTP approach
You can back up the configuration file by copying and saving the contents
displayed below “Current configuration” into a text file.
TFTP approach
First of all, start the TFTP server application program on a PC (the router should be
connected to the PC directly or indirectly, and ping operation can be performed
between them), then set a path and use the copy command in the system view,
thus, you can upload the configuration files to the TFTP server from the router. The
method is often used in remote maintenance.
Operation Command
Upload configuration files to the TFTP server copy tftp-server-ip-addr
with a specified address and specify the file-name config
name for the uploaded file
FTP approach
The procedure of loading configuration files with FTP is the same as loading the
main 3Com Router program software with FTP, except for the files to be loaded.
See “FTP Approach” on page 41 for reference. When loading configuration files
with FTP, however, the Step 6 described in “FTP Approach” on page 41 should be
modified as follows:
View Current and Saved During the power-on of the router, read the configuration files from Flash (or
Configuration of the NVRAM) to initialize the router. Therefore, the configuration file in Flash (or
Router NVRAM) is called initial configuration. If there is no configuration file in Flash (or
NVRAM), the router will use default parameters for initialization. Corresponding to
initial configuration, the configuration immediately effective during the running
process of the router is called current configuration.
In general, the initial configuration and current configuration should be the same.
In the case of upgrading (such as upgrading the host software version or board),
the initial configuration might be different from the current configuration. Then
you should save the initial configuration in time to avoid the loss of some
configuration commands.
Operation Command
View the initial configuration of the router display saved-configuration
View the current configuration of the router display current-configuration
View the current system configuration of the display current-configuration
router global
View all the current interface configuration of display current-configuration
the router interface type [ number ]
View the current IP routing and routing policy display current-configuration ip
configuration of the router { route | route-policy }
View all the routing protocol configuration of display current-configuration
the router protocol protocol
View the current IKE proposal configuration of display current-configuration
the router ike-proposal
View the current IPSec policy configuration of display current-configuration
the router ipsec-policy
View the current IPSec proposal configuration of display current-configuration
the router ipsec-proposal
View the current fr-class configuration of the display current-configuration
router fr-class
View the current voice configuration of the display current-configuration
router voice { aaa | access-number |
acct-method | cdr }
View and Select the The the 3Com Router series has two kinds of media, i.e. Flash and NVRAM, to
Storage Media of store configuration files. Either can be selected with the configfile command to
Configuration File serve as the storage media of configuration file. The current media can be viewed
by the display current-configuration command.
Operation Command
Select the storage media of configuration file (in system configfile { flash |
view) nvram }
View the storage media type of current configuration file display configfile
(in all view)
If there is only one type of storage media available, the configfile command will
not be effective.
Modify and Save Users can modify the current configuration of the router via the command line
Current Configuration interface. To save the current configuration as initial configuration for the next
power-on, use the save command to save the current configuration in Flash or
NVRAM, which will be decided by the configfile command.
Operation Command
Save current configuration save
Erase Configuration File The delete command can be used to delete the configuration file in Flash or
in Storage Media NVRAM of the router. After deleting the configuration files, the router will use the
default configuration parameters for initialization during the next power-on. The
configuration file in Flash or NVRAM can be deleted in the following cases:
■ After upgrading, if the router software does not match with the configuration
file.
■ If the configuration file in Flash or NVRAM is damaged, for example, the wrong
configuration file is loaded.
Operation Command
Erase the configuration file in storage media delete
Set the Flag Bit to Enter first-config set is used to set the flag bit of the initial setup. After the flag bit
the Initial Setup Mode is set, the router will delete the config files in Flash or NVRAM before the system
enters setup mode, in case of powering off, and reset. The operation is similar to
the delete command.
Do not use this command before the save command, which also cancels the
setting of the flag bit.
Operation Command
Set the flag bit to enter initial setup mode first-config set
Clear the flag bit of initial setup mode first-config reset
By default, no flag bit for entering the initial setup mode is set.
Configure FTP FTP (File Transfer Protocol), which belongs to the application layer protocol in the
TCP/IP protocol suite, mainly provides file transfer between remote hosts. Borne
on TCP, FTP provides reliable and connection-oriented data transfer service but
does not provide access authorization and authentication mechanism.
When the client originates control connection to a server (with port command)
and establishes control connection with the server port numbered 21 via an
arbitrarily allocated local protocol port number, this connection will be reserved
until data transfer is complete. The server establishes data connection with the
client via port 20 and transfer data.
The 3Com Router 1.x provides FTP service, that is, the router serves as the FTP
server. Users can run the FTP client application and logon to the router to access
files on the router.
Before using FTP, users need to install the FTP Client application. You need to
purchase the FTP Client application as this is not supplied as part of the 3Com
Router series.
Operation Command
Start AAA server aaa-enable
Disable AAA server undo aaa-enable
Turn on the accounting selection switch aaa accounting-scheme optional
Turn off the accounting selection switch undo aaa accounting-scheme
optional
Set local authentication for PPP connection aaa authentication-scheme login
default local
Operation Command
Add FTP authorized user name and Local-user username service-type ftp
password password {simple | cipher } password
Delete FTP user undo user username
For a detailed introduction to the above command, please refer to the chapter
“AAA and RADIUS Configuration” in the Security section of this manual.
Operation Command
Start FTP server ftp-server enable
Disable FTP server undo ftp-server
Operation Command
Set the program file name on FTP server ftp-server system-name file-name
Set the configuration file name on FTP server ftp-server config-name file-name
54 CHAPTER 3: SYSTEM MANAGEMENT
Operation Command
Set FTP update mode ftp-server update { fast | normal }
Operation Command
Set the connection time limit of FTP service ftp-server timeout seconds
Operation Command
Force a shut down of the FTP process kill ftp
Configure FTP 55
Operation Command
Display the configuration status of current FTP display ftp-server
server
Display detailed information of the FTP user display local-user
56 CHAPTER 3: SYSTEM MANAGEMENT
4 TERMINAL SERVICE
Terminal Service The terminal services provided by the 3Com Router to access the command line
Overview interface are as follows:
■ Perform terminal configuration via Console port
■ Perform terminal configuration via asynchronous serial port
■ Perform terminal configuration via Telnet connection
■ Perform terminal configuration via RLogin connection
■ Perform remote login via X.25 PAD
■ Perform terminal message service
Features of Terminal The Local configuration environment can be established via the console port.
Service at Console Port Please refer to Chapter 2 “3Com Router User Interface”for specific method.
The features of the terminal service at the console port are shown in the following
table. Parameters of the terminal program running on the computer should be set
according to this table.
Features of Terminal The 3Com Router supports remote configuration on the router via asynchronous
Service at Async Serial serial port (including synchronous/asynchronous serial port, 8/16 asynchronous
Port serial port, and AUX port). Please refer to Chapter 2 “3Com Router User
Interface”of this manual for the specific method to establish the configuration
environment.
The remote terminal service features of the asynchronous serial port are shown in
the following table. Parameters of the terminal program running on the computer
should be set according to this table, and parameters such as baud rate, data bit,
parity check and flow control should be consistent with those of corresponding
router interfaces.
Service Features
Echo mode No local echo
Terminal emulation type VT100
Baud rate Consistent with interface configuration, 9600 bps by default
Data bit Consistent with interface configuration, 8 bits by default
Parity check Consistent with interface configuration, no parity by default
Stop bit Consistent with interface configuration, 1 bit by default
Flow control Consistent with interface configuration, no flow control by
default
Set the Attributes of Usually, the terminal user connected via the console port can last for 3 minutes.
Terminal Service The time for the dumb terminal user can last for 10 minutes. For the user who
uses the dummy terminal in dial-up mode, the disconnection timeout is 6 minutes
but the user can disable this function by using the undo idle-timeout command
so that all the terminal users will never be disconnected.
Service Attribute
Enable the function of timeout disconnection from the idle-timeout
terminal user
Disable the function of timeout disconnection from the undo idle-timeout
terminal user
By default, the system will enable the timeout disconnection of the terminal user.
Terminal Message Whenever the terminal users that log into the same router want to communicate
Service with each other, they can use the terminal message service to send messages. The
remote users can telnet onto the local router to transmit information such as
simple configuration files and description characters that are not easily expressed
through telephones among terminal users, using the send command. It is much
more convenient than email. Ensuring information security and reliability, the
terminal message service fulfills information interaction among multiple terminals
on one router.
For example, user A and user B respectively log into Router A and Router B. If user
A wants to communicate some information (such as configuration information)
Terminal Message Service 59
with user B, user A should telnet onto Router B and execute the send command to
send the related information in all views. Then user B can receive the “message”
sent from user A. If user B does not want to receive additional similar messages,
they can use the send switch command to disable the function of receiving
messages.
Operation Command
Send a message to all the terminals send
Press Ctrl+W to terminate inputting the message, and the system will ask the user
whether to send the message to all the terminal users:
Send message? [confirm]
Press Enter, Ctrl+W, y, or Y to confirm the sending. Press Ctrl+C or other characters
to give up the sending.
The terminal message service supports the following features:
■ Supports the users that login through Telnet or console port to use the
message services.
■ Supports the input of multiple lines of messages.
■ Supports the screen paste on HyperTerminal.
■ Supports using the backspace button to modify the message input in a line.
■ Does not support the control keys such as Insert, Delete, ↑ , ↓, ←, →, Home,
End, and Tab.
■ Displays the prompt information when users input ?, h or H.
2 Enable/disable receiving messages from other terminals
In the terminal message service, receipt of messages from other terminals is
determined by the send switch command. If the terminal message service is
currently enabled, it will be disabled after a second input of this command.
Perform the following configuration in all views.
Table 41 Enable/disable receiving messages from other terminals
Operation Command
Enable/disable receiving messages from other terminals send switch
By default, the terminal message service is enabled to receive messages from other
terminals
Operation Command
60 CHAPTER 4: TERMINAL SERVICE
Press Enter, Ctrl+W, y, or Y to confirm the sending. Press Ctrl+C or other characters
to give up the sending.
Dumb Terminal When the asynchronous serial port (such as synchronous/synchronous serial port,
Service AUX port) of the router operates in flow mode, the command line interface (CLI)
of the router can be used to carry out configuration of the router. This is achieved
by directly connecting the RS-232 serial port with the asynchronous serial port of
the router. This is called the dumb terminal operation mode.
As shown in the diagram below, the user can connect with any asynchronous
serial port and log in to the router by running the hyper terminal on PC to carry
out the configuration management of the router.
PC
Asynchronous Port
■ The asynchronous port working under the flow mode is connected to the
RS-232 serial port via dedicated line to enter the router command line interface
thereby providing another mode of configuring routers besides the mode of
console port and Telnet mode.
■ Based on the dumb terminal, other applications can be built, for instance,
logging on to other equipment by executing the Telnet command.
Operation Command
Dumb Terminal Service 61
Operation Command
Configure the auto-execute command auto-execute command command
command on the asynchronous serial interface
Remove this command undo auto-execute command
command
SCO UNIX
Workstation
10.110.164.4
4
Terminal
Terminal Service of
Telnet Connection
Telnet Overview Telnet protocol, which belongs to the application layer protocol in the TCP/IP
protocol suite, describes how to provide telnet and virtual terminal functions via
the network. Telnet connection services provided by the 3Com Router 1.x include:
■ Telnet Server service: provides services for local and remote users to logon to
the router, maintains the router and accesses network resources. As shown in
the following figure, users can logon to the router by running the Telnet client
program on the computer and perform the configuration management for the
router.
Router
(Telnet Server)
Workstation
(Telnet Client)
■ Telnet Client service: provides service for local or remote users who have logged
on to the local router to access other remote system resources by using the
Telnet Client program of the local router. As shown in the following figure,
users can re-logon to router B using the Telnet command and perform
configuration management after establishing a connection with router A via
the terminal emulator or Telnet program on the computer.
Terminal Service of Telnet Connection 63
Router A
Router B
( Telnet Client)
Workstation (Telnet Server)
Reverse Telnet Overview Reverse Telnet service: the user logs on the router with a specified port number by
running the Telnet client program on the PC. Then the connection to the serial
port device connected with the async port of the router is established. One
example: the 3Com Router performs remote configuration and maintenance of
the external devices connected with its 8/16 asynchronous port with Reverse
Telnet service.
Telnet Client
QuidwayRouter
NAS
Modem
Router LAN Switch Other communication
devices
Service Value
Input mode Character mode
Echo mode No local echo
Terminal type VT100
Operation Command
Enable the Telnet Client connection service telnet host-ip-address [
service-port ]
Operation Command
Forbid the modem to dial in or dial out undo modem
Set the router to flow mode async mode flow
Log onto the router at specified port and telnet host-ip-address
connect to corresponding async port service-port
Disable/Enable the option negotiation towards terminal telnet
the Telnet client refuse-negotiation
Configure the timeout of Reverse Telnet terminal telnet timeout
Configure the Reverse Telnet timeout of the reverse-telnet timeout time
interface
Disconnect the Reverse Telnet of the interface reverse-telnet disconnect
Do not send the carriage return received from reverse-telnet return-deal
the telnet end to the terminal from-telnet
Do not send the carriage return received from reverse-telnet return-deal
the terminal to the telnet end from-dumb
By default, the option for negotiation towards the Telnet client is enabled, and
Reverse Telnet will expire in 600 seconds. Reverse Telnet transparently transmits all
data. The interface use the default listen port number.
The undo modem command must be used to disable modem calling-in and
calling-out before the Reverse Telnet timeout of the configuration interface is
configured.
On the 3Com Router series, the maximum number of Reverse Telnet connections
is related to the interface card and the maximum number of tasks supported by
the router.
Terminal Service of Telnet Connection 65
The interface listen port number is within the range of 1025 to 65535. Please note
that the listen port number cannot be the same as that of the widely used ports.
By default, the port number and asynchronous interface have the following
relations:
■ The async serial interface number starts from 2001. For instance, the first async
serial interface number is 2001, the second is 2002, and so on.
■ The AUX interface number is 3000.
■ The sync serial interface number starts from 3001. For instance, the first sync
serial interface number is 3001, the second is 3002, and so on.
Operation Command
Force to shut down Telnet process kill telnet { all | userID userid }
display client can only be used to display the interface through which the
Telnet client connected to the router passes. If you want to view the IP address of
the Telnet server connected to the router, you should execute the display tcp
status command. The TCP connection whose local port number is 23 is the Telnet
connection, including the Telnet client connection and Telnet server connection.
Password:
User guest logged in .
3 The message showing successful Telnet to Router B should pop up and display the
host name of RouterB.
[RouterB]
[RouterB]
The host can send commands to communicate with the device connected to the
asynchronous serial interface. If a modem is connected to the interface, you can
detect the modem status or configure the modem by using the AT command.
Rlogin Terminal Rlogin (Remote Login) is one of the most common Internet applications developed
Service by the BSD UNIX system, in which a client is connected with the server by TCP
connection. It provides the function of several remote terminals accessing the
UNIX host. Rlogin originated from Berkeley UNIX and id used for telnet service
between UNIX systems. Compared with Telnet protocol, it is easier to implement
and use Rlogin protocol.
Figure 31 Connect Unix Server and Terminal through the 3Com Router
Terminal
Terminal
Quidway Router ...
The Rlogin client provided by the 3Com Router series has the following features:
Rlogin Terminal Service 67
Operation Command
Establish a Rlogin connection rlogin ip-address [ username ]
Shut down a Rlogin connection exit
Use local user name abc and enter the wrong password for the first time
[Router] rlogin 1.1.254.78
Trying 1.1.254.78 ...
Last successful login for root: Thu Sep 06 15:14:15 2001 on ttyp0
Last unsuccessful login for root: Thu Sep 06 14:22:35 2001 on ttyp0
68 CHAPTER 4: TERMINAL SERVICE
X.25 PAD Remote PAD (Packet Assembly/Disassembly facility) is a definition specific to X.25 protocol.
Access Service
The traditional X.25 network requires that all its terminals are of X.25 type, and
relevant hardware and software are needed to support X.25 protocol, which are
the so-called packet terminals. Packet terminals must be intelligent ones, but
many terminals uses are either non-X.25 or not intelligent (such as keyboard,
monitor, printer, etc.) or intelligent but do not support X.25 procedures. In that
case it is impossible for non-X.25 terminals to interconnect with each other
through the X.25 network, or even access the X.25 network. X.25 PAD technology
was developed to address how these devices can be enabled to communicate via
X.25 network.
X.25 PAD bridges the X.25 network and non-X.25 terminals — it provides a
mechanism through which non-X.25 terminals can access the X.25 network. As
shown in the figure below, a PAD is positioned between the X.25 network and
terminals that do not support X.25 procedures to enable the latter to
communicate with other terminals through the X.25 network.
Non-X.25 terminal
P
X.25 Network X.25 A Non-X.25
Procedures Procedures
D
The 3Com Router implements X.29 and X.3 protocol in the X.25 PAD as well as in
the X.29 protocol-based Telnet application and the users can configure routers
without geographical limitation, as shown in the figure below. When the user, for
the sake of security, is unable to use IP protocol-based Telnet to configure routers,
they can access a remote router through X.25 PAD for the configuration.
Serial 0
Router A
X.25 Network
Router B
This command is not necessary, but if required, it must be used together with the
login pad command.
The called end (also called the configured end) is defined as the Server side, and
the calling end (also called the configuration end) is defined as the Client side.
Please implement the following configuration under the system view at the Server
side.
Operation Command
Configure X.25 PAD remote user local-user user-name
service-type type [ password {
simple | cipher } password ]
Cancel the completed configuration of X.25 undo local-user user-name
PAD remote user
70 CHAPTER 4: TERMINAL SERVICE
This command is not mandatory, but if required, it must be used together with the
user command.
Please implement the following configuration under the system view at the Server
side.
Operation Command
Enable AAA authentication of X.25 remote login pad
user
Disable AAA authentication of X.25 remote undo login pad
user
Enable AAA authentication aaa-enable
Configure user name and password local-user username password
password
Please implement the following configuration under the system view at the Client
side.
Operation Command
Establish a X.25 PAD call pad x.121-address
Exit X.25 PAD login exit
If a call successfully logs on, the user can, at the Client side, access the Server.
Pad command can be nested with itself or with the telnet command, that is, the
user can place an X.25 PAD call on a router and access another router, from which
they do the same and access a third router. Or, the user first Telnets to a router
from which they can place X.25 calls and access a third router. Or, users can place
X.25 calls, access a router and then telnet to another router, and so on. It is
recommended to limit the nesting to three times to ensure normal transmission.
X.25 PAD Remote Access Service 71
Exit command can also be nested with the Pad command. That is, users can
access a third or even more routers from a router by repeatedly using the
telnet/pad command or by repeatedly using the exit command to exit the
routers being accessed in turns until returning to the one from which the first call
is placed.
Please implement the following configuration under the system view at the Server
side.
Please implement the following configuration under the system view at the Server
side.
Operation Command
Set the response time to the Invite Clear message x29 inviteclear-time time
seconds
Display and Debug X.25 Perform the following configuration in all views.
PAD Table 55 Display and debug X.25 PAD
Operation Command
Display the relevant information of X.25 PAD display x25 pad [
pad-number ] [ tty ]
Enable the debugging of X.25 PAD on varied levels debugging pad { packet |
error | all }
c Enter the view of interface Serial 0 and set its link layer protocol as X.25 DTE
IETF.
[RouterA]interface serial 0
[RouterA-serial0]link-protocol x25 dte ietf
d Set its X.121 address as 123456.
[RouterA-serial0]x25 x121-address 123456
2 Configure Router B:
a Enter the view of interface Serial 0 and set its link layer protocol as X.25 DTE
IETF.
[RouterB]interface serial 0
[RouterB-serial0]link-protocol x25 dte ietf
b Set its X.121 address as 5678.
[RouterB-serial0]x25 x121-address 5678
c Return to the system view and place the X.25 PAD call to router A
[RouterB] pad 123456
Trying 123456...Open
Username:paduser
Password:
User paduser logged in.
[RouterA]
Fault Diagnosis and Fault one: If after X.25 calls a remote terminal, logon fails. The screen
Troubleshooting of X.25 displays Trying xxxxxxxxxx...Destination unreachable.
PAD Troubleshooting: Follow the steps below.
■ X.25 protocol is encapsulated on the serial port that is used for connection and
both ends support X.25 PAD protocol.
■ After the above condition is met, make sure that the serial port at the Server
side used to receive X.25 calls has set the X.121 address and the address is
correctly called at the Client side.
■ After the above conditions are satisfied, then you should confirm that the serial
interface used to accept the X.25 PAD calls at the Server end has specified the
X.121 address, and the Client has correctly called this address.
■ If the above condition is also satisfied, please check if the Client side has set
switch attributes (i.e., x25 switching command is used under system view),
but does not set the route to the Server side. If so, the data cannot be
transmitted from the Client side to the Server side in the packet mode. It is not
mandatory for the Client side to configure the route to access the Server,
though. If the Client side does not configure switch attributes, X.25 will choose
the default route for the call. Therefore, please confirm that the Client side is
not configured with the switch attributes or the Client side is configured with
the switch attributes as well as the route to the Server side.
5 CONFIGURING NETWORK
MANAGEMENT
■ SNMP Overview
■ RMON Overview
SNMP Overview Simple Network Management Protocol (SNMP), a widely accepted industry
standard, is the most dominant network management protocol in computer
networks by far. It is developed to ensure transmission of management
information between any two nodes, which will facilitate network administrators
to search for information at any node on the networks for the purpose of
modifying, locating faults, troubleshooting, planning capacity and generating
reports. Adopting the polling mechanism, SNMP provides essential functionality,
and is suitable for a networking environment requiring small size, high speed and
low cost. Since it uses the transport layer protocol UDP (User Datagram Protocol)
which requires no acknowledgement, it gains wide support in many products.
Response
Request NMS
Router
Ethernet
SNMP is the most widely applied communication protocol between NMS and
Agent in the computer network.
Development of SNMP
There are three versions of SNMP: SNMPv1, SNMPv2c and SNMPv3. SNMPv3
defines a series of access control management functions for network security, in
74 CHAPTER 5: CONFIGURING NETWORK MANAGEMENT
sub-tree, the network administrator can access the device with read or write
authority. Otherwise, the operations will be rejected.
SNMP architecture
An SNMP entity comprises one SNMP engine and multiple SNMP applications. The
SNMP engine is the core of the SNMP entity. It transceives and authenticates
SNMP messages, extracts PDU (Protocol Data Unit), reassembles messages, and
communicates with the SNMP applications. SNMP applications process PDUs,
implement protocol operations, and stores/gets MIB.
SNMP-supported MIB
To uniquely identify the equipment management variables in SNMP packets, SNMP
identifies the managed objects by using the hierarchical structure to name them.
The hierarchical structure is like a tree, in which, the nodes of the tree represent
the managed objects. As shown in the following figure, it can use a path starting
from the root to identify an object unambiguously.
1 2
1 2
1 2
B
5 6
As shown in the above figure, the managed object B can be uniquely specified by
a digit string {1.2.1.1}, which is the object identifier of the managed object.
Consisting of collections of standard variable definitions of monitored network
equipment, MIB describes the hierarchical structure of the tree
SNMP agents in the 3Com Router series support standard network management
versions SNMPv1, SNMPv2c, and SNMPv3. MIBs that are compatible with the
agents are shown in the following table.
76 CHAPTER 5: CONFIGURING NETWORK MANAGEMENT
Operation Command
Enable SNMP service snmp--agent
Disable SNMP service undo snmp-agent
Set an engine ID for the equipment snmp-agent local-engineid
engineid
Set the engine ID of equipment to the default undo snmp-agent local-engineid
value
You can skip these two operations when you begin to configure SNMP for a router
because SNMP service will be enabled once you configure any related SNMP
commands (except for the display commands). It is equivalent to configuring the
snmp-agent command. Furthermore, the default engine ID can generally ensure
the uniqueness of the router on the network.
2 Configure SNMP version and related tasks
The 3Com Router series support SNMPv1, SNMPv2c and SNMPv3.
SNMPv1 and SNMPv2c adopt a community name for authentication, and the
SNMP packets that are not compliant with the community name authorized by the
equipment will be discarded. Different groups can have either the read-only or
read-write access authority. A group with the read-only authority can only query
equipment information, whereas a group with read-write authority can configure
the equipment. The authorities are specified by MIB views.
Security defined in SNMPv3 is user-based hence an SNMP user inherits the
authority of the SNMP group to which it belongs. Different NMS have different
access authority. An SNMP group can have read-only, read-write or notifying
authority. The authorities of the SNMP group are also determined by MIB views.
Perform the following configurations in system view.
Table 58 Configure SNMP version and related tasks
Operation Command
Select an SNMP version for NMS snmp-agent sys-info version { v1 | v2c |
v3 | all }
Define the SNMP version(s) that undo snmp-agent sys-info version { v1 |
NMS are not permitted to use v2c | v3 | all }
Create or update view snmp-agent mib-view { included | excluded
information } viewname subtree subtree
Delete a view undo snmp-agent mib-view view-name
Set name and access authority snmp-agent community { read | write }
for a community community_name [ mib-view view-name ] [
acl number ]
Remove the previous community undo snmp-agent community community_name
name
Set an SNMP group snmp-server group { v1 groupname | v2c
groupname | v3 groupname { authentication
| noauthentication | privacy } } [
read-view readview ] [ write-view
writeview ] [ notify-view notifyview ]
[acl number ]
Delete an SNMP group undo snmp-agent group { v1 groupname | v2c
groupname | v3 groupname { authentication
| noauthentication | privacy } }
Add a new user to an SNMP snmp-agent usm-user { v1 username
group and specify the SNMP groupname | v2c username groupname | v3
version as well as the username groupname [ authentication-mod {
authentication/encryption mode md5 | sha } auth-password [ privacy-mod
des56 priv-password ] ] } [ acl number ]
78 CHAPTER 5: CONFIGURING NETWORK MANAGEMENT
Before configuring an SNMP group, you should first define the view, which will be
used for configuring the SNMP group. When configuring the community name,
however, specifying a view is optional.
3 Configure information of router administrator
You should correctly configure information describing location and management
of the local equipment so that the network administrator can contact the
equipment administrator.
Perform the following configurations in system view.
Table 59 Configure information of router administrator
Operation Command
Set the administrator ID and the contact method snmp-agent sys-info contact
string
Restore the default administrator ID and the undo snmp-agent sys-info
contact method contact
Set router location information snmp-agent sys-info location
string
Restore the default router location undo snmp-agent sys-info
location
Operation Command
Enable the router to send traps snmp-agent trap enable [ trap-type ]
Disable the router to send traps undo snmp-agent trap enable
Specify the interface whose address snmp-agent trap source interface-type
is bound as the source address in interface-number
the trap messages
Remove the interface whose undo snmp-agent trap source
address is bound as the source
address in the trap messages
SNMP Overview 79
Operation Command
Set the maximum size of SNMP packets that the snmp-agent packet max-size
agent can receive/send byte-count
Restore the default maximum size of SNMP undo snmp-agent packet max-size
packets
Operation Command
Display the statistics of SNMP packets display snmp-agent statistics
Display the current equipment engine ID display snmp-agent
local-engineid
Display information of system location display snmp-agent sys-info
location
Display system contact information display snmp-agent sys-info
contact
Display information of snmp groups on the display snmp-agent group
router
Display information of all SNMP users in the display snmp-agent usm-user
group user name list
Display the group names that have been display snmp-agent community
configured
Display information of the MIB views that have display snmp-agent mib-view
been configured
Enable SNMP debugging debugging snmp-agent { headers |
packets | process | trap | all }
80 CHAPTER 5: CONFIGURING NETWORK MANAGEMENT
Router e0
129.102.0.1
NMS 129.102.149.23
Ethernet
I. Networking Requirements
■ According to the networking of Example 1, NMS is connected to the router via
the Ethernet, and their IP addresses are respectively 129.102.149.23 and
129.102.0.1.
■ SNMPv3 is required. Three SNMP groups will be configured and respectively
authorized with read-only, writing, and notifying rights. Three SNMP users
belong to the three groups respectively, and three MIB views are used as read,
write and notify views respectively.
■ Information of the network administrator is required to be configured.
RMON Overview 81
RMON Overview RMON (Remote Monitor) is a MIB defined by IETF and is the most important
enhancement for the MIB II standard. It mainly monitors the data flow in a
network segment or on the entire network. It is implemented on the basis of the
SNMP architecture (one of its strengths), including NMS and Agent running on
network equipment.
Router Bridge
Internet
Router Ethernet
Bridge
Router
With RMON function
FDDI Ethernet
Backbone
PC with RMON
The value includes three managed objects. With enhanced RMON alarm group
function, if a sample is found to cross the threshold, which has been configured,
RMON Agent will report to NMS so as to avoid a lot of query messages of the
NMS.
Configure RMON on the To configure RMON after SNMP, first configure RMON command lines on the
Router 3Com Router series. Then enable RMON statistics before NMS can be used to
monitor network traffic and perform network management.
Operation Command
Enable RMON statistics of an Ethernet interface rmon promiscuous
Disable RMON statistics of an Ethernet interface undo rmon promiscuous
129.1.1.100/ 129.2.2.200/
202.38.165.1/24 202.38.165.2/24
host1 24 24
129.1.1.111/24
A(tested router) B
host3
129.2.2.222/24
host2
129.1.1.112/24
Display Command Set With display commands, the system status and system information can be
viewed. display commands can be divided as follows according to the
functionality:
■ The command to display system configuration information
■ The command to display system running status
■ The command to display system statistic information
The following commands can be used to display related information of the whole
system in all views. Please see related chapters in this manual for specific display
commands.
Operation Command
Display current terminal user. display client
Display the system clock display clock
Display the current memory type display configfile
Display states of various debugging switches display debugging
Display the history record of input command display history-command
Display the router name display systname
Display current configuration information of the display
system current-configuration
Display initial configuration information of the system display saved-configuration
stored in router Flash
Display primary system configuration information display tech-support [ page
]
Display registered terminal user display user
Display version information of system display version
Debugging Command The command line interface of the 3Com Router 1.x provides abundant
Set debugging commands, almost corresponding to all the protocols supported by the
router, helping the user to diagnose and eliminate network faults.
86 CHAPTER 6: DISPLAY AND DEBUGGING TOOLS
The following is part of the common debugging commands. For more specific
debugging commands related to various protocols, please see related chapters in
this manual and the 3Com Router Command Reference Guide.
The 3Com Router provides a shortcut Ctrl+D to close the huge amount of
debugging information output by the terminal, which functions the same as the
command undo debugging all.
Examples are omitted here. Please see relevant chapters in the 3Com Router
Command Reference Guide.
In addition, when any terminal user enables or disables the debugging, the
debugging information output on other user terminals will be affected.
As for all link layer protocols, the debugging can be controlled according to
interfaces, so that the interference of a huge amount of redundant information
can be avoided effectively and it makes troubleshooting more convenient.
On the 3Com Router, Syslog (log system) manages the output of debugging
information and other prompt information. Before obtaining the debugging
information, you need to open the related Syslog switch. Firstly, you must use the
info-center enable command to enable Syslog function, then you can use the
info-center console or info-center monitor command to enable debugging
according to the different type of terminal, or use the info-center console
debugging command on the Console terminal, or use info-center monitor
debugging on the telnet terminal or dumb terminal. Refer to subsequent sections
for introduction and detailed descriptions and commands of Syslog.
Since the output of the debugging information will affect the running efficiency of
the router, please do not turn on any debugging switches unless necessary,
especially the debugging all command. After completing debugging, please turn
off all debugging switches.
Ping Command The ping command is mainly used to check the connection of the network, i.e.
whether the host is accessible. Ping sends Internet Control Message Packets
(ICMP) echo packets to another computer connected on the network to see
whether it echoes back. Ping is a useful command to test the connectivity of the
network and details about the journey.
Table 65 ping command
Operation Command
Test Tool of Network Connection 87
ping supporting IP protocol ping [ip] [-Rdnqrv] [-c count] [-p pattern]
[-s packetsize] [-t timeout] { host |
ip-address }
ping supporting IPX ping [ipx] [-n] [-v] N.H.H.H [count [,timeout
protocol [,packetsize]]]
Please see relevant chapters in the 3Com Router Command Reference Guide for
detailed meanings of various options and parameters.
Examples:
[Router]ping 202.38.160.244
Examples:
!!!!!
--2.0.0c91.f61f IPX ping statistics--
5 packets transmitted
5 packets received
0% packet loss
round-trip min/avg/max = 1/2/3 ms
tracert command (Trace The trace route command helps to trace the current network path to a
Route Command) destination. With tracert command, all gateways by which the test packet
passes from the source address to the destination address can be displayed. It can
be used to check network connection and locate fault.
The tracert command is executed as follows: first, send a packet with TTL 1, and
the first hop returns an ICMP error message, indicating that this packet cannot be
sent (for TTL timeout). Then, this packet is re-sent with TTL added by 1 (namely 2).
Similarly, the next hop returns TTL timeout. In this way, the procedure continues till
the destination is reached. The purpose of these procedures is to record the source
address of each ICMP TTL timeout message, so as to provide the path by which an
IP packet has to pass to reach the destination address.
Operation Command
Display the path from the source tracert [ -a ip-address ] [ -f first_TTL ]
address to the destination [ -m max_TTL ] [ -p port ] [ -q nqueries ]
address [ -w timeout ] host
Please see relevant chapters in the 3Com Router Command Reference Guide for
detailed meanings of various options and parameters.
Described below are two examples to analyze the network connection with
tracert command. In the former example, network connection is correct, while in
the latter, network connection is faulty.
[Router]tracert 35.1.1.48
Trace route to nis.nsf.net (35.1.1.48), 30 hops max, 56 byte packet
1 helios.ee.lbl.gov (128.3.112.1) 19 ms 19 ms 0 ms
2 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 39 ms 19 ms
3 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 39 ms 40 ms 39 ms
4 ccn-nerif22.Berkeley.EDU (128.32.168.22) 39 ms 39 ms 39 ms
5 128.32.197.4 (128.32.197.4) 40 ms 59 ms 59 ms
6 131.119.2.5 (131.119.2.5) 59 ms 59 ms 59 ms
7 129.140.70.13 (129.140.70.13) 99 ms 99 ms 80 ms
8 129.140.71.6 (129.140.71.6) 139 ms 239 ms 319 ms
9 129.140.81.7 (129.140.81.7) 220 ms 199 ms 199 ms
10 nic.merit.edu (35.1.1.48) 239 ms 239 ms 239 ms
The above results indicate which gateways (1~9) are passed from the source
address to the destination address. That is very useful to network analysis.
[Router]tracert 18.26.0.115
traceroute to allspice.lcs.mit.edu (18.26.0.115), 30 hops max
1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms
2 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 19 ms 19 ms
Log Function 89
3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 19 ms
4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 19 ms 39 ms 39 ms
5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 20 ms 39 ms 39 ms
6 128.32.197.4 (128.32.197.4) 59 ms 119 ms 39 ms
7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 39 ms
8 129.140.70.13 (129.140.70.13) 80 ms 79 ms 99 ms
9 129.140.71.6 (129.140.71.6) 139 ms 139 ms 159 ms
10 129.140.81.7 (129.140.81.7) 199 ms 180 ms 300 ms
11 129.140.72.17 (129.140.72.17) 300 ms 239 ms 239 ms
12 * * *
13 128.121.54.72 (128.121.54.72) 259 ms 499 ms 279 ms
14 * * *
15 * * *
16 * * *
17 * * *
18 ALLSPICE.LCS.MIT.EDU (18.26.0.115) 339 ms 279 ms 279 ms
The above results indicate which gateways (1~17) are passed from the source host
to the destination host, and which gateways are faulty (12, 14, 15, 16 and 17).
Log Function This section describes the various attributes that form the log function and how to
configure on the router.
Syslog Overview The 3Com Router 1.x is configured with Syslog (log system). As an indispensable
part of the 3Com Router 1.x, Syslog serves as the information junction of the
3Com Router 1.x system software module. The log system is responsible for most
of the information output and can perform detailed classification so as to filter
information effectively. In combination with the debugging command, the system
provides powerful support for the network administrator and development staff to
monitor the network running state and diagnose the network faults.
■ Support log output in four directions, i.e. to the control console (Console), to
the telnet terminal and the dumb terminal (Monitor), to the internal buffer
(Buffer), and to the log host (Loghost).
■ Log information is divided into eight levels according to the importance and
filter based on the levels.
■ Information is classified according to the source modules and filter based on
the modules.
■ Information can be output in Chinese or English.
Operation Command
Enable to output log information to local control info-center console
console
Disable to output log information to local control undo info-center console
console
Enable to output log information to the terminal info-center monitor
Disable to output log information to the terminal undo info-center monitor
Enable to output log information to internal info-center logbuffer
buffer
Disable to output log information to internal undo info-center logbuffer
buffer
Define the size of internal buffer of output log info-center logbuffer size
information
Enable to output log information to the log host info-center loghost
Disable to output log information to the log host undo info-center loghost
Change the language mode (Chinese | English) of info-center { console | monitor
output log information | logbuffer | loghost} {
chinese | english }
The setting of output direction of the log information will be effective only if
Syslog is turned on.
The settings of the output log information in four directions are independent. The
shutdown of an output in any direction will not affect the output in other
directions.
When there are multiple telnet users or dumb terminal users simultaneously,
various users share the same configuration parameters, which include the filtering
setting based on the module, Chinese/English selection and severity threshold.
When a user changes the values of these parameters, other user terminals will also
be affected. At this time, the undo info-center monitor command can only turn
off the log information output on the respective terminal. Therefore, to turn off
the log information outputs of all telnet terminals and dumb terminals, please use
the undo info-center monitor all command.
Log Function 91
Operation Command
Enable to output log information info-center console {emergencies |alerts
with priority to local control | critical | errors | warnings |
console notifications |informational |debugging}
Enable to output log information info-center monitor {emergencies |alerts
with priority to the terminal | critical | errors | warnings |
notifications |informational |debugging}
Enable to output log information info-center logbuffer {emergencies
with priority to internal buffer |alerts | critical | errors | warnings |
notifications |informational |debugging}
Enable to output log information info-center loghost <0-9>
with priority to the log host {local<0-7>|ip-address} {emergencies
|alerts | critical | errors | warnings
notifications |informational |debugging}
Disable to output log information undo info-center { console | monitor |
with priority to the log host. logbuffer | loghost}
Severity Descriptions
Emergencies (0) Most severe/emergent fault
Alerts (1) Fault needs to be corrected immediately
Critical (2) Major fault
Errors (3) Noticeable but not major fault
Warnings (4) Cautions, it is possible there may be a fault
Notifications (5) Information needs to pay attention to
Informational (6) Ordinary prompt information:
Debugging (7) Debugging information
Operation Command
Set Filter of the control console info-center console filter module
Delete Filter of the control console undo info-center console filter
92 CHAPTER 6: DISPLAY AND DEBUGGING TOOLS
Here, module stands for the module name. Only the log information related to a
specified module can be filtered and output.
Operation Command
Turn on Syslog info-center enable
Turn off Syslog undo info-center enable
When Syslog is turned on, the performance of the system will be affected due to
the information classification and output - especially when processing a large
amount of information.
Operation Command
Display basic configuration information of Syslog display info-center
Display internal buffer information of Syslog display info-center logbuffer
3 When log files like config and security are created and /etc/syslog.conf file is
modified, an HUP will be sent to the system daemon, Syslogd, by executing the
following commands to make Syslogd re-read its configuration file
/etc/syslog.conf.
#ps -ae | grep syslogd
147
#kill -HUP 147
After the above operations, the router can record information in relevant log files.
POS Access Service Point of Sale (POS) service is a type of smart card service widely used in shopping
Overview malls, gas stations, and so on. It links the POS terminal device at the commercial
client (located in shopping mall or gas station) to the bank card accounting system
to provide service.
The POS terminal device is widely used in the fields of commerce, finance,
taxation, and so on. The earlier POS terminal devices worked independently in
different banks, and they could not communicate with each other. The technology
based on a shared POS access service has solved this problem and makes it
possible to use different bank cards on the same POS.
The POS terminal is connected to the transaction center in two ways, namely,
through dial-up POS access and POS network access.
The following figure shows the networking diagram of the typical dial-up POS
access.
Figure 39 Dial-up access when the POS access router is located at the FEP side
Serial port
PSTN
FCM Ethernet
POS terminal Quidw
Routeray
interface UNIX FEP
96 CHAPTER 7: POS TERMINAL ACCESS SERVICE
Figure 40 Dial-up access when the POS access router is located at the commercial client
side
POS terminal
PSTN/ PSTN/ISDN
PBX X.25/FR/DDN
POS terminal FCM
Quidw ay
Router Router
Router
UNIX FEP
POS terminal
Due to the way POS access service usually operates, that is, low speed, high
frequency and small traffic, it is rather sensitive to the dial-up connection time and
requires the interface board for fast dial-up function. However, the present
common PC modem cannot meet the response time requirements of 10 to 20
seconds. At present, most POS equipment manufacturers use the special modem
chip that supports fast connection to implement the function. The FCM card of
the 3Com Router series is a fast handshaking modem specially designed for POS
dial-up access service.
The following figure shows the networking of typical POS network access.
Figure 41 Access mode when the POS access router located at the commercial client end
RS-232
POS1 Long line
driv e Serial
POS PSTN, ISDN port
RS-485
X.25,FR,DDN Ethernet
Quidw ay
Router Router interface
POS2 UNIX FEP
RS-232
POS
concentrator
In the POS network access mode, 3Com Router series can be connected to the
POS terminal in the following two ways:
■ Directly connect the POS RS-232 connector with the asynchronous interface
(including the asynchronous mode of the synchronous/asynchronous interface)
of the 3Com Router series. If the distance between them exceeds 15 meters, it
will be necessary to install a long-line-driver at each end of the connection line.
The valid connection distance of a pair of passive long-line-drivers is about
1200 meters.
■ Set up an RS-485 network with the POS terminal device and POS concentrator,
then connect the RS-232 connector of the POS concentrator with the
asynchronous interface of the 3Com Router series. The 3Com Router series
communicate on the egress port in the same way as the first connection
method. Access in this way can save the router interface source greatly.
The advantages of POS network access are as follows:
POS Access Service Configuration 97
■ Avoiding the dial-up time problem and fast connecting to the transaction
processing center.
■ Reducing the number of occupied communication links, hence saving the
communications cost greatly.
■ Avoiding the problem of service queuing as it is as though each POS terminal
device enjoys a dedicated line (except the networking is comprised of the POS
terminal and the POS concentrator).
■ The POS access feature can be combined with other services of the router, i.e.,
dumb terminal, SNA, and VoIP, which brings a wide market and provides users
with integrated solutions.
Operation Command
Enable POS access server pos-server enable
Disable POS access server undo pos-server enable
Operation Command
Configure the POS access interface async mode pos pos-id
Only when the active interface operates in protocol mode can the command be
configured.
98 CHAPTER 7: POS TERMINAL ACCESS SERVICE
If the FCM interface is used as POS access interface undo modem cannot be
configured. If another interface is used as the POS access interface undo modem
must be configured.
Since POS access does not support flow control, the interface should be
configured with the flow-control none command.
If the POS access port is connected to the POS terminal in asynchronous mode,
and the POS asynchronous port does not send a DSR-DTR signal, it is necessary to
configure the command undo detect dsr-dtr on the interface. If the POS access
port is connected to the FCM interface via dial-up, it is unnecessary to configure
the undo detect dsr-dtr command.
3 Configure POS Application
The POS access router connects to the UNIX FEP in the following two ways:
asynchronous connection and TCP/IP connection. The commands used for
configuring the POS application are different in the two modes. Connecting to the
UNIX FEP through the Ethernet is called a TCP/IP connection, while connecting
through the asynchronous serial port is called asynchronous connection. No
matter how the connected is made, it is necessary to configure the POS
application to UNIX FEP for the terminal.
Please perform the following configuration in system view.
Table 74 Configure a POS application
Operation Command
Configure a POS application in asynchronous pos-server app flow app-number
connection interface-type interface-number
Delete a POS application in asynchronous undo pos-server app flow
connection app-number
Configure a POS application in TCP/IP pos-server app tcp app-number
connection ip-address port-number
Delete a POS application in TCP/IP connection undo pos-server app tcp
app-number
Operation Command
Configure the operation mode of POS application async mode posapp
interface
When the POS access router is connected to the UNIX FEP in asynchronous mode,
the interface should operate in posapp mode.
This command can be configured only when the active interface is configured with
the command async mode protocol
Only after the command undo modem is configured, can data be transceived
normally.
POS Access Service Configuration 99
POS access does not support flow control, therefore, the interface should be
configured with the flow-control none command.
5 Configure POS Multi-Application Map
POS multi-application is a kind of POS access function, which sends the packets
from a POS terminal device to different POS applications according to the packet
destination addresses. For TCP/IP connection, an application is marked by two
parts, IP address and port number, that is, the different applications may have
different IP addresses or share the same IP address but have different port
numbers. The packets can be sent to different applications according to the
destination address number. When the destination address number has a
corresponding entry in the mapping table, the packet will be sent to the
application corresponding to the entry. If there is no entry matching the
destination address, the packet will be sent to the default application.
Please perform the following configuration in system view.
Table 76 Configure POS multi-application mapping table
Operation Command
Configure the POS multi-application mapping table pos-server map { des-code |
default } app-number
Delete the POS multi-application mapping table undo pos-server map {
des-code | default }
Operation Command
Bind the source address of TCP connection pos-server source-ip app-number
ip-address
Remove the binding of the source address of undo pos-server source-ip
the TCP connection app-number
Please note that this command can be applied only in the application in the TCP
connection, and the application state is that the TCP connection has not been
100 CHAPTER 7: POS TERMINAL ACCESS SERVICE
implemented otherwise, the system will prompt as follows to indicate that the
configuration has failed: App-state is wrong.
7 Set the parameters of FCM used during Modem negotiation
In the POS access application, the Modem on the FCM card usually acts as the
called party, and the Modem embedded in the POS terminal acts as the calling
party. In the Modem communication, the POS terminal originates a call after the
called party detects the calling signal, it will answer and send an answer tone to
the POS terminal. After the POS terminal receives answer tone, both sides begin
the Modem negotiation (V.22). For a system with poor network quality, the short
answer tone may cause Modem negotiation failure. On the router, in the case that
you can see a constant UP and DOWN on the Modem port, without data being
transmitted or received, just enlarge the value of ANSWERTIME.
After the negotiation reached, communication begins. The POS terminal adopts
SDLC protocol, and the retransmission mechanism is used between the
monitoring frame and the data frame to deal with abnormal occasions. The
parameter PACKET INTERVAL is used to set the timeout value. For big packets
(greater than 512 bytes), the system should enlarge the timeout value.
To improve the utilization of the POS access port, and to avoid a POS terminal
being occupied for a long time, it is necessary to manage individual transaction
times through configuring the parameter TRADETIME. If the maximum transaction
time is exceeded after the POS terminal is dialed, the router will disconnect to
unblock the resource.
In general, the default values of the parameters can satisfy the demands of
application, but in abnormal occasions you need to modify some parameters.
Please perform the following configurations in system view.
Table 78 Set the parameters of FCM used during Modem negotiation
Operation Command
Set the parameters of FCM used pos-server fcm [ answertime time ] [
during Modem negotiation tradetime time ] [ packetinterval time ]
Restore the parameters of FCM noundo pos-server fcm [answertime time ]
used during Modem negotiation [tradetime time ] [ packetinterval time
]
Operation Command
Clear the counter of the displayed reset pos
information.
Clear the number of times that negotiation reset fcm
fails or the number of times of disconnection
due to transaction timeout to zero
Display the brief information of POS display pos-app
application.
Display the brief information of POS interface display pos-interface
Display the number of times that negotiation display fcm
fails or the number of times of disconnection
due to transaction times out
Enable the debugging of POS application debugging pos-app [ app-number ]
Typical Configuration Example of POS Access Service 101
Typical Configuration Configuration Example when the Router is Located at the FEP Side in
Example of POS TCP/IP Mode
Access Service
I. Networking Requirements
Three POS terminals access the Router A located at the FEP side through the FCM
card and connect to UNIX A (10.1.1.1) and UNIX B (10.1.1.2) in TCP/IP mode.
Figure 42 Networking diagram when the router is located at the FEP side in TCP/IP mode
10.1.1.1/24
POS
terminal UNIX A
FCM E0
POS PSTN
terminal 10.1.1.3/24
Router
Quidw ay UNIX B
POS
terminal
10.1.1.2/24
I. Networking Requirements
Three POS terminals access the Router A located at the FEP side through the FCM
and connect to UNIX A (10.1.1.1) and UNIX B (11.1.1.1) in asynchronous
connection mode.
Figure 43 Networking diagram when the router is located at the FEP side in asynchronous
connection mode
POS 10.1.1.1/24
terminal UNIX A
11.1.1.1/24
FCM A0
PSTN
POS
terminal Quidw
Routeray A1 UNIX B
11.1.1.2/24
POS
terminal
11.1.1.1/24
I. Networking Requirements
Three POS terminals access the 3Com Router series located at the commercial
client through the asynchronous serial port and connect to UNIX host (10.1.1.1) in
TCP/IP connection mode.
Figure 44 Networking diagram when the router is located at commercial client in TCP/IP
connection mode.
POS
terminal A0 172.17.0.1/ 172.17.0.2/
24 24 E0
POS IP
A1 S0
terminal Quidw ay
Router A A Router B B 10.1.1.2/
Quidw ay
24 10.1.1.1/24
POS A2
terminal UNIX FEP
Interface The router interface refers to the part through which the router exchanges data
Configuration and interacts with other devices in the network. It functions to implement data
Overview exchange between the router and other network devices.
The 3Com Router supports physical interface and logical interface on the router.
Logical interface is an interface that does not physically exist and needs to be
established through configuration, which can also exchange the data. Logical
interface includes the Dialer interface, sub-interface, standby center logic channel
and virtual-template.
Configure Interface
Interface View To facilitate configuration and maintenance of the interface, the interface view has
to be set in the 3Com Router software. Interface commands will be effective only
when used in the view of relevant interfaces.
Operation Command
Enter view of specified interface interface type number
108 CHAPTER 8: INTERFACE CONFIGURATION OVERVIEW
In the 3Com Router, the command to enter E1/T1 interface view is controller {
e1 | t1 }, which is different from the command of other interfaces.
Set Interface Description The 3Com Router has a configuration item of interface description for router’s
physical interface. Interface description is mainly used to help identifying the
usage of interface. Please use this command in interface view.
Table 81 Set interface description
Operation Command
Set interface description description
interface-description
Recover default interface description. undo description
Set Time Interval for The 3Com Router system counts interface flow at every time interval and
Flow Control Statistics calculates the unit flow as the reference for standby center. Other flow control
methods (including the dialer threshold command) need this parameter.
Operation Command
Set interval time for flow control on the flow-interval minutes
interface
Interface Configuration Before configuring an interface, it is necessary to have a clear idea about the
Method networking requirement and network diagram. The following operations must be
implemented at least for the interface configuration.
■ If the interface is a physical interface, be clear about the connection state,
working mode of the physical interface to be selected and related working
parameters.
■ If the interface is a WAN interface, assign the encapsulated link layer protocol
and working parameters that should be abided by for the opposite port
connected with this interface.
■ Configure network protocol (such as IP) address of this interface.
■ Configure the static route that can reach the destination network via this
interface, or configure working parameters of the dynamic route protocol on
this interface.
■ If the interface supports dial-up, please configure working parameters and
management to Modem.
■ If the interface acts as the main interface or standby interface at the standby
center application, please configure related working parameters of the standby
center.
Display and Debug Interface 109
There are lots of parameters to be configured in the interface view. So, this part
will mainly introduce configurations of some parameters specific to the physical
interface, and briefly introduce the logical interface definition. Configurations
about the link layer protocol, network layer protocol, parameter and some special
functions (such as dial, standby center, and firewall) will be introduced specifically
in other parts of this manual and no further details are provided here.
Display and Debug Please use the following commands in all views.
Interface Table 83 Display and debug interface
Operation Command
Display current running state and statistic display interfaces [type number
information of the interface (in all views) ]
display interfaces brief
Clear interface statistic information (in system reset counters interface [ type
view) number ]
Shut down interface (in interface view) shutdown
Restart interface (in interface view) undo shutdown
When the physical or protocol state of the interface changes, the system will
automatically output related prompt information of the interface (e.g., Serial0) as
shown in following table.
If a physical interface on the router is idle and not connected with cable, use the
shutdown command to disable the interface in case that the interface goes
abnormal due to some interference.
110 CHAPTER 8: INTERFACE CONFIGURATION OVERVIEW
9 CONFIGURING LAN INTERFACE
Ethernet Interface Ethernet interface of the 3Com Router series comprises fast Ethernet interface.
Overview
The conventional Ethernet interface complies with 10BASE-T physical layer
specifications, working at 10 Mbps and in two modes: full duplex and half duplex.
The fast Ethernet interface complies with 100BASE-T and also 10BASE-T physical
layer specifications, working at 10 Mbps or 100 Mbps, and in two modes: half
duplex and full duplex. With the auto-negotiation capability, it can consult other
network devices to determine and automatically select the optimum working
mode and rate, thus greatly simplifying the configuration and management of the
system.
The specified Ethernet interface cannot be configured unless you enter its view. It
is necessary to configure IP address. Since there are default values for other
parameters that can enable the system to work normally in most cases, it is
recommended not to perform other configuration on Ethernet interface.
Operation Command
Enter view of specified Ethernet interface interface ethernet number
Operation Command
Set IP address ip address ip-address ip-mask [ sub ]
Cancel IP address undo ip address ip-address ip-mask [
sub ]
Operation Command
Specify IPX network node value ipx enable [ node node ]
Delete IPX network node value. undo ipx enable
Specify IPX network number ipx network network-number
Delete IPX network number undo ipx network
Operation Command
Set frame format of sending message send-frame-type { ethernet_ii |
ethernet_snap }
Recover default frame format of sending undo send-frame-type
message
Operation Command
Set MTU mtu size
Display and Debug Ethernet Interface 113
Value ranges and default values of MTUs with different link layer protocol are
different. When Ethernet_II frame format is adopted, MTU value range will be
46-1500 bytes with the default value as 1500 bytes, and when Ethernet_SNAP
frame format is adopted, MTU value range will be 46-1492 bytes with default
value 1492 bytes.
5 Select work rate of fast Ethernet interface
As described before, the fast Ethernet interface can work at rates of 10Mbps and
100Mbps. Therefore, it is possible to select interface working rate with following
command in Ethernet interface view.
Table 90 Select working rate of fast Ethernet interface
Operation Command
Select working rate of fast Ethernet interface speed { 100 | 10 | negotiation }
Operation Command
Select working mode of Ethernet interface duplex { negotiation | full |
half }
Operation Command
Enable internal loopback and external loopback loopback
Disable internal loopback and external loopback undo loopback
Display and Debug The following command can be used to view the state of Ethernet interface in all
Ethernet Interface views, so that the specified Ethernet interface can be displayed and debugged.
Table 93 Display the state of specified Ethernet interface
Operation Command
Display the state of specified Ethernet display interfaces ethernet
interface number
114 CHAPTER 9: CONFIGURING LAN INTERFACE
E0
Internet
Network Address
192.168.0.0 Router A
Troubleshooting The following test methods can be used to check faulty Ethernet interface is
faulty:
■ Ping the Ethernet interface from the host located in the same LAN as the router
to observe whether the returned messages are correct.
■ View the statistic information of two ends of the connection (such as the router
and switch) to observe whether the statistic number of the received error
frames increases quickly.
If either test fails to pass, it indicates that the Ethernet interface of the router or
the connected Ethernet is abnormal.
1 View whether the LAN connection between the host and router is correct.
If the Ethernet is connected with HUB or LAN Switch, please check the status of
relevant link indicators on HUB or LAN Switch. If the indicators are on, it means
that the Ethernet interfaces of the host and router and the network cable are
physically correct. Otherwise, please replace such faulty physical equipment as the
network adapter, network cable, router or relevant interface module.
When the Ethernet is connected with unshielded twisted pair and at least one of
the connected parties supports 100BASE-TX, rate matching must be taken into
consideration. If the working rates of two parties do not match, i.e. one works in
100 Mbps mode while the other works in 10 Mbps mode, then the fault is that
Troubleshooting 115
the party with 100 Mbps configuration shows no connection, while the party with
10 Mbps connection shows the connection has been established. Furthermore,
the activity indicator of the physical layer blink quickly and messages can not be
received or transmitted normally.
On checking the connection of fast Ethernet interface of the 3Com Router series,
the following prompt information is very helpful. Both these two pieces of
information are output on the control console when the user is executing the rate
selection command or connecting the network cable.
Here, the first piece of prompt information indicates that the opposite end, which
is detected by the Ethernet interface of the 3Com Router series, does not support
100 Mbps working rate, while the local end is working at 100 Mbps rate by force.
At this time, the user should ensure that the opposite side has been configured
correspondingly and is working at the rate of 100 Mbps. The second prompt
information indicates that the opposite end, detected by the Ethernet interface of
the 3Com Router series, may not support 10 Mbps working rate, while the local
end is forced to work in 10 Mbps rate. Now, the user should ensure the opposite
end to work at the rate of 10 Mbps. However, when the Ethernet interface of the
3Com Router series is connecting 10/100 Mbps adaptive port of HUB, this
information does not mean the setting is incorrect.
2 View whether IP addresses of the Ethernet interfaces of the host and router are
within the same sub-net. That is the network addresses must be the same, only
the host addresses are different. If they are not in the same sub-net, please re-set
the IP address.
3 Check whether the link layer protocols match one another.
Take for example two link layer protocol standards supporting IP protocol,
Ethernet_II and Ethernet_SNAP: These two link layer protocols have different
encapsulation formats and MTU. MTU of the former has 1500 bytes and MTU of
the latter has 1492 bytes. Two Ethernet devices can not communicate reliably
unless they are connected with the same link layer protocol. The Ethernet interface
of the 3Com Router series can simultaneously receive data frames with Ethernet_II
and Ethernet_SNAP formats. However, the format of sending data frame must be
in accordance with either Ethernet_II or Ethernet_SNAP as specified by the user.
Therefore, please confirm whether the data frame sending format of the router is
the same as that of other hosts. When the protocols do not match although the
cables and interfaces are physically normal, they can not be pinged through.
4 View whether the working mode of the Ethernet interface is correct.
When connecting the Ethernet with unshielded twisted pair or fiber, there are two
working modes: full duplex and half duplex, specified in
10BASE-T/100BASE-TX/100BASE-FX standard. When using HUB, the half-duplex
working mode should be selected. When using LAN Switch, if LAN Switch works
in half duplex mode, the Ethernet interface of the router also works in half duplex
mode. If LAN Switch works in full duplex mode, the Ethernet interface of the
router works in full duplex mode too. If the working mode is incorrect, i.e. one
party of the connection works in full duplex mode while the other party in half
duplex mode, fault will occur. That is, when network flow increases, the party
working in half duplex mode shows frequent network collisions (for example, if
116 CHAPTER 9: CONFIGURING LAN INTERFACE
HUB is connected, all the other devices on the whole network segment will show
serious network collisions), while the party working in full duplex mode shows
large amount of error messages received, accompanied with serious message
losses at both parties. In this case, use display interfaces ethernet command
to view the error ratio of transceiving messages of the Ethernet interface. Usually,
the collision can be observed through the status indicator of the network
interface.
10 CONFIGURING WAN INTERFACE
WAN Interface The wide area network (WAN) can be divided into X.25 network, frame relay
Introduction network, ATM network and ISDN network according to the line type. Accordingly,
the router has synchronous/asynchronous serial interface, ATM interface, ISDN BRI
and CE1/PRI.
Asynchronous Serial There are two asynchronous serial interfaces in the 3Com Router. One is Serial,
Interface which sets the synchronous/asynchronous serial interface to work in asynchronous
mode. The other is Async, a special asynchronous serial interface.
You can set asynchronous serial interface to dedicated line mode or dialup mode.
When the asynchronous serial interface is connected with Modem or ISDN
terminal adapter (TA) externally, it can serve as a dialup interface, encapsulating
link layer protocol SLIP or PPP, and supporting IP and IPX.
■ Set the asynchronous serial interface to work in dialup or dedicated line mode
■ Set link layer protocol
■ Set baud rate
■ Set link establishment mode
■ Set the check mode in flow mode
■ Set stop bit in flow mode
■ Set data bit in flow mode
■ Set flow control mode
■ Enable or disable level detection
■ Enable or disable internal loopback and external loopback
■ Set MTU
■ Setting the coding format of Modem
The asynchronous serial interface may also need to be configured with SLIP
parameter, PPP parameter, BDR parameter, IP address, firewall and standby center
parameter as required.
Operation Command
Set the synchronous/asynchronous serial interface to physical-mode async
work in asynchronous mode.
Operation Command
Enter the view of specified asynchronous serial interface interface async number
Enter the view of the specified synchronous/asynchronous interface serial number
serial interface (which has been set to work in
asynchronous mode)
3 Set the asynchronous serial interface to work in dialup or dedicated line mode.
For special asynchronous serial interface or the asynchronous serial interface set
from synchronous/asynchronous serial interface, it is possible to dialup with modem
command. Please see Operation Manual - Dial-up for other settings and detailed
Asynchronous Serial Interface 119
Operation Command
Set the asynchronous serial interface to work in dial mode. modem { in | out }
Set the asynchronous serial interface to work in dedicated undo modem
line mode.
The asynchronous serial interface works in dial mode by default, i.e. modem
command is configured by default. Both calling in and calling out are allowed with
modem in and modem out command. The async/sync serial interface working in
asynchronous mode works in dedicated line mode by default.
Operation Command
Set the link layer protocol of the asynchronous serial link-protocol { slip | ppp }
interface
Operation Command
Set baud rate of the asynchronous serial interface baudrate baudrate
Dedicated mode is usually used when asynchronous serial interfaces are directly
connected.
■ Flow: Also called the Interactive mode, which means two ends of the link
interact with each other after the setup of a physical connection. The calling
end sends configuration command to the receiving end (with the same effect
as the user inputs configuration command remotely), sets working parameters
of the link layer protocol at the receiving end and then establishes the link. This
mode is usually used for such man-machine interactions as dumb terminal and
dialing, etc.
■ Dumb terminal access (TTY) mode: It is one type of flow mode. When the
asynchronous serial interface of the router is used for dumb terminal access
service, this key word and other related parameters could be used to set the
number of physical terminal and virtual terminal (VTY) to be accessed. For
detailed configuration, see Terminal Service User Manual.
Please use the following commands in the view of the asynchronous serial
interface.
Table 99 Set the link establishment mode of asynchronous serial interface
Operation Command
Set the asynchronous serial interface to establish the link in async mode protocol
protocol mode
Set the asynchronous serial interface to establish the link in flow async mode flow
mode
Operation Command
Set the method of data flow control on an flow-control { none | software |
asynchronous serial interface hardware } [ inbound | outbound ]
When the link establishment mode of async serial interface is flow or TTY, the two
ends of the link will interact with each other after the setup of a physical
connection. The calling end will send configuration command to the receiving end
and set the interactive parameters of link layer protocol on the receiving end
before the establishment of the link. In practical application (such as terminal
server), the router will send configuration command to the terminal and transmit
interactive operating parameters of the link layer that are set at local end to the
opposite end.
This command is used to set the interactive operating parameter of the link layer
protocol ---check mode.
Please perform the following configuration in asynchronous serial interface view.
Table 101 Set the check mode when the async serial interface works in flow mode
Operation Command
Set the check mode when the async serial parity { even | mark | none |
interface works in flow mode odd | space }
Operation Command
Set the stop bit when the asynchronous serial interface stopbits { 1 | 1.5 | 2 }
works in flow mode
Operation Command
Set the data bit when the asynchronous serial interface databits { 5 | 6 | 7 | 8 }
works in flow mode
5, 6, 7 and 8 stand for 5, 6, 7 and 8 data bits respectively. By default, there are 8
data bits.
11 Enable or disable level detection
If the level detection is disabled for the asynchronous serial interface, the system
will only detect whether the asynchronous serial interface connects cables
externally and automatically report its state (UP or DOWN) to the user. If the level
detection is enabled, the system will detect DSR signal in addition to the
above-mentioned detection. Only when this signal is effective will the system
regard the asynchronous serial interface as UP. Otherwise, it is regarded as DOWN.
122 CHAPTER 10: CONFIGURING WAN INTERFACE
Please use the following commands in the view of the asynchronous serial
interface.
Table 104 Enable or disable the level detection for the asynchronous serial interface
Operation Command
Enable the level detection for the asynchronous serial detect dsr-dtr
interface.
Disable the level detection for the asynchronous serial undo detect dsr-dtr
interface.
By default the level detection is enabled for the asynchronous serial interface.
12 Enable or disable internal loopback and external loopback
On performing special function test, the internal loopback and external loopback
is enabled for the asynchronous serial interface.
Please use following commands in the view of the asynchronous serial interface.
Table 105 Enable or disable internal loopback and external loopback for the
asynchronous serial interface
Operation Command
Enable internal loopback and external loopback for loopback
the asynchronous serial interface.
Disable internal loopback and external loopback for undo loopback
the asynchronous serial interface.
Operation Command
Set MTU of asynchronous serial interface mtu size
Recover MTU default undo mtu
The unit of mtu is byte, ranging from 128 to 1500, with 1500 as default.
14 Set the coding format of Modem
Please perform the following configurations in asynchronous serial interface
mode.
Table 107 Set the coding format of Modem
Operation Command
Set the coding format of Modem country-code area-name
AUX Interface AUX interface is a fixed port provided by the 3Com Router. It can be used as a
common asynchronous serial interface with the highest rate of 115200bps. It can
also implement functions such as remote configuration of the router and line
backup.
Synchronous Serial Interface 123
Operation Command
Enter AUX interface view interface aux 0
In addition to the above points, AUX interface is configured in the same way as
that of the asynchronous serial interface.
Operation Command
Set the synchronous/asynchronous serial interface in physical-mode sync
synchronous mode.
Operation Command
Enter the view of the specified synchronous/asynchronous interface serial number
serial interface (which has been set to work in synchronous
mode)
Operation Command
Set link layer protocol link-protocol { fr | hdlc |
lapb | ppp | sdlc | x25 }
Operation Command
Using NRZI encoding format code nrzi
Using NRZ encoding format undo code
Operation Command
Set baud rate of the synchronous serial baudrate baudrate
interface
When two synchronous serial interfaces are connected, the baud rate on line is
determined at DCE-side. Therefore, when the synchronous serial interfaces are
working in DCE mode, the baud rate is to be set. However, if the interfaces act as
DTE, then the baud rate need not be configured. Default baud rate of
synchronous serial interface is 64000 bps.
TxClk
Table 114 Selection method with synchronous serial interface serving as DTE-side clock
TxClk stands for transmitting clock, RxClk for receiving clock, the clock before “=”
is DTE-side clock, and that behind “=” is DCE-side clock.
Please use the following commands in the view of the synchronous serial
interface.
Table 115 Select work clock
Operation Command
Select DCE-side synchronous serial interface clock dceclk
clock
Select DTE-side synchronous serial interface clock { dteclk1 | dteclk2 |
clock. dteclk3 | dteclk4 }
The clock of DCE-side synchronous serial interface is dceclk by default, and that of
DTE side is dteclk3 by default.
7 Set clock inversion
In some special cases, the clock will generate half-period delay on the line, which
may cause failed interconnection of equipment at two ends or large amount of
messages discarded. In this case, the transmit clock signal of DTE-side synchronous
serial interface can be inverted to eliminate the influence of delay.
Please use the following commands in the view of the synchronous serial
interface.
Table 116 Set clock inversion
Operation Command
Enable the inversion of transmit clock signal of invert transmit-clock
DTE-side synchronous serial interface
Disable the inversion of transmit clock signal of undo invert transmit-clock
DTE-side synchronous serial interface
This command is only effective to certain clock signals provided by some DCEs.
Usually, clock inversion should not be set.
8 Enable or disable level detection
By default, when the system decides whether the synchronous serial interface is in
UP status or DOWN status, it detects the DSR signal, DCD signal and whether the
interface connects a cable at the same time. Only when the three signals are
effective, will the system regard the interface is in UP status, otherwise, in DOWN
status. If level detection is disabled for the synchronous serial interface, the system
will not detect the DSR signal.
Please use the following commands in the view of the synchronous serial
interface.
Table 117 Enable or disable level detection for the synchronous serial interface
Operation Command
Synchronous Serial Interface 127
Operation Command
Enable data carrier detection for the synchronous serial detect dcd
interface.
Disable data carrier detection for the synchronous serial undo detect dcd
interface.
Data carrier detection is enabled for the synchronous serial interface by default.
10 Set the synchronous serial interface to work in full duplex or half duplex mode
To operate with some devices working in half-duplex mode, the synchronous serial
interface can be configured to work in half-duplex mode.
Please make the following configurations in synchronous serial interface mode.
Table 119 Set the synchronous serial interface to work in full duplex or half duplex mode
Operation Command
Set the synchronous serial interface to work in half reverse-rts
duplex mode
Set the synchronous serial interface to work in full undo reverse-rts
duplex mode
Operation Command
Enable the internal loopback/external loopback for loopback
the synchronous serial interface.
Disable the internal loopback/external loopback undo loopback
for the synchronous serial interface.
12 Configure MTU
MTU of synchronous serial interface affects the fragmentation and reassembling
of IP network protocol message on this interface.
Please use the following commands in the view of the synchronous serial
interface.
Table 121 Set MTU of synchronous serial interface
Operation Command
Set MTU of synchronous serial interface mtu size
Recover the default value of MTU undo mtu
The unit of mtu is byte, ranging between 128-1500, with 1500 as default.
13 Configure the time interval for sending keepalive packets
The serial interface will send keepalive packets to the opposite end at every
keepalive interval to check if the link is in normal state or not.
Perform the following configuration in serial interface view.
Table 122 Set the time interval for sending keepalive packets
Operation Command
Set the time interval for sending keepalive packets timer hold seconds
Disable keepalive packet sending undo timer hold
CAUTION: When the serial interface is encapsulated with HDLC protocol, the
keepalive interval set on both ends of the link must be the same.
14 Set the idle coding of synchronous serial interface
Perform the following configuration in serial interface view.
Table 123 Set the idle coding of synchronous serial interface
Operation Command
Set the idle coding of synchronous serial interface idle-mark
to "FF"
Restore the idle coding of synchronous serial undo idle-mark
interface to "7E"
equipment complying with relevant ISDN standard of ITU-T able to access ISDN
easily.
5 4 3 2 1
S T U
TE2 TA
R S
■ Network terminal 1 (NT1): It mainly fulfills functions of OSI layer 1 including the
subscriber line transmission function, loop test and D channel contention.
■ Network terminal 2 (NT2): Also called intelligent network terminal, including
layer 1-layer 3 of OSI.
■ Type-1 terminal equipment (TE1): Also called ISDN standard terminal, which is
user equipment conforming to ISDN interface standard (such as digital phone
set).
■ Type-2 terminal equipment (TE2): Also called non-ISDN standard terminal,
which is user equipment not conforming to ISDN interface standard.
■ Terminal adapter (TA): It implements adaptation function, making TE2 to access
ISDN standard interface.
Configure ISDN BRI Please enter the view of the specified ISDN BRI interface with the following
Interface command in all views.
Table 124 Enter the view of the specified ISDN BRI interface
Operation Command
Enter the view of the specified ISDN BRI interface interface bri number
The ISDN BRI interface is used to dial up. Please refer to Dial-up for detail.
CE1/PRI Interface Along with the emergence of Pulse Code Modulation (PCM) technique in the
1960s, Time Division Multiplexing (TDM) technique is eventually achieving broad
applications in the digital communication systems. The TDM system is divided into
two types: E1 system recommended by ITU-T and T1 system recommended by
ANSI. The former one is widely applied in Europe and China, and the latter is
mainly applied in North America and Japan (the J1 system adopted in Japan is
similar to the T1 system and hence can be taken as T1 system).
CE1/PRI interface has two operating modes: E1 operating mode (also called
non-channelized operating mode) and CE1/PRI operating mode (also called
channelized operating mode).
■ When the interface is used as a CE1 interface, all the timeslots except timeslot
0 can be divided into multiple channel sets at will, and each group can be used
as an interface upon timeslot binding. Its logic feature is the same as that of a
synchronous serial interface. It supports the data link layer protocols, such as
PPP, Frame Relay, LAPB and X.25, and the network protocols such as IP and IPX.
■ When the interface is used as a PRI interface, timeslot 16 will be used as a D
channel to transmit signaling. Therefore, only a group of timeslots except the
timeslots 0 and 16 can be chosen as the B channels. These timeslots can be
bound together with timeslot 16 to form a pri set to be used as an interface.
The logic feature of this interface will be the same as that of an ISDN PRI
interface. It will support the data link layer protocol PPP and network protocols,
such as IP and IPX, and can be configured with parameters such as BDR
(Dial-on-Demand Routing).
Operation Command
Enter the view of CE1/PRI interface controller e1 number
Operation Command
Set the CE1/PRI interface to operate in E1 mode using e1
Set the CE1/PRI interface to operate in CE1/PRI mode using ce1
Operation Command
Enter the synchronous serial interface view interface serial number:0
Operation Command
Bind the timeslots of CE1/PRI interface to a channel-set set-number
channel set timeslot-list range
Remove binding timeslots to form channel undo channel-set set-number
sets
Operation Command
Enter the synchronous serial interface view interface serial
number:set-number
■ The rules for address translation or packet filtering need to be set if the firewall
is to be set up on the interface.
Operation Command
Bind the timeslots of CE1/PRI interface to be a pri-set [ timeslot-list range ]
pri set
Remove binding timeslots to be a pri set undo pri-set
Operation Command
Enter the ISDN interface view interface serial number:15
Table 132 Set the line code format on the CE1/PRI interface
Operation Command
Set the line code format on the CE1/PRI interface code { ami | hdb3 }
Restore the line code format on the CE1/PRI undo code
interface
Operation Command
Set the line clock of the CE1/PRI interface clock { master | slave }
Restore the line clock of the CE1/PRI interface undo clock
to the default vale
Operation Command
Set the frame format of CE1/PRI interface frame-format { crc4 | no-crc4 }
Restore the frame format of CE1/PRI interface undo frame-format
Operation Command
Enable the internal loopback/external loopback of loopback
the CE1/PRI
Disable the internal loopback/external loopback of undo loopback
the CE1/PRI
CT1/PRI Interface 135
By default, the functions of internal loopback and external loopback are disabled
on the CE1/PRI interface.
Display and Debug Perform the following configurations in all views to display the status and related
CE1/PRI Interface information of the CE1/PRI interface, so as to monitor and maintain it.
Table 136 Display and debug CE1/PRI interface
Operation Command
Display the operating status of the CE1/PRI display controller e1
interface interface-number
Display the operating status of the channel set display interfaces serial
or pri set interface-number:number
Generally, CE1/PRI interface is applied to the dedicated line and dial-up services.
For the typical configuration example and troubleshooting, refer to the
configurations of protocols at each layer and dialing configurations in this manual.
CT1/PRI Interface Along with the emergence of Pulse Code Modulation (PCM) technique in the
1960s, Time Division Multiplexing (TDM) technique is eventually achieving broad
applications in the digital communication systems. The TDM system is divided into
two types: T1 system recommended by ANSI and E1 system recommended by
ITU-T. The former one is mainly applied in North America and Japan (the J1 system
adopted in Japan is similar to the T1 system and hence can be taken as T1 system),
and the latter is widely applied in Europe and China.
The CT1/PRI interface can only operate in channelized operating mode. It is used
in the following two ways:
■ When the interface is used as a CT1 interface, all the timeslots from 1 to 24
can be divided into multiple groups at will, and each group can be bound to
form a channel set. Upon the binding of each group of timeslots, the system
automatically generates an interface which logically equals to a synchronous
serial interface. It supports the data link layer protocols such as PPP, Frame
Relay, LAPB and X.25, and the network protocols such as IP and IPX.
■ When the interface is used as a PRI interface, timeslot 24 will be used as a D
channel to transmit signaling. Therefore, only a group of timeslots except the
timeslot 24 can be chosen as the B channels. These timeslots can be bound
together with timeslot 24 to form a pri set which acts as an interface. The logic
feature of this interface will be the same as that of an ISDN PRI interface. It will
support the PPP data link layer protocol and network protocols, such as IP and
IPX, and can be configured with parameters, such as BDR.
Operation Command
Enter the view of CT1/PRI interface controller t1 number
Operation Command
Bind the timeslots of CT1/PRI interface to a channel-set set-number
channel set timeslot-list range [ speed { 56 |
64 } ]
Remove binding timeslots to form channel undo channel-set set-number
sets
Operation Command
Enter the synchronous serial interface view interface serial
number:set-number
■ The rules for address translation or packet filtering need to be set if the firewall
is to be set up on the interface.
For more details, refer to the related sections of this manual.
3 Bind an interface to be a pri set
Perform the following configurations in CT1/PRI interface view.
Table 140 Bind the interface to be a pri set
Operation Command
Bind the timeslots of CT1/PRI interface to be a pri-set [ timeslot-list range
pri set ]
Remove binding timeslots to be a pri set undo pri-set
Only one timeslot binding mode is supported on one CT1/PRI interface at one
time, that is, the interface can only be bound into either channel sets or a pri set.
After the interface is bound to be a pri set, the system will automatically create a
Serial interface numbered serial number:23. This interface is logically equivalent
to an ISDN PRI interface, and hence you can further configure it.
Perform the following configuration in all views.
Table 141 Enter the ISDN interface view
Operation Command
Enter the ISDN interface view interface serial number:23
Operation Command
138 CHAPTER 10: CONFIGURING WAN INTERFACE
Set the CT1/PRI interface to use long-distance cable long { 0db | -7.5db |
transmission cable -15db | -22.5db }
Set the CT1/PRI interface to use short-distance cable short { 133ft | 266ft |
transmission cable 399ft | 533ft | 655ft }
Restore the default value of the transmission undo cable
cable used by the CT1/PRI interface
Operation Command
Set the line code format on the CT1/PRI code { ami | b8zs }
interface
Restore the line code format on the CT1/PRI undo code
interface
Operation Command
Set the line clock of the CT1/PRI interface clock { master | slave }
Restore the line clock of the CT1/PRI interface undo clock
to the default vale
Operation Command
E1-F Interface 139
Operation Command
Enable the internal loopback/external loopback of the loopback { remote | local }
CT1/PRI
Disable the internal loopback/external loopback of the undo loopback { remote |
CT1/PRI local }
By default, the functions of internal loopback and external loopback are disabled
on the CT1/PRI interfaces.
Display and Debug Perform the following configurations in all views to display the status and related
CT1/PRI Interface information of the CT1/PRI interface, so as to monitor and maintain it.
Table 147 Display and debug CT1/PRI interface
Operation Command
Display the operating status of the CT1/PRI display controller t1
interface interface-number
Display the operating status of the channel set display interfaces serial
or pri set interface-number:number
Generally, CT1/PRI interfaces are applied to the dedicated line and dial-up services.
For the typical configuration example and troubleshooting, refer to the
configurations of protocols at each layer and dialing configurations in this manual.
E1-F Interface E1-F interface is fractional E1 interface, and it is respectively simplified CE1/PRI
interface. If there is no need to use multiple channel sets or if ISDN PRI is not
necessary in an E1 application, it is too much to use CE1/PRI interface. At this time,
E1-F interface is more than enough for meeting the simple E1 access
requirements. Compared with CE1/PRI interface, E1-F interface is a nice low-cost
choice for E1 access.
Compared with CE1/PRI interfaces, E1-F interface has the following features:
■ When working in framed mode, E1-F interface can only bind time slots into
one channel set, but CE1/PRI interface can group timeslots randomly and bind
them into multiple channel sets.
■ E1-F interface does not support PRI operating mode.
supporting the data link layer protocols PPP, HDLC, Frame Relay, LAPB and X.25, as
well as the network protocols IP and IPX.
When it works in framed mode, however, it is physically divided into 32 time slots
numbered in the range of 0 to 31. In these time slots, except for time slot 0 used
for synchronization information transmission, all the other time slots can be
randomly bound into one channel set. E1-F interface has the rate of nx64kbps,
owns logical features of synchronous serial interface, and supports the data link
layer protocols PPP, Frame Relay, LAPB and X.25 as well as the network protocols IP
and IPX.
Operation Command
Enter the view of an E1-F interface interface serial serial-number
E1-F interface is sequenced based on the same numbering and are numbered
together with the synchronous serial interfaces. For example, insert one 1E1-F
module in slot 0 on a 3Com Router, and one 4SA module in slot 1. Hence, the
E1-F interface will be numbered Serial 0, and the 4SA interfaces will be numbered
Serial 1 through Serial 4.
2 Set Interface Operating Mode
E1-F interface can work in both unframed and framed modes.
Perform the following configuration in E1-F interface view.
Table 149 Set Operating mode for an E1-F interface
Operation Command
Set an E1-F interface to work in unframed mode fe1 unframed
Set the E1-F interface to work in framed mode undo fe1 unframed
Operation Command
Bind time slots on an E1-F interface fe1 timeslot-list { all | range }
Restore the default setting for time slot undo fe1 timeslots
binding on the interface
By default, binding operation will be done on all the time slots on E1-F interface.
Time slot 0 on E1-F interface is used for synchronization information transmission.
Therefore, in practice, only time slots 1 through 31 are bound when performing
binding operation on all the time slots on an E1-F interface.
Unlike CE1/PRI interface, only one channel set can be bound on an E1-F interface,
and this channel set is associated with the current synchronous serial interface. On
a CE1/PRI interface, however, multiple channel sets can be bound, and the system
will automatically generate a synchronous serial interface accordingly whenever a
channel set is formed.
4 Set Line Code Format
E1-F interfaces support line code formats AMI (Alternate Mark Inversion) and
HDB3 (High Density Bipolar 3).
Perform the following configuration in E1-F interface view.
Table 151 Set line code format for E1-F interfaces
Operation Command
Set line code format for an E1-F interface fe1 code { ami | hdb3 }
Restore the default line code format for an E1-F interface undo fe1 code
Operation Command
Set line clock for an E1-F interface fe1 clock { master | slave }
Restore the line clock of the E1-F interface to the undo fe1 clock
default setting
Operation Command
Set frame format for an E1-F interface fe1 frame-format { crc4 |
no-crc4 }
Restore the default frame format of the E1-F undo fe1 frame-format
interface
Operation Command
Enable local/remote loopback on an interface fe1 loopback { local | remote }
Disable local/remote loopback on an interface undo fe1 loopback [ local |
remote ]
Display and Debug E1-F Perform the display command in all views to display the state of E1-F interface
Interface and other related information.
Table 155 Display and debug E1-F interface
Operation Command
Display configuration and state of E1-F interface display fe1 [ serial
serial-number ]
Display the operating state of E1-F interface display serial serial-number
T1-F Interface 143
T1-F Interface T1-F interface is fractional T1 interface, and it is respectively simplified CT1/PRI
interface. If there is no need to use multiple channel sets or if ISDN PRI is not
necessary in an T1 application, it is too much to use CT1/PRI interface. At this time,
T1-F interface is more than enough for meeting the simple T1 access
requirements. Compared with CT1/PRI interface, T1-F interfaces is a nice low-cost
choice for T1 access.
Compared with CT1/PRI interface, T1-F interface has the following features:
■ When working in framed mode, T1-F interface can only bind time slots into
one channel set, but CT1/PRI interface can group timeslots randomly and bind
them into multiple channel sets.
■ T1-F interface does not support PRI operating mode.
T1 line comprises 24 multiplexed channels. That is, a T1 primary group frame DS1
(Digital Signal Level-1) comprises 24 DS0 (64kbps) time slots, each has 8 bits and 1
framing bit for synchronization, and thus each primary group frame has 193 bits
(24 X 8+1). As DS1 can transmit 8000 frames per second, its transmission speed is
193 X 8k = 1544kbps.
T1-F interface can only work in framed mode, and it can randomly bind all time
slots (time slots 1 through 24) into one channel set. T1-F interface has the rate of
nx64kbps or nx56kbps, owns logical features of synchronous serial interface, and
supports the data link layer protocols PPP, HDLC, Frame Relay, LAPB and X.25 as
well as the network protocols IP and IPX.
Operation Command
Enter the view of a T1-F interface interface serial
serial-number
T1-F interface is sequenced based on the same numbering and are numbered
together with the synchronous serial interfaces. For example, insert one 1E1-F
module in slot 0 on a 3Com Router, one 4SA module in slot 1, and two 1T1-F
144 CHAPTER 10: CONFIGURING WAN INTERFACE
module in slot 2. Hence, the E1-F interface will be numbered Serial 0, and the 4SA
interfaces will be numbered Serial 1 through Serial 4, and the T1-F interfaces will
be numbered Serial 5 and Serial 6.
2 Set Interface Rate after Binding Operation
When T1-F interface works in framed mode, time slot binding on the interfaces
can be made according to user's demands.
Perform the following configuration in T1-F interface view.
Table 157 Set interface rate after binding operation
Operation Command
Bind time slots on a T1-F interface ft1 timeslot-list { all |
range } [ speed { 56 | 64 } ]
Restore the default setting for time slot binding on undo ft1 timeslots
the interface
By default, binding operation will be done on all the time slots on T1-F interface.
Unlike CT1/PRI interface, only one channel set can be bound on a T1/F interface,
and this channel set is associated with the current synchronous serial interface. On
a CT1/PRI interface, however, multiple channel sets can be bound, and the system
will automatically generate a synchronous serial interface accordingly whenever a
channel set is formed.
3 Set Length/Attenuation for Transmission Line
If a T1-F interface is connected to the transmission lines of various lengths, you
should match attenuation and waveform of the interface signals with the
transmission lines.
Perform the following configuration in T1-F interface view.
Table 158 Set length/attenuation of transmission line on a T1-F interface
Operation Command
Set the T1-F interface to use long-distance transmission ft1 cable long decibel
line
Set the T1-F interface to use short-distance transmission ft1 cable short length
line
Restore the default setting of the transmission line for undo ft1 cable
the T1-F interface
Operation Command
Set line code format for a T1-F interface ft1 code { ami | b8zs }
Restore the default line code format for a T1-F interface undo ft1 code
If T1-F interface is used as DCE, the slave clock should be selected. If it is used as
DTE, the master clock should be selected.
If the T1-F interfaces of two routers are directly connected, they must respectively
work in slave and master clock modes. If the T1-F interface of the router is
connected to an exchange, however, the exchange is working as DCE and
provides clock, so the interface of the router should work in master clock mode.
Perform the following configuration in T1-F interface view.
Table 160 Set line clock for a T1-F interface
Operation Command
Set line clock for a T1-F interface ft1 clock { master |
slave }
Restore the line clock of the T1-F interface to the default undo ft1 clock
setting
Operation Command
Set frame format for a T1-F interface ft1 frame-format { sf |
esf }
Restore the default frame format of T1-F interface undo ft1 frame-format
Operation Command
Enable local/remote loopback on an interface ft1 loopback { local |
remote }
Disable local/remote loopback on an interface undo ft1 loopback [
local | remote ]
Display and Debug T1-F Perform the display command in all views to display the state of T1-F interface
Interface and other related information.
Table 163 Display and debug T1-F interface
Operation Command
Display configuration and state of T1-F interface display ft1 [ serial
serial-number ]
Display the operating state of T1-F interface display serial
serial-number
CE3 Interface Both E3 and E1 belong to ITU-T digital carrier system and are used in most areas
outside the North America. The data transmission rate of E3 interface is
34.368Mbps, and the line coding/decoding is HDB3 (High-Density Bipolar 3).
CE3 interface supports the link layer protocols PPP, HDLC, Frame Relay, LAPB and
X.25, and the network protocols such as IP and IPX.
Operation Command
Enter the view of CE3 interface controller e3 number
Operation Command
Set clock mode of the CE3 interface clock { master | slave }
Restore the default clock mode of CE3 interface undo clock
Operation Command
Set clock mode of the E1 channel e1 line-number set clock {
master | slave }
Restore the default clock mode of E1 channel undo e1 line-number set
clock
Operation Command
Set national bit of the CE3 interface national-bit { 0 | 1 }
Restore the default national bit undo national-bit
Operation Command
Set loopback mode of CE3 interface loopback { local | payload |
remote }
Disable loopback on the CE3 interface undo loopback
Operation Command
Set loopback mode of E1 channel e1 line-number set loopback
{ local | remote }
Disable loopback on the E1 channel undo e1 line-number set
loopback
If framing has been enabled on an E1 channel, you can set its frame format.
Perform the following configuration in CE3 interface view.
Table 170 Set E1 frame format
Operation Command
Set E1 frame format e1 line-number set frame-format {
crc4 | no-crc4 }
Restore the default CRC setting undo e1 line-number set
frame-format
Operation Command
Enable E3 mode using e3
Enable CE3 mode using ce3
Restore the default operating mode undo using
Operation Command
Configure E1 channels of CE3 interface to e1 line-number unframed
work in E1 mode (unframed mode)
Configure E1 channels of CE3 interface to undo e1 line-number unframed
work in CE1 mode (framed mode)
Implement time slot binding on the CE1 e1 line-number channel-set
interface set-number timeslot-list range
Disable time slot binding on the CE1 interface undo e1 line-number channel-set
set-number
Display and Debug CE3 The display and debug operations of CE3 interface include disabling interface and
Interface displaying interface information. But you should be careful when using the
shutdown command, because disabling an interface will cause the interface to
stop working.
Operation Command
Disable the CE3 interface shutdown
Enable the CE3 interface undo shutdown
Disable the E1 channel e1 line-number shutdown
Enable the E1 channel undo e1 line-number shutdown
Display the CE3 interface information display controller e3 number
The enabling/disabling operation done on the CE3 interface takes effect on CE3
interface, the demultiplexed E1 channels and the serial interfaces formed through
binding operation. The enabling/disabling operation done on the E1 interface
takes effect on E1 interface and the serial interfaces formed through binding
operation. After executing the shutdown command on the specified CE3 interface,
all the E1 channels and the serial interfaces formed by channel binding on the CE3
interface will be shut down, and data transmitting and receiving activities will
stop. Executing the undo shutdown command, however, will re-enable all the E1
channels and the serial interfaces formed by channel binding operations.
CT3 Interface Both T3 and T1 belong to the T-carrier system specified by ANSI, T3 is
corresponding to the digital signal level DS-3, and the data transmission rate is
44.736Mbps.
CT3 interface has two operating modes: T3 mode (channelized mode) and CT3
mode (non-channelized mode).
CT3 interface supports the link layer protocols PPP, HDLC, Frame Relay, LAPB and
X.25, and the network protocols such as IP and IPX.
Operation Command
Enter specified CT3 Interface view controller t3 interface-number
Operation Command
Set clock mode of the CT3 interface clock { master | slave }
Restore the default clock mode of CT3 interface undo clock
Operation Command
Set clock mode of the T1 channel t1 line-number set clock {
master | slave }
Restore the default clock mode of T1 channel undo t1 line-number set clock
Operation Command
Set cable length of the CT3 interface cable feet
Restore the default cable length undo cable
By default, the cable length of the CT3 interface is set to 350 feet.
4 Set Loopback Mode
The CT3 interface supports loopback test on data at the rate of DS-3. Do not
enable the loopback function in normal operation.
Perform the following configuration in CT3 interface view.
CT3 Interface 151
Operation Command
Set loopback mode of CT3 interface loopback { local | payload |
remote }
Disable loopback on the CT3 interface undo loopback
Difference between two types of external loopback of the CT3 interface: Frame
header overhead should be processed for external payload loopback (payload)
while frame is not processed for external remote loopback (remote).
By default, loopback is disabled.
Single-channel loopback can be set on the T1 channels on a CT3 interface, and
the settings of individual channels are independent.
Table 179 Set loopback mode of T1 channel
Operation Command
Set loopback mode of T1 channel t1 line-number set loopback { local
| remote }
Disable loopback on the T1 channel undo t1 line-number set loopback
Operation Command
Set CT3 frame format frame-format { c-bit | m23 }
Restore the default setting undo frame-format
Operation Command
Set the frame format of T1 channel frame-format { sf | esf }
Restore the frame format of T1 channel to the undo frame-format
default value
Operation Command
Configure Operate Mode of CT3 Interface using { t3 | ct3 }
Restore Operate Mode of CT3 Interface to default undo using
152 CHAPTER 10: CONFIGURING WAN INTERFACE
Operation Command
Configure T1 channels of CT3 interface to work t1 line-number unframed
in T1 mode (unframed mode)
Configure T1 channels of CT3 interface to work undo t1 line-number unframed
in CT1 mode (framed mode)
Implement time slot binding on the CT1 interface t1 line-number channel-set
set-number timeslot-list range
[ speed { 56 | 64 } ]
Disable time slot binding on the CT1 interface undo t1 line-number channel-set
set-number
Operation Command
Set CRC of the Serial Interface crc { 16 | 32 | none }
Restore CRC of the Serial Interface to default value undo crc
Display and Debug CT3 The display and debug operations of CT3 interface include disabling interface and
Interface displaying interface information. But you should be careful when using the
shutdown command, because disabling an interface will cause the interface to
stop working.
Operation Command
Disable CT3 Interface shutdown
Enable CT3 Interface undo shutdown
Disable T1 channel t1 t1-number shutdown
Enable T1 channel undo t1 t1-number shutdown
The enabling/disabling operation done on the CT3 interface takes effect on CT3
interface, the T1 channels and the serial interfaces formed through binding
operation. The enabling/disabling operation done on the T1 interface takes effect
on T1 interface and the serial interfaces formed through binding operation.
To disable/enable only the serial interface formed by T3, the serial interface formed
by T1 channel or the serial interface formed by timeslot bundle of T1 channel, user
can use command shutdown/undo shutdown in Serial interface view.
Operation Command
Display the T3/CT3 Controller state and states of display controller t3 [
all channels interface-number ]
Display the configuration and state information display interface serial
of the serial interface formed by the T3/CT3 interface-number
interface
154 CHAPTER 10: CONFIGURING WAN INTERFACE
11 CONFIGURING LOGICAL INTERFACE
Logical Interface The logical interface refers to the interface that can exchange data, but does not
Introduction exist physically and needs to be established through configuration, including the
Dialer interface, loopback interface, null interface, sub-interface, standby center
logic channel and virtual-template.
Dialer Interface Dialer interface is used for dialup. Dial-supporting interfaces on the 3Com Router
series include synchronous serial interface, asynchronous serial interface, ISDN BRI
interface and ISDN PRI interface. The 3Com Router realizes the Bandwidth on
Demand Routing (BDR) function, and provides two BDR configuration methods:
Legacy BDR and BDR profiles. Please see Operation Manual - Dial-up for detailed
information.
Configure Dialer According to different BDR modes, configurations of Dialer interface are:
Interface ■ Configure Dialer interface for Legacy BDR
■ Configure Dialer interface for BDR profiles
Please see related chapters in Operation Manual - Dial-up for detailed description,
monitoring and maintenance, typical configuration example, fault diagnosis and
troubleshooting of the configurations of BDR.
Loopback Interface It is prescribed in TCP/IP that the network segment 127.0.0.0 is loopback address.
The interface with the loopback address is called loopback interface. The 3Com
Router series define interface Loopback0 as the loopback interface, which can
receive all the packets destined for this router. The addresses on the loopback
interfaces can neither be configured nor be advertised by routing protocols.
156 CHAPTER 11: CONFIGURING LOGICAL INTERFACE
Some applications (such as configuring local peer of SNA) requires that a local
interface with specified IP address should be configured without affecting physical
interface configuration. Furthermore, this address should have a 32-bit mask to
reduce the use of IP addresses and it should be advertised by the routing
protocols. Therefore, the loopback interface is added to meet this requirement.
Operation Command
Create the loopback interface and enter loopback interface loopback number
interface view
Delete the specified loopback interface undo interface loopback
number
Null Interface The 3Com Router support Null interface. Null interface is always in UP status, but
cannot forward data packet or configure IP address or encapsulate other
protocols.
Null interface is a virtual interface. Any network data packet sent to this interface
will be dropped.
Operation Command
Create the Null interface and enter Null interface view interface null 0
Delete the Null interface undo interface null 0
Sub-Interface 157
Any packet reaching the null interface will be dropped, which provides another
method for packet filtering: Just sending unnecessary network traffic to Null0
interface, so that there is no need to configure ACL.
For example: Use static routing configuration command ip route-static
192.101.0.0 255.255.0.0 null 0 will drop all the packets sent to network
segment 192.101.0.0.
2 Configure operating parameters of the interface
ip unreachables is the only command which can be configured on the Null
interface. It indicates that the router will reply the ICMP unreachable packet when
it receives packets sent to the Null interface.
Please perform the following configurations in Null interface view.
Table 189 Configure/Remove the sending of ICMP unreachable packet
Operation Command
Configure the sending of ICMP unreachable packet ip unreachables
Sub-Interface The 3Com Router comes up with the concept of “sub-interface” and allows users
to configure multiple sub-interfaces on one physical interfaces on the 3Com
Router series, making it very flexible for configuration.
WAN interface which link layer protocol is X.25: Its sub-interface can support IP
and IPX network protocols.
Operation Command
Create Ethernet sub-interface and enter its view interface ethernet
number.sub-number
Delete the specified Ethernet sub-interface undo interface ethernet
number.sub-number
Operation Command
Create WAN sub-interface and enter its view interface serial
number.sub-number [ multipoint |
point-to-point ]
Delete specified WAN sub-interface undo interface serial
number.sub-number [ multipoint |
point-to-point ]
When using the above commands, if corresponding WAN sub-interface has been
created (the same as sub-number), enter the view of this sub-interface directly.
Otherwise, first create WAN sub-interface with sub-number as the specified one,
and then enter the view of this sub-interface.
2 Configure relevant working parameters
The following items can be configured on the sub-interface of WAN interface
which link layer protocol is frame relay:
■ Frame relay address mapping which is different from the affiliated WAN
interface (i.e. the main interface)
■ IP address which is not in the same network segment as the affiliated WAN
interface
Sub-Interface 159
■ IPX network number which is different from that of the affiliated WAN
interface, and other IPX working parameters
■ Virtual circuit of the sub-interface
Please see chapters in Operation Manual - Link Layer Protocol and Operation
Manual - Network Protocol for details about the above configurations.
I. Networking Requirements
As shown below, WAN interface Serial0 of router A is connected with router B and
router C via public frame relay network. By configuring sub-interfaces on Serial0
of router A, LAN 1 can simultaneously access LAN 2 and LAN 3 via Serial0.
Ethernet 2
202.38.160.2
202.38.160.1 DLCI=70
DLCI=50 Router B
Ethernet 1
Frame relay
Serial0
Router A DLCI=60 DLCI=80
202.38.161.1 202.38.161.2 Router C
129.9.0.0 Ethernet 3
129.11.0.0
[Router-Serial0]link-protocol fr
3 Specify DTE as its frame relay terminal type
[Router-Serial0]fr interface-type dte
4 Create sub-interface Serial 0.1 on WAN interface Serial0 of router A in point-to
point mode, and enter its view
[Router]interface serial 0.1 point-to-point
5 Set its IP address to 202.38.160.1 and address mask to 255.255.255.0.
[Router-Serial0.1]ip address 202.38.160.1 255.255.255.0
6 Allocate a virtual circuit with DLCI 50 to it.
[Router-Serial0.1]fr dlci 50
7 Create sub-interface Serial 0.2 on WAN interface Serial0 of router A in point-to
point mode, and enter its view
[Router]interface serial 0.2 point-to-point
8 Set its IP address to 202.38,161.1 and address mask to 255.255.255.0.
[Router-Serial0.2]ip address 202.38.161.1 255.255.255.0
9 Allocate a virtual circuit with DLCI 60 to it.
[Router-Serial0.2]fr dlci 60
10 Configure the static route from router A to LAN2 and LAN3.
[Router]ip route-static 129.10.0.0 255.255.0.0 202.38.160.2
[Router]ip route-static 129.11.0.0 255.255.0.0 202.38.161.2
Configurations of router B and router C are omitted here. For fault diagnosis and
troubleshooting of sub-interface, please see chapters in Operation Manual - Link
Layer Protocol and Operation Manual - Network Protocol in this manual.
Standby Center Logic The standby center not only provides mutual backup between respective
Channel interfaces, but also chooses a certain virtual circuit belonging to X.25 or frame
relay as the main interface or standby interface of the standby center. Please see
relevant chapters in Operation Manual – Reliability for details about the standby
center.
To facilitate configuration, the user can specify relevant logic channel for the
above-mentioned virtual circuit and configure working parameters of the standby
center in the logic channel.
Configure Standby For detailed description, monitoring and maintenance, typical configuration
Center Logic Channel example, fault diagnosis and troubleshooting oriented to the configurations of the
standby center logic channel, please see Operation Manual – Reliability.
Virtual-Template and Virtual-template as the name implies, is a template used to configure a virtual
Virtual Interface interface, mainly used in VPN and MP.
Similarly, after multiple PPP links are bound as MP, a virtual interface also needs to
be created to exchange data with the opposite end. At this time, select an
interface template to dynamically create a virtual interface.
Configure In VPN and MP application environments, the system automatically creates and
Virtual-Template deletes virtual interface, which is completely transparent to the user. The user only
needs to configure VPN or MP at corresponding physical interface, create and
configure virtual-template and then build up relation between the virtual-template
and relevant physical interface.
Operation Command
Create virtual-template and enter its view interface virtual-template
number
Delete the virtual-template undo interface
virtual-template number
Here, number stands for template number of virtual-template ranging 1 to 25, i.e.
the user can create up to 25 virtual-templates.
In executing interface virtual-template command, if corresponding
virtual-template has been created, then directly enter the view of this
virtual-template. Otherwise, first create the virtual-template with specified
template number.
In deleting the virtual-template, make sure that all of its derived virtual interfaces
have been removed and this virtual-template is not in use any more.
2 Set work parameters of virtual-template
Compared with normal physical interface, the virtual-template has the following
features: the link layer protocol only supports PPP, and the network protocol
supports IP and IPX. Therefore, the following working parameters can be set:
■ Set working parameters of PPP
■ Set IP address of virtual interface
■ Set IP address (or IP address pool) allocated to PPP opposite end
Settings of these parameters on virtual-template are the same as those on normal
interface. Please see related chapters of PPP configuration in Operation Manual –
Link Layer Protocol, IP address configuration in Operation Manual – Network
Protocol and RADIUS configuration in Operation Manual – Security for
configuration details.
162 CHAPTER 11: CONFIGURING LOGICAL INTERFACE
Display and Debug The virtual interface, automatically created by the system if necessary, will work by
Virtual-Template and using parameters of related virtual-template. So, it's unnecessary for manual
Virtual Interface configuration. The virtual interface will be deleted because of low-layer link
disconnection or user intervention.
The following command can be used to display the state of virtual-template in all
views.
Operation Command
Display the state of the specified display interfaces
virtual-template virtual-template
virtual-template-number
Troubleshooting Before checking and eliminating faults of virtual-template, first find out the
virtual-template is used to create VPN virtual access interface or MP virtual
interface, then locate the fault of the virtual-template in actual application
environment.
Please see related chapters of Operation Manual – VPN and Operation Manual –
Link Layer Protocol for more methods of fault diagnosis and troubleshooting of
virtual-template.
IV LINK LAYER PROTOCOL
■ PPP Overview
■ MP Overview
■ Configure PPP
■ Configure MP
■ Display and Debug PPP
■ Typical PPP Configuration Example
■ Typical MP Configuration Example
■ Fault Diagnosis and Troubleshooting of PPP
PPP Overview The Point-to-Point Protocol (PPP) provides a standard method for transporting
multi-protocol datagram over point-to-point links. It gains wide applications since
it can provide user authentication, support synchronous/asynchronous lines and
can be expanded easily.
PPP defines a whole set of protocols, including link control protocol (LCP), network
control protocol (NCP) and authentication protocols (PAP and CHAP). Of them:
■ Link Control Protocol is used to negotiate some parameters of the link and is
responsible for creating and maintaining the link.
■ Network Control Protocol is used to negotiate the parameters of network layer
protocol.
UP OPENED
Dead Establish Authenticate
FAIL FAIL
SUCCESS/NON
DOWN CLOSING
Terminate Network
MP Overview MP protocol (PPP Multilink protocol) can bind multiple PPP links, so as to increase
bandwidth. MP protocol can fragment large packets, and then the fragmentation
will be sent to the same destination through different PPP links, so as to decrease
the transmission time of large packets.
1 Detect whether the interface of the peer works in MP mode. First begin LCP
negotiation with the peer, negotiating about ordinary LCP parameters and verify
whether the interface of the peer works in MP mode. If the peer does not work in
MP mode, begin NCP negotiation and do not bundle MP.
2 Bind the interface to virtual template interface. This can be done in the following
two ways: Bind directly and bind according to username or endpoint. In the
former way, the router does not detect the username and endpoint, and binds the
interface to a specified virtual template interface. In the latter way, the router
binds the interface to the virtual template interface according to the username or
endpoint.
3 Perform NCP negotiation. After the interface is bound to a virtual template, the
router will begin NCP negotiation with the NCP parameters for this virtual
template (such as IP address). The NCP parameters configured at the physical
interface are not functional. If NCP negotiation is successful, MP link can be
established, to transport data with wider bandwidth.
Table 194 Configure the link layer protocol of the interface to PPP
Operation Command
Configure the link layer protocol of the interface to PPP link-protocol ppp
Operation Command
Enable PAP authentication ppp authentication-mode pap [
callin ] [scheme { default |
name-list }]
Disable PPP authentication undo ppp authentication-mode
Add the username and password of the peer local-user user password {
into the local user list simple | cipher } password
service-type ppp
Operation Command
Configure PAP username and password when ppp pap local-user username
the peer authenticates the local in PAP mode password { simple | cipher }
password
Delete the above configured username and undo ppp pap local-user
password sent during authentication in PAP
mode
Table 197 Configure the local authenticates the peer in CHAP mode
Operation Command
Enable CHAP authentication ppp authentication-mode chap [
call-in ] [ scheme { default |
name-list }]
Disable CHAP authentication undo ppp authentication-mode
Configure the name of the local ppp chap user username
Delete the configured name of the local undo ppp chap user
Add the username and password of the peer local-user user password {
into the local user list simple | cipher } password
Operation Command
Configure the name of the local ppp chap user username
Delete the configured name of the local undo ppp chap user
Configure the password of the local for ppp chap password { simple |
authentication in CHAP mode cipher } password
Delete the password of the local during undo ppp chap password
authentication in CHAP mode
Add the username and password of the peer local-user user password {
into the local user list simple | cipher } password
Generally, when the router configures user list, it configures the command ppp
chap user username and local-user user password { simple | cipher }
password, to perform CHAP authentication. While configuring CHAP
authentication, user of one end is the username of the other, and the password
must be the same.
In some situation, if the router cannot configure user list then it needs to
configure the command ppp chap password { simple | cipher }
password to perform CHAP authentication.
While configuring CHAP authentication, note the following:
■ If one side originates the CHAP, authenticator should add username and
password for the requester in the local database (use local-user
command), and should send its username to the requester (use ppp chap
user command). The requester should also add username and password
for the authenticator in its database (use local-user command), and send
its username and password to the authenticator (use ppp chap user
command).
■ If one side originates the CHAP, authenticator only needs to start CHAP
authentication itself (use ppp authentication-mode chap command). The
requester does not need to configure the command.
■ If both sides originate CHAP simultaneously, then each side is both
authenticator and requester. At this time, both sides need to configure all
the commands supporting the CHAP authentication.
3 Configure AAA Authentication and Accounting Parameter of PPP
170 CHAPTER 12: CONFIGURING PPP AND MP
Whether the PPP user passes the authentication will be finally decided by AAA,
which can authenticate PPP user at local or at RADIUS server.
Local authentication is to authenticate the local user configured through the
local-user user password { simple | cipher } password command, and
RADIUS server authentication is to authenticate using the user database on
RADIUS server. The specific configuration commands are shown in the following
table.
Table 199 Configure AAA authentication and accounting of PPP
Operation Command
Enable AAA aaa-enable
Configure PPP authentication method of AAA aaa authentication ppp {
default | list-name } [
method1 | method2 | ...... ]
Configure the local first authentication of AAA aaa authentication local-first
Configure PPP authentication method of AAA at ppp authentication-mode { chap
the interface | pap } [ default | list-name ]
Operation Command
Configure the time interval of negotiation timeout ppp timer negotiate
seconds
Restore the default of time interval of negotiation undo ppp timer negotiate
timeout
Operation Command
Configure as Stac compression permitted on the ppp compression stac-lzs
interface
Cancel the Stac compression used by the interface undo ppp compression
stac-lzs
Configure MP 171
Operation Command
Enable PPP link quality monitoring function ppp lqc forbidden-percentage
[ resumptive-percentage ]
Disable PPP link quality monitoring function undo ppp lqc
Before PPP link quality monitoring is enabled, PP interface sends keepalive packets
every period. After the function is enabled, PPP interface will replace the keepalive
packets by LQR packets, that is, PPP interface will send LQR packets every period,
in order to monitor the link.
When link quality is normal, the system will calculate the link quality in each LQR
packet. If the calculation results turn out to be unqualified for two consecutive
times, the link will be disabled. After the link is disabled, the system will calculate
the link quality in every ten LQR packets. The link will be resumed only if the
calculation results of link quality are qualified for three consecutive times.
Therefore, the link can only be resumed at least 30 keepalive periods after it is
disabled. If the keepalive period is set too long, it may cause no resumption of
links for a long time.
Operation Command
Create and enter MP virtual template interface virtual-template
interface number
Delete the specified MP virtual template undo interface virtual-template
interface number
Operation Command
Configure the link layer protocol of the interface to PPP link-protocol ppp
Configure the interface to work in MP mode ppp mp
Configure the interface to work in common mode undo ppp mp
Operation Command
Bind the physical Interface to a Virtual ppp mp interface
Template virtual-template
interface-number
Remove the physical interface’s binding to a undo ppp mp interface
virtual template interface
After this command is configured, the system will not check the username and
endpoint when performing MP binding, namely, the commands ppp mp
binding-mode and ppp mp user will not take effect.
Configure MP 173
Operation Command
Perform MP binding according to username ppp mp binding-mode
authentication
Perform MP binding according to endpoint ppp mp binding-mode descriptor
Perform MP binding according to both ppp mp binding-mode both
username and endpoint
Restore the default binding conditions undo ppp mp binding-mode
Operation Command
Associate the PPP username with the virtual ppp mp user user-name bind
template interface virtual-template number
Dissociate e the PPP username with the virtual undo ppp mp user user-name
template interface
Operation Command
Set maximum link number MP channel permits for ppp mp max-bind binds
binding
Restore default value of maximum link number MP Undo ppp mp max-bind binds
channel permits for binding
174 CHAPTER 12: CONFIGURING PPP AND MP
By default, the maximum link number of links that MP channel permits to bind
is 16.
b Configure the maximum number of fragments received by MP channel
Table 209 Configure the maximum number of fragments received by MP channel
Operation Command
Set the number of maximum fragments MP channel ppp mp max-receive-frags
permits to receive frags
Restore default value of the number of maximum undo ppp mp
fragments MP channel permits to receive max-receive-frags
Operation Command
Set the number of maximum fragments MP channel ppp mp max-send-frags frags
permits to send
Restore default value of the number of maximum undo ppp mp max-send-frags
fragments MP channel permits to send
For synchronous serial interfaces operating in DTE mode, Baud rate is calculated in
line with 64000 bps without exception.
Generally, the actual sending capability is basically identical to its interface
Baud rate. However, in some special cases, the difference between them is
large. For example, when asynchronous serial interfaces of two routers are
connected via Modems, the actual transmission speed is decided by the line
quality, after the Modem negotiations. In this case, the speed is usually slower
than the preset interface Baud rate. Moreover, for synchronous serial interfaces
running under DTE mode, system cannot obtain their correct Baud rate.
In the above cases, you should set the virtual Baud rate on interfaces. When
virtual Baud rate (must not be 0) is set on an interface, system will substitute
virtual Baud rate for interface Baud rate to control flows. Proper application of
virtual Baud rate can make full use of the total link bandwidth and reduce
network delay time, while the irrational configuration runs the opposite.
Perform the following configuration in interface view.
Table 211 Configure virtual Baud rate on interface
Operation Command
Set virtual Baud rate on interface virtualbaudrate baudrate
Display and Debug PPP 175
Display and Debug Please use the display and debugging commands in all views.
PPP Table 212 Display and debug PPP
Operation Command
Display Multilink PPP information display ppp mp [ interface type
number ]
Enable the debugging of PPP debugging ppp { event | lqr |
negotiation | packet | all }
Typical PPP
Configuration
Example
Router 11
Quidway Router
Quidway2 2
Tower System
router-b
Tower System Desktop System
DDN
router-a
Tower System
Desktop System router-c
Desktop System
[Router]interface serial2: 1
[Router-Serial2:1]ppp mp
[Router-Serial2:1]ppp authentication-mode pap
[Router-Serial2:1]ppp pap local-user router-c password simple
router-c
Turn on the debugging switch of PPP, if LCP negotiation is successful and turns to
Up status, then begin PAP or CHAP negotiation and LCP turns to Down status.
Indicates that this interface is a dialup interface and the call is not connected
successfully.
Fault 3: Fail to ping through the peer although the link is UP and LCP and
IPCP are all opened.
Troubleshooting:
■ Execute the display running-configcurrent-configuration interface
command on the local end to check whether the IP address is configured and
whether IP address negotiation is configured with the ip address
ppp-negotiate command.
■ Check the configuration of the peer to see whether it assigns IP address to the
local end with the remote address command.
■ Directly specify IP address for the local end or assign IP address to the peer.
Then reset the interface with the shutdown and undo shutdown command.
13 CONFIGURING PPPOE CLIENT
■ PPoE Overview
■ Configure PPPoE Client
■ Display and Debug PPPoE Client
■ Typical PPPoE Configuration Example
PPoE Overview Point-to-Point Protocol over Ethernet (PPPoE) can be used for connecting Ethernet
hosts to a remote access concentrator through a simple bridging device. With
PPPoE, the remote access device can control and implement billing on the
accessed subscribers. Compared with traditional access approaches, PPPoE is more
cost-effective. Therefore, it is widely put in many applications, such as residential
quarter networks. As a popular broadband access approach at present, ADSL
(Asymmetric Digital Subscriber Line), adopts this protocol.
PPPoE is implemented at two phases, the discovery phase and the PPP session
phase.
■ Discovery phase
When a host initiates a PPP session, it must first go through the discovery phase
to confirm the remote Ethernet MAC address, and establish a PPPoE session ID.
Different from PPP, PPPoE establishes a client/server relationship at this phase,
whereas PPP establishes a peer relationship. Through the discovery phase, the
host (client) can discover an access concentrator (server). After this phase ends
normally, the host and the access concentrator can establish a PPPoE session by
using the MAC address and the session ID.
■ PPP session phase
As the PPP session begins, the host and the access concentrator implement
negotiation and transmit PPP data according to PPP. The PPP packets are
encapsulated in Ethernet frames as payload of PPPoE frames, and transmitted
to the peers of the PPPoE link. In this case, all the Ethernet frames are unicast.
Refer to RFC2516 for PPPoE.
implement the client dial-up function of PPPoE), so the subscribers can access the
Internet without installing a PPPoE client software on PCs. Furthermore, all the PCs
on the same LAN can share an ADSL account.
PC PC
Ethernet
PPPoE Client
ADSL Modem
PPPoE Session
PPPoE Server
As shown in the above figure, the PCs on an Ethernet are connected to a 3Com
Router running PPPoE client. The data destined for the Internet first reach the
router where PPPoE encapsulates the data, and then go through the ADSL access
server via the ADSL Modem attached to the router, and finally access the Internet.
The overall Internet-accessing process can be implemented, without requiring the
subscribers to install any PPPoE client dial-up software.
Operation Command
Configure a dialer rule dialer-rule dialer-group {
protocol-name { permit | deny } | acl
acl-number }
Create a dialer interface interface dialer number
Configure PPPoE Client 181
Operation Command
Configure a PPPoE session (permanently pppoe-client dial-bundle-number number
online) [ no-hostuniq ]
Configure a PPPoE session (triggered by pppoe-client dial-bundle-number number
packets) [ no-hostuniq ] idle-timeout seconds [
hold-queue packets ]
Delete the PPPoE session undo pppoe-client dial-bundle-number
number
The 3Com Router support two types of PPPoE connections, which are permanent
connections and packet-triggered connections.
■ In permanent connection, the router will originate a PPPoE call to automatically
and immediately set up a PPPoE session. And this session will be always in place
unless the user uses the undo pppoe-client command to delete it.
■ In packet-triggered connection, the router will not originate a PPPoE call
immediately. Instead, the router will originate a PPPoE call to establish a PPPoE
session only when there is data waiting for transmission. And the router will
automatically terminate the PPPoE session if the PPPoE link has been idle for
the specified period.
3 Reset or delete PPPoE Session
Perform the reset pppoe-client command in all views and the undo
pppoe-client command in Ethernet interface view.
Table 215 Reset or delete PPPoE session
Operation Command
Reset a PPPoE session but it will be re-established reset pppoe-client { all
later |dial-bundle-number number }
Delete a PPPoE session and it will not be undo pppoe-client
re-established dial-bundle-number number
The commands reset pppoe-client and undo pppoe-client differ in the sense
that the former only resets a PPPoE session temporarily whereas the latter deletes
a PPPoE session permanently.
If a permanent PPPoE session has been reset by executing the reset
pppoe-client command, the router will automatically re-establish the PPPoE
session 16 seconds later. If a packet-triggered PPPoE session has been reset by
executing the same command, however, the router will re-establish the session
only when there is data waiting for transmission.
182 CHAPTER 13: CONFIGURING PPPOE CLIENT
Display and Debug Perform the display and debugging command in all views.
PPPoE Client Table 216 Display and debug PPPoE Client
Operation Command
Display state of the PPPoE session and the display pppoe-client session {
statistic information as well summary | packet }
[dial-bundle-number number ]
Enable debugging of PPPoE client debugging pppoe-client option [
interface type number ]
Typical PPPoE
Configuration
Example
LAN
192.168.1.1 Eth0
RouterA
Eth1
ADSL Modem
Internet
[Router-Dialer1]ip ppp-negotiate
[Router-Dialer1]ppp pap local-user 3com password cipher 12345
2 Configure a PPPoE session
[Router]interface ethernet 1
[Router-Ethernet1]pppoe-client dial-bundle-number 1
3 Configure the LAN interface and the default route
[Router]interface ethernet 0
[Router-Ethernet0]ip address 192.168.1.1 255.255.255.0
[Router]ip route-static 0.0.0.0 0.0.0.0 dialer 1
If the IP addresses assigned to the PCs on the LAN are private addresses, Network
Address Translation (NAT) should also be configured on the router. For the NAT
configuration, refer to the related chapters contained in Operation Manual -
Network Protocol.
ADSL
DDN
RouterA Network center
■ SLIP Overview
■ Configure SLIP
■ Display and Debug SLIP
■ Typical SLIP Configuration Example
SLIP Overview SLIP (Serial Link Internet Protocol) can transmit data over the asynchronous serial
link. Through SLIP, the user can dial up to access the Internet. Compared with
other link layer protocols, SLIP is very simple. It does not provide protocol address,
error check, header compression. In addition, SLIP does not distinguish packet
types, so it supports only one type of network protocol at one time.
Configure SLIP Because SLIP does not negotiate the name of the remote end, SLIP dialer can only
be used with the standard BDR.
For the specific configuration methods of BDR and Modem, please refer to related
chapters of BDR, Modem in Operation Manual – Dial-up.
Operation Command
Configure the synchronous/asynchronous serial physical-mode async
interface to work in asynchronous mode
186 CHAPTER 14: CONFIGURING SLIP
Operation Command
Configure the link layer protocol of the interface to SLIP link-protocol slip
Display and Debug Perform the following task in all views to monitor the current state of SLIP in real
SLIP time.
Table 219 Enable/Disable the information debugging of SLIP
Operation Command
Enable the information debugging of SLIP packet debugging slip { hexadecimal
| packet | all }
Router A 10.110.0.1
8810003
PSTN
8810026
10.110.0.2 Router B
Typical SLIP Configuration Example 187
■ ISDN Overview
■ Configure ISDN
■ Display and Debug ISDN
■ Typical Configuration Example
■ Fault Diagnosis and Troubleshooting of ISDN
ISDN Overview ISDN (Integrated Services Digital Network), developed from telephone integrated
digital network (IDN), provides end-to-end digital connection, so as to support
wide range of services (including voice and non-voice services).
■ B channel is a user channel, used to transmit the voice, data and other user
information with the transmission rate 64kbps.
■ D channel is a control channel and used to transmit the common channel
signaling, controlling the calls on B channels of the same interface. The rate of
D channel is 64kbit/s (PRI) or 16kbps (BRI).ITU-T Q.921, the data link layer
protocol of D channel, defines the rules by which the information is exchanged
between layer-2 entities on the user-network interface through D channel.
Meanwhile, it supports the access of layer-3 entity. ITU-T Q.931, the network
layer protocol of D channel, provides methods to establish, maintain and
terminate the network connection between communication application
entities.
Operation Command
Set ISDN signaling to QSIG isdn protocol-type qsig
Set ISDN signaling to DSS1 (Digital Subscriber isdn protocol-type dss1-
Signaling No.1)
The isdn protocol-type command can take effect only on ISDN PRI interfaces.
For an ISDN BRI interface, it does not take effect. In other words, an ISDN BRI
interface can use only DSS1 signaling, whereas an ISDN PRI interface can use
either DSS1 signaling or QSIG signaling.
Using the isdn protocol-type command in system view will not affect the
existing ISDN PRI interface, and it will only change the default type of signaling on
the newly created ISDN PRI interface.
2 Configure the QSIG Signaling Parameters
If QSIG signaling is used on an ISDN PRI interface, you can configure the QSIG
signaling parameters. The following configuration commands can be used only
when the ISDN PRI interface adopts QSIG signaling.
a Length of call reference
Call reference is the flag used to distinguish the communication entities. A call
reference uniquely identifies a call.
Perform the following configurations in interface view.
Table 221 Configure the length of call reference
Operation Command
Set the length of call reference to 1 byte isdn crlength 1
Set the length of call reference to 2 bytes isdn crlength 2
Operation Command
Overlap receiving mode is used. isdn overlap-receiving
Complete receiving mode is used. undo isdn overlap-receiving
When a router originates a call to PBX, it usually contains all called number
information in the SETUP message. However, you can configure the command
to determine whether the Sending Sending-Complete Information Element
(SCIE) should be carried in the SETUP message.
Perform the following configurations in interface view.
Table 223 Configure the sending mode
Operation Command
Enable the router to carry the Sending-Complete isdn sending-complete
Information Element (SCIE) in the SETUP message
when sending a number
Disable the router to carry the Sending-Complete undo isdn sending-complete
Information Element in the SETUP message when
sending the number
Operation Command
Set interval for a QSIG signaling timer isdn qsig-timer timer-name
time-interval
Restore the default interval value(s) of QSIG undo isdn qsig-timer {
signaling timer(s) timer-name | all }
You can configure the QSIG signaling timers, including T301, T302, T303,
T304, T305, T308, T309, T310, T313, T316 and T322. Also, you can use the
display isdn qsig-timer command to view the default values of all the
QSIG signaling timers.
3 Verify the called number in an ISDN incoming call
Whenever an ISDN called party receives an incoming call, it can verify the called
number in the incoming call from the remote end. If the called number in the
remote call differs from the local configuration, the call will be denied. Otherwise,
the call will be accepted.
Perform the following configurations in interface view.
Table 225 Set the called number or sub-address to be checked in digital incoming call
Operation Command
Set the called number or sub-address to be isdn check-called-number [
checked in digital incoming call called-party ] [ :sub-address
]
Remove the called number or sub-address to undo isdn check-called-number
be checked in digital incoming call
Configure ISDN DoV ISDN call includes voice call and digital call. Different communication mode makes
different calls. In common circumstances, users initiate voice call when making
voice communication and initiate digital call when making data transmission. ISDN
DoV (Data over Voice) can firstly establish connections by voice call, and then
begins data transmission. ISDN DoV can apply to such conditions as digital call is
disabled (for example, long-distance call). However compared with digital call,
ISDN DoV has some disadvantages. It cannot guarantee correct data transmission
all the time and needs ISDN network support.
1 Configure Calling Method for Initiating a Connection on an Interface
For an interface generating ISDN calls, you must set the call type to either voice
call or data call.
Perform the following configuration in dialer interface or ISDN interface view.
Table 226 Configure an interface for voice calls
Operation Command
Configure an interface to initiate connection using voice dialer data2voice
calls
Configure the interface to initiate connection using data undo dialer data2voice
calls
Operation Command
Configure an interface to process the received calls as Isdn voice2data
voice calls
Configure the interface to process the received calls as undo isdn voice2data
data calls
Display and Debug Perform the display and debugging commands in all views.
ISDN Table 228 Display and debug ISDN
Operation Command
Display the current activated call display isdn active-channel [
information of ISDN interface interface type number ]
Display the value of ISDN DSS1 signaling display isdn q931-timer
timer
Display the value of ISDN QSIG signaling display isdn qsig-timer [ interface
timer type number ]
Display the current status of ISDN interface display isdn call-info [ interface
type number ]
Enable the debugging of ISDN CC debugging isdn cc [ interface type
number ]
Enable the debugging of ISDN q921 debugging isdn q921 [ interface
protocol type number ]
Enable the debugging of ISDN q931 debugging isdn q931 [ interface
protocol type number ]
Typical Configuration Example 193
Typical Configuration
Example
8810152
202.38.154.1
Router A
cE1/PRI
ISDN Exchange
Network
8810154
cE1/PRI
202.38.154.2
Router B
Fault Diagnosis and Fault: Two routers are connected via an ISDN PRI line, but pinging the
Troubleshooting of routers is not successful.
ISDN Troubleshooting:
1 Execute the display isdn call-info command. If the system prompts “there is
no isdn port”, it means that there is no ISDN PRI port, and you should configure
one. For the configuration, refer to the section “cE1/PRI Interface and cT1/PRI
Interface Configuration” in Operation Manual - Interface.
2 If enabling Q.921 information debugging and debugging information “ISDN-D
send data error” is output, it indicates that the physical layer is not activated. You
can try to use the commands shutdown and undo shutdown to disable and
re-enable the related interface.
3 Check whether the dialer is configured correctly. If the dialer is configured
correctly and no “ISDN-D send data error” is displayed, then it's possible the ISDN
line is not connected well.
16 CONFIGURING LAPB AND X.25
X.25 and LAPB X.25 protocol is the interface procedure between the data terminal equipment
Protocols Overview (DTE) and data circuit-terminating equipment (DCE). In 1974, CCITT issued the
first draft of X.25, whose initial files were based on the experiences and
recommendations of Telenet and Tymnet of USA and Datapac packet-switched
networks of Canada. It was revised in 1976, 1978, 1980 and 1984, added many
optional service functions and facilities.
With X.25, two DTE can communicate with each other via the existing telephone
network. X.25 sessions are established when one DTE device contacts another to
request a communication session. The DTE device that receives the request can
either accept or refuse the connection. If the request is accepted, the two systems
begin full-duplex information transfer. Either DTE device can terminate the
connection. After the session is terminated, any further communication requires
the establishment of a new session.
X.25 is the protocol of point-to-point interaction between DTE and DCE. DTE
usually refers to the host or terminal at the user side, and DCE usually refers to the
synchronous modem. DTE is connected with DCE directly, DCE is connected to a
port of packet switching exchange, and some connections are established
between the packet switching exchanges, thus forming the paths between
different DTE. In an X.25 network, the relation between entities is shown in the
following diagram:
196 CHAPTER 16: CONFIGURING LAPB AND X.25
DTE
PSE DCE
PSE DCE
DTE
PSN
DTE: Data Terminal Equipment
DCE: Data Circuit-terminating Equipment
PSE: Packet Switching Equipment
PSN: Packet Switching Network
The X.25 protocol suite maps to the lowest three layers of the OSI (Open System
Interconnection) reference model. The following protocols are typically used in
X.25 implementations: Packet-Layer Protocol (PLP), Link Access Procedure
Balanced (LAPB), and other physical-layer serial interfaces. X.25 layer 3
(packet-layer protocol) describes the format of packet used by the packet layer
and the procedure of packet switching between two layer 3 entities. X.25 layer 2
(link-layer protocol), also called LAPB (Link Access Procedure Balanced), defines the
format and procedure of interactive frames between DTE and DCE. X.25 layer 1
(physical-layer protocol) defines some physical and electrical characteristics in the
connection between DTE and DCE. The above relation is shown in the following
diagram.
7
6
5
4
X.25 X.25
Packet layer
3
Packet layer interface Packet layer
X.25 X.25
Link layer
2 Link layer Link layer
interface
X.25 Physical layer X.25
1 interface Physical layer
Physical layer
DTE DCE
The relation between packets and frames in various X.25 layers is shown in the
following diagram.
X.25 link layer specifies the frame switching process between DTE and DCE. In
terms of hierarchy, the link layer seems to bridge the packet layer interface of DTE
and that of DCE. Through this bridge, the packets can be transmitted continuously
between the packet layer of DTE and that of DCE. The link layer has such main
functions as follows:
As specified in international standards, X.25 link layer protocol LAPB adopts the
frame structure of high-level data link control (HDLC) and the frame structure is a
subset of LAPB. The bi-directional link will be established when either site sends an
SABM (Set Asynchronous Balanced mode) command and the other replies with
UA.
Defined as X.25 layer-2 protocol, LAPB is actually a separate link layer protocol,
which can transmit the data with LAPB bearing non-X.25 upper layer protocol.
3Com Router series can configure the link protocol of serial interface to LAPB and
perform simple local data transmission. Meanwhile, X.25 of 3Com Router series
has switching function, that is to say, the router can be used as a small X.25
packet switch. The following diagram shows the relations among LAPB, X.25 and
X.25 switching.
198 CHAPTER 16: CONFIGURING LAPB AND X.25
X.25
LAPB
Operation Command
Configure the link layer protocol of the interface to link-protocol lapb [ dte |
LAPB dce ] [ ip ]
Operation Command
Configure LAPB frame numbering mode (also called lapb modulo { 128 | 8 }
modulo)
Operation Command
Configure LAPB window parameter K lapb window-size k-value
Restore the default value of LAPB window parameter undo lapb window-size
K
By default, k is 7.
c Configure LAPB N1, N2
Configure X.25 199
N1 value represents the maximum number bits of I frame that DCE or DTE
wants to receive from DTE or DCE.
N2 value represents the maximum number of times that DCE or DTE tries to
successfully send a frame to DTE or DCE.
Table 232 Configure LAPB N1, N2
Operation Command
Configure LAPB parameter N1 lapb max-frame n1-value
Restore the default value of LAPB parameter N1 undo lapb max-frame
Configure LAPB parameter N2 lapb retry n2-value
Restore the default value of LAPB parameter N2 undo lapb retry
Operation Command
Configure LAPB system timer T1, T2, T3 lapb timer { t1 t1-value |
t2 t1-value | t3 t3-value }
Restore the default value of LAPB system timer T1, undo lapb timer{ t1 | t2 |
T2, T3 t3 }
Only when configured as an X.25 interface, can an interface transmit data with
X.25 protocol.
Operation Command
Set the X.121 address of the interface x25 x121-address
x.121-address
Cancel the set X.121 address of the interface undo x25 x121-address
Operation Command
Set the working mode and packet format of X.25 link-protocol x25 [ dte |
interface dce ] [ nonstandard | ietf ]
Layer 3 of X.25 supported by 3Com Router series can work in both DTE mode and
DCE mode. It can also specify the datagram format among the two optional
formats: IETF and Nonstandard.
Note that generally speaking, public X.25 packet switching network requires the
router to access at DTE side and requires the IETF format. Therefore, the working
mode of X.25 should be DTE and the format should be IETF. If a pair of serial
interfaces of two routers is directly connected for data transmission, make sure the
two transmission ends are DTE and DCE and the formats are the same.
For X.25 supported by 3Com Router series, default working mode is DTE and
default format is IETF.
X.25 protocol can multiplex multiple virtual connection over a real physical link
between DTE and DCE, also called virtual circuit (VC) or logical channel (LC). X.25
can establish up to 4095 virtual connections numbered from 1 to 4095. The
number that can be employed to identify each virtual circuit (or logical channel) is
called logical channel identifier (LCI) or virtual circuit number (VCN).
Strictly speaking, virtual circuit and logical channel are two different concepts.
However, they are not much different at the user side.
X.25 protocol divides the logical channel into 4 areas. (listed here in numerically
increasing order): Permanent virtual circuits (PVCs), Incoming-only circuits,
Two-way circuits, Outgoing-only circuits.
According to the X.25 recommendation proposed by ITU-T, DCE selects an
available logical channel with a smaller number from the “one-way incoming call
channel range” and “two-way channel range” to initiate a call, while DCE selects
an available logical channel with a larger number from the “one-way incoming call
channel range” and “two-way channel range” to initiate a call. Thus, we can
avoid the case that one side of the communication occupies all the channels, and
minimize the possibility of call collision.
In X.25 protocol, six parameters are employed to delimit the four sections, as
shown in the diagram below.
1
Permanent virtual circuit
LIC
Incoming-only channel
HIC
Unused
LTC
Two-way channel
HTC
Unused
LOC
Outgoing-only channel
HOC
Unused
4095
For the meanings of these six parameters, please refer to the following table.
Table 236 X.25 channel delimitation parameters
Parameter Meaning
LIC Lowest Incoming-only Channel
HIC Highest Incoming-only Channel
LTC Lowest Two-way Channel
HTC Highest Two-way Channel
LOC Lowest Outgoing-only Channel
HOC Highest Outgoing-only Channel
Operation Command
Set X.25 virtual circuit range x25 vc-range { in-channel hic lic
| bi-channel htc ltc | out-channel
hoc loc }
Cancel the set vc-range { in-channel hic lic | undo x25 vc-range
bi-channel htc ltc | out-channel hoc loc }
The above shows that each section (except the permanent virtual circuit section) is
defined by two parameters: upper limit and lower limit, the value of which ranges
between 1 and 4095 (including 1 and 4095). Correct configuration must satisfy
the following conditions:
■ At the two sides (i.e. DTE and DCE) of a physical connection, the six parameters
of X.25 must be equal correspondingly, otherwise, the procedure will possibly
operate abnormally, resulting in data transmission failure.
■ During the configuration, after ensuring the numerically increasing order, pay
attention to the default values of various parameters, and set the parameters
according to actual condition.
■ Because X.25 protocol requires DTE and DCE to have the same virtual circuit
range parameters, the new configuration can not take effect immediately after
successful X.25 protocol negotiation. It is necessary to first execute shutdown
and undo shutdown commands.
4 Configure X.25 modulo
The implementation of X.25 in 3Com Router series supports both modulo 8 and
modulo 128 packet sequence numbering. Module 8 is the default.
To set/cancel the packet sequence numbering, perform the following task in the
interface view:
Table 238 Set/Cancel X.25 packet numbering modulo
Operation Command
Set the packet sequence numbering mode x25 modulo { 8 | 128 }
Cancel the set packet sequence numbering mode undo x25 modulo
Please note that X.25 procedure requires DTE and DCE to have the same packet
numbering mode, therefore the configuration will take effect by executing the
shutdown and undo shutdown commands.
Besides, the packet sequence numbering mode of X.25 layer 3 is different from
the frame sequence numbering mode of LAPB (X.25 layer 2). When modulo 128
numbering mode is employed in the DTE/DCE interface with high throughput rate,
for LAPB, only the efficiency of local DTE/DCE interface is affected, that is
point-to-point efficiency increases. While for X.25 layer 3, the efficiency of
Configure X.25 203
end-to-end is affected, that is, the efficiency between two sets of communicating
DTE increases.
5 Configure X.25 flow control parameter
It is essential to set correct default flow control parameters (window size and
packet size) for the operation of the link because X.25 protocol is good at traffic
control. However, most public X.25 packet networks use the default window size
and maximum packet size specified in ITU-T X.25 Recommendation, which is also
true for 3Com Router series. Therefore, this task may be optional without special
requirements of service provider.
After setting window size and maximum packet size, the SVCs that can be
established only with call process will use these values if related parameters are
not negotiated in the call process. The PVCs that can be established without call
process will also use these values if no window size or packet size option is
assigned when specifying PVC.
X.25 transmitting end will fragment the too long data packet of upper layer
according to the maximum packet size and mark in the last fragment packet (M
bit is not set). When the packet reaches the receiving end, X.25 reassembles all
these fragment packets, and judges whether a complete packet is received
according to M bit marker. Therefore, too small value of the maximum packet size
will consume too much router resources on packet fragmenting and assembling,
thus lowering efficiency.
Finally, the following two points should be noted:
■ Maximum packet size < MTU*8 < LAPB N1.
■ New configuration will take effect only after executing shutdown and undo
shutdown commands
To set/cancel the default flow control parameter, perform the following tasks.
Table 239 Set the default flow control parameter
Operation Command
Set the receiving window and sending window size x25 window-size in-packets
of virtual circuit out-packets
Cancel the set receiving and sending window size undo x25 window-size
of virtual circuit
Set the receiving and sending maximum packet x25 packet-size in-packets
length out-packets
Cancel the set receiving and sending maximum undo x25 packet-size
packet length
Configure X.25 Interface ■ The Configuration of X.25 interface supplementary parameter includes:
Supplementary ■ Configure the time delay of X.25 layer 3 timer
Parameter
■ Configure the attributes related to X.25 address, including the following
configuration items:
■ Configure the alias of interface address
■ Configure to skip the calling or called address
■ Configure whether to check the address code block in call accepting packet.
■ Configure whether to carry the address code block in call accept packet
■ Configure default upper layer protocol
204 CHAPTER 16: CONFIGURING LAPB AND X.25
Timer name
In the table, T28 is the timer of “sending register request”, and is only defined at
the DTE side. It is used to dynamically apply to stop the selective services in the
network. Its reference value is 300 seconds, and cannot be modified. Perform the
following tasks in the interface view.
Table 241 Set X.25 layer 3 timer delay
Operation Command
Set the timer delay value of restart procedure x25 timer tx0 seconds
Default value (second): DTE: 180 DCE: 60
Cancel the set timer delay value of restart procedure undo x25 timer tx0
Set the timer delay value of call procedure x25 timer tx1 seconds
Default value (second): DTE: 200 DCE: 180
Cancel the set timer delay value of call procedure undo x25 timer tx1
Set the timer delay value of restore procedure x25 timer tx2 seconds
Default value (second): DTE: 180 DCE: 60
Cancel the set timer delay value of restore procedure undo x25 timer tx2
Set the timer delay value of clearing procedure x25 timer tx3 seconds
Default value (second): DTE: 180 DCE: 60
Cancel the set timer delay value of clearing procedure undo x25 timer tx3
of a call that reaches X.25 interface may be inconsistent with X.121 address of the
destination interface (because the destination address of this call is modified
within the network), still the interface will accept this call. At this time, one or
multiple aliases should be specified for this interface by performing the following
tasks in the interface view:
Table 242 Specify/Cancel an alias for the interface
Task Command
Specify an alias for the interface x25 alias-policy match-type
alias-string
Cancel the specification of an alias for the undo x25 alias-policy
interface match-type alias-string
To satisfy the requirements of different networks, nine matching modes and the
formats of corresponding alias strings are defined for X.25 in 3Com Router series,
as shown in the following table.
Table 243 Alias match modes and meanings
3 Configure the attributes related to the address code block in the call packet or call
accept packet
As specified in X.25 protocol, the call packet must carry the information set of
both the calling DTE address (source address) and the called DTE address
(destination address). This address information set is called the address code block.
While in call accept packet, some networks require that both (the calling DTE
address and the called DTE address) be carried, some networks require that only
one of the two be carried, while some others require that neither should be
carried. X.25 in 3Com Router series enables users to make choices according to
the requirement of specific network. Perform the following task in interface view.
206 CHAPTER 16: CONFIGURING LAPB AND X.25
Table 244 Configure/Cancel the attributes related to the address code block in the call
packet or call accept packet
Operation Command
Not carrying the called DTE address information when a x25 ignore
call is originated called-address (by
Default: carry default)
Cancel not carrying the called DTE address information undo x25 ignore
when a call is originated called-address
Not carrying the calling DTE address information when a x25 ignore
call is originated calling-address (by
Default: carry default)
Cancel not carrying of the calling DTE address undo x25 ignore
information in a call calling-address
Not carrying the called DTE address information when x25 response
the originated call is accepted called-address
Default: not carry
Cancel not carrying of the called DTE address undo x25 response
information when the originated call is accepted called-address (by
default)
Not carrying the calling DTE address information when x25 response
the originated call is accepted calling-address
Default: not carry
Cancel not carrying the calling DTE address information undo x25 response
when the originated call is accepted calling-address (by
default)
Check the address code block after the response of the x25
call is received check-response-address
Default: check (by default)
Cancel check the address code block after the response undo x25
of the call is received check-response-address
Operation Command
Specify the default upper layer protocol borne on x25 default-protocol [ ip
X.25 | ipx ]
Default: IP
Cancel the specifying of the default upper layer undo x25 default-protocol
protocol borne on X.25 [ ip | ipx ]
LAN A LAN B
X.25
Router A
The datagram uses IP address to communicate data and information between LAN
A and LAN B, whereas X.121 address is used inside X.25. Therefore, we setup
correct mapping between the IP address and X.121 address.
1 Create the mapping from the protocol address to X.121 address
An X.25 interface has its own X.121 address and inter-network protocol (such as
IP protocol) address. When X.25 initiates a call through this interface, the source
address (calling DTE address) it carries in the call request packet is the X.121
address of this interface.
For a datagram with a definite destination IP address, its corresponding X.121
destination address is located by the configured address mapping. The called
destination, just like a calling source, also has its own protocol address and X.121
address. Establish the mapping between the destination protocol address and the
X.121 address at the calling source, you can find the destination X.121 address
according to the destination protocol address, and successfully initiate a call.
In the interface view, perform the following commands to create/delete an address
mapping.
Table 246 Create/Delete the mapping from the protocol address to X.121 address
Operation Command
Create the mapping from the destination x25 map { ip | ipx }
protocol address to X.121 address protocol-address x121-address
x.121-address [ option ]
Delete the mapping from the destination undo x25 map protocol
protocol address to X.121 address protocol-address
The protocol-address and x.121-address in the command line refer to the protocol
address and X.121 address of the destination, not those of the source.
While creating an address mapping, specify its attributes with the option items.
The meanings and specific content of these options will be described in
subsequent sections.
2 Create the permanent virtual circuit (PVC)
A permanent virtual circuit can be created for large-traffic and stable data
transmission on leased line. Permanent virtual circuits (PVCs) do not need any call
208 CHAPTER 16: CONFIGURING LAPB AND X.25
process and it always exists. An address mapping will be created implicitly while a
permanent virtual circuit is created.
To create/delete a permanent virtual circuit, perform the following tasks in
interface view.
Table 247 Create/Delete permanent virtual circuit
Operation Command
Create a permanent virtual circuit x25 pvc pvc-number protocol
protocol-address x121-address
x.121-address [ option ]
Delete a permanent virtual circuit undo x25 pvc pvc-number
The format of this command shows that while a permanent virtual circuit is
created, an address mapping is also created for it. Similarly, the protocol-address
and x.121-address in the command also refer to the destination address. While
creating a permanent virtual circuit, some attributes of the PVC can also be
selected via the option. This [option] is a subset of [option] in the command "x25
map...... [option]".
For configuration example of permanent virtual circuit, refer to subsequent
sections.
Configure Additional The Configuration additional parameters of X.25 datagram transmission includes:
Parameters of X.25 ■ Specify the maximum idle time of SVC
Datagram Transmission
■ Specify the maximum number of SVCs that is associated with the same address
mapping
■ Specify the pre-acknowledgement of packet
■ Configure X.25 user facility
■ Set the length of virtual circuit queue
■ Broadcast via X.25
■ Restrict the use of address mapping
■ Configure the interface with the standby center
The X.25 of the 3Com Router series allows adding some additional characteristics,
including a series of optional user facilities stipulated in ITU-T Recommendation
X.25.
This section shows how to configure such additional characteristics, including the
options in the two commands of "x25 map ......" and "x25 pvc......". Please
select and configure these additional characteristics according to the actual needs,
X.25 network structure and the services provided by service provider.
Operation Command
Specify maximum idle time for all the SVCs on an x25 timer idle minutes
interface
Specify maximum idle time for SVC associated x25 map protocol
with an address mapping protocol-address
x121-address x.121-address
timer idle minutes
Cancel specify maximum idle time for all the SVCs undo x25 timer idle
on an interface
By default, the value of SVC maximum idle time is 0 minute, which means this
SVC will not be disconnected for idle times out.
2 Configure the maximum number of SVCs that are associated with the same
address mapping
The maximum number of virtual circuits to be set up on the same address
mapping can be specified. The X.25 of the 3Com Router series can establish up to
8 virtual circuits on one address mapping. In case of large traffic and low line rate,
this parameter can be increased properly to reduce data loss. By default, one
address mapping is associated with only one virtual circuit.
In the interface view, perform the following commands.
Table 249 Specify/Cancel the maximum number of SVCs associated with the same
address mapping
Operation Command
Specify the maximum number of SVCs x25 vc-per-map count
associated with all address mappings on an
X.25 interface
Specify the maximum number of SVCs x25 map protocol
associated with an address mapping protocol-address
x121-address x.121-address
vc-per-map count
Cancel the maximum number of SVCs undo x25 vc-per-map
associated with all address mappings on an
X.25 interface
Operation Command
Set packet acknowledgment value x25 receive-threshold
packet-count
Cancel packet acknowledgment value undo x25 receive-threshold
Operation Command
Specify CUG (Closed User Group) x25 call-facility
closed-user-group group-number
Or
x25 map protocol protocol-address
x121-address x.121-address
closed-user-group group_number
Cancel CUG number undo x25 call-facility
closed-user-group
Perform flow control parameter negotiation x25 call-facility packet-size
while initiating a call in-size out-size 1
Or
x25 map protocol protocol-address
x121-address x.121-address
packet-size in-size out-size 1
window-size and packet-size options are also supported in x25 pvc command.
However, in x25 pvc command, these two options specify the window size and
maximum packet length of the set PVC. If these two options are not selected in
the x25 pvc command, the set PVC will choose the default value of X.25
interface.
name is the name of the ROA ID list configured by the command x25 roa-list in
the system view, for example:
[Router]x25 roa-list list1 12 34 567
In the serial port view, list1 can be quoted:
[Router-Serial0]x25 call-facility roa-name list1
5 Configure the sending queue length of virtual circuit
The sending and receiving queue lengths of the virtual circuit can be specified for
the X.25 of the 3Com Router series to adapt to different network environments.
The default queue length can contain 500 packets, but if data flow is very large, or
the transmission rate of the X.25 network is low, the queue length can be
increased to avoid unexpected data packet loss.
In the interface view, perform the following tasks to specify the length of virtual
circuit queue.
Table 252 Configure the sending queue length of virtual circuit
Operation Command
Set the length of X.25 virtual circuit queue x25 queue-length
queue-size
Cancel set the length of X.25 virtual circuit queue undo x25 queue-length
Operation Command
Enable to send broadcasting data packets to x25 map protocol
the peer of the SVC associated with this protocol-address
address mapping x121-address x.121-address
broadcast
Enable to send broadcasting data packets to x25 pvc pvc-number protocol
the peer of this PVC protocol-address x121-address
x.121-address broadcast
Operation Command
Inhibit outgoing call through this address x25 map protocol protocol-address
mapping x121-address X.121-address
no-callout
Inhibit incoming call through this address x25 map protocol protocol-address
mapping x121-address X.121-address
no-callin
Operation Command
Set the logical interface number of this address X25 map protocol
mapping in the standby center protocol-address x121-address
x.121-address logic-channel
logical-interface-number
Configure X.25 213
Configure X.25 X.25 sub-interface is a virtual interface with its own protocol address and virtual
Sub-Interface circuit. Multiple sub-interfaces can be created on a physical interface, so the
networks can be interconnected via one physical interface. The sub-interface of
X.25 falls into two types: point-to-point sub-interface, used to connect a single
remote end and point-to-multipoint sub-interface, used to connect multiple
remote ends in the same network segment. All the sub-interfaces under the main
interface and the main interface share a X.121 address.
In the interface view, perform the following task to configure X.25 sub-interface.
Operation Command
Enter X.25 interface interface serial number
Configure X.25 protocol link-protocol x25
Create X.25 sub-interface interface serial
number.subinterface-number{multipoi
nt|point-to-point}
Configure address mapping x25 map protocol protocol-address
Or x121-address x.121-address [option]
or
Configure permanent virtual circuit x25 pvc pvc-number protocol
protocol-address
x121-address x.121-address [option]
X.25 packet switching means to receive packets from one X.25 port, and send
them out from the X.25 port selected according to related destination address
information contained in the packets. X.25 switching enables the 3Com Router
series to perform packet switching function in the packet layer, and to be used as
a small packet switching exchange.
The 3Com Router series provides such X.25 switching functions as follows:
The following describes how to configure X.25 switching tables for PVC and SVC.
214 CHAPTER 16: CONFIGURING LAPB AND X.25
PC
PC
Operation Command
Enable X.25 switching x25 switching
Disable X.25 switching undo x25 switching
Operation Command
Add a PVC route x25 switch pvc number interface
serial port-number pvc number
Delete a PVC route undo x25 switch pvc number
Operation Command
Add an SVC route x25 switch svc x.121-address [ sub-dest
destination-address ] [ sub-source source-address
] interface serial interface-number
Delete an SVC route undo x25 switch svc x.121-address [ sub-dest
destination-address ] [ sub-source source-address
] [ interface serial interface-number ]
X.25 load balancing is provided by DCEs. In order to implement the load balancing
in X.25 networks, a group of DTE/DCE interfaces (synchronous serial interfaces or
XOT Tunnels) need to be configured at the remote DCE on the network as a hunt
group. And it is necessary to allocate an X.121 address to such hunt group. When
other equipment in the network accesses the DTE inside the hunt group, they
need to call the hunt group address. After receiving the call request packets, the
remote DCE will, according to diverse channel selection policies (round-robin or
vc-number), select a line in the hunt group and send the incoming call packets.
Different calls will be allocated to the lines in the hunt group, thus achieving load
balancing.
It should be noted that X.25 hunt group can dynamically select different
transmission lines only in the process of the establishment of virtual circuit call.
Once the whole virtual circuit is established and enters into the stage of data
transmission, hunt group will be ineffective and data transmission will be
processed in accordance with the normal virtual circuit. After being established,
PVC stays at the data transmission stage without the process of call establishment
and call deletion, therefore X.25 load balancing is ineffective on PVC and
functions only on SVC.
Within a single X.25 hunt group, all DTEs hold identical status and have the same
X.121 addresses. The DTEs in a hunt group can call other DTEs outside the hunt
group in a normal mode. When equipment outside the hunt group access the
hunt group, they cannot know which equipment they will access, because the line
selection is controlled by the DCEs configured with hunt group.
DTE addresses in a hunt group may be identical or different to the hunt group
addresses. X.25 hunt group supports the substitutions of source address and
destination address. The function of destination address substitution enables us to
hide the addresses of DTEs inside the hunt group, thus external DTEs only know
the hunt group address, which enforces the security of the internal network of
hunt group. The function of source address substitution can hide the addresses of
DTEs outside a hunt group, therefore internal DTEs can only know the substituted
source address instead of the source address a call is connected to, which protects
subscribers' privacy.
216 CHAPTER 16: CONFIGURING LAPB AND X.25
Remote
User terminal DCE
X.25
packet Server A 9999
switching
User terminal network
QuidwayA
RouterA
Server B 9999
User terminal
X.25 hunt group supports two types of call channel selection policies: round-robin
mode and vc-number mode, but a hunt group can only utilize one type of channel
selection policy.
X.25 hunt group supports synchronous serial interfaces and XOT Tunnels. It can
indiscriminately select the available lines between synchronous serial interfaces
and XOT Tunnels. But XOT Tunnels cannot calculate the number of logical
channels, therefore it cannot be added into a hunt group adopting vc-number
selection policy.
DCE equipment in X.25 networks to provide the function of load balancing for
DTE equipment) then configuration of X.25 load balancing needs to be made on
the routers.
Hunt group addresses do not need separate configuration. Only the destination
addresses need to be set as hunt group addresses on source DTEs.
1 Start X.25 switching
Perform the following configuration in system view.
Table 260 Start /Close X.25 switching function
Operation Command
Start X.25 switching x25 switching
Close X. 25 switching undo x25 switching
Operation Command
Create X.25 hunt group x25 hunt-group hunt-group-name {
round-robin | vc-number }
Delete X.25 hunt group undo x25 hunt-group hunt-group-name
Operation Command
Add interfaces to hunt group channel interface interface-type
interface-number
Delete specified interfaces from hunt undo channel interface
group interface-type interface-number
Add XOT Tunnels to hunt group channel xot ip-address
Delete specified XOT Tunnels from hunt undo channel xot ip-address
group
It should be noted that a hunt group can have ten synchronous serial interfaces or
XOT Tunnels at most. XOT Tunnels cannot be added to the hunt group that adopts
vc-number channel selection policy.
4 Configure X.25 switching route which is forwarded to hunt group
Perform the following configuration in system view.
218 CHAPTER 16: CONFIGURING LAPB AND X.25
Table 263 Add/Delete X.25 switching route whose forwarding address is hunt group
Operation Command
Add an X.25 switching route whose x25 switch svc x.121-address [
forwarding address is hunt group sub-dest destination-address ] [
sub-source source-address ]
hunt-group hunt-group-name
Delete an X.25 switching route whose undo x25 switch svc x.121-address [
forwarding address is hunt group sub-dest destination-address ] [
sub-source source-address ] [
hunt-group hunt-group-name ]
Operation Command
Add an X.25 switching route whose x25 switch svc x.121-address [
forwarding address is interface sub-dest destination-address ] [
sub-source source-address ] interface
serial interface-number
Delete an X.25 switching route whose undo x25 switch svc x.121-address [
forwarding address is interface sub-dest destination-address ] [
sub-source source-address ] [
interface serial interface-number ]
Add an X.25 switching route whose x25 switch svc x.121-address [
forwarding address is XOT Tunnel sub-dest destination-address ] [
sub-source source-address ] xot
ip-address1 [ ip-address2 ] … [
ip-address6 ] [ xot-option ]
Delete an X.25 switching route whose undo x25 switch svc x.121-address [
forwarding address is XOT Tunnel sub-dest destination-address ] [
sub-source source-address ] [ xot
ip-address1 [ ip-address2 ] … [
ip-address6 ] ] [ xot-option ]
X.25 IP X.25
protocol provides reliable data transmission link. Because TCP has the mechanism
of error redirection and window flow controlling to guarantee the reliability of
links, it can be used by X.25. XOT builds a TCP tunnel connection between the
two X.25 networks, and the X.25 packets are supported by TCP as data of
application layer, i.e., TCP serves as the “link layer” of X.25. You can regard the
middle RouterB, RouterC and IP net as a big “X.25 switch”, and data is directly
switched from RouterA to RouterD through this “switch”.
The XOT features implemented in the 3Com Router accords with RFC1613
recommendation, and it possess the following features:
■ Supporting SVC application. The two routers can dynamically set up a SVC by
sending call packet, and the VC will automatically be cleared when no data is
transmitted.
■ Supporting PVC application. After the two routers configure a PVC, they
directly enter the data transmission status without the process of call
establishing. If no data is transmitted, this VC will not be cleared automatically.
■ Supporting the Keepalive attribute of TCP. If Keepalive is not configured, TCP
connection will not be cleared after a long period of time when the line is
disconnected. If Keepalive is configured, TCP check the usability of the links in
time, and it will automatically clear the TCP connection if it does not receive
the answer of the opposite side for certain times.
As shown in the former figure, when it has data to transmit, RouterA first send a
request packet to set up a VC. After RouterB receive the call packet and judges
that it is XOT application, it first set up a TCP connection with RouterC, and then
stick the XOT packet header to X.25 call packet which is encapsulated in TCP
header to send to RouterC. RouterC takes off the TCP and XOT packet headers
and send the call request packet to RouterD through X.25 local switch. After
RouterD receives the call request packet, it answers the call to confirm until the
link is completely set up and enters the data transmission status. To RouterA and
RouterD, the whole process of setting up and applying TCP connection is
transparent, and they do not and cannot care whether the data is forwarded
through IP net or X.25 net.
Configure XOT
XOT configuration includes:
■ Start X.25 switching
■ Configure IP side interface
■ Configure local switching (SVC)
■ Configure XOT route
■ Configure Keepalive and xot-source attributes
■ Start X.25 switching
Because the XOT is the extension of X.25 switch, first you have to start X.25
switch.
Operation Command
Enable X.25 switching x25 switching
Operation Command
Configure X.25 local switching x25 switch svc x.121-address [
sub-dest destination-address ] [
sub-source source-address ] interface
serial interface-number
Delete X.25 local switching undo x25 switch svc x.121-address [
sub-dest destination-address ] [
sub-source source-address ] [
interface serial interface-number ]
Operation Command
Configure a SVC XOT route x25 switch svc x.121-address [
sub-dest destination-address ] [
sub-source source-address ] xot
ip-address1 [ ip-address2 ] … [
ip-address6 ] [ xot-option ]
Delete a SVC XOT route undo x25 switch svc x.121-address [
sub-dest destination-address ] [
sub-source source-address ] [ xot
ip-address1 [ ip-address2 ] … [
ip-address6 ] ] [ xot-option ]
Operation Command
Add a PVC XOT route x25 xot pvc pvc-number ip address
interface type number
Delete a PVC XOT route undo x25 xot pvc pvc-number
Operation Command
Configure SVC Keepalive and x25 switch svc x.121-address [ sub-dest
xot-source attributes destination-address ] [ sub-source
source-address ] xot ip-address1 [
ip-address2 ] … [ ip-address6 ] [
xot-option ]
Configure PVC Keepalive and undo x25 switch svc x.121-address [
xot-source attributes sub-dest destination-address ] [
sub-source source-address ] [ xot
ip-address1 [ ip-address2 ] … [
ip-address6 ] ] [ xot-option ]
This section covers how to make configurations so that Annex G DLCI can be used
to transmit IP data. For the configurations of X.25 switching over Annex G DLCIs,
refer to the subsequent section.
Operation Command
Configure a Frame Relay interface link-protocol fr
Configure an IP address for the interface ip address { A.B.C.D } { A.B.C.D }
Configure a Frame Relay DLCI fr dlci dlci-number
Configure the Frame Relay DLCI to be Annex annexg { dce | dte }
G DLCI
Map the Frame Relay address to the fr map ip { A.B.C.D } {
destination IP address dlci-number }
Annex G DLCI does not support IARP (Inverse Address Resolution Protocol), so the
user should configure a static map between the destination IP address and the
Frame Relay address.
222 CHAPTER 16: CONFIGURING LAPB AND X.25
When configuring an Annex G DLCI, the user must explicitly configure it with the
argument DCE or DTE. In addition, the configurations on the routers of a
connection should not be the same. That is, if a router is configured to work as
DTE, the other router must be configured as DCE.
Operation Command
Create an X.25 template x25 template { name }
Configure the local X.25 address in the X.25 x25 x121-address x.121 address
template
Map the destination X.25 address to the x25 map ip { A.B.C.D } {
destination IP address in the X.25 template x121-address x.121 address }
Configure other LAPB/X.25 parameters in the For details, refer to the
X.25 template LAPB/X.25 configuration commands.
Associate the parameters configured in the x25-template { name }
X.25 template to an Annex G DLCI
Operation Command
Create an X.25 template x25 template name
Delete the X.25 template no x25 template name
Configure the X.25 attributes x25
Restore the X.25 attributes to default settings no x25
Configure the LAPB attributes lapb
Restore the LAPB attributes to default no lapb
settings
Associate the X.25 template with a DLCI x25-template name
Remove the association between the X.25 no x25-template
template and the DLCI
Display and Debug LAPB and X.25 223
Display and Debug In the all views, perform the following tasks to enable real-time monitoring of the
LAPB and X.25 current status of LAPB and X.25.
Table 273 Display and debug LAPB and X.25
Operation Command
Display interface information display interface [ type number ]
Display X.25 alias table display x25 alias-policy
Display X.25 hunt group information display x25 hunt-group-info [
hunt-group-name ]
Display X.25 address mapping table display x25 map
Display X.25 switching route table display x25 switch- vc-table svc
Display X.25 switching virtual circuit table display x25 switch-vc-table pvc
Display X.25 virtual circuit display x25 vc lci-number
Enable X.25 information debugging debugging x25 all [interface
interface-type interface-number ]
Enable X.25 event debugging debugging x25 event [interface
interface-type interface-number ]
Enable X.25 packet debugging debugging x25 packet [interface
interface-type interface-number ]
Enable XOT debugging debugging x25 xot
V.35 cable
Typical X.25
Configuration
Example
Serial0
RouterB
IP: 168.173.24.2
X.121: 30561002
Serial0 X.25
windowsize: 5 5
packetsize: 512 512
RouterA
IP: 168.173.24.1
X.121: 30561001
Serial0
RouterC
PC A PC B
PVC 3 PVC 4
X.25
windowsize: 5 5
packetsize: 512 512
Serial 0 Serial 0
EtherNet A RouterA RouterB EtherNet B
LC 3
RouterA PBX
PBX
LC 3 LC 4
LC 243
PBX RouterB
PBX LC 24
Therefore, the PVC 3 and PVC 4 mentioned above actually refer to the numbers of
the logical channels between the router and the switch directly connected to it.
However, on one side of this virtual circuit, the logical channel number can be
used to identify this virtual circuit without causing misunderstanding. This is why
no strict distinction is made between "virtual circuit" and "logical channel".
S0 S2
S1 RouterD
S0
S0
S0
RouterA
RouterC
RouterB
E0
Router B S0 Router C S0
S0
E0 Router A S0 E0 Router D
PC1
PC2
4 Configure Router C
a Start X.25 switching
[Router]x25 switching
b Configure X.25 local switching
[Router]x25 switch svc 2 interface serial 0
c Configure XOT switching
[Router]x25 switch svc 1 xot 10.1.1.1
d Configure Ethernet 0
[Router]interface ethernet 0
[Router-Ethernet0]ip address 10.1.1.2 255.0.0.0
e Configure Serial 0
[Router-Ethernet0]interface serial 0
[Router-Serial0]link-protocol x25 dce ietf
E0
E0
S0
Router B Router C S0
S0
E0 S0 E0
Router D
Router A
PC1
PC2
[Router-Serial0]x25 x121-address 2
[Router-Serial0]x25 x25 vc-range in-channel 10 20 bi-channel 30 1024
[Router-Serial0]x25 pvc 1 ip 1.1.1.1 x121-address 1
[Router-Serial0]ip address 1.1.1.2 255.0.0.0
3 Configure Router B
a Start X.25 switching
[Router]x25 switching
b Configure Ethernet 0
[Router]interface ethernet 0
[Router-Ethernet0]ip address 10.1.1.1 255.0.0.0
c Configure Serial 0
[Router-Ethernet0]interface serial 0
[Router-Serial0]link-protocol x25 dce ietf
[Router-Serial0]x25 x25 vc-range in-channel 10 20 bi-channel 30 1024
[Router-Serial0]x25 xot pvc 1 10.1.1.2 interface serial 0 pvc 1
4 Configure Router C
a Start X.25 switching
[Router]x25 switching
b Configure Ethernet 0
[Router]interface ethernet 0
[Router-Ethernet0]ip address 10.1.1.2 255.0.0.0
c Configure Serial 0.
[Router-Ethernet0]interface serial 0
[Router-Serial0]link-protocol x25 dce ietf
[Router-Serial0]x25 vc-range in-channel 10 20 bi-channel 30 1024
[Router-Serial0]x25 xot pvc 1 10.1.1.1 interface serial 0 pvc 1
QuidwayD
RouterD QuidwayE
RouterE
X.25 Terminal
[Router]interface serial 0
[Router-Serial0]link-protocol x25 dte
[Router-Serial0]x25 x121-address 8888
The configurations of RouterC and RouterE are identical with the configuration of
RouterB
3 Configure RouterD
a Configure link layer protocol of interface Serial 0 to X.25 and specify it to
operate in DCE mode.
[Router]interface serial 0
[Router-Serial0]link-protocol x25 dce
b Configure IP addresses on interface Ethernet 0.
[Router]interface ethernet 0
[Router-Ethernet0]ip address 10.1.1.2 255.255.255.0
c Enable X.25 switching in system view.
[Router]x25 switching
d Configure X.25 switching route whose forwarding address is XOT Tunnel.
[Router]x25 switch svc 1111 xot 10.1.1.1
e Configure X.25 switching route that is forwarded to router RouterE
[Router]x25 switch svc 8888 interface serial 0
Note that you must configure a virtual IP address and two static routes on
interface Serial 1 to deceive the router because two lines connected to the same
peer exist in router RouterC. Thus load balancing can be achieved because router
RouterC will deem that there are two routes connected to network segment
10.1.1.0.
1 Configure RouterA
a Configure interface Ethernet 0.
[Router]interface ethernet 0
[Router-Ethernet0]ip address 10.1.1.1 255.255.255.0
b Configure interface Serial 0.
[Router]interface serial 0
[Router-Serial0]link-protocol x25 dte
[Router-Serial0]x25 x121-address 1111
[Router-Serial0]ip address 1.1.1.1 255.255.255.0
[Router-Serial0]x25 map ip 1.1.1.3 x121-address 3333
[Router-Serial0]x25 vc-per-map 2
c Configure static route to RouterC.
[Router]ip route-static 10.3.1.0 24 1.1.1.3
2 Configure RouterB
a Configure interface Ethernet 0.
[Router]interface ethernet 0
[Router-Ethernet0]ip address 10.2.1.1 255.255.255.0
b Configure interface Serial 0.
[Router]interface serial 0
[Router-Serial0]link-protocol x25 dte
[Router-Serial0]x25 x121-address 2222
[Router-Serial0]ip address 1.1.1.2 255.255.255.0
[Router-Serial0]x25 map ip 1.1.1.3 x121-address 3333
[Router-Serial0]x25 vc-per-map 2
c Configure static route to RouterC.
[Router]ip route-static 10.3.1.0 24 1.1.1.3
Configure router RouterC
d Configure interface Ethernet 0.
[Router]interface ethernet 0
[Router-Ethernet0]ip address 10.3.1.1 255.255.255.0
e Configure interface Serial 0.
[Router]interface serial 0
[Router-Serial0]link-protocol x25 dte
[Router-Serial0]x25 x121-address 3333
[Router-Serial0]ip address 1.1.1.3 255.255.255.0
[Router-Serial0]x25 map ip 1.1.1.1 x121-address 1111
[Router-Serial0]x25 map ip 2.1.1.1 x121-address 1111
[Router-Serial0]x25 map ip 1.1.1.2 x121-address 2222
[Router-Serial0]x25 map ip 2.1.1.2 x121-address 2222
f Configure interface Serial 1.
[Router]interface serial 1
[Router-Serial1]link-protocol x25 dte
236 CHAPTER 16: CONFIGURING LAPB AND X.25
DLCI=100
[Router-fr-dlci-100]x25-template profile1
[Router-fr-dlci-100]quit
i Map the Frame Relay address to the destination IP address.
[Router-Serial1]fr map ip 202.38.163.252 100
2 Configure RouterB:
a Create an X.25 template.
[Router]x25 template profile1
b Configure the local X.25 address.
[Router-x25-profile1]x25 x121-address 20094
c Map the destination X.25 address to the destination IP address.
[Router-x25-profile1]x25 map ip 202.38.163.251 x121-address 10094
[Router-x25-profile1]quit
d Configure an IP address for the local interface.
[Router]interface serial 1
[Router-Serial1]ip address 202.38.163.252 255.255.255.0
e Configure the link layer protocol of the interface to Frame Relay.
[Router-Serial1]link-protocol fr
[Router-Serial1]fr interface-type dte
f Configure a Frame Relay DLCI.
[Router-Serial1]fr dlci 100
g Configure the DLCI to be Annex G DLCI.
[Router-fr-dlci-100]annexg dte
h Associates an X.25 template with the DLCI.
[Router-fr-dlci-100]x25-template profile1
[Router-fr-dlci-100]quit
i Map the Frame Relay address to the destination IP address.
[Router-Serial1]fr map ip 202.38.163.251 100
Figure 78 Networking for the SVC application of X.25 over Frame Relay
DLCI100
S1 S1
S0 S0
Router B Router C
S0 S0
E0 Router A E0 Router D
PC1 PC2
Figure 79 Networking for the PVC application of X.25 over Frame Relay
DLCI100
S1 S1
S0 S0
Router B Router C
S0 S0
E0 E0
Router A Router D
PC1 PC2
[Router-Serial0]x25 x121-address 1
[Router-Serial0]x25 vc-range in-channel 10 20 bi-channel 30 1024
[Router-Serial0]x25 pvc 1 ip 1.1.1.2 x121-address 2
[Router-Serial0]ip address 1.1.1.1 255.0.0.0
2 Configure Router D:
a Configure the basic X.25 parameters.
[Router]interface serial 0
[Router-Serial0]link-protocol x25 dte ietf
[Router-Serial0]x25 x121-address 2
[Router-Serial0]x25 vc-range in-channel 10 20 bi-channel 30 1024
[Router-Serial0]x25 pvc 1 ip 1.1.1.1 x121-address 1
[Router-Serial0]ip address 1.1.1.2 255.0.0.0
3 Configure Router B:
a Enable X.25 switching.
[Router]x25 switching
b Enable switching on Frame Relay DCE.
[Router]fr switching
c Configure Serial 0 as the X.25 interface.
[Router]interface serial 0
[Router-Serial0]link-protocol x25 dce ietf
[Router-Serial0]x25 vc-range in-channel 10 20 bi-channel 30 1024
d Configure an X.25 template.
[Router]x25 template profile1
[Router-x25-profile1]x25 vc-range in-channel 10 20 bi-channel 30
1024
[Router-x25-profile1]x25 pvc 1 interface serial 0 pvc 1
e Configure S1 as the Frame Relay interface.
[Router]interface serial 1
[Router-Serial1]link-protocol fr
[Router-Serial1]fr interface-type dce
f Configure a Frame Relay Annex G DLCI.
[Router-Serial1]fr dlci 100
[Router-fr-dlci-100]annexg dce
g Apply the X.25 template to Annex G DLCI 100 (which is equivalent to
configure X.25 attributes for the Annex G DLCI).
[Router-fr-dlci-100]x25-template profile1
4 Configure Router C:
a Enable X.25 switching.
[Router]x25 switching
b Configure Serial 0.
[Router]interface serial 0
[Router-Serial0]link-protocol x25 dce ietf
[Router-Serial0]x25 vc-range in-channel 10 20 bi-channel 30 1024
c Configure an X.25 template.
[Router]x25 template profile1
Fault Diagnosis and Troubleshooting of LAPB 241
Fault Diagnosis and Fault 1: Two connected sides use X.25 link layer protocol (or LAPB), but the
Troubleshooting of protocol is always disconnected. Turn on the debugging switch. It is found
LAPB that one end sends SABM frame, while the other end sends FRMR frame
circularly.
Troubleshooting: this is because both sides worked in the same working mode
(DTE or DCE). Change the working mode of one side to solve the problem.
Fault 2: Two connected sides use X.25 link layer protocol, and the protocol
is already in UP status, but cannot ping through the peer. Turn on the
debugging switch and it is found that the received frames are discarded
on one end instead of being forwarded up to the packet layer.
Troubleshooting: The maximum frame bits of this end may be too small. Change
the configuration.
Fault Diagnosis and This section describes some common faults and the troubleshooting methods.
Troubleshooting of
X.25 Assuming that the connection of the X.25 layer 2 (LAPB) is completely correct.
Fault 1: LAPB is already in "Connect" status, but the X.25 protocol can not
enter "UP" status.
Troubleshooting: It is possible that the local working mode has been configured
wrong, for example, both sides of a connection are DTE or DCE. Try again after
changing the interface working mode.
Fault 2: X.25 protocol is "UP", but virtual circuit can not be established, i.e.,
unable to ping through.
This may be caused by one of the following:
■ Local X.121 address not configured
■ Address mapping to the peer not configured
■ Opposite X.121 address not configured
■ Address mapping from peer to local not configured
■ Channel range not correct
242 CHAPTER 16: CONFIGURING LAPB AND X.25
Fault 7: Annex G DLCI is used for interconnection, the link layer protocol is
up, and DLCI has been in place after negotiation. However, the remote end
cannot be pinged.
Troubleshooting:
■ Check whether the X.25 protocol is up at both ends of the Annex G DLCI by
using the display fr pvc-info command. Both the Frame Relay interface
and DLCI number should be explicitly specified in the command.
■ Check whether the proper map between the Frame Relay address and the
destination IP address has been configured on the router at each ends.
■ Check whether the proper X.25 template has been configured for the Annex G
DLCI on each ends, and whether the local X.121 address has been correctly
mapped to the X.25 address for the destination IP address on each ends.
■ Check whether X.25 SVC has been correctly set up by executing the display
x25 vc command.
Fault Diagnosis and Troubleshooting of X.25 243
■ If receiving the ping packet forwarded from the router at one end, check
whether the returning route has been configured in the routing table. In
addition, if the destination IP address for returning the packets is different from
that configured in the Frame Relay address map and X.25 address map, you
need to reconfigure the maps.
■ If multiple X.25 address maps for reaching the same destination X.121 address
have been configured in an X.25 template, check whether the x25
vc-per-map command has been configured so that multiple X.25 SVC calls
can be placed with the same X.25 address map. Use the debugging x25
command to debug the X.25 protocol.
244 CHAPTER 16: CONFIGURING LAPB AND X.25
17 CONFIGURING FRAME RELAY
Frame Relay Protocol Frame Relay protocol is a fast-packaging switching technology, which develops on
Overview the basis of X.25 technology. Compared with X.25 protocol, Frame Relay only
implements the core function of the link layer, easily and efficiently.
Virtual circuits can be divided into permanent virtual circuit and switching virtual
circuit, according to their different configuration method. Virtual circuits
configured manually are called Permanent virtual circuits (PVCs), and those created
by protocol negotiation are called switching virtual circuits (SVCs), which are
automatically created and deleted by Inverse ARP protocol. At present, the most
frequently used in Frame Relay is the permanent virtual circuit mode, i.e., manually
configured virtual circuit.
In the permanent virtual circuit mode, test the availability of the virtual circuit,
which is accomplished by the local management interface (LMI) protocol. The
3Com Router supports three LMI protocols: LMI complying with ITU-T Q.933
Appendix A, LMI complying with ANSI T1.617 Appendix D and non-standard LMI.
Their basic function is: DTE sends one Status Enquiry packet to query the virtual
circuit status at certain interval, after the DCE receives the packet, it will
immediately use the Status packet to inform DTE the status of all the virtual
circuits on current interface.
Operation Command
Configure the link layer protocol of interface to Frame link-protocol fr [ ietf |
Relay nonstandard ]
The Frame Relay interface can send the packet in either of the Frame Relay
formats, while it can recognize and receive packets in both formats. That is, even if
the format of Frame Relay of opposite equipment is different from that of the
local, the equipment at the two ends can communicate with each other as long as
the opposite equipment can recognize the two formats automatically. But when
the opposite equipment can not recognize the two formats automatically, the
Frame Relays of equipment at the two ends must be set to the same format.
2 Configure Frame Relay Terminal Type
In Frame Relay, the two sides in communication are classified into user side and
network side. The user side is called DTE, and the network side is called DCE. The
equipment response interface should be configured as DTE or DCE format
according to its location in the network. In Frame Relay networks,
Network-to-Network Interface (NNI) is used between the Frame Relay switches.
In the interface view, perform the following task to configure the type of Frame
Relay interface as DTE, DCE or NNI.
Table 275 Configure Frame Relay interface type
Operation Command
Configure Frame Relay interface type fr interface-type { dte |
dce | nni }
Restore the Frame Relay interface type to the default value undo fr interface-type
Operation Command
Configure Frame Relay LMI protocol type fr lmi type { ansi |
nonstandard | q933a } [
bi-direction ]
Restore the Frame Relay interface LMI protocol type to undo fr lmi type
default.
248 CHAPTER 17: CONFIGURING FRAME RELAY
When the Frame Relay interface type is DCE or NNI, the default type of LMI
protocol of interface is Q933a. When the Frame Relay interface type is DTE, the
default LMI protocol of interface is null.
4 Configure the Related Parameters of Frame Relay LMI Protocol
The procedure of the LMI protocol is as follow:
■ DTE sends out a status enquiry message, and the timer T391 starts. T391 is set
with the polling interval. In other words, DTE will send a status enquiry
message at each interval of T391. Simultaneously, the counter V391 at the DTE
side will start. If V391 < N391, The status enquiry message sent by DTE will
only inquire the “link integrity”. If V391 = N391, it will clear all. In this case,
besides inquiring the “link integrity”, the status enquiry sent by DTE will inquire
the statuses of all the PVCs, which is called “Full Status Message Polling”.
■ Upon receiving the enquiry message, DCE respond to the status enquiry
message by sending the status message. Simultaneously, the polling
authentication timer T392 at the DCE side starts, and DCE waits for the next
status enquiry message. Upon the timeout of T392, if DCE receives no status
enquiry messages, it will record this error and add 1 to the number of errors.
■ Upon receiving the status response message, DTE knows the link status and
PVC status. When DCE responds to the status enquiry message, it should
respond the status message of all the PVCs if the PVC status on the network
changes or there is PVC added or deleted, irrespective of DTE inquires for the
PVC status or not,. Thereby, DTE can know the changes on DCE side, and
update the record based on that information.
■ If the timer T391 times out, but no status message is received yet at the DTE
side to respond to that, this event error will be recorded and 1 will be added to
the number of errors.
■ If the number of errors in N393 events exceeds N392, DTE or DCE will assume
that the path is usable but all the virtual circuits are unusable. N393 represents
the total number of observed events, and N392 represents the error threshold.
You can configure the various counters and thresholds of the frame relay LMI
protocol, to optimize the running efficiency of equipment at the DTE and DCE
sides.
Perform the following configurations in synchronous interface view.
Table 277 Configure the related parameters of Frame Relay LMI protocol
Operation Command
Set the counter on PVC status enquiry messages fr lmi n391dte [ n391-value ]
(N391 DTE)
Restore the default value of the counter on the undo fr lmi-n391dte
PVC status enquiry messages
Set the LMI error threshold (N392 DCE) fr lmi n392dce [ n392-value ]
Restore the default value of the LMI error undo fr lmi n392dce
threshold
Set the LMI error threshold (N392 DTE) fr lmi n392dte [ n392-value ]
Restore the default value of the LMI error undo fr lmi n392dte
threshold
Set the LMI event counter (N393 DTE) fr lmi n393dte [ n393-value ]
Restore the default value of the LMI event undo fr lmi n393dte
counter
Set the LMI event counter (N393 DCE) fr lmi n393dce [ n393-value ]
Configure Frame Relay 249
Restore the default value of the LMI event undo fr lmi n393dce
counter
Set the link integrity polling timer at the user side fr lmi t391dte [ t391-value ]
(T391 DTE)
Restore the default value of the link integrity undo fr lmi t391dte
polling timer at the user side
Set the polling timer at the network side (T392 fr lmi t392dce [ t392-value ]
DCE)
Restore the default value of the polling timer at undo fr lmi t392dce
the network side
The following table describes the value ranges and default values of related
parameters of the Frame Relay LMI protocol
Table 278 Descriptions of related parameters of Frame Relay LMI protocol
Operation
mode Parameter description Value range Default value
DTE Link integrity polling timer (T391) 5 to 30 seconds 10 seconds
When T391 = 0, it indicates that the
LMI protocol is disabled.
Counter on the PVC full status 1 to 255 times 6 times
message polling requests (N391)
Error threshold counter at the user 1 to 10 times 3 times
side (N392)
Event counter at the user side (N393) 1 to 10 times 4 times
DCE Polling authentication timer at the 5 to 30 seconds 15 seconds
network side (T392)
Error threshold counter at the 1 to 10 times 3 times
network side (N392)
Event counter at the network side 1 to 10 times 4 times
(N393)
N392, the DTE equipment will assume that the number of errors reaches the
threshold, and will regard the physical path and all the virtual circuits as unusable.
The parameters at the DCE side include:
■ T392DCE: Define the longest duration for the DCE equipment to wait for a
status enquiry message. It should be larger than T391.
■ N392DCE: The threshold for the errors that can occur in the total number of
observed events at the DCE side.
■ N393DCE: The total number of observed events at the DCE side.
It should be noted that N392 should be no larger than N393 and T391DTE should
be smaller than its peer T392DCE.
5 Configure Frame Relay Address Mapping
Frame Relay address mapping means to establish the mapping between the peer
protocol address and the local DLCI. Address mapping of Frame Relay can either
be configured statically or set up dynamically.
a Configure Frame Relay static address mapping
Static configuration means the manual setup of the mapping relation between
the peer protocol address and local DLCI, and is usually applied when there are
few peer hosts or there is a default route.
In interface view, perform the following task to configure the Frame Relay
static address mapping.
Table 279 Configure Frame Relay static address mapping
Operation Command
Add a static address mapping fr map { ip | ipx } protocol-address dlci
dlci [ broadcast ] [ nonstandard | ietf ]
[ logic-channel channel_number ] [
nocompress | compression vj ] [
compression frf9 ]
Delete a static address mapping undo fr map { ip | ipx } protocol-address
dlci dlci
Operation Command
Enable dynamic address mapping fr inarp [ { ip | ipx } [ dlci ] ]
Disable dynamic address mapping undo fr inarp [ { ip | ipx } [ dlci ] ]
The map created through the dynamic inverse ARP has broadcast attribute.
6 Configure Frame Relay Local Virtual Circuit Number
Perform the following configurations in synchronous serial interface view.
Table 281 Configure Frame Relay local virtual circuit number
Operation Command
Assign a virtual circuit number to Frame Relay interface fr dlci dlci-number
Remove the virtual circuit number of Frame Relay undo fr dlci dlci-number
interface
After entering the DLCI view through the fr dlci command, the user can
configure the parameters associated with this virtual circuit, such as Frame Relay
class.
The virtual circuit number is valid locally, that is, the virtual circuit numbers on both
ends of the link can be the same. Different interfaces can be assigned with the
same virtual circuit number, but the virtual circuit number must be unique on one
physical interface.
When the Frame Relay interface type is DCE or NNI, the interface (either main
interface or sub-interface) should be configured manully with virtual circuits.
When the Frame Relay interface type is DTE, for the main interface, the system will
determine the virtual circuit automatically according to the opposite equipment;
the sub-interface must be configured with virtual circuits manually.
7 Configure Frame Relay Sub-Interface
The Frame Relay interface is a kind of NBMA (Non-Broadcast Multi-Access)
interface, which supports sub-interfaces. The Frame Relay module has two types
of interfaces: main interface and sub-interface. The sub-interface is logical
interface and can be used to configure protocol address and virtual circuit. One
physical interface can include multiple sub-interfaces, which do not exist
physically. However, for the network layer, both the sub-interface and main
interface can be used to configure the virtual circuit to connect to remote
equipment.
The sub-interfaces of Frame Relay fall into two types: point-to-point sub-interface,
used to connect a single remote object and point-to-multipoint sub-interface,
used to connect multiple remote objects in the same network segment.
The address mapping relation between the frame-relay sub-interfaces can be
configured manually, or dynamically established by using the inverse ARP. For a
point-to-point sub-interface, you only need configure one PVC on this
sub-interface, since there is only one peer device. For a point-to-multipoint
sub-interface, you can configure multiple PVCs. Each PVC can establish the
address mapping with its connected peer through running the inverse dynamic
ARP. Thereby, different PVCs can reach their peers without confusing.
Alternatively, you can respectively establish different static address mapping for
these PVCs.
a Creating Frame Relay Sub-Interface
In the interface view, perform the following task to create a sub-interface.
Table 282 Create Frame Relay sub-interface
Operation Command
Enter interface view interface type number
252 CHAPTER 17: CONFIGURING FRAME RELAY
Operation Command
Configure a virtual circuit fr dlci dlci-number
Remove a virtual circuit undo fr dlci dlci-number
Operation Command
Establish address mapping fr map { ip | ipx }
protocol-address dlci dlci [
broadcast ] [ nonstandard | ietf ]
[ logic-channel channel_number ] [
nocompress | compression vj ] [
compression frf9 ]
Delete an address mapping undo fr map { ip | ipx }
protocol-address dlci dlci
Operation Command
Enable dynamic address mapping fr inarp [ { ip | ipx } [ dlci ] ]
Disable dynamic address mapping undo fr inarp [ { ip | ipx } [ dlci
] ]
Operation Command
Enable the Frame Relay to carry out PVC fr switching
switching
Disable the Frame Relay to carry out PVC undo fr switching
switching
Set the Frame Relay interface type fr interface-type { dte | dce |
nni }
Operation Command
Assign a PVC number for Frame Relay interface fr dlci dlci-number
Delete the PVC number of Frame Relay interface undo fr dlci dlci-number
Operation Command
Configure the route for Frame Relay PVC fr dlci-switch in-dlci
switching interface type number dlci
out-dlci
Delete the route for Frame Relay PVC switching undo fr dlci-switch in-dlci
Operation Command
Assign a switched PVC number for the main fr dlci dlci-number
interface or the sub-interface
Delete the switched PVC number for the main undo fr dlci dlci-number
interface or the sub-interface
Operation Command
Configure the Frame Relay switched PVC fr switch name interface type
number dlci dlci interface type
number dlci dlci
Delete the Frame Relay switched PVC undo fr switch name
254 CHAPTER 17: CONFIGURING FRAME RELAY
1) A Frame Relay switched route can become valid only when it is configured on
the two Frame Relay switched interfaces, whereas a Frame Relay switched PVC can
become valid as soon as it is configured in system view for once.
2) After the Frame Relay switched PVC is configured, the user will enter the frame
relay switch view. At this time, the user can perform the operations of shutdown
and undo shutdown on the switched PVC. However, the user cannot do that on a
Frame Relay switched route.
The virtual Frame Relay interface is called “Bundle”, and the physical interfaces
contained in the virtual interface is called “bundle link”. As for an actual physical
layer, bundle link is equal to an analog data link layer, and bundle manages all the
bundle links. As for data link layer, bundle is analog physical layer.
Bundle Bundle
Bundle Link
Bundle Link
Bundle
On the Router Routers, the virtual Frame Relay interface is called “MFR interface”.
One MFR interface corresponds to one bundle, and one physical interface
corresponds to a bundle ink. The management performed on the bundle and
bundle link is actually the management to the MFR interface and the physical
interface.
After the Frame Relay physical interface is bundle to an MFR interface, the
network layer parameters and Frame Relay link layer parameters configured on it
Configure Frame Relay 255
will not take effect. On the MFR interface, you can configure the network layer
parameters (e.g., IP address) and Frame Relay parameters (e.g., DLCI). The physical
interface bundled on the MFR interface will use the parameters on the MFR
interface.
Configure MFR
The configuration tasks of the MFR are listed as follows:
■ Configure a MFR Bundle
■ Configure a MFR Bundle Link
1 Configure a MFR bundle
Please perform the following configuration in system view.
Table 291 Configure a MFR bundle interface (MFR interface)
Operation Command
Configure or enter a MFR bundle interface interface mfr number [
.subnumber ] [ multipoint |
point-to-point ]
Remove a MFR bundle interface undo interface mfr number [
.subnumber ]
Operation Command
configure bundle identification mfr bundle-name name
Restore the default bundle identification undo mfr bundle-name
Set the maximum number of the fragments mfr window-size number
allowed by the MFR interface.
The default bundle identification s “mfr” plus the bundle number, for example,
“mfr1.
By default, the maximum number of the fragments allowed by the MFR interface
is the same with the number of the physical interfaces bundled to it.
By default, the voice packets are sent on the multiple physical interfaces bundled
to the MFR interface by turns.
2 Configure a MFR bundle link
Please perform the following configuration in synchronous serial interface view.
Table 293 Configure physical interface's link layer protocol to Multilink Frame Relay
Operation Command
Configure physical interface's link layer protocol to link-protocol fr mfr number [
Multilink Frame Relay and associate the link with a name ]
bundle.
By default, no MFR bundle link is created. To remove the association between the
physical interface and the MFR interface, configure the interface's link layer
protocol to a none MFR type using the link-protocol command.
Please perform the following configuration in synchronous serial interface view.
256 CHAPTER 17: CONFIGURING FRAME RELAY
Operation Command
configure link identification of the multilink Frame relay mfr link-name name
bundle link
Restore the default link identification undo mfr link-name
Set the time interval for the bundle link to send Hello mfr timer hello seconds
messages
Restore the default of the time interval for the bundle undo mfr timer hello
link to send Hello messages
Set the number of times that the Frame Relay bundle mfr retry number
link waits for the acknowledge timer to time out
successively
Restore the default value of the number of times that undo mfr retry
the Frame Relay bundle link waits for the acknowledge
timer to time out successively
Set the time that the Frame Relay bundle link waits for mfr timer ack seconds
the remote end to acknowledge the Hello message
Restore the default number of the time that the Frame undo mfr timer ack
Relay bundle link waits for the remote end to
acknowledge the Hello message
The 3Com Routers adopt FRF.9 standard to implement Frame Relay payload
compression. When applied to the Frame Relay lines with relatively low
bandwidth, Frame Relay payload compression can achieve significant effect.
Compression Command
Enable Frame Relay compression fr compression frf9
Disable Frame Relay compression undo fr compression frf9
Operation Command
Create a Frame Relay map, and enable Frame Relay fr map { ip | ipx }
compression on the DLCI protocol-address dlci dlci
compression frf9
Delete the Frame Relay map, and disable Frame undo fr map { ip | ipx }
Relay compression protocol-address dlci dlci
Enable/Disable TCP/IP Frame Relay supports TCP/IP header compression. Only when the packet format of
Header Compression on Frame Relay interface is nonstandard, can TCP/IP header compression be
Interfaces executed. TCP/IP header compression can be designated both on the interface and
on configuring static address mapping.
Operation Command
Enable TCP/IP Header Compression on Interfaces fr compression vj [ passive ]
Disable TCP/IP Header Compression on Interfaces undo fr compression vj
Operation Command
Create a Frame Relay class fr class class-name
Delete a Frame Relay class undo fr class class-name
Configure the Frame Relay fragment size fragment fragment-size {
data-level | voice-level }
Disable Frame Relay fragmentation undo fragment [ fragment-size {
data-level | voice-level } ]
Associate a Frame Relay class with a Frame fr-class class-name
Relay interface or PVC
258 CHAPTER 17: CONFIGURING FRAME RELAY
Configure Frame Relay Quality of Service (QoS) is a set of technologies adopted to meet the users'
QoS requirements in throughput, delay jitter, delay and packet loss ratio. Briefly
speaking, QoS technologies provides network services of different qualities for
different requirements.
On a Frame Relay interface, the user can use the general QoS to provide the
services, such as traffic policing, traffic shaping, congestion management, and
congestion avoidance. For details, please refer to the relative description in the
part of QoS.
Furthermore, a Frame Relay network has its own QoS mechanisms, including
Frame Relay traffic shaping, Frame Relay traffic policing, Frame Relay congestion
management, Frame Relay discard eligibility (DE) rule list and Frame Relay
queueing management. According to different requirements, the network service
provider can provide various services, such as bandwidth restriction and
bandwidth reservation.
Compared with the general QoS, Frame Relay QoS can provide the service of QoS
for each PVC on an interface. However, the general QoS can only provide the
service of QoS on the whole interface. Therefore, the Frame Relay QoS can provide
more flexible quality services for users.
DTE
NNI Frame Relay
DCE Network
Router A Router B
DE Rule Congestion
Management
In a Frame Relay network, the bottleneck will often occur at the boundary of
segments if the bandwidths of different segments do not match. As shown in
Figure 82, Router B transmits packets to Router A at the rate of 128 kbps whereas
the maximum interface rate of Router A is only 64 kbps. In this case, the
bottleneck will occur at the place where Router A is connected to the Frame Relay
network, and thereby resulting in the congestion that prevents the data from
normal transmitting.
Configure Frame Relay QoS 259
S0 Frame-relay network S0
Router B Router A
DTE DTE
CIR ALLOW = 64kbps
CIR = 32kbps
If the Frame Relay traffic shaping is applied on the outgoing interface Serial 0 on
Router B, the interface will be able to transmit packets at 64 kbps, a relatively
average rate, so as to avoid the network congestion. Even if the congestion occurs
to the network, Router B can still transmit packets at 32 kbps.
Frame Relay traffic shaping is applied on the outgoing interface on a router. It can
provide for the users the parameters like Committed Information Rate Allowed
(CIR ALLOW), Committed Information Rate (CIR), Committed Burst Size (CBS) and
Excess Burst Size (EBS).
When the network is in normal, the Frame Relay PVCs can transmit packets at the
rate of CIR ALLOW. In this case, the packet traffic transmitted at an interval of Tc is
CBS. Furthermore, the Frame Relay traffic shaping allows the PVCs to transmit
packets at a rate exceeding CIR ALLOW in case of the burst, and the traffic
exceeding the CBS can be EBS at maximum.
When the network congestion occurs, if the Frame Relay switch device has been
configured with the function of congestion management, it will notify the router
of network congestion. Upon receiving the notification, the router will eventually
slow down the transmit rate to the CIR, so as to ease the congestion, then users
can transmit data at the rate of CIR. After this, if no notifications of network
congestion are received within a certain period of time, the router will eventually
raise the transmit rate from the CIR back to the CIR ALLOW.
CI R ALLOW£
º 64 kbps
CI R£
º 32 kbps
0s 1s 2s 3s 4s 5s 6s TI ME
As shown in Figure 83, the parameters of Frame Relay traffic shaping are
respectively set to be: CIR ALLOW= 64 kbps, CIR = 32 kbps, CBS = 64000 bit, EBS
= 64000 bit, and interval Tc = CBS / CIR ALLOW = 1s. Within the first interval Tc,
the PVC-transmitting burst traffic size equals to CBS+EBS. Beginning from the
second Tc, the transmitted traffic size within each interval Tc becomes CBS. At the
3s, the router receives the Frame Relay packet whose backward explicit congestion
260 CHAPTER 17: CONFIGURING FRAME RELAY
notification (BECN) flag bit is 1, indicating that the congestion has occurred to the
network, and the transmit rate of the PVC will be lowered to CIR.
Besides the Frame Relay PVC queues, the Frame Relay interface also owns an
interface queue. In the case that the Frame Relay traffic shaping is not enabled,
there will only be the Frame Relay interface queue. After it is enabled, both Frame
Relay PVC queues and the Frame Relay interface queue will exist. Their relations
are illustrated in Frame Relay queueing.
Interface queue
The Frame Relay PVC queueing types include FIFO (First-In First-Out Queueing), PQ
(Priority Queueing), CQ (Custom Queueing), and WFQ (Weighted Fair Queueing).
The FIFO, PQ, CQ, WFQ, and PIPQ (PVC Interface Priority Queueing) queues can be
used on a Frame Relay interface. Among them, FIFO, PQ, CQ, and WFQ queues
are general queues. For the detailed introduction, refer to the part of QoS. PIPQ
can only be applied on the Frame Relay interface. It is similar to PQ, but aiming at
the PVCs on an interface. When the Frame Relay traffic shaping is enabled on an
interface, the queueing type on the interface can only be either FIFO or PIPQ.
PIPQ is applied on a Frame Relay interface. There are four types of PIPQ: top,
middle, normal and bottom. Their queueing priorities are listed in descending
order. The packets on the same PVC can only enter one type of PIPQ queue, and
the packets on different PVCs enter different PIPQ queues on the interface,
depending on the priorities of the PVCs. The PIPQ transmitting policy is as follows:
Based on the queueing priority, transmit the packets in the queue with low priority
after those in the queue with high priority are transmitted.
As shown in the above figure, Router A at the user side transmits packets at 192
kbps to Router B at the switching side. However, Router B only wants to provide
the 64 kbps bandwidth for Router A. In this case, you need to configure the Frame
Relay traffic policing at the DCE side of Router B.
Frame Relay traffic policing can only be applied on the DCE interface on a router. It
can monitor the traffic transmitted from the DTE side. When the traffic size is
smaller than CBS, the packets can be normally transmitted, and the router will not
process the packets. When the traffic size is larger than CBS and smaller than EBS
+ CBS, the packets can be normally transmitted. In this case, however, as for those
packets in the traffic exceeding CBS, the router will mark the flag bit of DE in the
Frame Relay packet headers to 1. When the traffic size is larger than CBS + EBS,
the router will transmit the traffic within CBS + EBS, and discard the traffic
exceeding CBS + EBS. As for the traffic of EBS which is the size exceeding CBS, the
router will mark the flag bit of DE in the Frame Relay packet headers to 1.
150 Kbps
CI R ALLOW+EI Rº£ 128 Kbps
Discarded
100 Kbps
DE
CI R ALLOW£
º 64 Kbps
Transmit
As shown in the above figure, the parameters of Frame Relay traffic policing are
respectively set to be: CIR ALLOW = 64 kbps, CBS = 64000 bit, EBS = 64000 bit,
and interval Tc = CBS / CIR ALLOW = 1s. When the interval is in the range of 0 to
2s, DTE will transmit packets to DCE at 64 kbps and DCE will normally forward
these packets at 64 kbps. When the interval is in the range of 2 to 4ms, DTE will
transmit packets at 100 kbps, and DCE will forward them at 100 kbps. In this case,
however, the flag bit of DE in the headers of packets exceeding CBS will be set to
1. After 4 seconds, DTE will transmit the packets to DCE at 150 kbps, and DCE will
forward them at 128 kbps. As for the packets exceeding CBS but within CBS +
EBS, the flag bit of DE in their headers will be set to 1, and the packets exceeding
CBS + EBS will be discarded directly.
262 CHAPTER 17: CONFIGURING FRAME RELAY
Configure Frame Relay The 3Com Router system integrates the QoS on Frame Relay PVCs into Frame
class Relay class. Thereby, it provides a flexible overall solution to Frame Relay traffic
control and quality service. Before configuring the QoS such as Frame Relay traffic
shaping, you need to create a Frame Relay class, and configure various QoS
parameters on it. Such a Frame Relay class equals to a set of QoS network service
solution. Then, the user can associate it with a Frame Relay PVC. It is equivalent to
applying a set of QoS scheme to the Frame Relay PVC. Different PVCs can use
different Frame Relay classes as well as a single Frame Relay class.
Operation Command
Create a Frame Relay class fr class class-name
Delete a Frame Relay class undo fr class class-name
Operation Command
Associate a Frame Relay class with a Frame fr-class class-name
Relay interface or PVC
Remove the association between a Frame Relay undo fr-class class-name
class and a Frame Relay interface or PVC
By default, no Frame Relay class is associated with the Frame Relay interface or the
Frame Relay PVC.
When using the command fr-class, if the specified Frame Relay class does not
exist, this command will first create a Frame Relay class (but not enter the frame
relay class view) and then associate it with the current interface or PVCs.
The command undo fr-class will remove the association between the specified
Frame Relay class and the interface/PVCs without deleting the actual Frame Relay
class. In this case, if using the display current-configuration command to
view the configurations of the router, you can still see the configuration of the
Frame Relay class. To delete the Frame Relay class, use the undo fr class
command.
When a Frame Relay PVC implements QoS, it will search for the corresponding
Frame Relay class in the following sequence:
■ If there is a Frame Relay class associated with the PVC, use the QoS parameters
configured to the Frame Relay class.
■ If there is no Frame Relay class associated with the PVC but a Frame Relay class
associated with the interface to which the PVC belongs, use the QoS
parameters configured to this Frame Relay class.
3 Configure the Frame Relay class parameters
In frame relay class view, the user can configure the parameters for the QoS, such
as Frame Relay traffic shaping, Frame Relay traffic policing, Frame Relay
congestion management, and Frame Relay queueing management. The following
sections will cover the parameter settings in detail.
Operation Command
Enable the Frame Relay traffic shaping fr traffic-shaping
Disable the Frame Relay traffic shaping undo fr traffic-shaping
By default, the Frame Relay traffic shaping is not enabled on the interface.
The function of Frame Relay traffic shaping is applied on the outgoing interfaces
on a router. Usually it is applied at the DTE end on a Frame Relay network.
2 Create a Frame Relay class
Refer to the previous section “Configure Frame Relay class” for the configuration
procedure in detail.
3 Associate the Frame Relay class with the Frame Relay interface or a PVC
Refer to the previous section “Configure Frame Relay class” for the configuration
procedure in detail.
4 Configure the Frame Relay class parameters for Frame Relay traffic shaping
Perform the following configurations in frame relay class view.
Table 302 Configure the parameters of Frame Relay class
Operation Command
Set the CBS of a Frame Relay PVC cbs [ outbound ] burst-size
Restore the CBS of a Frame Relay PVC to the undo cbs [ outbound ]
default value
Set the EBS of a Frame Relay PVC ebs [ outbound ]
excess-burst-size
Restore the EBS of a Frame Relay PVC to the undo ebs [ outbound ]
default value
Set the CIR ALLOW of a Frame Relay PVC cir allow [ outbound ]
rate-limit
Restore the CIR ALLOW of a Frame Relay PVC to undo cir allow [ outbound ]
the default value
Set the CIR of a Frame Relay PVC cir rate-limit
Restore the CIR of a Frame Relay PVC to the undo cir
default value
Enable the adaptive adjustment function of traffic-shaping adaptation becn
traffic shaping [ percentage ]
Disable the adaptive adjustment function of undo traffic-shaping adaptation
traffic shaping becn
Set the reserved band width of Frame Relay PVC reserved-bandwidth
bandwidth-percentage
Restore the reserved band width of a Frame undo reserved-bandwidth
Relay PVC to the default value
The commands cbs, ebs, and cir allow can be used to set the inbound and
outbound parameters. However, only the outbound parameters are effective for
the Frame Relay traffic shaping.
Configure Frame Relay QoS 265
Numerically, the value of CBS should not be less than CIR ALLOW, otherwise, the
large packets may not be sent.
Configure the parameters of Frame Relay class for Frame Relay traffic policing
Operation Command
Enable the Frame Relay traffic policing fr traffic-policing
Disable the Frame Relay traffic policing undo fr traffic-policing
By default, the Frame Relay traffic policing is not enabled on the interface.
The function of Frame Relay traffic policing is applied on the interface receiving
the Frame Relay packets on a router. It can only be applied at the DCE side on a
Frame Relay network.
2 Create a Frame Relay class
Please refer to the above section “Configure Frame Relay class” for the
configuration procedure in detail.
3 Associate the Frame Relay class with the Frame Relay interface or a PVC
Please refer to the above section “Configure Frame Relay class” for the
configuration procedure in detail.
4 Configure the parameters of Frame Relay class for Frame Relay traffic policing
Perform the following configurations in frame relay class view.
Table 304 Configure the parameters of Frame Relay class
Operation Command
Set the CBS of a Frame Relay PVC cbs [ inbound ] burst-size
Restore the CBS of a Frame Relay PVC to the default undo cbs [ inbound ]
value
Set the EBS of a Frame Relay PVC ebs [ inbound ]
excess-burst-size
Restore the EBS of a Frame Relay PVC to the default undo ebs [ inbound ]
value
Set the CIR ALLOW of a Frame Relay PVC cir allow [ inbound ]
rate-limit
Restore the CIR ALLOW of a Frame Relay PVC to the undo cir allow [ inbound ]
default value
The commands cbs, ebs, and cir allow can be used to set the inbound and
outbound parameters on a PVC. However, only the inbound parameters are
effective for the Frame Relay traffic policing.
266 CHAPTER 17: CONFIGURING FRAME RELAY
Configure Frame Relay There are two ways to set the congestion threshold. One is to configure the
Congestion congestion threshold for a PVC in a specified Frame Relay class, another is to
Management configure the congestion threshold for the overall interface in interface view. The
router determines whether there is congestion on the interface according to the
ratio that the current queue length on the Frame Relay interface or PVC occupies
the total queue length on the interface. If the ratio is greater than the threshold
set by the user, the router will assume that there is congestion, and will process
the packets with the corresponding methods, such as discarding.
Operation Command
Enable a Frame Relay interface to discard the fr congestion-threshold de
packets that are marked with DE flag bit in the queue-percentage
case of congestion
Disable the Frame Relay interface to discard the undo fr congestion-threshold
packets that are marked with DE flag bit in the de
case of congestion
Enable a Frame Relay interface to process the fr congestion-threshold ecn
BECN and FECN flag bits in the case of congestion queue-percentage
Disable the Frame Relay interface to process the undo fr congestion-threshold
BECN and FECN flag bits in the case of congestion ecn
Operation Command
Enable a Frame Relay PVC to discard the packets congestion-threshold
that are marked with DE flag bit in the case of dequeue-percentage
congestion
Disable the Frame Relay PVC to discard the packets undo congestion-threshold de
that are marked with DE flag bit in the case of
congestion
Enable the Frame Relay PVC to process the BECN congestion-threshold ecn
and FECN bits in the case of congestion queue-percentage
Disable the Frame Relay PVC to process the BECN undo congestion-threshold ecn
and FECN bits in the case of congestion
Only when the Frame Relay traffic shaping is enabled on the interface where a
PVC is located, can the congestion management take effect on the PVC.
Configure Frame Relay QoS 267
Operation Command
Configure an interface-based DE rule list fr del list-number
inbound-interface type number
Delete the interface-based DE rule undo fr del list-number
inbound-interface type number
Configure a protocol-based DE rule list fr del list-number protocol
protocol [ characteristic ]
Delete the protocol-based DE rule undo fr del list-number protocol
protocol [ characteristic ]
Operation Command
Apply the DE rule list on a Frame Relay PVC fr de del list-number dlci-number
Delete a DE rule list from the Frame Relay undo fr de del list-number
PVC dlci-number
Operation Command
Set the FIFO queue length of a Frame Relay PVC fifo queue-length queue-size
Restore the FIFO queue length of a Frame Relay undo fifo queue-length
PVC to the default value
Set the queue type of a Frame Relay PVC to PQ pq pql list-number
Restore the queue type of a Frame Relay PVC to undo pq pql
FIFO
268 CHAPTER 17: CONFIGURING FRAME RELAY
Operation Command
Set the queueing type of Frame Relay interface to fr pvc-pq [ top-limit
PIPQ and set the length of each PIPQ queue at middle-limit normal-limit
the same time (in interface view) bottom-limit ]
Restore the queueing type of Frame Relay undo fr pvc-pq
interface to FIFO (in interface view)
Set the priority of PIPQ on the Frame Relay PVC pvc-pq { top | middle | normal
(in frame relay class view) | bottom }
Restore the priority of PIPQ on the Frame Relay undo pvc-pq
PVC to normal (in frame relay class view)
Frame Relay over IP IP networks are used to carry the Frame Relay data to interconnect the Frame
Relay networks. In the technique of Frame Relay over IP, a GRE tunnel is
established between the Frame Relay networks at both ends of IP, and the Frame
Relay data are carried over IP. The application of Frame Relay over IP is illustrated in
the following figure:
IP Network
Operation Command
Create a tunnel interface interface tunnel
tunnel-number
Specify a source address for the tunnel interface source ip-address
Specify a destination address for the tunnel interface destination ip-address
In addition, the user can make the configurations, such as packet mode, ID
keyword, for the tunnel interface. The tunnel interface configuration details will
not be covered here. Please read the related chapters in Operation manual - VPN
for reference.
2 Configure Frame Relay Switching
Enable Frame Relay switching in system view and configure Frame Relay switched
routes in serial interface view.
Table 312 Configure Frame Relay switching
Operation Command
Enable Frame Relay switching fr switching
Configure a Frame Relay switched route fr dlci-switch in-dlci
interface tunnel number
out-dlci
If the specified tunnel interface does not exist when implementing configuration,
the system will automatically create a tunnel interface. However, the Frame Relay
switched route can take effect only after the source address, destination address,
and IP address have been configured for the tunnel interface.
270 CHAPTER 17: CONFIGURING FRAME RELAY
After configuring the Frame Relay route through the fr dlci-switch interface
tunnel command, two routes will be added to the Frame Relay routing table on
the router. One route takes the tunnel interface as the incoming interface and the
serial interface as the outgoing interface. On the contrary, the other route takes
the serial interface as the incoming interface and the tunnel interface as the
outgoing interface.
After the Frame Relay route is configured through the fr dlci-switch
interface tunnel command, a PVC will be created on the tunnel interface and
assigned with a DLCI number out-dlci. When implementing configuration, make
sure that the same DLCI number (that is, out-dlci) should be used on the tunnel
interfaces at two ends of the GRE tunnel.
Frame Relay over ISDN Nowadays, Frame Relay technique has gained wide applications, in which, most
devices are accessed to the Frame Relay networks via leased lines. To shorten the
time for users to access Frame Relay networks and lower the cost of leased lines,
ISDNs and the related devices can be used to access Frame Relay networks, the
so-called Frame Relay over ISDN.
With the Frame Relay over ISDN technique, the cost of a leased line can be shared
by the routers, so the overall cost is lowered. The users can access the Frame Relay
networks much quicker and with lower cost. At the same time, ISDN can also be
taken as a standby for Frame Relay accessing. Therefore, the Frame Relay over
ISDN is mainly used in the following two aspects:
■ The simplest application is to take Frame Relay over ISDN as the main
communications method. That is, all the routers support Frame Relay over
ISDN, and the individual routers can directly access the Frame Relay networks
(without TA adapters) to communicate.
■ Combined with BDR, Frame Relay over ISDN can be taken as the standby
communication method for Frame Relay. In such applications, routers support
Frame Relay over ISDN. Being the standby for a Frame Relay network, ISDN can
be used to re-establish the connections for accessing the Frame Relay network,
whenever a Frame Relay accessing line/device fails to work or the Frame Relay
network is blocked.
Router A Router B
RouterA, RouterB and RouterC support Frame Relay over ISDN. Being DTE devices,
they and RouterD transmit Frame Relay packets over ISDN B channels. RouterD,
which works as a DCE device, supports both Frame Relay over ISDN and Frame
Relay switching. A simplified working procedure is shown below:
■ RouterA (DTE device) originates a call on the BRI interface to the PRI interface
on RouterD (DCE device).
Configure Frame Relay over Other Protocols 271
■ The DCE device identifies the calling number of the incoming call and
authenticates the DTE device according to it to determine whether to accept or
deny the call.
■ If the DTE device passes the authentication, it can establish a B channel to the
DCE device for carrying out the Frame Relay communications.
Normally, if a DCE device is connected to multiple DTE devices, calls can only be
originated from the DTE side. However, it is not the case for back-to-back
connections.
Since a B channel can only be connected to a remote end and cannot have more
than one IP addresses, it cannot be configured with multiple DLCIs, nor configured
with multiple sub-interfaces.
Bri0 Pri
Bri1
Router A Router B
If legacy BDR is adopted on the ISDN interface used with Frame Relay, the
calling party can directly use the configured dial string to make an ISDN call to
the remote end, after it finds an available B channel. If dialer profiles are
adopted, the calling party will re-configure the selected available B channel
with the link layer protocol on the dialer interface, and then use the configured
dial string to place an ISDN call to the remote end.
After a physical B channel is set up, Frame Relay LMI (Local Management
Interface) and inverse ARP process will start. If an agreement is reached
through the negotiation, Frame Relay will be used to carry the network layer
data on the B channel.
If dialer profiles are adopted, the called party searches for the dialer interface
according to the dialing number in the ISDN packet. If the dialer interface is found,
the called party will re-configure the selected B channel with the link layer
protocol on the dialer interface. If the dialer interface is not found but the dialer
call-in command has been configured, it will disconnect the call. If the dialer
call-in command is not configured, PPP will be adopted by default. Therefore,
each dialer interface of the called party should be configured with a unique dialing
number, and can only receive the calls from that number. This restriction, however,
is not placed on the calling parties.
■ Frame Relay switching connection between DTE devices
272 CHAPTER 17: CONFIGURING FRAME RELAY
A DCE device provides Frame Relay switching. Its one end is connected to a
DTE device via ISDN, and the other end is directly connected to another DTE
device, as shown in the following figure:
Bri0 Pri S1 S1
Router B
Bri1
Router A Frame Relay Router C
Switching
The DCE device cannot originate a call, since the PVC segment that the DCE
device establishes via ISDN can only be activated through dialing. The call can
only be originated by the DTE device, which is connected to ISDN. After the call
is successfully made, the corresponding PVC segment is established for
transmitting the network layer data.
If legacy BDR is adopted on the ISDN interface worked with Frame Relay on the
DCE device, the calling party will use the configured dial string to make an
ISDN call to the DCE device. If dialer profiles are adopted, the calling party (the
DTE device) will re-configure the selected available B channel with the link layer
protocol on the dialer interface, and then use the configured dial string to
make an ISDN call to the DCE device.
After a physical B channel is set up, Frame Relay LMI and inverse ARP process
will start. If an agreement is reached through the negotiation, the
corresponding PVC will be established. Then, the DCE device will look for
another PVC segment according to the Frame Relay switching configuration
and activate the PVC segment. When both PVC segments are in active status, it
means that the whole PVC is set up. In this case, Frame Relay can be adopted
on the B channel to carry the network layer data.
Distinguished from legacy BDR, dialer profiles require a called party to search for
the dialer interface according to the dialing number in the ISDN packet, and hence
obtain the link layer protocol type for the B channel. Then, the called party can
dynamically configure the dialer interface or physical ISDN interface and initialize
it.
Operation Command
Configure Frame Relay over Other Protocols 273
Operation Command
Enable Frame Relay to implement PVC fr switching
switching
Configure a terminal type for a Frame fr interface-type { dte | dce | nni }
Relay interface
Assign DLCI number for the main interface fr dlci dlci-number
or a sub-interface
Configure a Frame Relay switched virtual fr switch name interface type number
circuit (SVC) dlci dlci interface type number dlci
dlci
Operation Command
Configure the link layer protocol of the link-protocol fr [ ietf |
interface to Frame Relay nonstandard ]
The two ends of a BDR call should work with the same link layer protocol.
For a physical interface (such as an ISDN BRI or PRI interface), both the D channel
and B channel are configured with Frame Relay.
274 CHAPTER 17: CONFIGURING FRAME RELAY
In the legacy BDR implementation of Frame Relay over ISDN, a dialer interface and
all the ISDN physical interfaces (including BRI and PRI interfaces) attached to it will
be Configured with Frame Relay.
■ Adopt dialer profiles
In the dialer profiles implementation of Frame Relay over ISDN, the dialer
number command must be configured, besides using the link-protocol fr
command to change the link layer protocol on the interface. The configuration
is necessary because the negotiation of user name is disabled after the dialer
interface is configured with Frame Relay, so the called party will identify
different dialer interfaces according to the dial strings of the calling parties. In
this case, however, there is no need to configure the dialer user command.
In addition, the dialer call-in command must be configured for the called
party to pre-process a dial-in number, thereby to determine whether the user
dialing the number should be accessed. For other configurations, refer to the
Dial-up.
Perform the following configuration in physical ISDN or dialer interface view.
Table 316 Configure parameters related to dialer profiles
Operation Command
Configure a dialer interface with Frame Relay link-protocol fr [ ietf |
nonstandard ]
Enable dialer profiles dialer bundle number
Configure the dial string for calling a remote dialer number dial-string [
end :isdn_subaddress ]
Pre-process ISDN dial-in numbers dialer call-in remote-number [
callback ]
The two ends of a BDR call should work with the same link layer protocol.
For a dialer interface adopting dialer profiles to implement Frame Relay over ISDN,
it should be configured with Frame Relay. In addition, Frame Relay and PPP are
probably carried on a B channel for supporting the dynamic configuration on the
channel. Therefore, the ISDN physical interface should be configured with PPP.
After the dynamic B channel is disconnected, the link layer protocol of the ISDN
interface will be automatically restored to PPP (by default, physical interface will
inherit the configurations of dialer interface).
Multiple dialer number is allowed to configure for the calling party, which is the
so-called dialer string rotary backup. For the called party, after a dialer interface
link layer protocol is configured to Frame Relay, the dialer numbers configured
on other dialer interfaces cannot be the same dialer number configured on it.
Otherwise, calls will fail.
Display and debug Please use the display and debugging commands in all views.
Frame Relay Table 317 Display and Debug Frame Relay
Operation Command
Display receiving/sending statistics information display fr lmi-info [ interface
of Frame Relay LMI type packets type number ]
Display protocol address and Frame Relay display fr map-info
address mapping table
Display and debug Frame Relay 275
DLCI=50 DLCI=70
DLCI=60
FR
Router C
DLCI=80 IP:202.38.163.253
DLCI=100
Router A Router B
S0 Frame Relay S0
Network
IP:202.38.163.251 IP:202.38.163.252
S0 Frame Relay S0
Router A Router B
S0 Frame Relay
Network
Quidway
Router
CIR ALLOW = 96kbps
DTE EIR = 32kbps
CIR = 32kbps
On RouterA, two BRI interfaces, Bri0 and Bri1, are available. Bri0 is assigned with
the ISDN number 660218, the IP address 110.0.0.1 and the DLCI number 100.
Bri1 is assigned with the ISDN number 660208, the IP address 120.0.0.1 and the
DLCI number 200. On RouterB, one PRI interface is available for providing services
for two dialer interfaces. This PRI interface is assigned with the ISDN number
660045, the IP addresses 110.0.0.2 and 120.0.0.2, and the DLCI numbers 100
and 200.
Figure 99 Networking for the back-to-back connection between DTE and DCE
ISDN
DTE Switch DCE
Bri0 660218
660045 Pri
Bri1 660208
Router A Router B
[Router-Serial2:15]dialer bundle-member 20
For configuring the BDR and Frame Relay parameters on Dialer1, refer to the
configuration on Dialer0. The user only needs to change the IP address to
120.0.0.2, DLCI number to 200, and configure to receive the incoming calls from
the number 660208 and assign Dialer1 to Dialer Bundle 20.
On RouterA, two BRI interfaces, Bri0 and Bri1, are available. Bri0 is assigned with
the ISDN number 660218, the IP address 110.0.0.1 and the DLCI number 100.
Bri1 is assigned with the ISDN number 660208, the IP address 120.0.0.1 and the
DLCI number 200. On RouterB, one PRI interface is available for providing services
for two dialer interfaces. This PRI interface is assigned with the ISDN number
660045, and the DLCI numbers 100 and 200 respectively for these two dialer
interfaces. At the same time, RouterB is connected to RouterC via a serial
interface, which is assigned with the DLCI numbers 300 and 400. The serial
interface on RouterC is available with 2 sub-interfaces, which are respectively
assigned with the IP addresses 110.0.0.2 and 120.0.0.2, and DLCI numbers 300
and 400.
Figure 100 Networking for the Frame Relay switching connection between DTE devices
ISDN
DTE Switch DCE DTE
Bri0 660218 S1 S1
660045 Pri
Bri1 660208
Router A Router B Router C
2 Configure RouterB
a Configure the BDR and Frame Relay parameters on the PRI interface.
[Router]dialer-rule 1 ip permit
[Router]fr switching
[Router]controller e1 0
[Router-E1-0]pri-set
[Router]interface dialer 0
[Router-Dialer0]ip address 110.0.0.2 255.255.255.0
[Router-Dialer0]dialer bundle 10
[Router-Dialer0]dialer-group 1
[Router-Dialer0]dialer number 660218
[Router-Dialer0]dialer call-in 660218
[Router-Dialer0]link-protocol fr
[Router-Dialer0]fr interface-type dce
[Router-Dialer0]fr dlci 100
[Router]interface serial 2:15
[Router-Serial2:15]undo dialer enable-legacy
[Router-Serial2:15]dialer bundle-member 10
[Router-Serial2:15]dialer bundle-member 20
For configuring the BDR and Frame Relay parameters on Dialer1, refer to the
configuration on Dialer0. The user only needs to change the IP address to
120.0.0.2, DLCI number to 200, and configure to receive the incoming calls from
the number 660208 and assign Dialer1 to Dialer Bundle 20.
b Configure the Frame Relay switching parameters on Serial1.
[Router-Serial1]link-protocol fr
[Router-Serial1]fr interface-type dce
[Router]interface serial 1.1
[Router-Serial1.1]ip address 130.0.0.1 255.255.255.0
[Router-Serial1.1]fr dlci 300
[Router]interface serial 1.2
[Router-Serial1.2]ip address 140.0.0.1 255.255.255.0
[Router-Serial1.2]fr dlci 400
c Configure Frame Relay SVCs.
[Router]fr switch myconnect1 interface dialer 0 dlci 100 interface
serial 1 dlci 300
[Router]fr switch myconnect2 interface dialer 1 dlci 200 interface
serial 1 dlci 400
3 Configure RouterC
a Configure IP addresses and DLCI numbers for the serial interface and
sub-interfaces.
[Router]interface serial 1
[Router-Serial1] link-protocol fr
[Router]interface serial 1.1
[Router-Serial1.1]ip address 130.0.0.2 255.255.255.0
[Router-Serial1.1]fr dlci 300
[Router]interface serial 1.2
[Router-Serial1.2]ip address 140.0.0.2 255.255.255.0
[Router-Serial1.2]fr dlci 400
Fault Diagnosis and Troubleshooting of Frame Relay 285
Fault 2: the physical layer is already UP, but the link layer protocol is
DOWN.
Troubleshooting:
■ Check whether both local equipment and opposite equipment have been
configured with Frame Relay protocol.
■ If two sets of equipment are directly connected, check the local equipment and
opposite equipment to see whether one end is configured as Frame Relay DTE
interface and the other end as Frame Relay DCE interface.
■ Turn on the monitoring switch for the Frame Relay LMI packet to see whether
the Status Enquiry packets correspond to the Status packet. If not, it indicates
the physical layer data is not receiving or sending correctly. Check the physical
layer. Command debugging fr lmi-info is used to turn on the monitoring
switch for Frame Relay LMI information.
Fault 3: link layer protocol is UP, but cannot Ping through the peer.
Troubleshooting:
■ Check whether the link layer protocols of the equipment at both ends are UP.
■ Check whether the equipment at both ends have configured (or created)
correct address mapping for the peer.
■ Check the route table to see whether there is a route to the peer.
Fault 4: After the Frame Relay traffic shaping is enabled on the Frame
Relay interface, the small-sized packets can be pinged, but the large-sized
packets cannot.
Troubleshooting:
■ Configuring a too small committed burst size (CBS) will probably cause this
phenomenon. In common conditions, CBS cannot be less than 12000 bits. If it
is configured too small, the large packets will probably fail to be transmitted.
■ Check the configurations of the Frame Relay class associated with the Frame
Relay interface or the PVCs, and use the fr cbs command to make the CBS
larger.
■ Check whether the Frame Relay configurations at both ends are correct. Read
the section of troubleshooting in Link Layer Protocol.
18 CONFIGURING HDLC
■ Configure HDLC
■ Display and Debug HDLC
Configure HDLC HDLC (High Data Link Control) is a bit-oriented link layer protocol. Its most
prominent feature is that it can transparently transmit any kind of bit flow without
the restriction that the data must be character set. Protocols of standard HDLC
protocol group operate upon the synchronous serial lines, e.g., DDN. The address
field of HDLC is 8 bits, its control field is 8 bits, and the protocol field is 16 bits,
which are used to represent all kinds of control information of HDLC protocol and
to mark whether they are data. The 3Com Router supports the HDLC protocol and
can connect with HDLC protocol of other popular devices.HDLC configuration
includes:
■ Configure the link layer protocol of the interface to HDLC
1 Configure the Link Layer Protocol of the Interface to HDLC
In synchronous interface view, perform the following task.
Table 318 Configure the link layer protocol of the interface to HDLC
Operation Command
Configure the link layer protocol of the interface to link-protocol hdlc
HDLC
Only when the interface operates in the synchronous mode, can the link layer
protocol be configured to HDLC.
When the interface link layer protocol is SLIP, its physical attribute cannot be
changed to synchronous mode. At this time, you should first change the link layer
protocol of the interface to PPP before you change the interface attribute to
synchronous mode.
■ Bridge Overview
■ Configure Bridge’s Routing Function
■ Display and Debug Bridge
■ Typical Bridge Configuration
Bridge Overview Bridge is a type of network device on the data link layer, which interconnects Local
Area Networks (LANs) and transfers data between them. In some small-sized
networks, especially in the networks widely dispersed, using bridges can reduce
the network maintenance cost, and the network terminal users do not need to
make special settings for the devices, since the bridges interconnect networks just
like hubs.
The transparent bridging supported by the 3Com Router series has the following
features:
■ Conforms to the IEEE 802.1d standards and supports the STP and bridging
functions specified in IEEE 802.1d.
■ Supports bridging on the links of PPP and HDLC.
■ Supports bridging on X.25 links.
290 CHAPTER 19: CONFIGURING BRIDGE
Workstation A Workstation B
Ethernet segment 1
Bridge port 1
00e0.fccc.cccc
00e0.fcdd.dddd
Bridge
Workstation C Workstation D
Bridge port 2
Ethernet segment 2
Upon receiving the Ethernet frame, the bridge learns that Workstation A is
connected with Bridge port 1 since the frame received is from Port 1. As a result,
the correlation between the MAC address of Workstation A and Bridge port 1 will
be added to the bridging table, as shown in the following figure:
Bridge Overview 291
Workstation B
Workstation A
Bridge
Workstation C Workstation D
Bridge port 2
Ethernet segment 2
Figure 103 Bridge learns that Workstation B is connected with the port 1 too.
00e0.fcaa.aaaa 00e0.fcbb.bbbb
Workstation A Workstation B
Ethernet segment 1
Bridging table Bridge port 1
MAC address Port
00e0.fcaa.aaaa 1
00e0.fccc.cccc
00e0.fcbb.bbbb 1 00e0.fcdd.dddd
Bridge
Workstation D
Workstation C Bridge port 2
Ethernet segment 2
At last, given that all the workstations are in use, the bridge will obtain all
correlation between the MAC addresses and the bridge ports as shown in the
following figure:
292 CHAPTER 19: CONFIGURING BRIDGE
Workstation A Workstation B
Ethernet segment 2
Workstation A Workstation B
Ethernet segment 1
Bridging table Bridge port 1
MAC address Port
00e0.fcaa.aaaa 1
00e0.fccc.cccc 00e0.fcdd.dddd
00e0.fcbb.bbbb 1 Bridge
00e0.fccc.cccc 2
00e0.fcdd.dddd 2
Forwarding Workstation D
Bridge port 2
Workstation C
Note that the bridge will forward the broadcast or multicast frames received on
one port to the other ports.
Given that Workstation A sends an Ethernet frame to Workstation B, the
bridge will filter this frame rather than forwarding it, since Workstation B and
Workstation A are located on the same physical network segment.
Bridge Overview 293
Workstation A Workstation B
Ethernet segment 1
Bridging table Bridge port 1
MAC address Port
00e0.fcaa.aaaa 1
00e0.fcbb. bbbb 1 00e0.fcdd.dddd
Bridge
00e0.fccc . cccc 2
00e0.fcdd.dddd 2
No forwarding
Ethernet segment 2
Ethernet segment 1
Bridging table Bridge port 1
MAC address Port
00e0.fccc.cccc 00e0.fcaa.aaaa 1 00e0.fcdd.dddd
00e0.fcbb.bbbb 1
Bridge
Bridge port 2
Ethernet segment 2
Eliminating loop
As shown in the following figure, both bridges X and Y are connected with
Ethernet segment 1. Once detecting a broadcasting frame, both bridges will send
it to all ports except the source port on which the frame is detected. That is, both
bridges X and Y will forward this broadcast frame.
294 CHAPTER 19: CONFIGURING BRIDGE
Broadcast address
Bridge Y
FFFFFFFFFFFF
Ethernet segment 1
Ethernet segment 2
Bridge X Bridge Z
Ethernet segment 3
As shown in the following figure, the broadcast frame is forwarded over Ethernet
segment 2 and Ethernet segment 3 that are connected with Bridge Z. Upon
detecting two copies of this frame on two different ports, Bridge Z forwards them
to Ethernet segment 3 and Ethernet segment 2 again. Thus, Ethernet segment 2
and Ethernet segment 3 receive a copy of this frame for the second time. Like this,
the frame is repeatedly forwarded over the network, which is called bridging loop.
Broadcast frame
FFFFFFFFFFFF
FFFFFFFFFFFF Bridge Y Forwarding broadcast frame again
Ethernet segment 1
Ethernet segment 2
Bridge Z
Bridge X
Forwarding broadcast frame
FFFFFFFFFFFF
Ethernet segment 3
FFFFFFFFFFFF
In practice, if there are hundreds of physical segments, bridging loops will cause a
sharp decline to the network performance. After the location where loops occur is
detected, the only solution is to cut off all connections. It is obvious that
eliminating loops is an essential requirement for ensuring the bridge working
normally. Therefore, the third function of bridge is to locate loops and block
redundant ports.
Spanning Tree Protocol Spanning Tree Protocol (STP) is used to prevent redundant paths through certain
algorithms. A loop network is thus pruned to be a loop-free tree network so as to
avoid the infinite cycling of data frames in the loop network.
STP transmits a type of special data frame called Bridge Protocol Data Unit (BPDU)
between bridges. The overall network will compute a minimum spanning tree
describing the distribution of bridges in the network. This minimum spanning tree
Bridge Overview 295
will also specify which bridge to be the “root bridge” and which bridges to be the
“leaf nodes”.
■ Root Identifier: Consists of the Bridge Priority and the MAC address of the root
bridge.
■ Root Path Cost: Path cost from the individual leaf nodes to the root bridge.
■ Bridge Identifier: Consists of the Bridge priority and the MAC address of the
current bridge.
■ Port Identifier: Consists of the Port Priority and the Port Number.
■ Message Age of BPDU
■ Max Age of BPDU
■ Hello Time of BPDU
■ Forward Delay of port state transition
Upon the computation of the minimum spanning tree, the newly generated root
port and designated ports begin to forward packets after a period of forward
delay. After all the bridges on the network accomplish the spanning tree
computation, the network topology will be stabilized and will remain the same
until the network takes changes.
The following figure illustrates the topology of the minimum spanning tree on a
network:
296 CHAPTER 19: CONFIGURING BRIDGE
DP
DP
RP
Bridge 3 DP
Root Bridge/ Designated
Designed Bridge Bridge
DP
DP DP
RP
DP
Bridge 1 DP Bridge 4
Designated DP
Bridge
RP
DP
Designated
Bridge RP DP
DP
Bridge 2 DP Bridge 5
DP
Designated
Bridge
Hub Hub
RP = Root Port
DP= Designated Port
However, the recomputed new BPDU will not be propagated throughout the
network right away, so the old root port and designated ports that have not
detected the topology changes will still forward the data through the old path. If
the newly elected root port and designated ports begin to forward data
immediately, a temporary loop may be introduced. In STP, a transitional state
mechanism is thus adopted. Specifically, the root port and the designated ports
will undergo a transitional state for an interval of forward delay to enter the
forwarding state to resume the data forwarding. Such a delay ensures that the
new BPDU has already been propagated throughout the network before the data
frames are forwarded according to the latest topology.
Multi-Protocol Router Generally, a router is called multi-protocol router when it can implement the
routed protocols like IP and IPX, as well as the bridging protocol. For a
multi-protocol router, the bridging protocol can be either enabled or disabled.
However, if both the routed protocols and the bridging protocols are enabled on a
router, the router will be taken as a multi-protocol router. In this case, whether a
packet should be routed through IP or IPX or forwarded via the bridge will depend
on the protocol type of the packet. For example, bridging protocol and IP are
concurrently enabled on a router. If the packet to be processed is an IP packet, it
Configure Bridge’s Routing Function 297
will be routed through IP. Certainly, if IP cannot find a route, it will discard the
packet instead of forwarding it to the bridge for processing. If the packet uses a
protocol other than IP (for example, if it is the packet from the network like
AppleTalk or DecNet), it will be bridged.
For the 3Com Router series, if the bridging function is not enabled, all the IP
packets will be routed through IP. If it is enabled, the packets in the bridge-set will
be bridge forwarded.
Link-set When there are multiple parallel links between two bridge devices, and the
corresponding link ports are all added to the bridge set, the spanning tree protocol
can be used to avoid bridge loop, and can ensure that only one link is available to
transmit data. Other corresponding link ports are all in congestion state. This can
guarantee normal bridging between two bridge devices on the cost of wasting
link bandwidth. The link set can guarantee the bridging function and save the link
bandwidth. The solution is, adding multiple parallel links to a link set. Each
corresponding link port can still independently take part in the spanning tree
calculation, which guarantees the bridging function. During data forwarding, each
link in the link set can share loads, thus utilizing all link bandwidths.
Operation Command
Enable bridging functions bridge enable
Disable bridging functions undo bridge enable
2 Configure Bridge-Set
Each bridge set is independent, and packets can not be transmitted between the
ports belonging to different bridge sets. That is, the packets received via one
bridge set port can only be sent via the ports of the same bridge set. One physical
interface can only be added to one bridge set.
The bridges support several STP versions and these versions are not compatible.
Sometimes, different STP versions may result in bridge looping.
The 3Com Router series only support the STP defined in IEEE.
Perform the following configuration in system view.
Table 321 Specify the STP version supported by the bridge-set
Operation Command
Specify the STP version supported by the bridge bridge-set stp ieee
bridge-set
Delete the STP version supported by the undo bridge bridge-set stp ieee
bridge-set
Operation Command
Add ports to a bridge-set bridge-set bridge-set
Remove ports from a bridge-set undo bridge-set bridge-set
Operation Command
Configure static address table entries bridge bridge-set mac-address
mac-address { permit | deny } [
interface-type interface-number ]
Delete static address table entries undo bridge bridge-set mac-address
mac-address
Operation Command
Enable forwarding using the dynamic address table bridge bridge-set learning
Disable forwarding using the dynamic address table undo bridge bridge-set
learning
Operation Command
Configure the aging time of dynamic address table bridge aging-time seconds
Restore the aging time of dynamic address table to undo bridge aging-time
the default value
By default, the aging time of dynamic address table is 300 seconds. The aging
time is in the range of 10 to 1000000 seconds.
5 Configure Parameters Related to STP
a Disable/Enable STP on ports
Only when STP is enabled on the ports can all the configured parameters
related to STP take effect.
Perform the following configuration in interface view.
Table 326 Disable/Enable STP on ports
Operation Command
Disable STP on ports bridge-set bridge-set stp
disable
Enable STP on ports undo bridge-set bridge-set stp
disable
Operation Command
Configure the bridge priority bridge stp priority value
Restore the default value of the bridge priority undo bridge stp priority
Operation Command
Configure the path cost of bridge port bridge set bridge-set stp port
pathcost cost
Restore the path cost on the bridge port to the undo bridge-set bridge-set stp
default value port pathcost
By default, the path cost of Ethernet port is 100, and the path cost of serial
interface is 647. It is valued in the range 1 to 65535.
d Configure the bridge port priority
In the case that path costs of the ports are the same, the port with lower ID is
more likely to become the designated port. The port ID is comprised of Port
Priority and Port Number. The smaller the port priority, the smaller the bridge
port ID will be. Changing the bridge port priority will cause recomputation of
the spanning tree. If all the bridge ports adopt the same priority, the smaller the
port number is, the smaller the port ID will be.
Perform the following configuration in interface view.
Table 329 Configure the bridge port priority
Operation Command
Configure the bridge port priority bridge-set bridge-set stp port
priority value
Restore the default value of the bridge port undo bridge-set bridge-set stp
priority priority
Operation Command
Configure Hello Time timer bridge stp timer hello seconds
Restore the default value of the Hello Time timer undo bridge stp timer hello
Operation Command
Configure the forward delay timer bridge stp timer
forward-delay seconds
Restore the default value of the forward delay timer undo bridge stp timer
forward-delay
By default, the value of the forward delay timer is 15 seconds. It is in the range
of 4 to 200 seconds.
When configuring the forward delay timer, note that:
■ No matter what its individual configuration might be, all the bridges in the
spanning tree should use the time value of the forward delay timer of the
root bridge.
■ If the forward delay is configured too short, temporary redundant paths
may be introduced. If the forward delay is configured too long, however,
the restoring of network connection may take a long time because the STP
cannot converge to a stable state for a long period. It is recommended that
users use the default value.
g Configure the Max Age of BPDU
302 CHAPTER 19: CONFIGURING BRIDGE
The Max Age is the parameter used to judge whether the BPDUs are
“timeout”. Users can configure it according to the actual network conditions.
When a port enables the STP, the Max Age timer begins to time. If no BPDU is
received in the specified period, it will assume that the link has failed and the
STP will recompute the minimum spanning tree.
Perform the following configuration in system view.
Table 332 Configure the Max age of BPDU
Operation Command
Configure a time value for the Max Age timer bridge stp max-age seconds
Restore the default value of the Max Age timer undo bridge stp max-age
By default, the value of the Max Age timer is 20 seconds. It is in the range of 6
to 40 seconds.
When configuring the Max Age timer, it should be noted that:
■ Spanning tree should use the value of the Max Age timer of the root bridge.
■ Too short a Max Age will result in frequent recompilations of spanning tree
and mistaking the network delay for link fault. On the other hand, too long
a Max Age may make the bridge unable to detect link fault promptly and
reduce the network self-sensing ability. It is recommended that users use
the default value.
6 Create ACLs of Bridge
a Create an ACL based on MAC Ethernet addresses
Perform the following configuration in system view.
Table 333 Create an ACL based on MAC Ethernet addresses
Operation Command
Create an ACL based on MAC Ethernet acl acl-number { permit | deny }
addresses mac-address mac-wildcard
Delete an ACL based on MAC Ethernet undo acl acl--number
addresses
Operation Command
Create ACLs based on varied Ethernet acl acl-number { permit | deny }
encapsulation formats type-code type-wildcard
Delete ACLs based on varied Ethernet undo acl acl- number
encapsulation formats
Operation Command
Apply ACLs based on MAC addresses in the bridge-set bridge-set source-mac
input direction of ports acl acl-number
Remove the application of ACLs based on undo bridge-set bridge-set
MAC addresses in the input direction of ports source-mac acl acl -number
Apply ACLs based on MAC addresses in the bridge-set bridge-set dest-mac acl
output direction of ports acl-number
Remove the application of ACLs based on undo bridge-set bridge-set
MAC addresses in the input direction of ports dest-mac acl acl-number
Operation Command
Apply an ACL encapsulated in the form of bridge-set bridge-set inbound-lsap
IEEE 802.2 to the input side of the port acl acl-number
Remove the application of the ACL undo bridge-set bridge-set
encapsulated in the form of IEEE 802.2 to the inbound-lsap acl acl-number
input side of the port
Apply the ACL encapsulated in the form of bridge-set bridge-set
IEEE 802.2 to the output side of the port outbound-lsap acl -number
Remove the application of the ACL undo bridge-set bridge-set
encapsulated in the form of IEEE 802.2 to the outbound-lsap acl acl-number
output side of the port
Operation Command
Apply an ACL encapsulated in the form of bridge-set bridge-set
Ethernet-II or Ethernet-SNAP to the input side inbound-type acl acl-number
of the port
304 CHAPTER 19: CONFIGURING BRIDGE
Operation Command
Enable bridge’s routing function bridge routing-enable
Disable bridge’s routing function undo bridge routing-enable
Operation Command
Create a bridge-template interface to connect interface bridge-template
the specified bridge-set to the routing network. bridge-set
Table 340 Configure bridge set to route or bridge the network layer protocol
Operation Command
Enable the bridge set to route the network layer bridge bridge-set routing { ip
protocol | ipx }
Disable the bridge set to route the network layer undo bridge bridge-set routing
protocol { ip | ipx }
Enable the bridge set to bridge the network layer bridge bridge-set bridging { ip
protocol | ipx }
Disable the bridge set to bridge the network layer undo bridge bridge-set bridging
protocol { ip | ipx }
Operation Command
Assign a port to a link-set. bridge-set bridge-set link-set
link-set
Operation Command
Bind the ports to a link-set to share the load bridgebridge-set link-set link-set
by source MAC address origin
Disable the load sharing by source address undo bridge bridge-set link-set
link-set origin
Operation Command
Configure a Frame Relay mapping forwarded to the fr map bridge dlci broadcast
bridge
Operation Command
Define a dialer list. dialer-rule dialer-group
bridge { permit | deny }
Operation Command
Add the interface to the dialer-group dialer-group dialer-group
Map the bridge address to BDR dialer route bridge broadcast
string
Operation Command
Configure the link layer protocol of the link-protocol lapb [ dte | dce ]
interface to LAPB [ multi-protocol ]
Operation Command
Configure the link layer protocol of the interface link-protocol ppp
to PPP
Operation Command
Configure the link layer protocol of the interface link-protocol hdlc
to HDLC
Operation Command
Configure the bridge-set on the sub-interface bridge-set bridge-set
of VLAN
Display and Debug Perform the reset, display and debugging commands in all views.
Bridge Table 350 Display and debug bridge
Operation Command
Clear the statistics of access list rules reset acl counters [ acl-number ]
Clear the entries of all the bridge-sets or reset bridge [ bridge-set ]
specified groups in the forwarding database
Clear the statistics of Spanning Tree reset stp statistics
Clear the traffic statistics of bridge-set on the reset bridge traffic
interface
Display the states of all the bridge-sets display bridge-set [ bridge-set ]
Display the information in the bridge display bridge information
forwarding database
Display the state and statistics of STP display bridge spanning-tree
Display the static data of bridge-set traffic on a display bridge traffic
port
Display the routing and bridging configuration display bridge bridge-set
on each interface bridge-template
Display link set configuration of the specified display bridgebridge-set link-set
bridge set.
Enable bridge-set debugging debugging bridge
Enable the spanning-tree protocol debugging debugging stp { error | event |
packet }
Typical Bridge
Configuration
e0 s0 s0 e0
Router A Router B
LAN 1 LAN 2
DLCI=50 DLCI=50
s0 s0
Router A Router B
PSTN
s1 s1
PC
s0 s0
Router A Router B
PC
E1 E0
2.1.1.1
E2
Router
e1 e1
e0.1 e0.1
Link Set 1
s0 s0
e0 e0
s1 s1
Router A Router B
■ IP Address Overview
■ Troubleshooting IP Address Configuration
■ Map between WAN Interface IP Address and Link Layer Protocol Address
IP Address Overview IP address is a unique 32-bit address assigned to a host connected to Internet.
Usually it is composed of two parts: network ID and host ID. Its structure enables
convenient addressing on Internet. IP address is assigned by Network Information
Center (NIC) of American National Defense Data Network.
■ Type field (also called type bit), used to distinguish the type of IP address.
■ Network ID field (net-id).
■ Host ID field (host-id).
When using IP addresses, it should also be noted that some of them are reserved
for special uses, and are seldom used.
318 CHAPTER 20: CONFIGURING IP ADDRESS
The IP addresses a user can use are listed in the following table.
Network
class IP network range Description
A 1.0.0.0 ~ 126.0.0.0 Network IDs with all the digits being 0 or all the digits being
1 are reserved for special use.
Host ID with all the digits being 0 indicates that the IP
address is the network address, and is used for network
routing.
Host ID with all the digits being 1 indicates the broadcast
address, i.e. broadcast to all hosts on the network.
Network ID 127 is used for self-loop interface.
B 128.1.0.0 ~ Network IDs with all the digits being 0 or all the digits being
191.254.0.0 1 are reserved for special use.
Host ID with all the digits being 0 indicates that the IP
address is the network address, and is used for network
routing.
Host ID with all the digits being 1 indicates the broadcast
address, i.e. broadcast to all hosts on the network.
C 192.0.1.0 ~ Network IDs with all the digits being 0 or all the digits being
223.255.254.0 1 are reserved for special use.
Host ID with all the digits being 0 indicates that the IP
address is the network address, and is used for network
routing.
Host ID with all the digits being 1 indicates the broadcast
address, i.e. broadcast to all hosts on the network.
D None Addresses of class D are multicast addresses.
Host ID with all the digits being 1 indicates the broadcast
address, i.e. broadcast to all hosts on the network.
E None 255.255.255.255 is used as the whole network's broadcast
address, and the other addresses are reserved for future use.
Some IP addresses are not in a hierarchical structure, which is different from the
structure of telephone number. In other words, these IP addresses cannot reflect
any geographical information about the host position.
■ When a host is connected to two networks at the same time (such as the host
used as a router), it must have two corresponding IP addresses with different
net-ids. Such host is called multihomed host.
■ According to Internet concept, several LANs connected via transceiver or
bridges are still in the same network, so these LANs have the same net-id.
■ In terms of IP address, all networks which are assigned with net-ids are equal
(no matter whether it is a small LAN or a big WAN).
Since 1985, only the net-id of IP address is assigned, while the following host-id is
controlled by the enterprise. The IP address assigned to an enterprise is only a
network ID: net-id. The specific host Ids, the host-ids for respective hosts, shall be
assigned by the enterprise independently and uniquely. If there are many
enterprise hosts widely scattered, the host IDs may be further divided into internal
sub-nets to facilitate management. Please note that the division of sub-nets is
IP Address Overview 319
completely internal to the enterprise itself, and seen from the outside, the
enterprise only has one net-id. When an external message enters this enterprise
network, the internal router can route according to the sub-net number, and
finally reach the destination host.
(a)
Subnet ID Host ID
Add subnet
net-id Subnet-id host-id
number field
(b)
(c)
If there is no sub-net division in an enterprise, then its sub-net mask is the default
value and the length of “1” indicates the net-id length. Therefore, for IP addresses
of classes A, B and C, the default values of corresponding sub-net mask are
255.0.0.0, 255.255.0.0 and 255.255.255.0 respectively.
A router connecting multiple sub-nets will have multiple sub-net IP addresses. The
IP addresses mentioned above cannot be directly used in communication, because:
■ An IP address is only an address of a host in the network layer. To send the data
messages transmitted through the network layer to the destination host,
physical address of the host is required. So the IP address must be first resolved
into a physical address.
■ IP address is hard to remember, but a host domain name will be much easier to
remember and is also more popular. So the host domain name must also be
resolved into an IP address.
The following figure illustrates relation between host name, IP address and
physical address.
320 CHAPTER 20: CONFIGURING IP ADDRESS
Figure 119 Relation between host name, IP address and physical address
Each interface of a router can have several IP addresses, among which one is the
master IP address and the others are slave IP addresses. Any two IP addresses of a
router cannot be in the same network segment.
Operation Command
Configure master IP address of an interface ip address ip-address { mask |
mask-length }
Delete IP address of an interface undo ip address ip-address { mask |
mask-length }
Operation Command
Configure slave IP address of an interface ip address ip-address { mask |
mask-length } sub
Delete slave IP address of an interface undo ip address ip-address { mask
| mask-length } [ sub ]
■ Slave IP addresses cannot be on the same network segment with each other
and they cannot be on the same network segment with the master IP address.
Otherwise, the system will prompt:
■ IP address configured now conflicts with others.
■ If the interface is not configured with the master IP address, the first configured
IP address will become the master IP address automatically.
■ When there are slave IP addresses on the interface, the master IP address
cannot be deleted. Otherwise, the system will prompt:
Must delete secondary before deleting primary.
3 Set negotiable attribute of an IP address for an interface
When an interface is encapsulated with PPP, but not configured with IP address
while the peer has been configured with IP address, the user can configure
negotiable attribute of IP address on the interface on the local router. (To configure
ip address ppp-negotiate command on the local router, and to configure
remote address on the peer router) In this case, the local router can accept the IP
address originated from PPP negotiation and allocated by the peer router. Such
configuration is mainly used to obtain IP address allocated by ISP when accessing
the Internet via ISP.
322 CHAPTER 20: CONFIGURING IP ADDRESS
Operation Command
Set PPP negotiable attribute of IP address for an ip address ppp-negotiate
interface
Cancel negotiable attribute of IP address for an undo ip address
interface ppp-negotiate
Assign IP address for the peer interface remote address { ip-address
| pool [ pool-number ] }
Cancel IP address for the peer interface undo remote address
Because the borrowing interface has no IP address of its own, and can not route,
two routes need to be configured manually to connect routers.
Operation Command
Activate IP address unnumbered ip address unnumbered
interface-type
interface-number
Deactivate IP address unnumbered undo ip address unnumbered
Operation Command
Display information of interface borrowing IP display interfaces [type
address number]
Display the current configuration information. display current-configuration
Quidway
Router
Quidway
Router
Router
Quidway router
R3 ( Wuhan)
Quidway
Router
The second static route is an interface route to the serial port of R1, and the next
hop is the serial port of R
cannot receive the arp message, then possibly the error is on the Ethernet physical
layer.
Fault 2: When the interface is encapsulated with PPP or Frame Relay, the
link layer protocol status does not change to UP.
Troubleshooting: check whether the IP address of this interface is in the same
network segment as the opposite side.
Fault 3: After the interface borrows an IP address, the link layer protocol
status will turn to UP, but it can not ping through itself, and other ports
can not ping through this borrowed IP address either.
Troubleshooting: Check whether the lender port is UP. Only when the port
protocol of the lender is UP, will the address be added to the route table and
pinged through by other ports.
Map between WAN In a router, you shall maintain both the mapping from an Ethernet interface IP
Interface IP Address address to an MAC address, and that from a WAN interface IP address to a link
and Link Layer layer protocol address. Namely there are the following types:
Protocol Address ■ On a dialup interface (such as an asynchronous serial port or ISDN interface),
mapping between IP address and dialing serial port is maintained by the
command dialer route ip.
■ On an interface encapsulated with X.25, the mapping between an IP address
and X.121 address is maintained by the command x25 map ip.
■ On an interface encapsulated with Frame Relay, mapping between an IP
address and a virtual circuit number (DLCI) is maintained by the command fr
map ip.
The above mapping tables are also called second routing tables, which are
essential for the normal working of the router. For details, refer to related chapters
in Link Layer Protocol.
326 CHAPTER 20: CONFIGURING IP ADDRESS
21 CONFIGURING IP APPLICATION
Configure Address ARP is mainly used for resolution from IP address to Ethernet MAC address.
Resolution Protocol Normally, dynamic ARP is used to resolve the mapping relation from the IP address
(ARP) to the Ethernet MAC address. The resolution is completed automatically. At
present, the number of dynamic ARP mapping table items supported by the 3Com
Router series is up to 2000.
Operation Command
Manually add static ARP mapping table item arp static ip-address
mac-address
Manually delete static ARP mapping table item undo arp static ip-address
Operation Command
Manually add dynamic ARP mapping table item arp dynamic ip-address
mac-address
Manually delete dynamic ARP mapping table undo arp dynamic ip-address
item
328 CHAPTER 21: CONFIGURING IP APPLICATION
Display and Debug ARP Table 359 Display and Debug ARP
Operation Command
Display ARP mapping table display arp [ verbose [
ip-address ] ]
Clear dynamic ARP information reset arp-cache
Turn on ARP commission information debugging arp
Configure Domain The TCP/IP Extranet not only provides an IP address to locate a device, but also
Name Resolution designs a specific character-string host naming mechanism. This system uses a
(DNS) layered naming mode, designating a meaningful name for a device on the
Internet. There is a domain name resolution server on the network to associate the
domain name to the corresponding IP address. As a result, the user can use the
easy-to-remember, meaningful domain name instead of the complex IP address.
Domain name resolution includes dynamic resolution and static resolution, which
can supplement each other. In the resolution of a domain name, first use static
resolution. If it fails, then use dynamic resolution. Some common domain names
can be put into static domain name resolution table, which greatly increases the
efficiency of domain name resolution.
s domain name resolution requests. The server firstly resolves the domain name
inside its own database, and submits it to superior domain name resolution server
if the domain name is not within local domain, till the resolution is completed. The
result can either be an IP address, or a non-existing domain name, which will be
fed back to the user.
Configure Static Domain Static domain name resolution is conducted through static domain name
Name Resolution resolution table, similar to the host file under Windows 95/98 operating system.
The router can obtain the IP addresses of common domain names by checking this
table. Meanwhile, it is easier for the user to remember host names than the highly
abstract IP address to access the corresponding device.
Operation Command
Add static domain name resolution table item ip host domain-name ip-address
VLAN Configuration 329
Delete static domain name resolution table item undo ip host domain-name
ip-address
Display and Debug Table 361 Display and Debug domain name resolution
Domain Name
Operation Command
Resolution
Display static domain name resolution table item display ip host
VLAN Configuration To facilitate the mobility of computers in the network and save bandwidth, we can
create VLAN in LAN Switch to meet various requirements. After creating VLAN in
LAN Switch port, data communication can be easily implemented within the same
VLAN. However, the different VLANs are isolated from each other, so it is necessary
to transmit packet between different VLAN in the same way as transmitting it
between different LAN segments. The forwarding function between VLANs on the
3Com Router series is implemented by Ethernet interface and it supports IP and
IPX packet. In order to save port resources, several subinterfaces can be
encapsulated on one Ethernet interface and every subinterface acts as an
independent Ethernet interface. Therefore, a physical Ethernet interface can
implement data forwarding between several VLANs as shown in the figure below.
Workstation
Bridge/LAN Switch Workstation
Router Floor 3
File Server (Accounting)
Fast
Ethernet Workstation
Bridge/LAN Switch
File Server Floor 2
Workstation (Marketing)
File Server
Bridge/LAN Switch Workstation
Floor 1
Workstation (R&D)
VLAN 1 VLAN 2 VLAN 3
In accordance with the IEEE 802.1Q, to implement the VLAN functionality of the
3Com Router series, a 4-byte VLAN tag is placed between the source/destination
MAC address of the original Ethernet frame header and the Type field to mark the
VLAN message. The format of VLAN tag is shown as below.
330 CHAPTER 21: CONFIGURING IP APPLICATION
TPID (Tag Protocol Identifier) field has two bytes. When its value is 0X8100, it
means the Ethernet frame header contains VLAN tag. The third and fourth byte
are TCI (Tag Control Information) fields, with the higher three bits being user
priority field, the fourth being the instruction of standard encapsulation format
and the other 12 bits being VLAN IDs whose value ranges from 0 to 4094 (the
value must begin with 1 on routers).
Operation Command
Create Ethernet subinterface and enter interface ethernet
Ethernet subinterface view interface-number.subinterface-number
Delete specified Ethernet subinterface undo interface ethernet
interface-number.subinterface-number
Operation Command
Specify the VLAN on which Ethernet vlan-type dot1q vid vlan-id
subinterface is located
Remove the specification for the undo vlan-type
belonging of the Ethernet subinterface
Operation Command
Configure IP address of Ethernet subinterface ip address ip-address mask
Delete IP address of Ethernet subinterface undo ip address [ ip-address ]
P1 P2 P3 P4 P5 P6 P7 P8 Console
LAN Switch
P1: Port 1
Router
PC 1 PC 2
1)
Fault Diagnosis and Fault: Ping the IP address of the Ethernet subinterface in the same VLAN
Troubleshooting of from a PC, but fails.
VLAN Troubleshooting: The steps below can be taken.
■ Use display interface ethernet 0.1 command or display interface
ethernet 0.2 command to ensure that the physical interface of this
subinterface and the protocol are both in state Up. If the configuration is
correct, whereas the physical interface and the protocol are both in state of
Down, pleased check whether the network cable is correctly connected or not..
■ If the physical interface of this subinterface and the protocol are both in state
of Up, and the Ping operation still fails, please check whether the LAN Switch
configuration is correct. It must be ensured that the default VLAN id of ports
connected with router Ethernet interface differs from that of ports connected
with PC and the type of all ports must be tagged. However, the type of all ports
DHCP Server Configuration 333
connected with PC must be set as “untagged” for the reason that PC cannot
identify data packet marked with VLAN tag.
DHCP vs BOOTP
■ Both BOOTP and DHCP adopt the client/server communication mode. A client
applies to the server for configurations (including the configurations of
important parameters such as allocated IP address, subnetmask, and the
default gateway). Then, the server will return the corresponding configuration
information according to the policies. Both types of packets are encapsulated
with the UDP packets. Furthermore, their structures are almost the same.
■ BOOTP is running in a relatively static (every host is connected by a permanent
network) environment. Hence, administrators should configure special BOOTP
parameter files for each host and then, these files will stay the same for a
relatively long time.
■ DHCP extends the BOOTP from two aspects: DHCP enables computers to
obtain all the needed configuration information by using one message and it
allows computers to rapidly and dynamically obtain IP addresses so to avoid
statically specifying addresses for each host by BOOTP.
DHCP server can provide three types of IP address allocation policies according
to the different requirements:
■ Allocate addresses manually: Administrators configure special IP addresses for a
small number of particular hosts such as the service server WWW.
■ Allocate addresses automatically: Allocate permanent IP addresses for some
hosts connected to the network for the first time and the addresses will be
allocated to the hosts for a long period of time.
■ Allocate addresses dynamically: Allocate some addresses to client hosts by
means of “leasing”. In this case, the expiry date is limited and clients should
re-apply for new addresses upon the expiry. Most of clients are offered such
dynamic addresses.
Fundamentals of DHCP Normally, a typical DHCP application network comprises of a DHCP server and
Server numerous client computers such as PCs and portable computers, as shown in the
following figure:
DHCP clients
will take back the IP address. If the DHCP client wants to continue to use
this address, it should renew the IP leasing contract such as extending the
leasing contract of the IP address.
■ In practice, the DHCP client will automatically send the message for
renewing the IP leasing contract to the DHCP server when the DHCP client
starts up or half of the valid period of the IP leasing contract has expired. To
renew the IP leasing contract, the DHCP client will send a DHCP_Discover
message to the DHCP server. If the IP address is valid, the DHCP server will
send back a DHCP_ACK message to notify the DHCP client that it has
obtained a new IP leasing contract. In addition, the ipconfig /renew
command can be used on the user PC (that is, the DHCP client) to renew its
IP leasing contract.
■ Priority sequence in which the DHCP server allocates IP address to the client
The DHCP server will select an IP address for a client in the following order:
a IP address in the DHCP Server database, which is statically bound with the
MAC address of the client.
b IP address that was used by the client.
c Address in the requested IP address option contained in the DHCP_Discover
message sent by the client.
d IP address that is first found when searching for the IP addresses available for
allocation in the DHCP address pool in sequence.
e Report the error, if no IP address is available for allocation after going through
the above steps.
■ Applications of DHCP Server
In practice, to improve the serving efficiency of DHCP servers, a DHCP server
will probably be used to serve the clients beyond the LAN. Normally, routers
have been added with the function of DHCP relay proxy (that is, providing the
across-segment transmission of DHCP packets). Clients in the LAN can
communicate with the DHCP servers in other subnetworks through the DHCP
relay proxy and finally obtain legal IP addresses.
Figure 125 Integrated networking application of DHCP server and DHCP relay
Client Client DHCP Server
DHCP Relay
Router
Internet
LAN
Router
Client Client
Normally, DHCP relay proxy can either be a host or a router as long as the
service program of DHCP relay proxy is enabled.
Operation Command
Enable the DHCP service dhcp enable
Disable the DHCP service undo dhcp enable
Operation Command
Create a DHCP address pool or enter the dhcp server ip-pool pool-name
DHCP address pool view
338 CHAPTER 21: CONFIGURING IP APPLICATION
Operation Command
Configure a statically binding IP address static-bind
ip-addressip-address [ mask
netmask ]
Delete the statically binding IP address undo static-bind ip-address
Configure a statically binding client MAC address static-bind mac-address
mac-address
Delete a statically binding client MAC address undo static-bind mac-address
Operation Command
Configure the range of the IP addresses allocated network ip-address [
dynamically mask netmask ]
Delete the range of the IP addresses allocated dynamically undo network
By default, no DHCP address pool is configured, that is, there are no allocable
addresses.
DHCP Server Configuration 339
The command network cannot be superimposed, that is, the latest configuration
will overwrite the previous one.
Operation Command
Configure the IP addresses in a DHCP address dhcp server forbidden-ip
pool that will not participate in low-ipaddress [ high-ipaddress ]
auto-allocation
Delete the IP addresses in a DHCP address undo dhcp server forbidden-ip
pool that do not participate in auto-allocation low-ipaddress [ high -ipaddress ]
This command can be superimposed. That is, the latest and the original
configurations will take effect simultaneously. When using the undo dhcp server
forbidden-ip command to delete the address-excluding setting, make sure that
the parameters are totally consistent with those originally configured. That is, do
not delete only some addresses originally configured.
5 Configure IP Address Leasing Valid Period for DHCP Address Pool
According to various purposes of client hosts, a DHCP server can specify different
valid periods of address leasing for different address pools and thus enhance the
application flexibility. All the addresses in the same DHCP address pool own the
same valid period. Address leasing valid period can not be inherited.
Perform the following configurations in DHCP address pool view.
Table 371 Configure IP address leasing valid period for DHCP address pool
Operation Command
Configure the leasing valid period of the dynamically expired { day day [ hour
allocated IP address for a DHCP address pool hour [ minute minute ] ] |
unlimited }
Restore the leasing valid period of the dynamically undo expired
allocated IP address for the DHCP address pool to the
default value
340 CHAPTER 21: CONFIGURING IP APPLICATION
Operation Command
Configure the egress gateway address of DHCP gateway-list ipaddress1 [
client ipaddress2 … ipaddress8 ]
Delete the egress gateway address of DHCP client undo gateway-list {
ip-address | all }
Operation Command
Configure the domain name allocated to a DHCP client domain-name domainame
Delete the domain name allocated to a DHCP client undo domain-name
By default, the domain names allocated to DHCP clients are not configured.
8 Configure IP Address of DNS Used by DHCP Clients
When a computer accesses the Internet through the domain name, the domain
name should be resolved to IP addresses. To access the DHCP client to the Internet,
a DHCP server specifies the DNS address for the client when allocating the IP
address to it. Each DHCP address pool can be configured with up to a maximum of
8 DNS addresses.
Perform the following configurations in DHCP address pool view.
Table 374 Configure the DNS addresses in a DHCP address pool
Operation Command
Configure the addresses of DNSes for the DHCP dns-list ipaddress1 [
clients ipaddress2 … ipaddress8 ]
Delete the IP addresses of DNSes for the DHCP undo dns-list { ip-address |
clients all }
That is because the new DNS address will replace the previous one rather than
superimpose it.
9 Configure IP Address of NetBIOS Server Used by DHCP Clients
Clients can communicate through the NetBIOS protocol. As for the clients installed
with the Microsoft operating system, WINS (Windows Internet Naming Service)
Server will provide the hostname-to-IP-address resolution mechanism for the hosts
adopting the NetBIOS protocol. Therefore, WINS setting is necessary for most
Windows network clients. Each DHCP address pool can be configured with up to a
maximum of 8 NetBIOS addresses.
Perform the following configurations in DHCP address pool view.
Table 375 Configure the address of NetBIOS server used by DHCP clients
Operation Command
Configure the address of NetBIOS server used nbns-list ip-address1 [
by DHCP clients ip-address2 ... ip-address8 ]
Delete the address of NetBIOS server used by undo nbns-list { ip-address | all
DHCP clients }
Operation Command
Set the type of NetBIOS node for DHCP client netbios-type { b-node |
h-node | m-node | p-node }
Restore the type of NetBIOS node for DHCP client to undo netbios-type
the default value
assume that the IP address in this segment is not in use. Only when it is not in use
can the IP address be allocated to the specified client.
Perform the following configurations in system view.
Table 377 Configure maximum number of ping packets sent by DHCP server & time for
response
Operation Command
Configure the maximum number of ping packets sent dhcp server ping { packets
by the DHCP server number }
Restore the maximum number of ping packets sent undo dhcp server ping
by the DHCP server to the default value packets
Configure the longest time waiting for response after dhcp server ping { timeout
ping packets are sent by the DHCP server milliseconds }
Restore the longest time waiting for response after undo dhcp server ping
ping packets are sent by the DHCP server to the timeout
default value
By default, the number of ping packets being sent is 2 and the time waiting for
ping response packets is 500ms.
12 Configure self-defined options
As DHCP continuously develops, you can support these new options/development
by adding add them to the attribute tables of the DHCP servers by means of the
self-defined options.
Perform the following configurations in DHCP address pool view.
Table 378 Configure DHCP self-defined options
Operation Command
Configure DHCP self-defined options option code { ascii ascii-string
| hex hex-string [ hex-string… ]
| ip-address ip-address }
Delete the DHCP self-defined options undo option code
Display and Debug Use reset, debugging and display command in All views.
DHCP Server Table 379 Display and Debug DHCP servers
Operation Command
Display the address binding information of display dhcp server ip-in-use [
DHCP ip-address ]
Reset all the address binding information of reset dhcp server ip-in-use {
DHCP all | ip-address }
Display the statistic information of address display dhcp server conflict [
conflicts of DHCP ip-address ]
Reset all the statistics of address conflicts of reset dhcp server conflict { all
DHCP | ip-address }
Display the statistics of DHCP server display dhcp server statistics
Reset all the statistics of DHCP server reset dhcp server statistics
Display the information of the available display dhcp server expired
addresses in the DHCP address pool
Display the information of the tree structure in display dhcp server tree
the DHCP address pool
Enable the DHCP server debugging debugging dhcp server { events |
packet | ip-relation }
DHCP Server Configuration 343
Typical DHCP Server The common DHCP networking methods can be classified into two categories:
Configuration Example One is that the DHCP server and the clients reside on the same subnetwork and
they directly carry out the interaction of DHCP. Another one is that the DHCP
server and the clients reside on different subnetworks and they must implement
the allocation of IP addresses through the DHCP relay proxy. In both these cases,
the DHCP configurations are the same.
I. Networking Requirements
DHCP server allocates IP addresses dynamically for the clients in the same
segment, the address pool segment 10.1.1.0 is divided into two segments:
10.1.1.0 (the mask is 255.255.255.128) and 10.1.1.128 (the mask is
255.255.255.128). The two Ethernet interfaces of the DHCP server are 10.1.1.1
(the mask is 255.255.255.128) and 10.1.1.129 (the mask is 255.255.255.128)
respectively.
In the segment 10.1.1.0, the address lease period is 10 days and 12 hours, the
domain name is 3com.com. The DNS address is 10.1.1.2, without NetBIOS
address, and the outgoing router address is 10.1.1.126. In the segment
10.1.1.128, the address lease period is 5 days, the DNS address is 10.1.1.2, the
NetBIOS address is 10.1.1.4, and the outgoing router address is 10.1.1.254.
Figure 126 DHCP server and clients reside in the same network
NetBIOS
Serv er Client Client Client
LAN LAN
Router Router Router
4 Configure the attributes (address pool range, outgoing gateway and address lease
period) in DHCP pool 1.
[Router] dhcp server ip-pool 1
[Router-dhcp1] network 10.1.1.0 mask 255.255.255.128
[Router-dhcp1] gateway-list 10.1.1.126
[Router-dhcp1] expired day 10 hour 12
5 Configure the attributes (address pool range, outgoing gateway, NetBIOS address,
and address lease period) in DHCP pool 2.
[Router] dhcp server ip-pool 2
[Router-dhcp2] network 10.10.1.128 mask 255.255.255.128
[Router-dhcp2] expired day 5
[Router-dhcp2] nbns-list 10.1.1.4
[Router-dhcp2] gateway-list 10.1.1.254
Configure DHCP Relay As the scale of networks grows and their complexities increase, network
configurations become more and more complex. The original BOOTP protocol for
static host configuration cannot satisfy the demands of users, especially on the
occasions when computers are always on the move (e.g., using laptops or wireless
network) and the number of actual computers exceeds that of the available IP
addresses. To facilitate users to improve utilization ratio of resources and to
support diskless networking mechanisms, the DHCP (Dynamic Host Configuration
Protocol) based on BOOTP was developed. Similar to the BOOTP protocol, DHCP
works in client-server mode. With this protocol, a DHCP client can dynamically
request configuration information from a DHCP server, including important
parameters such as assigned IP addresses, subnet masks and default gateways,
etc. DHCP server can also conveniently configure this information dynamically for
DHCP clients.
However, original DHCP can only take effect in a sub-net, and cannot work across
different network segments, which is obviously not economic. So, it is necessary to
set a DHCP server on all network segments for dynamic host configuration. This
problem is solved by the introduction of DHCP relay, which relays relative
messages to a destination DHCP server, so that multiple networks can share a
DHCP server, which is more cost-effective and convenient for centralized
management.
Configure DHCP Relay 345
DHCP client
Network
The above figure is the schematic diagram of DHCP relay. Its working principle is as
follows:
After starting DHCP client, a configuration request message is broadcast and the
DHCP relay router will send the message to the designated DHCP server on the
other network after processing it properly. According to the information provided
by the client, the server sends configuration information to the client via DHCP
relay and completes the dynamic configuration of host.
Operation Command
Configure interface relay address ip relay-address ip-address
Delete interface relay address undo ip relay-address [
ip-address ]
Operation Command
Add transparent transmission forwarding ip relay protocol udp port
protocol
Delete transparent transmission forwarding undo ip relay protocol udp [
protocol port ]
Display and Debug Table 382 Display and debug of DHCP relay
DHCP Relay
Operation Command
Display the current transparent transmission protocol display ip relay protocol
Display helper addresses of respective interfaces display ip relay-address
Turn on DHCP relay and transparent transmission debugging ip relay protocol
debugging information switch
10.110.1.1
Intermediate
network DHCPserver
202.38.160.2
202.38.160.1
I. Configuration Requirements
The host and TFTP server should not be in the same network segment. As the host
does not know the IP address of TFTP server, it sends a request message with the
broadcast address as the destination address so as to transmit it transparently to
the TFTP server via router A.
348 CHAPTER 21: CONFIGURING IP APPLICATION
Host
10.110.1.1
Router A
Intermediate
network TFTP server
202.38.160.2
202.38.160.1
Troubleshooting DHCP When DHCP relay or transparent transmission function is abnormal, locate the
fault with display command or debugging information. Here are some common
faults as examples to illustrate the troubleshooting procedure.
Configure Network Network Address Translation (NAT), also known as address proxy, implements the
Address Translation function for the private network to visit the external network.
(NAT)
Private Network Address and Public Network Address
Private address refers to the address of the internal network or the host computer.
Public address refers to the sole IP address worldwide on the Internet. The Internet
Address Allocation Organization prescribes that the following IP addresses be
retained as private addresses:
■ 10.0.0.0 --- 10.255.255.255
■ 172.16.0.0 --- 172.31.255.255
■ 192.168.0.0 --- 192.168.255.255
That is to say, the addresses within the three ranges will not be allocated on the
Internet. They can be used internally in a unit or a company. The enterprises can
select appropriate internal network addresses according to their forecast of the
number of internal host computers and networks in future. The internal network
addresses of different enterprises can be the same. Disorders are most likely to
occur, if a company select the network segments outside the three ranges above
as the internal network address.
10.1.1.10 10.1.1.48
......
203.196.3.23
www
server
Internet
202.18.245.251
The address of the internal network is 10.0.0.0 network segment, while the
formal external IP address is 203.196.3.23. The internal host computer 10.1.1.48
visits the server 202.18.245.251 outside the network by means of WWW The host
computer 10.1.1.48 sends one data message with the source port selected as
6048 and the destination port as 80. After it passes by the proxy server, the source
address and port of the data message will probably be changed to
350 CHAPTER 21: CONFIGURING IP APPLICATION
PC 1
Internet
Router
PC 2
Modem
Disadvantages:
■ The debugging of the network becomes even more difficult. For instance,
when one host machine of the internal network attempts to attack other
networks, it is very difficult to pinpoint which computer is attacking computer,
since the IP address of the host machine is shielded.
Operation Command
Define one address pool nat address-group start-addr
end-addr pool-name
Delete one address pool undo nat address-group
pool-name
All the addresses in the address pool should be consecutive. For the most, 64
addresses can be defined in each address pool.
An address pool can not be deleted, if it is correlated to one access control list and
address translation has started.
2 Configure the correlation between the access control list and address pool
Multiple-to-multiple address translation can be implemented, after the access
control list and the address pool are correlated. The access control list is generated
by rule command. It defines some rules, according to the format of the header of
the IP data packet message and the header of data packet of the lower layer
protocol it bears, which denotes the enable or disable of the data packets with
certain features. For the data packet configured with NAT, it goes though address
analysis before the message is forwarded. For the data packet no configured with
NAT, it goes ahead with the normal forwarding process.
s according to this correlation relationship the addresses are translated. When the
data packets of the internal network are to be transmitted to the external
network: firstly, it is determined if the data packets are allowed according to the
352 CHAPTER 21: CONFIGURING IP APPLICATION
access control list, then locate the corresponding data pool according to the
correlation. Thus, the source address is translated into one address in the data
pool and the address translation process is completed. In the translation
correlation form, the necessary corresponding information of the translation,
including access list, data pool information and the HASH table index
corresponding to the address pool are recorded.
HASH table is correlated to the data pool. That is to say, “the data packet that
implements address translation using the addresses in the address pool” will have
the record recorded in HASH table. During the translation, we can find the data
pool that corresponds with the data packet according to the translation
relationship. According to the address pool, we can find HASH and records the
translation record in the corresponding HASH table. In the restoration process, the
address pool can be located according to the destination address. And according
to the address pool, the relevant HASH table can be located, to implement
restoration operation.
Please carry out the following configuration under interface view.
Table 384 Configure the correlation between the access control list and address pool
Operation Command
Add the correlation between the access control list nat outbound acl-number
and address pool. address-group pool-name
Delete the correlation between the access control undo nat outbound acl-number
list and address pool. address-group pool-name
By default, the access control list is not correlated to any address pools.
3 Configure the incidence between the access control list and the interface (EASY IP
feature)
Configure the correlation between the access control and the interface is also
known as EASY IP feature. It refers to taking the IP address of the interface as the
translated source address directly during the course of address translation, which
is applicable to two conditions. In dial view, the user hopes to take the interface IP
address obtained through negotiation as the translated source address; or the user
hopes to take the IP address of the interface itself as the translated source address.
Please carry out the following configuration under interface view.
Table 385 Configure the correlation between the access control list and the interface
Operation Command
Add the correlation between the access control list and nat outbound acl-number
interface. interface
Delete the correlation between the access control list undo nat outbound
and interface. acl-number interface
corresponding internal server. During the course of address translation, it will look
up the resource address of the message, to determine if the message is sent from
the internal server. If yes, the source address is translated to the corresponding
public network address.
The information the user needs to configure includes: external address, external
port, external server address and the type of internal server port and protocol.
Please carry out the following configuration under interface view.
Table 386 Configure the Internal Server
Operation Command
Add one internal server nat server global global-addr { global-port |
any | domain | ftp | pop2 | pop3 | smtp | telnet
| www } inside inside-addr { inside-port | any |
domain | ftp | pop2 | pop3 | smtp | telnet | www
} { protocol-number | ip | icmp | tcp | udp }
Delete one internal server undo nat server { global | inside } address {
port | any | domain | ftp | pop2 | pop3 | smtp |
telnet | www } { protocol-number | ip | icmp |
tcp | udp }
When deleting one internal server, if the global key word is used, then the external
address, port and protocol information also need to be provided; If inside key
word is used, only the internal address and port number need to be provided.
Operation Command
Configure the Timeouts of NAT nat aging-time { tcp | udp |
icmp } seconds
Restore the default value of the Timeout of address nat aging-time default
translation
By default, the Timeout for TCP address translation is 240 seconds and 40 seconds
for UDP address translation.
The Timeout for ICMP address translation is 20 seconds.
354 CHAPTER 21: CONFIGURING IP APPLICATION
Display and Debug NAT Table 388 Display and debug NAT
Operation Command
Browse the condition of NAT display nat [ translations [
global ip-address | inside
ip-address ] ]
Clear up the mapping table of NAT nat reset
Enable the information debugging of NAT event debugging nat event
Enable the information debugging of NAT data debugging nat packet
packet
I. Networking Requirement
An enterprise is connected to WAN by the address translation function of the
3Com Router series. It is required that the enterprise can access the Internet via
serial port 0 of the 3Com Router series, and provide WWW, FTP and SNMP services
to the outside, as well as two WWW servers. The internal network address of the
enterprise is 10.110.0.0/16.
There are three legal public network IP addresses of the enterprise from
202.38.160.101 to 202.38.160.103. The internal FTP server address is
10.110.10.1, using the public network address 202.38.160.101. The internal
WWW server1 address is 10.110.10.2. The internal WWW server 2 address is
10.110.10.3, using the 8080 port for external communications, and the two
WWW servers both use the public network address 202.38.160.102. The internal
SNMP server address 10.110.10.4. It is expected to provide uniform server IP
address to the outside, using the public network address 202.38.160.103.
10.110.10.100 10.110.12.100
Internal PC Internal PC
Quidway
Router
DDN
External PC
I. Networking Requirement
The internal LAN of an enterprise can dial-up to access Internet through serial port
S0 by the address translation of the 3Com Router series.
PC A
Router
Internet
PC B Modem
■ Configure IP Performance
■ Configure TCP Performance
■ Configure Fast Forwarding
■ Display and Debug IP Performance
■ Troubleshooting IP Performance Configuration
Operation Command
Configure maximum transmission unit on an interface mtu size
Restore default value of maximum transmission unit on an undo mtu
interface
When the Ethernet interface is encapsulated as Ethernet II, the interface mtu
ranges from 46 to 1500 bytes, and default is 1500 bytes. When the Ethernet
interface is encapsulated as SNAP, the interface mtu ranges from 46 to 1492
bytes, and 1492 bytes is default value. The serial port mtu ranges from 128 to
1500 bytes, and 1500 bytes is default value. The BRI port mtu value ranges from
128 to 1500 bytes, and 1500 bytes is default value.
2 Configure Queue Length
Perform the following task in system view.
Table 390 Configure queue length
Operation Command
Configure IP receiving queue length ifquelen ip queue-length
Configure IPX receiving queue length ifquelen ipx queue-length
Configure ARP receiving queue length ifquelen arp queue-length
Configure interface queue length ifquelen interface type number
receive-queue queue-length
The range of the receiving queue length of all the protocols is 10~1000 bytes, and
75 bytes is the default value.
3 Configure Router Forwarding Redirect Packets
The following configurations should be made in system view.
360 CHAPTER 22: CONFIGURING IP PERFORMANCE
Operation Command
Configure router forwarding redirect packets icmp redirect send
Disable router forwarding redirect packets undo icmp redirect send
Operation Command
Configure router receiving/forwarding source ip option source-route
address route packets
Disable router receiving/forwarding source address undo ip option source-route
route packets
Configure TCP To configure TCP performance, carry out the following steps:
Performance
1 Configure TCP Header Compression
When small messages are transmitted on low-rate physical lines (such as PSTN),
the TCP header occupies an obviously larger portion in the messages. To raise
transmission efficiency, TCP header compression can be configured on this
interface. At present, TCP head compression can only be used on PPP links.
Perform the following task in interface view.
Table 393 Enable/disable TCP header compression
Operation Command
Enable TCP/IP VJ header compression ppp compression vj
Disable TCP header compression undo ppp compression vj
Operation Command
Configure synwait timer for TCP connection tcp timer syn-timeout seconds
Configure FIN_WAIT_2 timer for TCP tcp timer fin-timeout seconds
Configure TCP Performance 361
Configure the size of the receiving and sending tcp window size
window for TCP Socket.
The Synwait timer's timeout ranges between 2~600 seconds, with a default value
of 75 seconds. The Finwait timer's timeout ranges between 76~3600 seconds,
with a default value of 675 seconds. The value of window-size ranges between
1~32Kbytes, with a default value of 4Kbytes.
362 CHAPTER 22: CONFIGURING IP PERFORMANCE
Configure Fast Message forwarding efficiency is a key feature evaluating router performance.
Forwarding According to regular flow, when a message arrives, the router will copy it from the
interface memory to the main CPU. The CPU specifies the network ID from the IP
address, consults with the routing table to get the best path to forward the
message, and creates MAC frame suitable for output of the message. The created
MAC frame is copied to the output queue via DMA (Direct Memory Access), and
during this process the main system bus is passed twice. This process can be
repeated for message forwarding.
In the Fast forwarding, cache is used to process messages. After the first message
is forwarded by searching routing table, corresponding exchange information is
generated in the cache, and forwarding of the following same messages can be
realized by directly searching the cache. This practice greatly simplifies the queuing
of IP messages, cuts down the route finding time and improves forwarding
throughput of IP messages. Since the forwarding table in the cache has been
optimized, much quicker searching speed can be obtained.
The 3Com Router supports Fast forwarding on various high-speed link interfaces,
such as Ethernet, synchronous PPP, frame relay and HDLC.
Besides, the 3Com Router also supports Fast forwarding when firewall is
configured.
Fast forwarding implemented via the 3Com Router contains the following
features:
Operation Command
Enable fast-forwarding in both directions of the ip fast-forwarding
interface
Enable fast-forwarding on the inbound interface ip fast-forwarding inbound
Enable fast-forwarding on the outbound interface ip fast-forwarding outbound
Display and Debug IP Performance 363
Operation Command
Configure a fast-forwarding table size ip fast-forwarding cache-size { 4k
| 16k | 64k | 256k | 1m}
Restore the default fast-forwarding table undo ip fast-forwarding cache-size
size
The fast-forwarding table size on a router defaults to 4K, that is, up to 4K entries
are allowed in the table.
Fast-forwarding table size depends on the memory capacity. The larger the
memory capacity is, the larger the configurable fast-forwarding table size will be.
Display and Debug Fast Table 397 Display and Debug fast forwarding
Forwarding
Operation Command
Display IP fast-forwarding cache display ip fast-forwarding cache
Display IP fast-forwarding flow-control display ip fast-forwarding
Information flow-control
Clear contents in the fast forwarding cache reset ip fast-forwarding cache
Troubleshooting IP Fault 1: TCP and UDP are created upon IP protocol, and IP is able to provide
Performance data packet transmission. However, TCP and UDP protocols do not work
Configuration normally
Troubleshooting: Turn on corresponding debugging switches to check the
debugging information
■ Use the debugging udp command to turn on the UDP debugging switch, and
trace the UDP data packet. When the router sends or receives UDP data
packets, the packet content format can be displayed in real time, so problems
can be located.
The UDP data packet format is as follows:
UDP output packet:
Source IP address: 202.38.160.1
Source port: 1024
Destination IP Address 202.38.160.1
Destination port: 4296
■ Use the debugging tcp command to turn on the TCP debugging switch, and
trace the TCP data packet. TCP has two data packet format options: one is to
debug and trace the receiving/sending of TCP packets in all TCP connections
with this equipment as one end. The specific operation is as follows:
[Router] info-center enable
[Router] debugging tcp packet
The TCP packets received or sent can be checked in real time, and the specific
format is as follows:
TCP output packet:
Source IP address: 202.38.160.1
Source port: 1024
Destination IP Address 202.38.160.1
Destination port: 4296
Sequence number: 4185089
Ack number: 0
Flag: SYN
Packet length: 60
Data offset: 10
Another data packet format is to debug and trace packets with SYN, FIN or RST
setting.
[Router] info-center enable
[Router] debugging tcp event
The TCP packets received or sent can be checked in real time, with the same
packet format as above.
23 CONFIGURING IP COUNT
■ IP Count Introduction
■ IP Count Configuration
■ Display and Debug IP Count
■ Typical Configuration Example
■ Troubleshooting
IP Count Introduction IP Count makes the statistics about the input and output packets, and the packets
denied by the firewall as well. When making the statistics, the router classifies the
bidirectional (in and out) IP packets by testing whether they match any IP Count
lists and whether they are denied by the firewall. At the same time of making data
statistics, the total numbers of packets and bytes are recorded.
As shown in the following figure, if IP Count has been enabled on the output
interface Ethernet1, the statistics will be made on the flows transmitted from this
interface to the network B. A flow destined for the B network can be identified by
an IP triplet (source address, destination address and protocol). Through the
statistics that has been made, you can know the outgoing traffic size. If a firewall
for filtering outgoing packets has been configured on the interface, IP Count will
record the addresses from which the packets are denied by the firewall, and make
the statistics on the denied packets and bytes.
169.254.10.1
PC1 E1 PC3
E0:
169.254.10.1 Router
PC2 PC4
A B
Operation Command
Enable IP Count ip count enable
Disable IP Count undo ip count enable
Operation Command
Set IP Count to make statistics on the input ip count inbound-packets
packets on the current interface
Disable IP Count to make statistics on the input undo ip count inbound-packets
packets on the current interface
Set IP Count to make statistics on the output ip count outbound-packets
packets on the current interface
Disable IP Count to make statistics on the undo ip count outbound-packets
output packets on the current interface
Set IP Count to make statistics on the packets ip count firewall-denied [
denied by the firewall on the current interface inbound-packets |
outbound-packets ]
Disable IP Count to make statistics on the undo ip count firewall-denied [
packets denied by the firewall on the current inbound-packets |
interface outbound-packets ]
Operation Command
Configure an IP Count list ip count table ip-address mask
Delete the IP Count list undo ip count table [ ip-address
mask ]
Operation Command
Specify count maximum of exterior ip count exterior-threshold
number
Restore the default count maximum of exterior undo ip count
exterior-threshold
368 CHAPTER 23: CONFIGURING IP COUNT
The default max entries number of exterior is set to 0, namely, the packets that do
not match the rules will not be counted.
5 Configure Upper Threshold of Interior-List Accounting Entries
The following command is used for specifying count maximum of interior, that is,
the max entries number of the packets compliant with the IP Count lists.
Perform the following configuration in system view.
Table 403 Specify count maximum of interior
Operation Command
Specify count maximum of interior ip count interior-threshold
number
Restore the default count maximum of interior undo ip count
interior-threshold
Table 404 Configure the period that an IP Count entry exists before it times out
Operation Command
Configure the timeout time of IP Count entries ip count timeout minutes
Restore the default timeout time of IP Count entries undo ip count timeout
IPX Protocol Overview Novell IPX protocol is a connectionless protocol. Though both data and destination
IPX address are included in IPX packet, the protocol cannot confirm whether a
packet has been forwarded successfully. Such functions are provided by the
protocol at the layer above IPX. In IPX, any IPX packet is considered as an
independent entity, not related to any other IPX packets logically or sequentially.
In network model, IPX protocol is in network layer and is the only path for
information transmission between the upper-layer protocol and the lower-layer
protocol. IPX protocol functions to fill in addresses, route and forward information
packets. For packets generated at the upper-layer, IPX forwards them out directly.
For user data packets, IPX will first find the correct path in RIP route information
table, and then forward them out.
IPX address
IPX address consists of network and node, represented as network.node. Network
number is the unique identifier of the physical network, which is 4-byte long and
is expressed by eight hexadecimal digits. The preamble 0 can be omitted and not
input.
Node value is, of 6 bytes long, the unique identifier of one node. Every two bytes
are followed by ".", and then the node value is divided into three groups. Each
group is represented with four hexadecimal numbers with the preamble 0
omitted.
bc.0.0cb.47
RIP
A router mainly functions to forward packets between networks. When a client
sends a packet between networks, instead of knowing what path the packet
should pass to reach the destination, it only knows to transmit the packet to the
nearest router and forward it via the next router. So a router must provide the
372 CHAPTER 24: CONFIGURING IPX
Figure 135 Schematic diagram of the relation between main components of RIP
Router
Information Table
Routing Information
Timer Timer
RIP Process
Periodic
Aging Process
Broadcast Process
Socket
RIP Request/Response Packets
0 x 453
IPX Process
SAP
SAP is an abbreviation for Service Advertising Protocol. SAP allows providing
various service nodes, such as file server, print server, NetWare access server and
remote control console server, and broadcasting their service types and addresses.
When servers start, they broadcast their services through SAP, and when serves are
shut down, they indicate the termination of services through SAP.
A server that provides services will periodically broadcast its services and address to
the adjacent sites. Clients cannot use such information directly, it is collected by
SAP agents in different routers on the network, and saved in their server
information tables. Since server information is often dynamically updated by SAP,
Configure IPX 373
clients can always obtain the latest server addresses. The following diagram
describes the relation between main components of SAP.
Figure 136 Schematic diagram of the relation between main components of SAP
S erv er
I n f o rm ati o n
T ab l e
S erv er I n f o rm ati o n
T i m er T i m er
S A P P r o c ess
P erio d ic
A ging
B r o ad c ast
P r o c ess
P r o c ess
S o c k et
S A P R eq u est /R esp o n se P ac k et s
0x452
IPX
N I C s an d D r i v ers
Operation Command
Activate IPX ipx enable [ node node ]
Deactivate IPX undo ipx enable
If the node of a router is not specified, then the router will use the MAC address of
its first Ethernet interface as its node address.
2 Enable IPX Interface
After activating the IPX function of a router, each independent interface must be
assigned with a network ID so that IPX can run on the interface.
374 CHAPTER 24: CONFIGURING IPX
Operation Command
Enable IPX interface ipx network network
Delete IPX interface undo ipx network
Operation Command
Configure IPX static route ipx route network.node tick ticks
hop hops [ preference value]
Remove IPX static route undo ipx route { network [
network.node | float | static |
preference value ] | all }
Operation Command
Enable a default route ipx default-route
Disable a default route undo ipx default-route
By default, enable a default route, i.e. all packets which cannot find their
routing can be forwarded via this route.
b Configure updating interval of IPX RIP
You can set the interval for RIP to update IPX module. The router will send RIP
updated broadcast message at intervals.
Perform the following task in system view.
Configure IPX 375
Operation Command
Configure RIP updating period ipx rip timer update seconds
Restore default value of RIP updating period undo ipx rip timer update
Operation Command
Adjust RIP aging period ipx rip multiplier multiplier
Restore default value of RIP aging period undo ipx rip multiplier
By default, the aging period of a routing table item is 3 times that of RIP
updating period. In other words, if a routing table item is not updated after 3
RIP updating periods, it will be deleted from the table, so will the
corresponding dynamic service information table item be deleted from the
server information table.
d Configure the maximum size of RIP update packet
Perform the following task in interface view.
Table 412 Configure the maximum size of RIP update packet
Operation Command
Configure the maximum size of RIP update packet ipx rip mtu bytes
Restore default value of RIP updated packet size undo ipx rip mtu
By default, the maximum size of the RIP update packet is 432 bytes.
e Configure the maximum number of IPX parallel route
Usually, there is more than one best route to the same destination, which are
called parallel routes. When the number of parallel route (N) configured
exceeds 1, the system will implement load-sharing function automatically.
Reuse multiple paths to send data.
Configuring parallel routes can decrease the possibility of congestion, but
occupy relatively large memory. Parallel routes are not recommended when the
memory is not abundant, however, to configure parallel routes can reduce the
probability of blockage.
Perform the following task in system view.
Table 413 Configure the maximum number of IPX parallel route
Operation Command
Configure the maximum number of IPX parallel route ipx rip load-balance-path
number
Restore the maximum number of IPX parallel route to undo ipx rip
default load-balance-path
When the length of a route reserve queue is 1, the system only saves one route
for a destination. If this unique route is faulty, it will be deleted by the system
and there will be no route to the destination while searching for the substitute
routes, resulting in huge loss of packets. When the length of a route reserve
queue exceeds 1, if one route is deleted, it will be replaced with another one as
soon as possible, so as to prevent huge loss of packets. However, increasing
the length of the route reserve queue in turn increases the system memory
that will be occupied by IPX module.
Perform the following task in system view.
Table 414 Configure length of route reserve queue
Operation Command
Configure length of route reserving queue ipx rip max-reserve-paths
length
Restore default value of length of route reserving undo ipx rip
queue max-reserve-paths
Operation Command
Add one static service information ipx service service-type name
network.node socket hop hopcount [
preference preference ]
Delete one static service information undo ipx service { service-type [
name [ network.node ] ] [ preference
preference] } | all
By default, the priority of static service information is 10, and that of dynamic
service information is 60.
b Configure updating period of IPX SAP
In a huge network, one IPX SAP broadcast occupies much of the bandwidth.
For interfaces running protocols such as PPP, X.25 and frame relay, the
bandwidth is limited, therefore changing IPX SAP updating period is an
effective method to reduce bandwidth occupation. You should make sure that
all servers and routers on the network have the same SAP updating period,
otherwise, the router might think that a server fails to work, while the server is
still working.
Perform the following task in system view.
Configure IPX 377
Operation Command
Configure SAP updating period ipx sap timer update seconds
Restore default value of SAP updating period undo ipx sap timer update
By default, the updating period of IPX SAP is 1 tick (i.e. 1/18 seconds).
c Configure SAP aging period
Perform the following task in system view.
Table 417 Configure SAP aging period
Operation Command
Configure SAP aging period ipx sap multiplier multiplier
Restore default value of SAP aging period undo ipx sap multiplier
Operation Command
Configure size of SAP maximum updated message ipx sap mtu bytes
Restore default value of size of SAP maximum updated undo ipx sap mtu
message
By default, the Max. length of the service update packet is 480 bytes.
e Configure reply to SAP GNS request
You can set the processing mode of SAP GNS request by router:
■ whether to reply with the nearest service information or by polling all
service information known by the router
■ whether to reply to SAP GNS request or not
Usually, a router will reply to GNS request with the service information of the
nearest server. There may also be exceptions: if the nearest server is local server,
then the router will not reply to the GNS request from this network segment.
Please configure ipx sap gns-round-robin command in system view, and
configure ipx sap gns-disable-reply command in interface view.
Table 419 Configure reply to SAP GNS request
Operation Command
Configure Process GNS request in Round Robin ipx sap gns-load-balance
algorithm
Disable replying to GNS request ipx sap gns-disable-reply
By default, a router replies to GNS request with the service information of the
nearest server.
f Configure length of service information reserve queue
378 CHAPTER 24: CONFIGURING IPX
If the length of a service information reserve queue is 1, the system saves only
one service information. If the server to which the only service information
corresponds is faulty, system will delete this information, and you cannot find
any server to provide such service while searching for the substitute service
information. When the length of a service information reserve queue exceeds
1, if one service information is deleted, it will be replaced with the next service
information as soon as possible, so that you will have no trouble finding server.
However, increasing the length of the service information reserve queue means
in turn increases the system memory that will be occupied by IPX module.
Table 420 Configure length of service information reserve queue
Operation Command
Configure length of service information reserving ipx sap max-reserve-server
queue length
Restore default value of length of service information undo ipx sap
reserve queue max-reserve-server
Operation Command
Configure Using touch-off for an interface ipx update-change-only
Configure Disabling touch-off on an interface undo ipx update-change-only
Operation Command
Disable split-horizon undo ipx split-horizon
Enable split-horizon ipx split-horizon
Operation Command
Configure the Delay of Interface Sending IPX Packets ipx tick ticks
Restore default value of interface delay undo ipx tick
By default, the delay of Ethernet interface is 1 tick, For asynchronous serial port is
30 ticks and that for WAN port is 6 ticks. The range of ticks is: 0~30000.
8 Configure Management of IPX Packet
By default, the router usually discards the broadcast packet of type 20, but you
can also enable such packet to be sent to other network segments by configuring
routers.
Perform the following task in interface view.
Table 424 Configure management of IPX packet
Operation Command
Enable propagation of broadcast packet of type 20 ipx netbios-propagation
Disable propagation of broadcast packet of type 20 undo ipx netbios-propagation
Operation Command
Modify encapsulation format of IPX frame on an ipx encapsulation [ dot3 |
interface dot2 | ethernet-2 | snap ]
Restore default value of encapsulation format of IPX undo ipx encapsulation
frame on an interface
Display and Debug IPX Table 427 Display and Debug IPX
Operation Command
Display interface status and interface display ipx interface [ type number ]
parameters of IPX
Display IPX router information table display ipx routing-table [ network |
static | default ] [ verbose ]
Display IPX server information table display ipx service-table [ type
service-type | name name | network
network | socket socket | order { net
| type } ] [ verbose ]
Display type and quantity of packets display ipx statistics
received and transmitted
Clear IPX statistical information. reset ipx statistics
PSTN Tel:
Modem Tel: 8810124 Modem
8810122 3.0.0c91.f61f
2.e0.fc01.0
Hub Hub
Sever1 Sever2
DLSw Protocol Data Link Switch Protocol (DLSw) is a method designed by Advanced Peer-to-Peer
Overview Networking (APPN) Implementers Workshop (AIW) to load SNA through TCP/IP
(SNA is a network protocol introduced by IBM in 1970's and completely
correspondent with OSI reference model). DLSw technology is one of the solutions
for implementing the transmission across WANs via SNA protocol.
TCP/IP
LAN LAN
End System DLSw DLSw End System
LLC2 LLC2
SSP
From the above diagram, you may find out the router with DLSw transforms the
frame in format LLC2 on the local SNA equipment into SSP frame which can be
encapsulated into TCP messages. Then it sends SSP frame to the remote end
through TCP channel across WANs, and transforms SSP frame into the
corresponding frame in LLC2 format at the remote end site, finally sends the latter
to the next-hop SNA equipment. In another words, DLSw makes the local
terminating equipment “think” the remote equipment locates in the same
network. With the differences from transparent bridge, DLSw transforms the
original LLC2 protocol frame into SSP protocol frame instead of
transparent-transmitting to the next hop directly, so as to encapsulate the existing
data into TCP messages. It features local acknowledgement mechanism, thus
reducing unnecessary data transmission (confirming frame and maintaining alive
frame) and resolving the overtime problem of data link control.
With DLSw technology, the transmission across TCP/IP via SDLC link protocol can
also be implemented. The procedure is to transform the messages in SDLC format
into the messages in LLC2 format, then utilize DLSw to intercommunicate with the
remote end. DLSw also supports intercommunication of different media between
LAN and SDLC.
384 CHAPTER 25: CONFIGURING DLSW
Operation Command
Create DLSw local peer entity dlsw local ip-address [ init-window
init-window-size ] [ max-frame
max-frame-size ] [ max-window
max-window-size ] [ permit-dynamic ]
[ vendor-id vendor-id ]
Delete DLSw local peer entity undo dlsw local
Operation Command
Create DLSw remote end peer entity dlsw remote ip-address [ backup
backup-peer-address ] [ priority
priority-value ] [ max-frame
max-frame-size ] [max-queue
max-queue-length ] [ linger minutes ]
[ compatible { 3com | nonstandard } ]
Delete DLSw remote end peer entity undo dlsw remote ip-address
Operation Command
Configure Bridge set connecting to DLSw dlsw bridge-set
Bridge-set-number
Delete Bridge set connecting to DLSw undo dlsw bridge-set
Bridge-set-number
Operation Command
Configure to add Ethernet port to Bridge set bridge-set
bridge-set-number
Delete the configuration of adding Ethernet port to undo bridge-set
Bridge set Bridge-set-number
Operation Command
Configure link layer protocol for interface encapsulation link-protocol sdlc
to be SDLC
Operation Command
Configure SDLC role sdlc status { primary | secondary }
Delete SDLC role undo sdlc status
SDLC role shall be configured according to the role of SDLC equipment connecting
with this router. If SDLC equipment connecting with the interface is primary, the
interface should be set to secondary. If the connected equipment is secondary, the
interface should be set to primary.
Generally, the central IBM mainframes are primary, and terminal equipment is
secondary, such as Unix host and ATM machine.
forwarding. This command is used to specify the virtual MAC address on the
interface, thus providing source MAC address for transforming SDLC message into
LLC2 message.
Please process the following configurations in the synchronous interface view.
Table 434 Configure SDLC virtual MAC address
Operation Command
Configure SDLC virtual MAC address sdlc mac-map local mac-address
[ sdlc-address ]
Delete SDLC virtual MAC address undo sdlc mac-map local [
sdlc-address ]
Operation Command
Configure SDLC address sdlc controller sdlc-address
Delete SDLC address undo sdlc controller
sdlc-address
partner shall be the MAC address of the remote end SNA equipment (physical
addresses of such equipment as Ethernet and Token-Ring) or next-hop MAC
address composed of SDLC.
Please process the following configurations in the synchronous interface view.
Table 436 Configure SDLC peer entity
Operation Command
Configure SDLC peer entity sdlc mac-map remote mac-addr
sdlc-addr
Delete SDLC peer entity undo sdlc mac-map remote mac-addr
sdlc-addr
Operation Command
Configure XID of SDLC sdlc xid sdlc-address
xid-number
Delete XID of SDLC undo sdlc xid sdlc-address
Operation Command
Add synchronous interface to Bridge set bridge-set
bridge-set-number
Delete the configuration of adding synchronous undo bridge-set
interface to Bridge set bridge-set-number
Configuration of DLSw 389
Operation Command
Enable running DLSw dlsw enable
Stop running DLSw undo dlsw enable
Operation Command
Configure baud rate of synchronous interface baudrate baudrate
By default, the baud rate of the serial interface on SNA equipment is 9600bps.
14 Configure Encoding Mode of Sync Interface
There are two kinds of encoding modes including NRZI and NRZ on the
synchronous serial interface. The routers in our company generally use NRZ
encoding mode, but the encoding mode of the serial ports in some SNA
equipment uses NRZI. So you need to change the encoding of routers according to
the encoding mode used by the connected equipment.
This command is used to change the encoding mode of synchronous serial
interface.
Please process the following configurations in the synchronous interface view.
Table 441 Configure encoding mode of synchronous Interface
Operation Command
Configure NRZI encoding mode of synchronous interface code nrzi
Delete NRZI encoding mode of synchronous interface undo code nrzi
Operation Command
Configure idle time encoding mode of synchronous idle-mark
interface
Restore idle time encoding mode of synchronous undo idle-mark
interface
Operation Command
Configure parameters of DLSw timer dlsw timer [ cache seconds ] [
connected seconds ] [ keepalive
seconds ] [ local-pending seconds ]
[ remote-pending seconds ]
Restore the default value of each undo dlsw timer [cache | connected |
parameter of DLSw timer keepalive | local-pending |
remote-pending ]
Operation Command
Configure LLC2 local acknowledgement delay time llc2 timer ack-delay
mseconds
Restore the default value of LLC2 local acknowledgement delay undo llc2 timer
time ack-delay
LLC2 pre-answer refers to sending answer packet to the peer in advance after
receiving the specified amount of packets. This parameter and local answer
display time in 1 controls the time to send answer packet together. If any
condition is satisfied, the answer packet will be sent, that is, it sends
acknowledgement message to the other part in advance after receiving the nth
message.
Please process the following configurations in the Ethernet interface view.
Table 445 Configure LLC2 premature acknowledgement window
Operation Command
Configure the length of LLC2 premature llc2 max-ack n
acknowledgement window
Restore the default length value of LLC2 premature undo llc2 max-ack
acknowledgement window
Operation Command
Configure the length of LLC2 Premature Acknowledgement llc2 receive-window
Window length
Restore the default length value of LLC2 premature undo llc2
acknowledgement window receive-window
Operation Command
Configure Modulo Value of LLC2 llc2 modulo n
Restore the default value of LLC2 modulo value undo llc2 modulo
Operation Command
Configure retransmission number of LLC2 llc2 max-transmission
retries
Restore the default value of the retransmission number of undo llc2
LLC2 max-transmission
Operation Command
Configure LLC2 Local Acknowledgement Time llc2 timer ack mseconds
Restore the default value of LLC2 local acknowledgement undo llc2 timer ack
time
Operation Command
Configure BUSY status time of LLC2 llc2 timer busy mseconds
Restore the default value of BUSY status time of LLC2 undo llc2 timer busy
Operation Command
Configure P/F wait time of LLC2 llc2 timer poll mseconds
Restore the default value of P/F wait time of LLC2 undo llc2 timer poll
Operation Command
Configure REJ status time of LLC2 llc2 timer reject mseconds
Restore the default value of REJ status time of LLC2 undo llc2 timer reject
Operation Command
Configure queue length of sending message of LLC2 llc2 max-send-queue length
Restore the default value of queue length of sending undo llc2 max-send-queue
message of LLC2
Operation Command
Configure queue length of sending message of SDLC sdlc max-send-queue length
Restore the default value of queue length of sending undo sdlc max-send-queue
message of SDLC
Operation Command
Configure the length of SDLC local acknowledgement sdlc window length
window
Restore the default length value of SDLC local undo sdlc window
acknowledgement window
Operation Command
Configure Modulo Value of SDLC sdlc modulo n
Restore the default value of SDLC modulo value undo sdlc modulo
394 CHAPTER 25: CONFIGURING DLSW
Operation Command
Configure Maximum Receivable Frame Length of SDLC sdlc max-pdu n
Restore the default value of maximum receivable frame undo sdlc max-pdu
length of SDLC
Operation Command
Configure retransmission number of SDLC sdlc max-transmission
retries
Restore the default value of the retransmission undo sdlc max-transmission
number of SDLC
Operation Command
Configure poll time interval of SDLC sdlc timer poll mseconds
Restore the default value of poll time interval of SDLC undo sdlc timer poll
Operation Command
Configure local SAP address for transforming SDLC to sdlc sap-map local lsap
LLC2 sdlc-addr
Restore the default value of local SAP address for undo sdlc sap-map local
transforming SDLC to LLC2 lsap
Configure remote SAP address for transforming SDLC sdlc sap-map remote dsap
to LLC2 sdlc-addr
Restore the default value of remote SAP address for undo sdlc sap-map remote
transforming SDLC to LLC2 dsap
Operation Command
Configure data bi-directional transmission mode of sdlc simultaneous
SDLC
Delete data bi-directional transmission mode of SDLC undo sdlc simultaneous
Operation Command
Configure acknowledgement wait time T1 of SDLC sdlc timer ack mseconds
Primary Station
Restore the default value of acknowledgement wait undo sdlc timer ack
time of SDLC primary station
Operation Command
Configure acknowledgement wait time T2 of SDLC sdlc timer lifetime
secondary station mseconds
Restore the default value of acknowledgement wait undo sdlc timer lifetime
time T2 of SDLC secondary station
Typical DLSw
Configuration
Example
Router A Router B
LLC2 LLC2
Ethernet Ethernet
SDLC
SDLC
00-28-33-00-2a-f5
Note that MAC address of partner is the same as MAC address of AS/400 network
card when configuring router B, but the word digital order on Ethernet and
Token-Ring are reversed, thus you should reverse the MAC addresses to configure
them. If the other part is Token-Ring, then you do not need to reverse it. In the
400 CHAPTER 25: CONFIGURING DLSW
above example, c1 and c2 are the equipment of PU2.0 type, and c3 is the
equipment of PU2.1 type.
Diagnosis and The normal communication of DLSw requires the sound coordination between the
Troubleshooting of two SNA equipments and two routers operating DLSw, which participate in the
DLSw Fault communication. Problem in the co-ordination between any of the two points is
likely to result in failure in connection.
Fault 1: TCP channel can not be created. The status shown is DISCONNECT
when using command display dlsw remote.
Creating TCP channel is the first step for the successful connection of DLSw. If TCP
connection can't be established, the problem lies between the two routers.
Generally, the problem is the configuration of IP address of the router. You can
check if the IP address of remote-peer is accessible by the ping command with the
source address. Also you can use display ip routing-table command to see if there
is any route to the network segment. TCP connection can be created once both
parties have established correct routes.
Fault 2: circuit can not be created correctly. To display dlsw circuits, the
virtual circuit can't attain CONNECTED state.
There are many causes that circuit can't be created. First of all, please make sure
that TCP connection to the opposite end is successfully established. If TCP
connection can be established successfully, while circuit can' t be created, this is
generally caused by the problem in the coordination of the router and SNA
equipment, mainly the problem of SDLC configuration.
Firstly, open the debugging switch of SDLC to observe if the SDLC interface can
receive and send messages successfully. You can use display interface command to
observe the condition of receiving and sending messages on the interface. If the
messages can't be received and sent correctly, it is generally because something is
wrong with the encoding mode of the interface, baud rate or clock configuration.
Generally, this can be solved by modifying the interface configuration parameter
of the router or adjusting the configuration parameter of SDLC equipment.
If the messages can be received and sent correctly, please check if the
configuration PU type is correct. You can use sdlc xid command to configure XID,
changing the setup of PU type.
If the messages can be received and sent correctly, you can check with display dlsw
circuits verbose command to see if the virtual circuit can enter into CIRCUIT_EST
status. If CIRCUIT_EST is not accessible all the time, it suggests that something is
wrong with the coordination between the MAC address and the partner
configured. Generally, this can be solved by modifying configuration parameters
such as sdlc partner.
If circuit can attain CIRCUIT_EST state, but can not attain CONNECTED state, it
suggests that the SDLC configuration of the router and the configuration of SNA
equipment are not matching. Check the configuration of SDLC equipment on
both ends and the configuration of the router to see if the configuration of the
XID of SNA equipment (PU2.1) and the configuration of XID of the router (PU2.0)
are correct. If nothing is wrong with the configuration, check the SDLC line on the
Diagnosis and Troubleshooting of DLSw Fault 401
IP Routing Protocol Routers are used to select the route in the Internet. A router selects a suitable path
Overview according to the destination host address contained in a received data packet, and
sends the data packet to the next router. The last router on the path sends the
data packet to the destination host.
Route and Route A router processes the path for transmitting a packet through a network as a
Segment logical route unit, referred to as a hop. For example, in Figure 142, a packet from
host A to host C passes through 3 networks and 2 routers for a total of 3 hops. It
shows that when two nodes are connected to each other by a network, they are
separated by one hop and are neighbors on the Internet. Similarly, two adjacent
routers are those connected to the same network. So, the hops from a router to
the local network host total 0. In the diagram, the bold arrows represent the hops.
The router does not handle data transmission through the physical links in each
route unit.
A
R R
R ou te
S e gm ent
R
R
C
R
B
Networks vary in size, so the actual length of each hop is also different. Therefore,
for different networks, the route segments can be multiplied by a weight
coefficient and then used to measure the length of a path.
If a router in the Internet is regarded as a node on the network, and a hop in the
Internet is regarded as a link, then routing in the Internet is similar to that in a
simple network. Sometimes it may not be optimal to select the route with the
fewest hops. For example, a route passing 3 LAN hops might be much faster than
a route passing 2 WAN hops.
Routing Tables The routing table is essential for a router to transfer data packets. Every router has
one routing table. The routing value in the routing table shows which physical port
406 CHAPTER 26: IP ROUTING PROTOCOL
According to the connection mode between the destination and the router, you
can classify the router as:
■ Direct route: The destination address and the router are located in the same
segment.
■ Indirect route: The destination address and the router are not located in the
same segment.
To keep the routing table within a certain size, a default route is set. Whenever a
data packet fails to find the routing table, the default route is selected to transfer
the data packet.
In complicated networks, the digits assigned to a router in each network are its
network address. For example, if router 8 (R8) is connected to three networks, it
has 3 IP addresses and 3 physical ports. The routing table is shown in the figure
below.
Routing Management Strategy 407
16.0.0.1 16.0.0.3
3Com routers support not only static route configuration, but also dynamic
routing protocols such as RIP, OSPF and BGP. Depending on the interface status
and user configuration, a router can automatically obtain some direct routes
during their operation.
Routing Management 3Com routers support both manual configuration of a static route to a specific
Strategy destination and dynamic routing protocol configuration which finds the route with
the routing algorithm to interact with other routers in the network. Both static
routes configured by the user and dynamic routes found by the routing protocol
are uniformly administered in the router.
Routing Protocol and Different routing protocols (including static routes) can find different routes to the
Routing Priority same destination, but not all these routes are optimal. In fact, at a certain
moment, the current route to a destination is determined only by a unique routing
protocol. As a result, every routing protocol (including static route) is assigned a
priority. When there are multiple route information sources, the route found by
higher-priority routing protocols become the current route. The routing protocols
and their default routing priorities (the less the value, the higher the priority) are
shown in the Table 465.
Here, 0 stands for a directly connected route and 255 stands for any route from
unknown sources or terminals.
Except for the direct route (Connected), the priority of each dynamic routing
protocol can be manually configured according to specific requirements. In
addition, each static route can have a different priority.
Support of the Route A backup route allows a router to automatically select another route to transmit
Backup data packets when the line changes, and enhances the user network reliability. To
implement route backup, you can set a different priority to the multiple routes to
the same destination. In fact, a user can set the highest priority to the route
passing the main path, and take turns to reduce the priority to the routes passing
backup paths. Normally, the router will send data through the main path. When a
fault occurs on the line, the route will be hidden, and router will select the backup
route with second-highest priority for data transmission. In this way, the
switchover from the active interface to the backup interface is implemented.
When the main path is recovered, the router recovers the route and begins
reselecting routes. Since the recovered route has the highest priority, it selects this
main route to transmit data.
Sharing Routes Learned As different protocols find different routes due to the various algorithms adopted
by each protocol, the problem of sharing the findings of different protocols is of
concern. On 3Com routers, a route learned by a routing protocol can be imported
to another routing protocol. Each protocol has its own route import mechanism.
27 CONFIGURING STATIC ROUTES
Static Route Overview A static route is a special route that allows a router to transmit packets over one
path to a specified destination. Proper setting and application of the static route
can guarantee network security effectively and at the same time, ensure
bandwidth for important applications.
If the topology changes due to network failure or other problems, the static route
cannot change automatically and requires the intervention of administrator.
Here, the attributes reject and blackhole are normally used to control the scope
of destinations reachable by this router, to facilitate network fault diagnosis.
Default Route
Default route is one type of static route that is used when no matching route is
found or when there is no suitable route. In the routing table, the default route is
the route to network 0.0.0.0 (mask is 0.0.0.0). You can check whether the default
route is properly set through the result of display ip routing-table command.
If the destination address of the message does not match any route item in the
routing table, the default route is selected. If there is no default route, this
message will be discarded and an ICMP message will be returned to the source
terminal, indicating that the destination address or network is unreachable.
410 CHAPTER 27: CONFIGURING STATIC ROUTES
Default routes are very useful in network. In a typical network with hundreds of
routers, dynamic routing protocols may consume lots of bandwidth resource.
Using default route means that you can replace high bandwidth links with
adequate bandwidth links to meet the requirements of communication for a large
number of subscribers.
Configuring a Static Configuring static and default routes involves tasks described in the following
Route sections:
■ Configuring a Static Route
■ Configuring a Default Route
Operation Command
Configure a static route ip route-static ip-address { mask | mask-length }
{ interface-type interface-number |
nexthop-address } [ preference value ] [ reject |
blackhole ]
Delete a static route undo ip route-static { all | ip-address { mask |
mask-length } [ interface-type interface-number |
nexthop-address ] [ preference value ] }
When NBMA interfaces like the interface encapsulated with X.25 or frame relay or
dial-up interface support point-to-multipoint mode, besides configuring the IP
route, you must also set up the secondary route at the link layer and map from the
Displaying and Debugging the Routing Table 411
IP address to the link layer address (such as dialer route ip, x.25 map ip or
fr map ip commands, and so on). In this case, you cannot specify the
transmitting interface for the static route and must configure the IP address of the
next hop.
Actually, all the route items must mark the address of the next hop. According to
the destination address of packets, an IP router searches for the matching route in
the routing table. Only when the address of next hop is specified in the route, can
the link layer find a corresponding address through this address and transfer
packets.
However, in certain cases (such as PPP encapsulated in link layer), the address of
the node on the other end may be unknown when the router is configured so that
the sending interface has to be specified. In addition, if the sending interface has
been specified, it is not necessary to change the router's configuration when the
address of the node connected on the other end is changed
■ Preference
Different preference configurations can achieve flexible route management. For
example, when configuring multiple routes to the same destination, if the
same preference is designated, load balancing can be realized. If different
preferences are designated, route standby can be realized.
■ Other parameters
The reject and blackhole attributes refer to unreachable routes and black
hole routes respectively.
Operation Command
Configure a default ip route-static 0.0.0.0 { 0.0.0.0 | 0 } {
route interface-type interface-number | nexthop-address
} [ preference value ] [ reject | blackhole ]
Delete a default route undo ip route-static 0.0.0.0 { 0.0.0.0 | 0 } [
interface-type interface-number | nexthop-address
] [ preference value ]
The parameters of this command mean the same as those in static route
configuration.
Displaying and Table 468 Displaying and Debugging the Routing Table
Debugging the
Routing Table Operation Command
Display the abstract information of the display ip routing-table
routing table
Display the information of specific route display ip routing-table ip-address
Display the detailed information of the display ip routing-table verbose
routing table
Display the radix information of the display ip routing-table radix
routing table
Display the static routing table display ip routing-table static
412 CHAPTER 27: CONFIGURING STATIC ROUTES
Static Route By configuring a status route, any two hosts or routes can communicate with each
Configuration other.
Example
Figure 144 Example of static route configuration
Host3 1.1.5.1
E0
1.1.5.2
s0 s1
1.1.2.2 Router C 1.1.3.1
s0
1.1.2.1 s0
E0 s1 s1 1.1.3.2
E0
1.1.1.2 1.1.6.1 1.1.6.2 1.1.4.1
Troubleshooting a The status of the physical interface and link layer protocol is UP, but IP packets
Static Route cannot be forwarded normally.
Configuration
Troubleshooting:
■ Use the display ip routing-table static command to check whether
related static routes are configured correctly or not.
■ Use the display ip routing-table command to see whether this static route
is already effective or not.
■ Check whether the next hop address is specified or specified correctly on the
NBMA type interface.
■ Check the secondary routing table of the link layer on the NBMA interface to
see if the configuration is correct.
28 CONFIGURING RIP
RIP Overview The Routing Information Protocol (RIP) is an interior gateway and dynamic routing
protocol based on the Distance-Vector (D-V) routing algorithm. RIP uses User
Datagram Protocol (UDP) packets to exchange routing information and adopts
hop count to measure the distance from the destination, called the routing cost. In
RIP, a hop count that is equal to or larger than 16 is defined as infinity (the
destination network or host is unreachable) so RIP is generally applied to
medium-sized networks, such as a campus network. RIP is not designed for
complicated and large-sized networks.
RIP has two versions, RIP-1 and RIP-2. RIP-2 supports simple text authentication
and MD5 authentication, as well as the variable-length sub-net masks.
Each router that runs RIP manages a database that includes route items of all
reachable routers on the network. A route item includes the following
information.
■ Destination address: The address of the host or network.
■ Next-hop address: The address of the next router through which this route
passes to get to the destination.
■ Interface: The interface where messages are forwarded.
■ Metric value: The overhead for the router to get to the destination. It is an
integer ranging from 0 to16.
■ Timer: The last time the route item was modified.
■ Route tag: The tag indicates whether it is an internal routing protocol route or
an external routing protocol route.
414 CHAPTER 28: CONFIGURING RIP
Configure RIP Begin all configuration tasks by first enabling the RIP routing process and
associating a network with an RIP routing process, then configure other functional
features related to RIP protocol. The task of configuring the interface-related
features is not subject to whether RIP has been enabled.
The original interface parameters become invalid after the RIP is closed.
Enabling RIP To enter RIP view, you must first enable RIP, then configure the parameters related
to the RIP protocol. Interface-related parameters are not subject to enabling of RIP.
Operation Command
Enable RIP and enter the RIP view rip
Disable RIP undo rip
The parameters related to an interface are also invalid after RIP is turned off.
Enabling RIP at the To flexibly control RIP operation, you can configure a corresponding network
Specified Network segment to RIP network so that RIP messages can be received and transmitted
through the specified interface.
Operation Command
Specify a list of networks associated with network { network-number | all }
RIP
Delete a list of networks associated with undo network { network-number | all }
RIP
The undo network command is associated with RIP by default after RIP is enabled.
After enabling RIP, you must specify a list of networks with the RIP, since RIP works
only on the interface of specified network segment. RIP won't receive or forward a
route on interfaces of non-specified network segments, and it functions as if these
interfaces do not exist. The network-number attribute specifies the address of the
enabled or disabled network or it can designate the network address of the
interfaces.
When the network command is used for a specified address, the interface of the
network segment of this address is enabled. For example: network 129.102.1.1,
use either the display current-configuration or the display rip command,
to see network 129.102.0.0.
416 CHAPTER 28: CONFIGURING RIP
Operation Command
Define a neighboring router peer ip-address
Cancel exchanging routing information undo peer ip-address
with a neighboring router.
Normally, this command is not recommended because the node on the other end
does not need to receive two identical packets at the same time. Also when a peer
sends messages, it is also subject to the restrictions of such commands as rip
work, rip output, rip input and network.
Specifying RIP Version RIP-2 has two sending modes, broadcasting and multicasting, with message
multicasting as the default mode. The multicast address in RIP-2 is 224.0.0.9. The
advantage of multicasting is that the host not running RIP in the network does not
receive RIP broadcast messages. In addition, message multicasting can also prevent
the host running RIP-1 from incorrectly receiving and processing the routes with
subnet mask in RIP-2.
When RIP-1 is running on the interface, the interface receives and transmits the
broadcast packets of RIP-1 and RIP-2 but does not receive RIP-2 multicast
messages. When RIP-2 is running on the interface, the interface can receive and
transmit RIP-1 and RIP-2 broadcast packets but cannot receive RIP-2 multicast
packets. When the interface runs in RIP-2 multicast mode, it receives and transmits
the RIP-2 multicast packets and does not receive the RIP-1 and RIP-2 broadcast
packets.
Operation Command
Configure the interface to run RIP-1 rip version 1
Configure the interface to run RIP-2 rip version 2 [ broadcast | multicast
]
Restore the default RIP version run on the undo rip version
interface
Configuring Check Zero The check zero command is used by the router to validate the version of the RIP
Field of RIP Version 1 Version 1 message. RFC 1058 stipulates that the ZERO FIELD in the RIP Version 1
header must be set to zero. If the checkzero parameter is set and the router
receives a message with the zero field not 0, the router will discard the RIP
message because it is the wrong version.
Configure RIP 417
RIP Version 2 does not have provisions for a zero field in its header so this
configuration is invalid for RIP-2.
Operation Command
Enable check zero field of RIP version 1 checkzero
Disable check zero field of RIP version 1 undo checkzero
Specifying the Status of You can specify the working status of RIP on an interface, such as whether RIP is
an Interface running on the interface and whether updated messages are transmitted or
received on the interface.
Operation Command
Specify running RIP on the interface rip work
Disable running RIP on the interface undo rip work
Specify receiving RIP update packets on rip input
the interface
Disable receiving RIP update packets on undo rip input
the interface
Specify sending RIP update packets on the rip output
interface
Disable transmitting RIP updated packets undo rip output
on the interface
By default, an interface can both receive and send RIP update packets.
The undo rip work command is similar to undo network command in that the
interface using either command no longer transmits an RIP route. They differ in
that in undo rip work mode, routes of related interfaces are forwarded and in
undo network mode, routes of related interfaces are not forwarded, as if an
interface was missing.
In addition, rip work functions similar to the combination of two commands rip
input and rip output.
Disabling Host Routes In some special cases, a router may receive large number of host routes from the
same network segment. These routes consume lots of network resources and are
of little use to route addressing. You can use the undo host-route command to
reject the messages of the host routes.
Operation Command
418 CHAPTER 28: CONFIGURING RIP
Enabling Route Route summarization summarizes the routes of different subnets within the same
Summarization for RIP natural network segment and sends the summary to other network segments as a
Version 2 summarized route with a natural mask. Route summarization largely reduces the
network expenditure and the routing table size.
RIP-1 always sends routes with natural mask. RIP-2 supports sub-net mask and
routs of unknown category. If the sub-net route needs to be broadcast, RIP-2 route
summary function can be disabled.
Operation Command
Enable automatic route summarization summary
Disable the automatic summarization undo summary
function of RIP-2
Configuring RIP-2 Packet Authentication for packets is not supported by RIP Version 1. But RIP Version 2
Authentication on the supports authentication.
Interface
RIP Version 2 supports authentication in two modes: simple text authentication
and MD5 authentication. Security is not ensured in simple text authentication.
Simple text means that the unencrypted authentication is transmitted with the
packets, therefore simple text authentication does not apply to a situation that
requires a high level of security. MD5 authentication has two message formats, in
compliance of the requirements of RFC1723 (RIP Version 2 Carrying Additional
Information) and RFC2082 (RIP Version 2 MD5 Authentication).
Operation Command
Specify a password for RIP Version 2 rip authentication-mode simple
simple text authentication password
Specify a key-string for RIP Version 2 MD5 rip authentication-mode md5
authentication key-string string
Set the packet format type of RIP-2 MD5 rip authentication-mode md5 type [
authentication nonstandard | usual ]
Cancel authentication for RIP Version 2 undo rip authentication-mode
Configuring RIP RIP is a Distance-Vector algorithm routing protocol. It uses the split-horizon
Horizontal algorithm to avoid loop routes. Split-horizon means that routes received at a
Segmentation on the certain interface are not sent to the same interface. If correct transmission of
Interface routes is more important than efficiency, then split-horizon should be disabled.
Operation Command
Configure RIP horizontal segmentation on rip split-horizon
the interface
Prohibit the interface from using undo rip split-horizon
split-horizon when sending RIP packets.
Configuring Route RIP allows importing the routes learned from other protocols.
Import for RIP
Perform the following configurations in RIP view.
Operation Command
Configure route import for RIP import-route protocol [ cost cost ] [
route-policy policy-name ]
Cancel route distribution for RIP undo import-route protocol
By default, RIP does not import routes from other domains into the routing table.
The protocol attribute specifies the source routing domain that can be imported.
At present RIP can import routes domain such as Connected, Static, OSPF,
OSPF-ASE, and BGP.
Specifying Default The import-route command is used to import routes of other routing protocols.
Route Metric Value for If import-route is not followed by the value of a routing metric, then the
RIP parameter value of default-med command is set as the metric value when
distributing other routing protocols.
Operation Command
Specify default route metric value for RIP default-cost cost
Restore the default route metric value for undo default-cost
RIP
Since the route metric of route import cannot be reverted, the dynamic route
information may be significantly distorted. Therefore, route import is done
cautiously to prevent loss of RIP protocol's performance.
Specifying Additional The additional routing metric here is to add input or output metric for routes
Route Metric Values for obtained for RIP. The rip metricin will add a designated metric value while
RIP receiving routes on the interface, then add this route metric value in the routing
table. The rip metricout does not directly change the route metric value in the
routing table, but will add a designated metric value when sending routes on the
interface.
Operation Command
Specify additional route metric value rip metricin metric
received for RIP
Restore the additional route metric value undo rip metricin
received for RIP to its default value
Specify additional route metric value being rip metricout metric
advertised for RIP
Restore the additional route metric value undo rip metricout
being advertised for RIP to its default value
By default, the additional route metric value received for RIP is 0 but ranges from 0
to 16. Additional route metric value being advertised for RIP is 1, ranging from 1
to 16.
Setting Route Preference Each routing protocol has its own preference that decides which routing protocol
is used to select the best route by IP route strategy. The greater the value is, the
lower the preference. RIP preference can be set manually.
Operation Command
Set the RIP route preference preference value
Restore the default value of RIP route undo preference
preference
Operation Command
Filter routing information received from a filter-policy gateway
specified gateway prefix-list-name import
Displaying and Debugging RIP 421
Operation Command
Change or cancel filtering the routing undo filter-policy gateway
information received from a specified prefix-list-name import
gateway
Filter the routing information received filter-policy {acl-number | ip-prefix
prefix-list-name } import
Change or cancel filtering routing undo filter-policy {acl-number |
information received ip-prefix prefix-list-name } import
Filter routing information received from a filter-policy ip-prefix
specified gateway and the routing prefix-list-name gateway
information received according to prefix-list-name import
prefix-list
Change or cancel filtering the routing undo filter-policy ip-prifix
information received from a specified prefix-list-name gateway
gateway and the routing information prefix-list-name import
received according to prefix-list
Operation Command
Filter the routing information being filter-policy { acl-number |
advertised. ip-prefix prefix-list-name } export [
protocol ]
Change or cancel filtering the routing undo filter-policy { acl-number |
information being advertised ip-prefix prefix-list-name } export [
protocol ]
By default, RIP does not filter any route information received or being advertised.
The protocol attribute specifies the routing domain that can be filtered. At
present, RIP can filter routes domain such as Connected, Static, OSPF, OSPF-ASE
and BGP. See “Configure Route Filter” of “Configuration of IP Routing Policy” for
details.
Resetting RIP This command restores the router to the default RIP configuration.
Operation Command
Reset RIP reset
RIP - Unicast RIP is a broadcast protocol so it can only exchange routing information with
Configuration non-broadcasting networks in unicast mode. This example shows how to
Example configure RIP message unicasting.
s0 192.1.1.1
Router A RouterA unicasts the
upgraded routing
information to RouterB
s0 192.1.1.2
Router C Router B
Troubleshooting RIP No updating messages can be received when the physical connection works well.
■ OSPF Overview
■ Configuring OSPF
■ Displaying and Debugging OSPF
■ OSPF Configuration Example
OSPF Overview Open Shortest Path First (OSPF) is an autonomous, link-state-based internal
routing protocol developed by Internet Engineering Task Force (IETF). The current
version is version 2 (RFC1583), which features the following:
■ Applicable range — Supports networks of various sizes and hundreds of
routers.
■ Fast convergence — Sends an update message immediately after the
topological structure of the network is changed, so the change can be
synchronized in the autonomous system.
■ No self-loop — OSPF calculates the route with the shortest path tree algorithm
through the collected link status. This algorithm ensures that no self-loop route
is generated.
■ Area division — An AS network can be divided into areas and the routing
information between the areas is further abstracted, reducing the bandwidth
occupation in the network.
■ Equivalent route ----support multiple equivalent routes to the same destination
address.
■ Route level --- the four levels of routes according to different priorities:
intra-area routes, inter-area routes, external route class 1 and external route
class 2.
■ Authentication ---- support interface-based message authentication to ensure
the security of the route computation.
■ Multicast ---packets are transmitted and received with multicast address on
multicasting link layer, greatly reducing interference to other netw ork devices.
The entire network is composed of multiple autonomous systems (AS). The link
state of an AS is collected and transmitted to determine and propagate the route
dynamically and then synchronize the information of the AS. Each system is
divided into areas. If a router port is allocated to multiple areas, it is an area
boundary router (ABR) since it is located at the boundary and connected with
multiple areas. Routing information of another area can be learned from the ABR.
All ABRs and the routers between them form a backbone area, tagged with
424 CHAPTER 29: CONFIGURING OSPF
0.0.0.0. All areas must be continuous logically. Thus, a virtual link is introduced to
the backbone to ensure that physically separated areas are still connected logically.
The router between the ASs is called autonomous system boundary router (ASBR).
Routing information, such as static routing, RIP routing, BGP routing, outside the
OSPF AS can be learned from the ASBR.
In addition, multiple adjacent relationship lists must be created so that each router
on the broadcast network and NBMA network can broadcast the local status
information (such as available interface information and reachable peer
information) to the whole system. Consequently, the route change of any router
may be transmitted many times, which is both unnecessary and wastes bandwidth
resources. To solve this problem, OSPF protocol selects a designated router (DR).
All routers send information to the DR, which broadcasts the network link status.
Two non-DR routers (DR Other) do not create neighboring relations with each
other and do not exchange any routing information. Then the number of
neighboring relations between the routers on the multi-address network is greatly
The OSPF protocol supports IP subnet and the marking and receiving of external
routing information. It supports interface-based message authentication to insure
the security of route calculation. Messages are transmitted and received in IP
multicast mode.
Configuring OSPF In all configuration tasks, the OSPF-specified interface and area number must be
defined first to configure other function features. The configuration of
interface-related function features is not restricted by whether OSPF has been
enabled. The original interface parameters become invalid after OSPF is
terminated.
■ Specify Router ID
■ Enabling OSPF
■ Associating an Area-id with the Specified Interface
■ Configuring the Network Type of the OSPF Interface
Configuring OSPF 425
Specify Router ID Router ID is a 32-bit integral with symbol, the exclusive ID of a router in the AS. If
all interfaces of the router have not been configured with IP addresses, the router
ID must be configured in OSPF view, otherwise OSPF will not run.
You must configure the router ID, which must be the same as the IP address of a
specific interface of this router.
Operation Command
Specify the router ID router id router-id
Delete the router ID undo router id
Please note when modifying the router ID, the system will display the following
message:
OSPF: router id has changed. If you want to use new router id, reboot
the router.
The configuration needs to be saved after the router ID is modified (execute the
save command in system view). After restarting the router, the new router ID will
take effect.
Operation Command
426 CHAPTER 29: CONFIGURING OSPF
Enable OSPF and enter into the OSPF view ospf enable
Turn off OSPF undo ospf enable
Associating an Area-id The OSPF protocol divides the autonomous system into areas. An area is the
with the Specified logical group of the router. Some routers belong to different areas (called area
Interface boundary router ABR), while a network segment can only be in one area. In other
words, each interface running the OSPF protocol must be put in a specific area.
The area is flagged with an area ID. The ABR transmits routing information
between areas.
In addition, in the same area, all routers must agree unanimously to the parameter
configurations of this area. So, in the configuration of routers in the same area,
most configuration data must be considered on the basis of this area. Incorrect
configurations make it impossible for adjacent routers to transfer information to
each other, or can even lead to the blocking or self-loop of routing information.
Table 489 Associate an Area-id with the Specified Interface which runs OSPF
Operation Command
Specify an area-id associated with the ospf enable area area-id
specified interface which runs OSPF
Delete an area-id associated with the undo ospf enable area area-id
specified interface
After OSPF is enabled, you must specify an area-id associated with the specified
interface. OSPF only works on the specified interface.
Configuring the The OSPF protocol calculates the route on the basis of the topological structure of
Network Type of the the neighboring network of this router. Each router describes the topology of its
OSPF Interface neighboring network and transmits this information to all other routers.
OSPF divides the network into 4 types according to the link layer protocols:
■ When the link layer is Ethernet, OSPF regards the network type as broadcast by
default.
■ When the link layer protocol is frame relay, HDLC and X.25, OSPF regards the
network type as NBMA by default.
■ No link layer protocol is considered as point-to-multipoint type by default. It is
usually manually modified from NBMA if the NBMA network is not wholly
interconnected.
■ When the link layer protocol is PPP, LAPB, OSPF regards the network type as
point-to-point by default.
NBMA is a Non Broadcast Multi Access network. The typical network is X.25 and
frame relay. Configure the poll-interval to specify the period for sending a polling
Configuring OSPF 427
hello packet before this interface sets up neighboring relations with the adjacent
routers.
The interface can be configured into nbma mode on the broadcast network
without multi-access capability.
If not all routers are inter-reachable on NBMA network, the interface can be
configured into p2mp mode.
If the router has only one opposite terminal in NBMA network, the interface can
also be changed to p2p mode.
Operation Command
Configure the network type of the OSPF ospf network-type { broadcast | nbma
interface | p2mp | p2p }
Delete the specified OSPF network type undo ospf network-type { broadcast |
nbma | p2mp | p2p }
After a new OSPF network type is configured, the old network type on the
interface will be replaced automatically.
Configuring Sending You can configure the cost of sending a packet on the interface, otherwise OSPF
Packet Cost automatically calculates the cost value according to the baud rate of the current
interface.
Operation Command
428 CHAPTER 29: CONFIGURING OSPF
The default value of the cost of sending a packet on the interface is calculated
automatically according to the interface baud rate as follows:
■ If the baud rate is less than 2000 bps, 2000 is taken, and the overhead value is
100000000/2000=50000.
■ If the baud rate is greater than 100000000 bps, 100000000 is taken, and the
overhead value is 100000000/100000000=1.
■ If the baud rate is between 2000 bps and 100000000bps, the overhead value
is the result of 100000000/interface rate.
Configuring a Peer for Special configuration is needed for the network of an NBMP interface. Since the
the NBMA Interface adjacent router cannot be found by broadcasting hello packets, the IP address of
the adjacent router should be specified manually for the interface, as well as
whether the adjacent router has a voting right. This is specified with the ospf
peer ip-address [eligible] command. To use the eligible attribute, this
adjacent router must have no voting right.
On X.25 and frame relay networks, you can configure a map to make the whole
network fully connected so there is a virtual circuit between any two routers ont
eh network and they are directly reachable. Then OSPF can process like a
broadcast network. The IP address of the adjacent router, and whether it has a
voting right, must be specified manually for the interface because the adjacent
router cannot be found dynamically by broadcasting hello packets.
Operation Command
Configure a peer for NBMA interface ospf peer ip-address [eligible]
Cancel or delete a peer for NBMA interface undo ospf peer ip-address
When you configure the peer of the NBMA interface, the following items are
necessary:
■ The configured hello timer and dead timer between neighbors must be
identical.
■ The configured link route type betwen neighbors must be identical.
■ The area number that neighbors belong to must be identical.
■ The authentication mode (simple text or MD5), authentication password, and
key-id of the area that neighbors belong to must be identical.
■ The configured stub attribute of the areas including the neighbors must be
consistent.
Configuring OSPF 429
Specifying the Router It is necessary to establish the peer relationship manually between interfaces for
Priority multi-point access network, (NBMA and broadcast type networks). But
establishing peer relationshipoccupies large amounts of system resources when
there are hundreds of routers in the network. To resolve this issue, OSPF specifies a
“designated router” (DR). All routers within the same network segment send the
relationship information to the DR, which broadcasts the link status of each
network segment. In this way, the number of the peer relationships between
different routers on the multi-access network is significantly reduced.
The DR is not designated manually, but voted by all routers in the local network
segment. The routers of Priority>0 in the local network segment can be used as
the “candidates”. The router with the greatest priority value is selected among all
routers that claim to be DR. If two routers have the same priority, the one with
greater router ID is selected. Routers vote by Hello packet. Each router writes the
DR into the Hello packet and sends it to all other routers on the network segment.
When two routers in the same network segment claim to be the DR, the one with
the higher priority is chosen. If the priorities are equivalent, the one with higher
router ID is chosen. If the priority of a router is 0, it is not selected as the DR or
“backup designated router” (BDR).
Operation Command
Set the priority of the interface when ospf dr-priority value
selecting a designated router
Return to the default router priority undo ospf dr-priority
430 CHAPTER 29: CONFIGURING OSPF
Specifying the Hello The Hello packet is periodically sent to the neighboring router to find and maintain
Interval OSPF neighbor relationship, and to elect the DR and BDR in the NBMA and
broadcast networks. When one router is started, it only sends hello packets to the
neighbors whose precedences are larger than 0, that is, the routers can possibly be
elected as DR or BDR. You can configure the interval for sending hello packets. If
the interval is too short, the network change can be easily found but the network
load will be greatly increased. An appropriate value must be selected for the
specific network conditions.
The poll-interval attribute must be at least 3 times the value for hello-timer.
Operation Command
Set the time interval for the interface to ospf timer hello seconds
send hello packets
Return to the default hello interval time undo ospf timer hello
Specify the length of poll-interval on ospf timer poll seconds
NBMA and point-to-multipoint network
type
Return to the default poll interval time undo ospf timer poll
By default, the hello-timer on the p2p interface is 10 seconds and the hello timer
on the p2mp amd nbma interfaces on the same network segment must be
identical.
Specifying the Dead The expiration time of a neighboring router means that if a hello packet of the
Interval neighbor router (peer) is not received within a certain period, the neighbor router
is invalid. You can specify the dead-timer, the period where the peer route fails.
The value of the dead-timer must be at least 4 times the value of the hello-timer.
Operation Command
Specify the expiration duration of the ospf timer dead seconds
OSPF neighbor
Return to the default value of dead undo ospf timer dead
interval
By default, the dead-timer on the p2p interface is 40 seconds and on p2mp and
nbma interface the dead-timer is 120 seconds, ranging from 1 to 65535 seconds.
Note that:
■ The dead-timer of the router on the same network segment must be the same.
■ When you modify the network type, the hello-timer and dead-timer are both
restored to their default values.
Configuring OSPF 431
Specifying the The router waits for confirmation from the neighbor to whom it has sent an LSA. If
Retransmitting Interval the router does not receive the neighbor's confirmation after a specified interval,
the retransmitting interval, it resends the LSA. You can set the time interval for
re-transmitting an LSA.
Operation Command
Configure the interval of LSA ospf timer retransmit seconds
retransmission for the neighboring routers
Return to the default value of undo ospf timer retransmit
re-transmitting interval
The interval for retransmitting an LSA between adjacent routers must not be so
small as to cause unnecessary retransmission.
Specifying the The LSA ages in the link status database (LSDB) of the local router (1 is added per
Transmit-delay second), but not during the process of network transmission. Therefore, it is
necessary to add the aging time before the transmission. Set and adjust this
parameter according to the actual situation in the low-speed network.
Operation Command
Set the delay time of LSA tramsmission ospf trans-delay seconds
Return the default value of transmit-delay undo ospf trans-delay
A “stub area” is the area that does not advertise the received external LSA, inside
which the scale of the routing table and the quantity of the transmitted routing
432 CHAPTER 29: CONFIGURING OSPF
information is reduced greatly. A default routing (0.0.0.0) is generated for the area
by the ABR of the area to insure that these routes are reachable. A stub area is an
optional configured attribute, but it does not mean that each area is configurable.
Usually, a stub area is located at the boundary of the AS. A non-backbone area
with only one ABR or multi-ABR that are not virtually connected between ABRs
can be configured as a stub area.
A “totally stubby area” is the area that does not receive Type-3, Type-4, and Type-5
LSA (excluding Type-3 LSA which contains default routing and is generated by the
ABR). Inside such areas, there is no route to the outside and other areas of the AS,
so the scale of the routing table and the quantity of the transmitted routing
information is less.
When a stubby area or totally stubby area is configured, the following must be
noted:
■ The backbone area cannot be configured as a stubby area or totally stub area
and the virtual connection cannot pass through a stubby area or totally stub
area.
■ If one area is configured as stubby area or totally stub area, all routers in this
area must be configured with this attribute.
■ An ASBR cannot be inside a stubby area or a totally stub area, which means
that the exterior route of the AS cannot be transferred to the area.
Operation Command
Define an area as stub area or totally stub stub cost cost area area-id [
area and specify cost value. no-summary ]
Cancel Stub Area undo stub cost cost area area-id [
no-summary ]
By default, no stubby area or totally stub area is configured. The cost of the
default routing sent to Stub area is 1.
The area is configured of totally stub area when no-summary option is selected
Configuring an NSSA NSSA areas are areas that can import external routing by itself and advertise in the
Area AS, but cannot accept external routing generated by another area in the AS.
Actually an NSSA area is one form of a stub area, which can conditionally import
AS external routing. A new area-NSSA Area and a new LSA-NSSA LSA (or called
Type-7 LSA) are added in the RFC1587 OSPF NSSA Option.
The NSSA and stub area are similar in many ways. Neither of them generates or
redistributes an AS-External-LSA (namely Type-5 LSA), and both of them can
generate and import a Type-7 LSA. Type-7 LSA is generated by the ASBR in an
NSSA area, which can only advertise in an NSSA area. When a Type-7 LSA reaches
the ABR of an NSSA, the ABR selects whether to transform the Type-7 LSA into an
AS-External-LSA to advertise to other areas.
Configuring OSPF 433
In the following group network, an AS operating the OSPF protocol includes three
areas, area 1, area 2, and area 0. Area 0 is the backbone area. The other ASs
operate RIP. Area 1 is defined as an NSSA area. After an RIP route advertises to the
NSSA ASBR that generates a Type-7 LSA and propagates in Area 1. After the
Type-7 LSA reaches the NSSA ABR, it is transformed into a Type-5 LSA that is
advertised to Area 0 and Area 2. The RIP route is generated as a Type-5 LSA and
propagated in the OSPF AS by the ASBR of Area 2. This Type-5 LSA will not reach
Area 1 because Area 1 is an NSSA area. On this point, an NSSA area and a stub
area are the same.
Operation Command
Configure an area as NSSA area nssa area area-id [
default-route-advertise ] [
no-import-route ] [ no-summary ]
Cancel the configured NSSA area undo nssa area area-id
The no-import-route attribute is used on the ASBR, which allows the OSPF route
that is imported using the import-route command, to not be advertised to the
NSSA area. If the NSSA router is both ASBR and ABR, this parameter option is
always selected.
Configuring Route Route summary provides that the routing information is processed in the ABR.
Summarization within Only one route is sent to other areas for the network segment configured with
the OSPF Domain. summary. One area can be configured with multiple summary network segments
so that OSPF can summarize multiple network segments. When the ABR sends
routing information to other areas, Sum_net_Lsa (Type 3 LSA) is generated for
each network segment. If there are some continuous network segments in the
area, they can be summarized into one network segment with a range command.
Then the ABR only sends one summery LSA and all other LSAs in the summary
network segment range specified with this command are not sent separately,
434 CHAPTER 29: CONFIGURING OSPF
which reduces the LSDB in other areas. The configuration of range is only effective
when it is configured on teh ABR in the stub area.
Note that the route summary is only effective when configured on an ABR.
Operation Command
Configure route summarization within abr-summary address mask mask area
OSPF domain. area-id [ advertise | notadvertise ]
Cancel route summary between areas undo abr-summary address mask mask
area area-id
It must be noted that a routing summary configuration is only valid on the ABR.
Creating and After the OSPF area division, all the areas may not be of equal size. One particular
Configuring a Virtual area is unique and that is the backbone area with the area-id of 0.0.0.0. OSPF
Link route update between non-backbone areas is carried out through the backbone
area. The OSPF protocol requires that all non-backbone areas be connected to
backbone areas and at least one port on an ABR must be in the area 0.0.0.0. If
there is no physical connection between an area and the backbone area 0.0.0.0, a
virtual link must be created.
The virtual link is activated after the route through the transit area is calculated. It
is equivalent to a point-to-point connection between two terminals. Parameters
can be configured for this connection like a physical interface, such as sending a
hello-timer.
A “logic channel” is provided for multiple routers running OSPF that forwards
messages between two ABRs. Since the destination addresses of the protocol
messages are not these ABRs, the messages are transparent to them and they are
transmitted as ordinary IP messages, while routing information is transmitted
directly between the two ABRs. Routing information here means an LSA of Type3
that is generated by ABR. The synchronization of routers in the area is not
changed.
Operation Command
Create and configure a virtual link vlink peer-id router-id transit-area
area-id [ hello-timer seconds ] [
retransmit-timer seconds ] [
transit-delay seconds ] [ dead-timer
seconds ]
Delete the specified virtual link undo vlink peer-id router-id
transit-area area-id
By default, there is no virtual link is created. The attributes for this command have
the following default values:
■ area-id : None
■ router-id : None
■ hello-timer: 10 seconds
■ retransmit-timer: 5 seconds
■ transit-delay: 1 second
436 CHAPTER 29: CONFIGURING OSPF
■ dead-timer: 40 seconds
Configuring OSPF supports simple text authentication and MD5 authentication between
Authentication adjacent routers.
Operation Command
Specify a password for OSPF simple text ospf authentication-mode simple
authentication password
Specify the string and key-id for OSPF ospf authentication-mode md5 string
MD5 authentication key-id
Cancel authentication on the interface undo ospf authentication-mode
Configuring Route The dynamic routing protocols on the routers can share routing information. Due
Import for OSPF to OSPF features, the routes found by other routing protocols are always regarded
as the routes outside the AS in processing. In the receiving command, the cost
type of the route, cost value, and flag can be specified to overlap default routing
parameters.
Operation Command
Configure route import for OSPF import-route protocol [ cost cost ] [
type 1 | 2 ] [ tag tag-value ] [
route-policy policy-name ]
Cancel route distribution for OSPF undo import-route protocol [ cost
cost ] [ type 1 | 2 ] [ tag tag-value
] [ route-policy policy-name ]
By default, OSPF does not import routes from other domains into the routing
table.
The protocol attribute specifies the source routing domain that can be imported.
At present, OSPF can import routes domain such as connected, static, RIP, and
BGP.
See“Configuring Route Import for OSPF” for the details of routing import.
Configuring Parameters When the routes found by other routing protocols on the router are received by
when Importing OSPF as the external routing information of its own AS, some other parameters
External Routes are needed, including the default cost and default tag of the route. Router tag can
be used to identify the information related to the protocol, such as the number
OSPF uses as the AS number when receiving BGP protocol.
OSPF specifies two types of cost selection modes of external routing information in
the protocol. You can configure receiving the default cost type of the route.
Operation Command
Configure the default cost value when default import-route cost cost
OSPF importing external routes
Return to the default cost value when undo default import-route cost
OSPF importing external routes
Configure the interval for OSPF importing default import-route interval
external routes seconds
Return to the default interval value for undo default import-route interval
OSPF importing external routes seconds
Configure the upper limit of routes that default import-route limit routes
OSPF can import
Restore default value of routes that OSPF undo default import-route limit
can import
Configure the default tag value when default import-route tag tag
OSPF importing external routes
Return to the default tag value when OSPF undo default import-route tag
importing external routes
Configure the default type when OSPF default import-route type { 1 | 2 }
importing external routes
Return to the default route type when undo default import-route type
OSPF importing external routes
438 CHAPTER 29: CONFIGURING OSPF
By default, the cost value is 1, and the tag value is 1. The imported route is
external route Type 2, the interval of importing external route is 1 second and at
most 150 external routes can be imported in each interval.
Setting Route Preference Multiple dynamic routing protocols may be executed on the router at the same
time, the problem of information sharing and selection between the routing
protocols can occur. The system sets a priority for every routing protocol. When
several protocols find the same route, the protocol with higher priority will
supercede.
Operation Command
Specify OSPF route preference preference [ ase ] value
Return the default value of OSPF route undo preference [ ase ]
preference
By default, OSPF route preference is 10. The preference of the imported external
routing protocol is 150.
Operation Command
Filter the routing information received filter-policy acl-number import
Change or cancel filtering routing undo filter-policy acl-number import
information received
Operation Command
Display OSPF routing table information display ospf routing
Display the information about OSPF virtual display ospf vlink
links
Turn on the OSPF debugging packet debugging ospf { event | packet [ ack
switches | dd | hello | request | update ] |
lsa | spf }
Turn off the OSPF debugging packet undo debugging ospf { event | packet
switches [ ack | dd | hello | request | update
] | lsa | spf }
OSPF Configuration This section describes several different configurations of OSPF with a suggested
Example procedure for each configuration
Configuring OSPF on the The configuration for this example includes the following features:
Point-to-Multipoint ■ Router A communicates with Router B through DLCI 101, communicates with
Network. Router C through DLCI 102, and communicates with Router E through DLCI
103.
■ Router B communicates with Router A through DLCI 201 and communicates
with Router C through DLCI 202.
■ Router C communicates with Router A through DLCI 301 and communicates
with Router B through DLCI 302.
■ Router D communicates with Router E through DLCI 401.
■ Router E communicates with Router A through DLCI 501 and communicates
with Router D through DLCI 502.
301
FR 302
s0
501 s0
Router E 401 Router C
1.1.1.5 502 s0 1.1.1.3
Router D
1.1.1.4
1.1.1.1 4.4.4.4
DR
Router A Router D
E0 192.1.1.1/24 E0 192.1.1.4/24
E0 192.1.1.2/24 E0 10.1.2.3/24
BDR
Router B Router C
2.2.2.2 3.3.3.3
Run display ospf peer on Router A to show OSPF peer. Note that Router A has
3 peers.
The status of every peer is full, which means that Router A has created
neighboring relation with all peers. Only DR and BDR have created neighboring
relation with all routers on the network. Router A is DR and Router C is BDR on the
network. All other peers are DRother, which means that they are neither DR nor
BDR.
Run display ospf peer on Router A to show OSPF peers. Note that the
preference of Router B has been changed to 200, but it is not DR.
Only when the DR no longer exists on the network are the DR changed. Shut
down Router A and run display ospf peer on Router D to display peers. Note
that Router C, which was BDR, now becomes DR and so does Router B.
Shutting down the router and restarting leads to the reelection of DR and BDR.
Restart router A and run the display ospf peer command to display peers. Note
that router B is elected DR (whose preference is 200) and Router A becomes BDR
(whose preference is 100).
Configuring an OSPF Area 4 is not directly connected with area 0 in the following diagram. Area 1
Virtual Link serves as the transit area to connect area 4 and area 0. Configure a virtual link
between Router B and Router C.
Router A
1.1.1.1
Area 0 E0 192.1.1.1/24
E0 192.1.1.2/24
Router B S0 193.1.1.2/24
2.2.2.2
Virtual S0 193.1.1.1/24
Area 1
Link
Router C E0 152.1.1.1/24
3.3.3.3
Area 2
Configuring OSPF Peer Verify peer authentication with simple text algorithm and MD5 algorithm. Simple
Authentication text authentication is used when Router A and Router B exchange route updating
and MD5 authentication is used when Router A and Router C exchange route
updating. The Ethernet interface of Router A and that of Router B are in OSPF area
0.The serial interface of Router A and that of Router B are both in area 1,
configured with MD5 authentication.
E0 192. 1. 1. 2/ 24
Area 0 Simple authentication
Router B
2.2.2.2
E0 192. 1. 1. 1/ 24
0
1.1.1.1
Router A
S0 193. 1. 1. 1/ 24
S0 193. 1. 1. 2/ 24
3.3.3.3
Router C
Troubleshooting an You have configured OSPF as described previously, but router OSPF fails to run
OSPF Configuration normally.
View OSPF information on the interface with the display ospf interface
command.
■ Check whether the physical connection and low layer protocol are running
normally. If the opposite router cannot ping through the local router, it means
that the physical connection and lower layer protocol are faulty.
■ If the physical connection and lower layer protocol are normal, check the OSPF
parameters configured on the interface. The parameters must be the same as
those of the adjacent routers of this interface. The parameters include
hellointerval, deadinterval and authentication. The area-id must be the same
and the network segment and mask must be consistent (the network segment
and mask of point-to-point and virtual link can be different).
■ Check whether the deadinterval value is at least 4 times the hellointerval value
on the same interface.
■ If the network type is NBMA or point-to-multipoint, or the interface type is
manually modified to point-to-point, use command ospf network-type p2p
to manually specify the peer. In addition, when two routers are connected in
OSPF Configuration Example 447
dial-up mode, although the PPP protocol is encapsulated on the link layer, it is
still NBMA type. The peer must be specified manually. Use the ospf peer
ip-address command.
■ If the network type is broadcast network or NBMA, at least the priority of one
interface must be over 0.
■ If an area is configured to a stub area, all routers connected with this area must
be configured to stub areas.
■ The interface type of two adjacent routers must be the same.
■ If two or more areas are configured, at least one area must be configured into
a backbone area (area 0).
■ Make sure the backbone area is connected with all areas.
■ A virtual connection cannot go through stub area.
2 Global troubleshooting: If the previous steps are correct but OSPF still cannot find
the remote route, check the following features of the configuration.
■ If two or more areas are configured for one router, at least one area must be
configured as a backbone area (the area-id of one area must be 0 or a virtual
link must be configured).
As shown in the following diagram, only one area is configured on Router A and
Router D and two areas are configured respectively for Router B (area0, area1) and
Router C (area1, area2). One area in Router B is 0, which satisfies the requirement.
However, none of the two areas in Router C is 0. In such a case, a virtual link must
be set up between Router C and Router B.
ar ea 0 ar ea 1 ar ea 2
■ BGP Overview
■ Configuring BGP
■ Displaying and Debugging BGP
■ BGP Configuration Example
BGP Overview Border Gateway Protocol (BGP) is an inter-AS dynamic route discovery protocol. Its
primary function is to exchange loop-free routing information between ASs
automatically and to construct the topology diagram of an AS through the
exchange of path reachability information, including AS numbers. It constructs the
topological diagrams of the ASs to eliminate route loops and carry out user
configured strategies. The BGP protocol is usually used between ISPs.
The current version of BGP is BGP- 4. It applies to the distributed structure and
supports classless interdomain routing (CIDR). BGP-4 has become the standard of
Internet external routing protocol. It features the following:
■ BGP is an external routing protocol, oriented to control route spreading and
select best route rather than find and calculate route. This is different from the
internal routing protocol.
■ Completely resolves the route loop problem by carrying AS path information.
■ Uses TCP as the transmission layer protocol, improving the reliability of the
protocol.
■ BGP-4 supports classless interdomain routing (CIDR), or supernetting. CIDR
judges the IP address in a totally new way. It no long recognizes network class
A, network class B, or network class C. For example, with CIDR, an illegal class
C network address 192.213.0.0 (255.255.0.0) is indicated as 192.213.0.0/16,
which is a legal supernetwork. /16 means that the subnet mask is 16bit starting
from the left of the address. The introduction of CIDR simplifies the route
aggregation. Route aggregation is the combination of several routes. Thus one
route instead of several routes are distributed and the routing table is
simplified.
■ When a route is updated, BGP only sends the incremental route. In this way,
BGP occupies much less bandwidth in transmitting routes. It applies to the
transmission of a large amount of routing information on the Internet.
■ For political and economic reasons, each AS must filter, select and control the
routes. BGP-4 provides abundant routing strategies for easy expansion of BGP
to support new developments of the Internet.
450 CHAPTER 30: CONFIGURING BGP
The BGP system runs on a specific router as a high layer protocol. At system
startup, the whole BGP routing table is transmitted for the exchange of routing
information. Later on, only an update message is transmitted for updating the
routing table. In the system, keep-alive messages are received and transmitted to
check whether the connection between routers is normal.
The router transmitting the BGP message is called the BGP speaker. It receives and
generates new routing information from time to time and advertises to other BGP
speakers. When a BGP speaker receives a new route advertisement from other
ASs, if this route is better than the existing route, or if there is no acceptable route
currently, the BGP speaker broadcasts this route to all other BGP speakers in the
AS. BGP speakers are peers to each other and several related peers form a peer
group.
The BGP protocol system is driven by messages that can be divided into 4
categories:
■ Open message. This is the first transmitted message after the connection is
created. It is used to create a connection between BGP peers
■ Update message is the most important message in BGP system, and is used to
switch routing information among the peers. Update message consists of three
parts: unreachable route, path attributes and Network Layer Reachability
Information (NLRI).
■ Notification message notifies errors.
■ Keep-alive message is used to check the validity of the connection.
Configuring BGP A BGP configuration includes tasks described in the following sections:
■ Enabling BGP
■ Configuring Networks for BGP Distribution
■ Configuring Peers
Enabling BGP Specify the local AS number when BGP is enabled. After BGP is enabled, the local
router continuously monitors whether any incoming BGP connection request is
received from the peer routers. To make the local router send BGP connection
requests to the peer routers, use the peer command. When BGP is turned off,
BGP protocol closes all BGP connections that have been created.
Operation Command
Enable BGP and enter into the BGP view bgp [ as-number ]
Turn off the BGP undo bgp
Operation Command
Specify a list of networks associated with network ip-address [ mask
BGP address-mask ] [ route-policy
policy-name ]
Delete a list of networks associated with undo network ip-address [ mask
BGP address-mask ]
Configuring Peers The routers that exchange BGP packets are called peers to each other. Peers can
be directly connected routers or indirectly connected routers but should be
connected by other directly connected router or routers.
BGP peer basic configuration includes setting the AS number of the peer.
Operation Command
Configure AS number of the peer peer peer-address as-number
as-number
452 CHAPTER 30: CONFIGURING BGP
Operation Command
Configure connection between EBGP peer peer-address ebgp-max-hop [
peers connected indirectly max-hop-count ]
Return to the default BGP connections to undo peer peer-address ebgp-max-hop [
external peers max-hop-count ]
By default, the BGP connection can be established with a directly connected peer
router.
Operation Command
Configure the BGP version of the peer peer peer-address version
version-number
Unconfigure the BGP version of the peer undo peer peer-address version
Operation Command
Set the timers for BGP peer peer peer-address timers
keepalive-interval holdtime-interval
Set the timers for BGP peer to default undo peer peer-address timers
value
Caution: The timer configured with this command is of higher preference than
that configured with the timers command.
4 Configure the BGP route-update interval.
Table 514 Configure BGP Route-update Interval
Operation Command
Configure BGP route-update interval peer peer-address
route-update-interval seconds
Restore BGP route-update interval undo peer peer-address
route-update-interval
Operation Command
Configure to send community attribute to peer peer-address
the peer advertise-community
Cancel sending community attribute to undo peer peer-address
the peer advertise-community
Operation Command
Configure the peer to be the client of the peer peer-address reflect-client
route reflector
Cancel the configuration of making the undo peer peer-address
peer as the client of the BGP route reflect-client
reflector
Operation Command
Configure to distribute default route to peer peer-address
the peer default-route-advertise
Configure not to distribute default route undo peer peer-address
to the peer default-route-advertise
By default, the local router does not advertise the default route to any peer. A next
hop should be sent to the peer unconditionally as the default route.
8 Set the own IP address as the next hop when the peer distributes routes.
Set the router's own IP address as the next hop when the peer distributes routes.
Table 518 Set the Own IP Address as the Next Hop When the Peer Distributes Route
Operation Command
Set the own IP address as the next hop peer peer-address next-hop-local
when the peer distributes route
Not to Set the own IP address as the next undo peer peer-address
hop when the peer distributes route next-hop-local
By default, its own address is not the next hop when the peer distributes routes.
Operation Command
Create a routing policy for the peer peer peer-address route-policy
policy-name { import | export }
Remove a routing policy to import or undo peer peer-address route-policy
export routes policy-name { import | export }
454 CHAPTER 30: CONFIGURING BGP
By default, the route from the peer or peer group is not designated with any route
policy.
Operation Command
Create an filter policy based on access list peer peer-address filter-policy
for the peer acl-number { import | export }
Remove an filter policy based on the undo peer peer-address filter-policy
access list for the peer acl-number { import | export }
11 Create BGP route filtering based on the AS path for the peer. By default, a BGP
filter is disabled.
Table 521 Create a BGP Route Filtering Based on AS Path for the Peer
Operation Command
Create a BGP route filtering based on AS peer peer-address acl
path for the peer aspath-list-number { import | export
}
Delete a BGP route filtering based on AS undo peer peer-address acl
path for the peer aspath-list-number { import | export
}
Setting the MED for the The multi-exit discriminator (MED) is the external metric of a route. It is different
AS from the local preference attribute. MED is switched between ASs and the MED
that has entered the AS does not leave the AS. AS uses local attributes for its own
out-site selection processing while MED attribute is used to select the best route.
The route with smallest MED value is selected. When a router running BGP gets
routes with the same destination address but a different next hop through
different external peers, it makes a preference selection based on the MED values.
To operate the MED attribute, an access control list is used to indicate what
network will be operated.
Operation Command
Configure MED for an AS default-med med
Restore the default MED of an AS undo default-med
Allow Comparing Path This command is used to compare MED values from different AS neighboring
MED routes and to select the best route. The route with smaller MED value is selected.
Operation Command
Configuring BGP 455
By default, MED values from different AS neighboring routes are not compared
when determining the best route.
This configuration should not be used unless it is certain that different ASs uses
the same IGP and routing modes.
Configuring the Local Configuring different local preferences affects BGP routing selection. When a
Preference router running BGP gets routes with the same destination address but different
next hops through different internal peers, it selects the route of the highest local
preference to this destination.
Operation Command
Configure the local preference default local-preference value
Restore the local preference value to its undo default local-preference
default value
Configuring BGP Timers The interval of sending keepalive messages required by RFC and BGP holdtime are
important parameters in BGP protocol.
When a router has created a BGP connection successfully with the other router, it
sends keepalive messages to this router with the time interval set by the
keepalive-interval attribute to indicate whether the connection channel is
normal. Generally, the time interval for sending a keepalive message is one third of
the value for the holdtime attribute.
The value of the holdtime-interval attribute is the time interval for continuously
receiving keepalive and update messages. If a keepalive or update message is
received, the holding timer is reset. If a router has not received any messages from
the opposite router for a specific period of holding time, this BGP connection is
considered broken and is cut off. The router can negotiate with the
interconnected router to set a shorter holding time.
Table 525 Configure the Keepalive Timer and Holdtime Tmer for BGP
Operation Command
Configure the keepalive timer and timers keepalive-interval
holdtime timer for BGP holdtime-interval
Restore BGP network timers to their undo timers
default value
By default, the value for the keepalive-interval attribute is 60 seconds and may
have a value ranging from 1 to 4294967295 seconds. The default value for the
456 CHAPTER 30: CONFIGURING BGP
Configuring a BGP Peer The BGP peer group command can be used for user configuration. When starting
Group several peers of the same configuration, you can first create and configure one
peer group, then add other peer groups into this group to get the same
configuration.
Configuring a basic BGP peer group includes creating a peer group and adding a
peer to the group.
Operation Command
Create a peer group peer group-name group
Delete a specified peer group undo peer group-name group
Reset the connection of all members in reset bgp group group-name
the peer group
Operation Command
Add a peer to the BGP peer group peer peer-address group group-name
Delete a member from the BGP peer undo peer peer-address group
group group-name
Operation Command
Configure AS number of BGP peer group peer group-name as-number as-number
Remove AS number of BGP peer group undo peer group-name as-number as-number
Operation Command
Configure connection between peers peer group-name ebgp-max-hop [ ttl ]
indirectly connected
Return to the default BGP connections to undo peer group-name ebgp-max-hop
external peer group
Operation Command
Set the timers of BGP peer group peer group-name timers keepalive-interval
holdtime-interval
Restore the timers of BGP peer group to undo peer group-name timers
default value
Operation Command
Configure BGP routing update sending peer group-name
interval route-update-interval seconds
Restore BGP routing update sending undo peer group-name
interval route-update-interval
Operation Command
Configure to send community attribute to peer group-name advertise-community
a BGP peer group
Delete the BGP community en to the peer undo peer group-name
group. advertise-community
458 CHAPTER 30: CONFIGURING BGP
Operation Command
Configure peer group as the client of BGP peer group-name reflect-client
reflector
Disable peer group as the client of BGP undo peer group-name reflect-client
reflector
Operation Command
Configure to send the default route to peer group-name
peer group default-route-advertise
Do not allow to send default route to the undo peer group-name
peers default-route-advertise
By default, the local router does not advertise the default route to any peer group.
A next hop should be sent to the peer unconditionally as the default route.
8 Set the router’s own IP address as the next hop when the peer group distributes
route information.
Cancel the processing of next hop when sending a route to the peer and take the
self-address as the next hop.
Table 535 Set the Own IP address as Next Hop When Peer Group Distributes Route
Operation Command
Set the own IP address as next hop when peer group-name next-hop-local
peer group distributes route
Not to set the own IP address as next hop undo peer group-name next-hop-local
when peer group distributes route
By default, the router’s own IP address is not set as the next hop when the peer
group distributes routes.
9 Create a routing policy for the peer group
Table 536 Create Routing Policy for Peer Group
Operation Command
Configuring BGP 459
By default, the route from the peer or peer group is not designated with any route
policy.
10 Create a filtering policy based on the access list for the peer group
Table 537 Create a Filtering Policy Based on Access List for Peer Group
Operation Command
Create an filtering policy based on access peer group-name filter-policy
list for peer group acl-number { import | export }
Delete an filtering policy based on access undo peer group-name filter-policy
list for peer group acl-number { import | export }
By default, no route filtering policy based on IP ACL for peer group is set.
11 Create a BGP route filtering based on the AS path for the peer group
Table 538 Create a BGP Route Filtering Based on AS Path for Peer Group
Operation Command
Create a BGP route filtering based on AS peer group-name acl
path for peer group aspath-list-number { import | export
}
Delete a BGP route filtering based on AS undo peer group-name acl
path for peer group aspath-list-number { import | export
}
Operation Command
Configure the BGP version of peer group peer group-name version
version-number
Restore the default BGP version for the undo peer group-name version
peer group
Creating Aggregate CIDR supports manual route aggregation. Manual aggregation, using the
Addresses aggregate command adds a piece of routing aggregate information to the BGP
routing table. The parameters can be set at the same time when manual
aggregation mode is configured.
Operation Command
460 CHAPTER 30: CONFIGURING BGP
Configure BGP Route To guarantee the connectivity between the IBGP peers, an all-closed network
Reflector should exist between IBGP peers. In some networks, the internal BGP network can
become very large (with more than one hundred sessions in each router), resulting
in huge overhead. The route reflector designates a central router as the core of the
internal sessions. Multiple BGP routers can become peers with this central router,
and then multiple route reflectors can be peers with each other.
Since the route reflector is the center of other routers, other routers are called
client routers from the viewpoint of the reflector. The client routers are peers of
the route reflector and exchange routing information. The route reflector forwards
(reflects) information among the client routers in turn.
Router B can reflect the routing update from client Router A to client Router C. In
this instance, the session between Router A and Router C is unnecessary because
the route reflector forwards the BGP information to Router C.
Update route
The route reflector divides the IBGP peers into two types: client and non-client.
Using the peer reflect-client command, you can configure the internal neighbors
that can communicate with the route reflector. The neighbors are called the client
group members of the route reflector, and other neighbors that are not configured
as the non-clients are the non-client group members of the route reflector.
Configuring BGP 461
The non-clients must form an all-closed network with the reflector, as they follow
the basic rules of IBGP. A client should not be peer of other internal speakers
outside its cluster. The reflecting function is achieved only on the route reflector.
All the clients and non-clients are normal BGP peers irrelevant to the function. A
client is a client only because the route reflector regards it as the client.
When the router reflector receives several routes to one destination, it chooses the
best one based on the usual BGP routing strategy process. The best route transfers
inside AS according to following rules:
■ If the route is received from non-client peers, it only reflects to clients.
■ If the route is received from client peers, it reflects to all the clients and
non-clients except this route's sender.
■ If an EBGP peer receives the route, it is reflected to all clients and non-client
peers that can be reflected.
1 Configure the route reflection between clients.
Perform the following configurations in BGP view.
Table 541 Configure the Route Reflection Between Clients
Operation Command
Enable route reflection function between reflect between-clients
the clients within the reflection group
Disable route reflection function between undo reflect between-clients
the clients within the reflection group
By default, the route reflection function is disabled between the clients within the
reflection group.
Note that the route reflector configuration between the clients is invalid if the
clients are fully connected.
2 Configure the cluster ID.
As the route reflector is imported, the route selection circle can occur in an AS,
and the route that leaves a cluster during update may try to reenter this cluster.
The traditional AS routing method cannot detect the internal circle of the AS,
because the update has not left the AS yet. BGP provides two methods to avoid an
AS internal loop when you configure the route reflector:
a Configure an originator-ID for the route reflector:
The originator-ID is a 4-bit, optional, non-transitional BGP attribute created by
the route reflector. It carries the router ID of the originator. If the configuration
is improper, and the routing update returns to the originator, the originator will
discard it.
You don't need to configure this parameter, and it functions automatically
when the BGP protocol is started.
b Configure the cluster-ID of the route reflector:
Generally, a cluster has only one route reflector. To avoid routing update
information failure due to the route reflector failure, multiple route reflectors
are recommended for a cluster. If more than one route reflector exists in a
cluster, all the route reflectors must be configured with the same cluster ID.
Operation Command
Configure Cluster-ID of the reflect cluster-id cluster-id
Route-Reflector
Remove Cluster-ID of the Route-Reflector undo reflect cluster-id cluster-id
By default, the router ID of the route reflector is used as the cluster ID.
Configuring a BGP In BGP range, a community is a logical area formed by a group of destinations
Community which share common attributes for applying the route policy. A community is not
limited to a network or an AS, and has no physical boundary.
The community attribute list is used to identify the community information. It can
be a standard-community-list and an extended-community-list.
In addition, one route can have more than one community attribute. The speaker
with multiple community attributes in a route can work according to one, several
or all attributes. The community attribute can be added or modified before the
router transfers a route to other peers.
Operation Command
Create a standard-community-list ip community-list
standard-community-list-number {
permit | deny } { aa:nn | internet |
no-export-subconfed | no-advertise |
no-export }
Specify a extended-community-list entry ip community-list
extended-community-list-number {
permit | deny } as-regular-expression
Delete the specified community list undo ip community-list
{standard-community-list-number |
extended-community-list-number }
Configuring a BGP AS Confederation is another method to solve the problem of a sudden increase of
Confederation Attribute IBGP closed networks inside an AS. An AS is divided into multiple sub-ASs and the
IBGP peers inside the sub-ASs are fully connected, and each sub-AS connects with
other sub-ASs inside the confederation. Among the subsystem, the peers perform
EBGP sessions, but they can exchange routing information just like IBGP peers. All
the important information such as the next hop, MED value and the local priority
will not be lost when passing through the AS.
Configuring BGP 463
1 Configure a Confederation
You can use different IGP for each sub-AS. Externally, a sub-AS is an integer and
the confederation ID is the identification of the sub-AS.
Perform the following configurations in BGP view.
Table 544 Configure a Confederation
Operation Command
Specify a Confederation id confederation id as-number
Remove a Confederation id undo confederation id
Operation Command
Configure the sub-system of e confederation peer-as as-number [
confederation as-number ] …
Delete an AS from the confederation undo confederation peer-as as-number
[ as-number ] …
The creation of an AS confederation in the devices from some other providers may
not be consistent with the RFC1965 standard. All the routers in the confederation
must be configured as using non-RFC1965 standard AS confederation attributes
to create interconnections with the router using non-RFC1965 standard AS
confederation.
Operation Command
Configure the non-RFC standard AS confederation nonstandard-compatible
confederation attributes.
Remove the non-RFC standard AS undo confederation
confederation attributes. nonstandard-compatible
Configuring Route Route instability is frequently indicated when a route disappears that used to exist
Dampening in the routing table. This route may reappear and disappear frequently, which is
called routing flapping. When there is route flapping, the UPDATE and
WITHDRAWN messages are broadcast repeatedly over the network, occupying
bandwidth and processing time of the routers. The administrator should take
action to prevent route flapping. Route dampening is a technology to control
routing flapping.
There are two types of routes, stable routes and unstable routes. Stable routes
remain in the route table continuously, while unstable routes should be suppressed
by route dampening. The unstable route is penalized by not allowing it to
advertise when its penalty level reaches a threshold. The penalty is exponentially
decreased as time goes by. Once it is lower than a certain threshold, the route is
unsuppressed and is advertised again, as shown in the following diagram.
P enalty
S uppression threshold
Threshold to reuse
Tim e
The parameters are mutually dependent. To configure any parameter, all other
parameters should also be specified.
Configuring BGP 465
Operation Command
Put BGP route attenuation in effect or dampening [ half-life-reachable
modify BGP route attenuation parameter half-life-unreachable reuse suppress
ceiling ] [ route-policy policy-name
]
Clear route routing dampening reset dampening [ network-address [
information and de-suppress the mask ] ]
suppressed route
Disable the route dampening undo dampening
Operation Command
Display BGP dampened routes display bgp routing-table dampened
Display flap information of all routes display bgp routing-table
flap-information
Display the route flap statistics of routes display bgp routing-table
with AS path comply with regular flap-information regular-expression
expression as-regular-expression
Reset BGP flap information matching AS reset bgp flap-information
path regular expression regular-expression [
as-regular-expression ]
Display the route flap statistics of routes display bgp routing-table
that passed AS filter-list flap-information acl
[aspath-list-number ]
Clear BGP flap information matching the reset bgp flap-information acl
specified filter list [aspath-list-number ]
Display the route flap statistics of routes display bgp routing-table
with designated destination address flap-information network-address
mask [ longer-match ]
Clear the route flap statistics of routes reset bgp flap-information
with designated destination address network-address
Clear the route flap statistics of routes reset bgp network-address
received from the specified peer. flap-information
Configuring BGP protocol prescribes that a BGP router does not advertise the destination
Synchronization of BGP known through internal BGP peers to external peers unless the destination can be
and IGP known also through IGP. If a router can know the destination through IGP, then
the route can be distributed in the AS because an internal connection has been
ensured.
One major task of the BGP protocol is to distribute the network reachable
information of the local AS to other ASs. Therefore, BGP needs to distribute the
route information by synchronization with IGP (such as RIP and OSPF),
Synchronization means that BGP cannot distribute transition information to other
ASs until IGP broadcasts the route information successfully within its AS. That is to
say, before a router receives an updated destination information from an IBGP
466 CHAPTER 30: CONFIGURING BGP
peer and advertises it to other EBGP peers, it will try to check whether this
destination can be reached through its AS.
Operation Command
Synchronize BGP with IGP synchronization
Prohibit synchronizing BGP with IGP undo synchronization
3Com routers provide the ability to cancel BGP and IGP synchronization so the
route from IBGP can be distributed without continuously checking if the IGP route
still exists.
The synchronization of a border router can be shut down safely in the following
cases:
Configuring the BGP can import route information that is found by running IGP in another AS to its
Interactions between own AS.
BGP and an IGP
Perform the following configurations in BGP view.
Operation Command
Configure route import for BGP import-route protocol [ med med ] [
route-policy policy-name ]
Cancel route distribution for BGP undo import-route protocol
By default, BGP does not import routes from other domains into the routing table.
The protocol attribute specifies the source routing domain that can be imported.
At present, BGP can import routes domain such as connected, static, RIP, OSPF and
OSPF-ASE.
The import-route command cannot import the default route into BGP, so you
must use the default-information command to import the default route into
BGP.
Table 551 Allow the Import of Network 0.0.0.0 into the BGP
Operation Command
Allow the import of network 0.0.0.0 into default-information
the BGP
Disable the import of network 0.0.0.0 into undo default-information
the BGP
Defining an Access List This section describes the configuration of an access list, an AS path list, and a
Entry, an AS Path-list routing policy.
Entry, a Routing Policy
Define an access list entry
See “Access Control List” in ****need proper ref here 3Com Router Operation
Manual (Security Configuration)******. for more details.
Operation Command
Define a BGP-related ACL entry ip as-path acl aspath-list-number {
permit | deny } as-regular-expression
Remove a BGP-related ACL entry undo ip as-path acl
aspath-list-number
Operation Command
Define a routing policy and enter into the route-policy policy-name { permit |
Routing policy view deny } [ seq-number ]
Remove a specified routing policy undo route-policy policy-name [
permit | deny ] [seq-number ]
Operation Command
Specify a BGP AS path list to be matched if-match as-path aspath-list-number
in routing policy
Delete a BGP AS path list to be matched in undo if-match as-path
routing policy
Specify BGP community list number to be if-match community
matched in routing policy. {standard-community-list-number [
exact-match ] |
extended-community-list-number }
Delete BGP community list undo if-match community
Define the matched routing access control if-match ip address { acl-number |
list and prefix list in routing policy. ip-prefix prefix-list-name }
Remove a standard access list or a prefix undo if-match ip address [ ip-prefix
list ]
Define matched the type of interface if-match interface [ type number ]
Remove the matched interface undo if-match interface
Specify the next hop to be matched in if-match ip next-hop { acl-number |
Route-policy by an access list or an prefix ip-prefix prefix-list-name }
list specified
Remove the destination address of the undo if-match ip next-hop [ ip-prefix
matched route ]
Define matched the specified cost if-match cost cost
Delete the specified cost undo if-match cost
Operation Command
Set the BGP AS path access list apply as-path aspath-list-number
Delete BGP AS-path attribute to BGP undo apply as-path
routes
Configuring BGP 469
Operation Command
Set the communities attributes apply community { { [aa:nn ] [
no-export-subconfed ] [ no-advertise
] [ no-export ] } [ additive ] | none
| additive }
Delete the communities attributes undo apply community
Set the next hop of BGP routing apply ip next-hop ip-address
information
delete the next hop of BGP routing undo apply ip next-hop
Set the local preference value of source apply local-preference value
route
Cancel the local preference value of undo apply local-preference
source route
Apply cost to the imported routes apply cost cost
Restore the destination routing protocol's undo apply cost
cost value
Set the origin attribute of the original apply origin { igp | egp as-number |
route in the Route-policy incomplete }
Remove the origin attribute undo apply origin
By default, AS serial number, BGP community attribute, next hop, local preference,
metric value, and origin attributes are not applied.
See “Define Apply Clause “of “Configuration of IP Routing Policy” for details.
Operation Command
Filter routing information received from a filter-policy gateway
specified gateway prefix-list-name import
Change or cancel filtering the routing undo filter-policy gateway
information received from a specified prefix-list-name import
gateway
Filter the routing information received filter-policy {acl-number | ip-prefix
prefix-list-name } import
Change or cancel filtering routing undo filter-policy {acl-number |
information received ip-prefix prefix-list-name } import
Configure to filter the routing information filter-policy ip-prefix
received from the specified address and prefix-list-name { gateway
that matching prefix-list. prefix-list-name | import }
Configure not to filter the routing undo filter-policy ip-prefix
information received from the specified prefix-list-name { gateway
address and that matching prefix-list. prefix-list-name | import }
470 CHAPTER 30: CONFIGURING BGP
Operation Command
Filter routing information being advertised filter-policy {acl-number |
by BGP ip-prefix prefix-list-name } export [
protocol ]
Cancel filtering routing information being undo filter-policy {acl-number |
advertised by BGP ip-prefix prefix-list-name } export [
protocol ]
By default, BGP does not filter any route information that is received or advertised.
protocol specifies the routing domain that can will be filtered. At present, BGP
can filter route domains such as connected, static, OSPF and OSPF-ASE.
Resetting BGP After modifying a BGP configuration, you must turn off the current BGP
Connections connections and reset BGP connections to make the new configuration effective.
Operation Command
Reset BGP connection reset bgp { all | peer-id }
Clear routing flapping attenuation reset bgp dampening [ network-address
information and cancel the dampening [ mask ] ]
over the routes.
Reset the BGP connection of a specified reset bgp group group-name
peer or all members of a peer group
Operation Command
Display route flap information display bgp routing-table
flap-information [ {
regular-expression
as-regular-expression } | { acl
acl-number } | { network-address [
mask [ longer-match ] ] } ]
Display the route with inconsistent source display bgp routing-table
AS different-origin-as
Display peer information display bgp peer [ peer-address ]
Display routing information distributed display bgp routing-table network
through BGP
Display peer group information display bgp group [ group-name ]
–table regular-express display bgp routing-table
regular-expression
as-regular-expression
Display BGP route summary information display bgp summary
Display the configured routing policy display route-policy policy-name
information
Enable BGP packet debugging. debugging bgp { all | event | {
keepalive | open | packet | update }
[ receive | send ] [ verbose ] } }
undo debugging bgp { all | event |
Disable BGP packet debugging keepalive | open | packet | update }
BGP Configuration This section describes several different configurations of BGP with a suggested
Example procedure for each configuration.
Configuring the AS As shown in the following diagram, AS 100 is divided into 3 sub-ASs: 1001, 1002,
Confederation Attribute 1003, which are configured with EBGP, confederation EBGP and IBGP.
472 CHAPTER 30: CONFIGURING BGP
AS100
Router A Router B
AS1001 AS1002
172.68.10.1 172.68.10.2
Ethernet
172.68.10.3
172.68.1.1
172.68.1.2 Router D
156.10.1.1 Router C
AS1003
156.10.1.2
Router E
AS200
1 Configure Router A:
[RouterA] bgp 1001
[RouterA-bgp] undo synchronization
[RouterA-bgp] confederation id 100
[RouterA-bgp] confederation peer-as 1002 1003
[RouterA-bgp] peer 172.68.10.2 as-number 1002
[RouterA-bgp] peer 172.68.10.3 as-number 1003
2 Configure Router B:
[RouterB] bgp 1002
[RouterA-bgp] undo synchronization
[RouterB-bgp] confederation id 100
[RouterB-bgp] confederation peer-as 1001 1003
[RouterB-bgp] peer 172.68.10.1 as-number 1001
[RouterB-bgp] peer 172.68.10.3 as-number 1003
3 Configure Router C:
[RouterC] bgp 1003
[RouterA-bgp] undo synchronization
[RouterC-bgp] confederation id 100
[RouterC-bgp] confederation peer-as 1001 1002
[RouterC-bgp] peer 172.68.10.1 as-number 1001
[RouterC-bgp] peer 172.68.10.2 as-number 1002
[RouterC-bgp] peer 156.10.1.2 as-number 200
[RouterC-bgp] peer 172.68.1.2 as-number 1003
Configuring BGP Route Router B receives a BGP update message and forwards the update to Router C,
Reflector which is configured as a route reflector and has two clients: Router B and Router
D. When Router C receives routing update from Router B, it reflects the
information to Router D. Therefore, an IBGP connection is not necessary between
Router B and Router D, because Router C will reflect the information to Router D.
BGP Configuration Example 473
Router C
Route reflector
3.3.3.3 S2
S0 IBGP
Connected w ith 193.1.1.1/24 S1 S0
netw ork 1.0.0.0 194.1.1.1/24
AS100 AS200 IBGP
IBGP Router E
S1 S0 5.5.5.5
S1
EBGP S0 193.1.1.2/24 194.1.1.2/24
192.1.1.2/24
Router A S0 2.2.2.2
1.1.1.1 192.1.1.1/24 Router B 4.4.4.4
Router D
Route reflector client
Route reflector client
1 Configure Router A:
[RouterA] bgp 100
[RouterA-bgp] undo synchronization
[RouterA-bgp] peer 192.1.1.2 as-number 200
[RouterA-bgp] interface serial 0
[RouterA-Serial0] ip address 192.1.1.1 255.255.255.0
2 Configure Router B:
a Configure BGP peers
[RouterB] bgp 200
[RouterA-bgp] undo synchronization
[RouterB-bgp] peer 192.1.1.1 as-number 100
[RouterB-bgp] peer 193.1.1.1 as-number 200
b Enable OSPF
[RouterB] ospf enable
c Configure Serial 0
[RouterB-ospf] interface serial 0
[RouterB-Serial0] ip address 192.1.1.2 255.255.255.0
d Configure Serial 1
[RouterB-Serial0] interface serial 1
[RouterB-Serial1] ip address 193.1.1.2 255.255.255.0
[RouterB-Serial1] ospf enable area 0
3 Configure Router C:
a Configure BGP peers and route reflector clients
[RouterC] bgp 200
[RouterA-bgp] undo synchronization
[RouterC-bgp] peer 193.1.1.2 as-number 200 reflect-client
[RouterC-bgp] peer 193.1.1.2 reflect-client
[RouterC-bgp] peer 194.1.1.2 as-number 200 reflect-client
[RouterC-bgp] peer 194.1.1.2 reflect-client
b Enable OSPF
[RouterC] ospf enable
c Configure Serial 0
[RouterC-ospf] interface serial 0
474 CHAPTER 30: CONFIGURING BGP
Configuring BGP Path This example describes how the administrator manages the routing with the BGP
Selection attribute. All routers are configured with BGP. OSPF is used by IGP in AS200.
Router A is in AS100, functioning as the BGP peer of Router B and Router C in
AS200. When Router B and Router C run IBGP to Router D, Router D is also in
AS200.
BGP Configuration Example 475
To network
AS200
2.2.2.2 2.0.0.0
S0 S0
192.1.1.2/24 194.1.1.2/24
Router B
S0
S0 192.1.1.1/24 EBGP IBGP 194.1.1.1/24
1.1.1.1
4.4.4.4
To network EBGP IBGP
1.0.0.0 Router A S1 Router D
S1 193.1.1.1/24 195.1.1.1/24
AS100 S0 193.1.1.2/24 S1
Router C
3.3.3.3 195.1.1.2/24
To network
To network 2.0.0.0
2.0.0.0
1 Configure Router A:
[RouterA] interface serial 0
[RouterA-Serial0] ip address 192.1.1.1 255.255.255.0
[RouterA] interface serial 1
[RouterA-Serial1] ip address 193.1.1.1 255.255.255.0
[RouterA-Serial1] quit
a Start BGP
[RouterA] bgp 100
[RouterA-bgp] undo synchronization
b Specify BGP transmission network
[RouterA-bgp] network 1.0.0.0 mask 255.0.0.0
[RouterA-bgp] network 2.0.0.0 mask 255.0.0.0
c Configure peer
[RouterA-bgp] peer 192.1.1.2 as-number 200
[RouterA-bgp] peer 193.1.1.2 as-number 200
d Configure MED attribute of Router A
■ Add access list to Router A and enable network 1.0.0.0.
[RouterA-bgp] acl 1
[RouterA-acl-1] rule permit source 1.0.0.0 0.255.255.255
■ Define two routing diagram, namely set_med_50 and set_med_100. The first
routing diagram is network 1.0.0.0. The MED attribute is 50, and the second
MED attribute is 100.
[RouterA-acl-1] route-policy set_med_50 permit 1
[RouterA-route-policy] if-match ip address 1
[RouterA-route-policy] apply cost 50
[RouterA-route-policy] quit
[RouterA] route-policy set_med_100 permit 1
[RouterA-route-policy] if-match ip address 1
■ [RouterA-route-policy] apply cost 100Apply the routing diagram set_med_50
to the exit routing update of Router C (193.1.1.2). Apply the routing diagram
set_med_100 to exit routing update of Router B (192.1.1.2).
[RouterA] bgp 100
[RouterA-bgp] peer 193.1.1.2 route-policy set_med_50 export
[RouterA-bgp] peer 192.1.1.2 route-policy set_med_100 export
476 CHAPTER 30: CONFIGURING BGP
2 Configure Router B:
[RouterB] interface serial 0
[RouterB-Serial0] ip address 192.1.1.2 255.255.255.0
[RouterB] interface serial 1
[RouterB-Serial1] ip address 194.1.1.2 255.255.255.0
[RouterB] ospf enable
[RouterB-ospf] network 194.1.1.0 0.0.0.255 area 0
[RouterB-ospf] network 192.1.1.0 0.0.0.255 area 0
[RouterB] bgp 200
[RouterB-bgp] undo synchronization
[RouterB-bgp] peer 192.1.1.1.1 as-number 100
[RouterB-bgp] peer 194.1.1.1.1 as-number 200
[RouterB-bgp] peer 195.1.1.1.2 as-number 200
3 Configure Router C:
[RouterC] interface serial 0
[RouterC -Serial] ip address 193.1.1.2 255.255.255.0
[RouterC] interface serial 1
[RouterC-Serial1] ip address 195.1.1.2 255.255.255.0
[RouterC] ospf enable
[RouterC-ospf] network 193.1.1.0 0.0.0.255 area 0
[RouterC-ospf] network 195.1.1.0 0.0.0.255 area 0
[RouterC] bgp 200
[RouterC-bgp] undo synchronization
[RouterC-bgp] peer 193.1.1.1 as-number 100
[RouterC-bgp] peer 194.1.1.2 as-number 200
[RouterC-bgp] peer 195.1.1.1 as-number 200
To make the configuration effective, use the reset bgp all command to reset all
BGP neighbors.
478 CHAPTER 30: CONFIGURING BGP
31 CONFIGURING IP ROUTING POLICY
IP Routing Policy During the information exchange with a peer router, the routing protocol may
Overview need to receive or distribute only part of the route information that complies with
specific conditions; and to import only part of the route information learned by
other protocols that satisfy the preset conditions. In addition, some attributes of
the imported route information are set in order to satisfy the requirements of the
protocol. The route strategy also provides measures for the routing protocol to
implement these functions.
The route strategy consists of a series of rules, classified into three types and used
for route information filtering in route advertisement, route receiving, and route
import. Since defining a strategy is similar to defining a group of filters that are
used during receiving or advertising route information or before the route
information exchange between different protocols, route strategy is also called
route filtering.
A common filter is the basis for route strategy implementation. The user defines
some matching conditions as necessary, which are referred to when making the
routing strategies. Apply these conditions to different objects such as the
destination address of the routing information, and the router address publishing
the routing information, to implement route information filtering.
These filters serve as the reference for the protocols to work out routing strategies.
480 CHAPTER 31: CONFIGURING IP ROUTING POLICY
Routing Policy A routing policy matches attributes of the given routing information and sets
some attributes of the routing information when the conditions are matched. A
routing policy contains several "if-match" clauses and "apply" clauses. The
"if-match" clauses specify the matching conditions. The "apply" clauses specify
the configuration commands that are executed when the filtering conditions
specified by if-match clauses are satisfied.
Access List An access list can be divided into a standard access list and an extended access list.
The standard access list is usually used for filtering routing information. When you
define an access list, you need to specify the network segment range of an IP
address, to match the destination network segment address or next hop address
of the routing information and to filter the routing information not satisfying the
conditions. If an extended access list is used, only the source address matching
field is used to match the destination network segment of the routing
information, while the IP address range used to match packet destination address
specified in the extended access list should be ignored.
Prefix-list Prefix-list functions are similar to the functions of an access list, which may not be
easily understood when used for routing information filtering, because it is in the
format of packet filtering. ip ip-prefix is more flexible and comprehensible.
When applied to routing information filtering, its matching object is the
destination address information of the routing information. It can also be directly
used to the router object (gateway), so that the local routing protocol can only
receive the routing information distributed by specific routers. The addresses of
these filters must be filtered by prefix-list. In this case, the matching object of ip
ip-prefix is the source address of the IP header of the route packet.
A prefix-list is identified with the list name and consists of several parts, with
sequence-number specifying the matching order of these parts. In each part, you
can specify a matching range in the form of the network prefix. Different parts of
different sequence-numbers are matched using Boolean “OR” operations. When
the routing information matches a specific part of prefix-list, it is considered
successfully filtered through the prefix-list.
Aspath-list Aspath-list is only used for the BGP protocol. There is an aspath field in the routing
information packet of the BGP protocol. When the BGP protocol operates with the
switching routing information, the path of the routing information crossing the AS
is recorded in this field. Aspath-list is identified with aspath-list-number. When
defining aspath-list, you can specify an aspath regular expression to match the
aspath field in the routing information. You can use aspath-list to match the
aspath field in the BGP routing information, and filter information that does not
satisfy the conditions. Each list number can be defined with multiple aspath-lists,
because one list number represents a group of aspath-lists. The matching process
for acl-numbers uses Boolean “OR” operations, so a match with any one of the list
is considered successful filtering of the routing information through the aspath list
identified with this list number.
The definition of access-path-list is implemented in the BGP configuration. See the
description of the ip as-path acl command in “Define an AS Path-list entry”.
Community-list Community-list is only used for the BGP protocol. In the routing information
packet of the BGP protocol, there is a community attribute field, used to identify a
Configure IP Routing Policy 481
Configure IP Routing Configuring an IP routing policy includes tasks that are described in the following
Policy sections:
■ Defining a Routing Policy
■ Define a Matching Rules
■ Defining an Apply Clause
■ Configuring Route Import
■ Defining an IP Prefix List
■ Configuring Route Filter
Defining a Routing A routing policy consists of several parts and each part has its own if-match
Policy clauses and applies clauses, with sequence-number specifying the matching order
of these parts.
Operation Command
Define a routing policy and enter into the route-policy policy-name { permit |
routing policy view. deny } { seq-number }
Delete a routing policy undo route-policy policy-name [
permit | deny ] [seq-number ]
permit specifies the matching mode of the defined routing policy node as permit
mode. When the route item satisfies all if-match clauses of the node, it is
permitted to pass the filtering of this node and execute apply clauses of this node.
If the route item does not satisfy the if-match clauses of this node, the next node
of this routing policy is tested.
deny specifies the matching mode of the defined routing policy node as deny
mode. When the route item satisfies all if-match clauses of this node, it is rejected
and the next node is nottested.
Please note that the parts of different seq-number use Boolean “OR” operations.
Namely, route information matches every part in turn. Through a certain part of
routing policy defines filtering through this routing policy.
482 CHAPTER 31: CONFIGURING IP ROUTING POLICY
Define a Matching Rules The if-match clause defines matching rules to meet the filtering conditions of the
routing information of the current routing policy. The matched objects are the
attributes of this routing information.
Operation Command
Specify the AS number to be matched at if-match as-path aspath-list-number
the beginning of the AS path in the
route-policy.
Remove the AS number to be matched undo if-match as-path
from the beginning of the AS path in the
route-policy.
Specify the BGP community attributes to if-match community-list
be matched in the route-policy. {standard-community-list-number [
exact-match ] |
extended-community-list-number }
Remove the BGP community attributes to undo if-match community-list
be matched from the route-policy.
Specify the ACL and prefix list to be if-match ip address { acl-number |
matched in the route-policy. ip-prefix prefix-list-name }
Remove the ACL and prefix list to be undo if-match ip address [ ip-prefix
matched from the route-policy. ]
Specify the interface to be matched in the if-match interface [ type number ]
route-policy.
Remove the interface to be matched from undo if-match interface
the route-policy.
Specify the route-policy-matching if-match ip next-hop { acl-number |
next-hop of the routing information. ip-prefix prefix-list-name }
Remove the route-policy-matching undo if-match ip next-hop [ ip-prefix
next-hop of the routing information. ]
Specify the cost of the routing information if-match cost cost
to be matched in the route-policy.
Remove the cost of the routing undo if-match cost
information to be matched in the
route-policy
Specify the tag of OSPF routing if-match tag tag-value
information to be matched in the
route-policy.
Delete the tag of OSPF routing undo if-match tag
information to be matched in the
route-policy.
Specify the matched OSPF route type (i.e. if-match route-type { internal |
internal or external) in the routing policy. external }
Delete the matched OSPF route type in the undo if-match route-type
routing policy
Note that:
■ For one routing policy node, the if-match clauses of the same part use Boolean
“AND” operations in the matching process so the routing information cannot
Configure IP Routing Policy 483
be filtered through the routing policy unless it matches all if-match clauses of
this part and it can execute the operation of teh apply sub-clause.
■ If an if-match clause is not specified, all routing information is filtered through
the policy of this node.
Defining an Apply The apply clause specifies the configuration commands that are executed after
Clause the filtering conditions specified by the if-match clause are satisfied. The
commands are used to modify attributes of the routing information.
Operation Command
Specify the AS number ahead of the apply as-path aspath-list-number
original AS path in Routing policy.
Cancel the AS number ahead of the undo apply as-path
original AS path in Routing policy.
Set BGP community attribute in Routing apply community { { aa:nn |
policy no-export-subconfed | no-advertise |
no-export } [ addtive ] | none }
Cancel BGP community attribute in undo apply community
Routing policy
Set the next hop address of BGP routing apply ip next-hop ip-address
information.
Cancel the next hop address of BGP undo apply ip next-hop
routing information.
Set the local preference of BGP routing apply local-preference value
information.
Cancel the local preference of BGP routing undo apply local-preference
information.
Set the cost of routing information. apply cost cost
Cancel the cost of routing information. undo apply cost
Set the origin attribute of the original apply origin { igp | egp as-number |
route in the Route-policy incomplete }
Remove the origin attribute of the original undo apply origin
route in the Route-policy.
Set the OSPF tag value apply tag tag-value
Cancel the OSPF tag value undo apply tag
Configuring Route Different routing protocols can import and share the routing information. When
Import the routing information of other protocols is imported, the inappropriate routing
information can be filtered The metric of distributed destination routing protocol
cannot exchange with that of the imported original routing protocol. At this time,
a route metric should be specified for the imported route.
Perform the following configurations in RIP view, OSPF view, or BGP view.
484 CHAPTER 31: CONFIGURING IP ROUTING POLICY
Operation Command
Configure route import in RIP import-route protocol [ cost cost ] [
route-policy route-policy-name ]
Cancel route import undo import-route protocol
Configure route import in OSPF import-route protocol [ cost cost ] [
type 1 | 2 ] [ tag tag-value ]
Cancel route import undo import-route protocol [ cost
cost ] [ type 1 | 2 ] [ tag tag-value
]
Configure route import in BGP import-route protocol [ med med ] [
tag tag-value ] [ type 1 | 2 ] [
route-policy policy-name ]
Cancel route import undo import-route protocol
By default, a protocol does not import routes from other domains into the its
routing table.
protocol specifies the source routing domain that can be imported. At present, it
can import routes domain such as direct, static, RIP, OSPF, OSPF-ASE and BGP.
med med or cost cost: specifies the metric value of the imported routes.
delay is the route time delay, each unit stands for 10µs, ranging from 1 to
16777215
reliability is the channel reliability, ranging 0 to 255. 255 stands for 100%
creditable.
loading is the channel seizure rate, ranging 1 to 255, 255 stands for 100% seized.
mtu is the maximum transfer unit of route, ranging from 1 to 65535 byte.
tag tag-value sets the tag value of the imported route when ospf is importing
other protocol routes.
Configure IP Routing Policy 485
type is the type of ospf external route corresponding to the imported route when
ospf is importing other protocol routes. type 1 refers to external route type 1 and
type 2 refers to external route type 2.
The metric value of the imported route can be set as the following:
1 Specify the metric value with the apply cost command.
2 Filter the route with routing policy and set attributes for the route matching the
conditions.
3 If neither of the above is specified, the imported route uses the default metric
value. The default metric can be specified with the default-med command.
When both routing policy and med value are specified, the routing information
matching the routing policy will use the metric specified by the apply command
of a routing policy.
Defining an IP Prefix List An IP prefix list is identified with the list name and consists of several parts, with
the sequence-number specifying the matching order of these parts. In each part,
you can specify an individual matching range in the form of network prefix.
Operation Command
Define an IP prefix list ip ip-prefix prefix-list-name [
index index-number ] { permit | deny
} network/len [ greater-equal
ge-value ] [ less-equal le-value ]
Cancel an IP prefix list undo ip ip-prefix prefix-list-name [
index seq-number ] [ permit | deny ]
Configuring Route Filter In some cases, only the routing information that meets the condition should be
distributed or imported, to prevent the neighboring routers from receiving private
information of other routes. A prefix-list or access list in the route strategy is used
to filter the routing information.
Perform the following configurations in RIP view, OSPF view, or BGP view.
Operation Command
Filter the route information received from filter-policy gateway
a specified gateway prefix-list-name import
Change or cancel filtering the route undo filter-policy gateway
information received from a specified prefix-list-name import
gateway
Filter the route information received filter-policy {acl-number |
ip-prefix prefix-list-name } import
Change or cancel filtering route undo filter-policy {acl-number |
information received ip-prefix prefix-list-name } import
Filter routing information received from a filter-policy ip-prefix
specified gateway and the routing prefix-list-name gateway
information received according to prefix-list-name import
prefix-list
Change or cancel filtering the routing undo filter-policy ip-prefix
information received from a specified prefix-list-name gateway
gateway and the routing information prefix-list-name import
received according to prefix-list
Operation Command
Filter the route information being filter-policy {acl-number |
advertised ip-prefix prefix-list-name } export [
protocol ]
Change or cancel filtering route undo filter-policy { acl-number |
information being advertised ip-prefix prefix-list-name } export [
protocol ]
protocol specifies the routing domain that can will be filtered. At present, it can
filter routes domain as follows:
■ direct: the network segment (host) route directly connected with the local
interface.
■ static: static route
■ RIP: route discovered by RIP protocol+
■ OSPF: route discovered by OSPF protocol
■ OSPF-ASE: external route discovered by OSPF protocol
■ BGP: route discovered by BGP protocol
Operation Command
Display routing policy display route-policy [ policy-name ]
Display IP prefix list information display ip ip-prefix [
prefix-list-name ]
Configuring IP This example explains how an OSPF protocol selectively imports an RIP route.
Routing Policy
As shown in the following figure, the router connects a campus network which
uses RIP as its internal routing protocol and an external area network which uses
OSPF routing protocol. The router advertises some routing information of the
campus network around the external area network. To implement this, the OSPF
protocol imports a routing policy to perform route filtering in order to import the
RIP information. The routing policy consists of two nodes, and the routing
information of 192.1.0.0/24 and 128.2.0.0/16 is advertised by the OSPF protocol
with different weighting values.
192. 1. 0. 0/ 24 128.1.0.1
128. 1. 0. 0/ 16
128. 2. 0. 0/ 16
static 20.0.0.1
30.0.0.1 area 0
S0
40.0.0.1
S0
Router A Router B
1 Configure Router A:
a Configure static routes:
[RouterA]ip route-static 20.0.0.1 32 ethernet 0
[RouterA]ip route-static 30.0.0.1 32 ethernet 0
[RouterA]ip route-static 40.0.0.1 32 ethernet 0
b Start OSPF protocol.
[RouterA]router id 1.1.1.1
[RouterA]ospf enable
c Import static route
[RouterA-ospf]import-route static
d Configure Serial 0, and specify id of area including the interface.
[RouterA-ospf]interface serial 0
[RouterA-Serial0]ip address 10.0.0.1 255.0.0.0
[RouterA-Serial0]link-protocol ppp
[RouterA-Serial0]interface serial 0
[RouterA-Serial0]ospf enable area 0
2 Configure Router B:
a Configure an access list:
[RouterB]acl 1
[RouterB-acl-1]rule deny source 30.0.0.0 255.255.255.0
[RouterB-acl-1]permit any
[RouterB-acl-1]quit
b Start OSPF protocol and configure the area number of this interface
[RouterB]router id 2.2.2.2
[RouterB]ospf enable
c Configure filtering route information received for OSPF
[RouterB-ospf]filter-policy 1 import
d Configure IP address of Serial0, encapsulated to PPP protocol.
[RouterB-ospf]interface serial 0
[RouterB-Serial0]link-protocol ppp
[RouterB-Serial0]ip address 10.0.0.2 255.0.0.0
[RouterB-Serial0]ospf enable area 0
Configuring Filtering This example describes how OSPF imports RIP route selectively.
Route Information
The router connects campus network A and campus network B, both of which use
RIP as the internal routing protocol. The router needs to distribute the routes
192.1.1.0/24 and 192.1.2.0/24 of campus A in the local network. To achieve this
function, RIP protocol on the router defines a filter-policy to filter the routing
information, perform the route filtering function through quoting a prefix list.
Troubleshooting IP Routing Policy 489
192.1.10.0 202.1.1.0
Campus network A Campus network B
Router
1 Configure ip-prefix
[Router]ip ip-prefix p1 permit 192.1.1.0/24
2 Configure RIP protocol
[Router]rip
[Router-rip]network 192.1.0.0
[Router-rip]network 202.1.1.0
[Router-rip]filter-policy ip-prefix p1 export
In this case, reconfigure by quoting the strategy and rule of this ACL to inform the
protocol of the ACL change. If other filters are quoted, this operation is not
necessary and the protocols are informed of the change of the router.
490 CHAPTER 31: CONFIGURING IP ROUTING POLICY
32 CONFIGURING IP POLICY ROUTING
IP Policy Routing IP policy routing is a mechanism in which messages are transmitted and forwarded
Overview by strategy without going through the routing table. When a router is forwarding
a packet by policy routing, it is first filtered by a route policy which decides the
packets to be forwarded and to which router.
The user configures the IP policy for routing. It is composed of a group of if-match
clauses and a group of apply clauses. Only when all if-match clauses of policy
routings are fully satisfied are the apply clauses in the policy routings executed in
sequence, to affect the message forwarding.
Apply clause defines the operation of the strategy. there are five apply clauses:
apply ip precedence, apply interface, apply ip next-hop, apply default
interface, apply ip default next-hop. They are executed in sequence until
the operation can proceed.
There are two kinds of policy routings: interface policy routing and local policy
routing. Interface policy routing is configured in interface view and performs
strategic routing for messages from this interface. Local policy routing is
configured in system view and performs policy routing for messages generated by
this host. Generally, the local policy routing must not be configured.
The policy routing can be used for security and load balancing.
Creating a Routing The strategy specified with the strategy name may have several strategy points
Policy and each strategy point is specified with sequence-num. The smaller the
sequence-num, the higher the preference and the defined strategy will be
executed first. This strategy can be used to import routes and perform policy
routing when IP messages are forwarded. When a routing policy is recreated, the
configuration information of the new routing policy overwrites that of the old
routing policy. The contents of the strategy is specified by if-match and apply
clauses.
Operation Command
Create a routing policy and enter into the route-policy policy-name { permit |
Routing policy view deny} { seq-number }
Delete a routing policy no route-policy policy-name [ permit
| deny ] [ seq-number ]
permit means policy routing for the messages meets the conditions and deny
means no policy routing for the message meets the conditions.
Define Match Rules IP policy routing provides two if-match clauses that allow matching strategy
according to IP message length and IP address. One strategy includes multiple
if-match clauses, which can be used in combination.
Operation Command
Specify IP message matching the length if-match length min-len max-len
Remove IP message matching the length no if-match length
Specify IP address matching the specified if-match ip address acl-number
access lists
Remove IP address matching the specified undo if-match ip address
access lists
Define Apply Clause IP policy routing provides 5 apply clauses. One strategy includes multiple apply
clauses, which can be used in combination.
Operation Command
Set message precedence apply ip precedence precedence
Displaying and Debugging IP Policy Routing 493
Operation Command
Cancel apply clauses setting message undo apply ip precedence
precedence
Set message transmitting interface apply interface type number
Cancel apply clauses setting message no apply interface
transmitting interface
Set message default transmitting interface apply default interface type number
Cancel apply clauses setting message undo apply default interface
default sending interface
Set message next-hop apply ip next-hop ip-address
Cancel apply clauses setting message undo apply ip next-hop
next-hop
Set message default next-hop apply ip default next-hop ip-address
Cancel apply clauses setting message undo apply ip default next-hop
default next-hop
You can specify multiple next-hops or send the message to multiple interfaces.
Generally, only the first parameter works. If the first parameter is mismatched, the
second parameter will take effect, and so on.
Operation Command
Enable local policy routing ip local policy route-policy
policy-name
Disable local policy routing undo ip local policy route-policy
By default, local policy routing is disabled. Only one local policy route can be
configured.
Operation Command
Enable interface policy routing ip policy route-policy policy-name
Disable interface policy routing undo ip policy route-policy
IP Policy Routing This section describes two different configurations for IP policy routing with a
Configuration suggested procedure for each configuration.
Example
Configure Policy Routing Define a policy named “aaa” that includes two nodes, through which all TCP
Based on Source Address messages are transferred from serial interface 0 and the others are transferred
from serial interface 1.
■ Node 10 indicates that messages matched with access list 102 will be sent to
serial interface 0.
■ Node 20 indicates that all the other messages will be sent to serial interface 1.
The messages from Ethernet 0 attempt to match if-match clauses of nodes 10 and
20, in turn. If nodes in permit mode are matched, the corresponding apply clauses
are executed. If nodes in deny modes are matched, exit from policy routing.
LAN A is connected with the Internet through the 3Com router, requiring that TCP
messages be transmitted through path 1 and other messages be transmitted
through path 2.
Figure 160 Networking diagram of configuring policy routing based on source address
LAN A 10.110.0.0/16
EO
S0 S1
Quidway
Internet
Configure Policy Routing Router A sends the messages of 64-100 bytes through S0, messages of 101-1000
Based on Message Size bytes through S1 and those of other sizes must be routed normally.
Figure 161 Networking diagram of configuring policy routing based on message size
64-100 bytes
S0 S0
150.1.1.1 150.1.1.2
Router A S1 S1 Router B
151.1.1.1 151.1.1.2
Apply strategy on E0 E0
101-1000 bytes
192.1.1.1
1 Configure Router A:
[RouterA]interface ethernet 0
[RouterA-Ethernet0]ip address 192.1.1.1 255.255.255.0
[RouterA-Ethernet0]ip policy route-policy lab1
[RouterA-Ethernet0]interface serial 0
[RouterA-Serial0]ip address 150.1.1.1 255.255.255.0
[RouterA-Serial0]interface serial 1
[RouterA-Serial1]ip address 151.1.1.1 255.255.255.0
[RouterA-Serial1]quit
[RouterA]rip
[RouterA-rip]network 192.1.1.0
[RouterA-rip] network 150.1.1.0
[RouterA-rip] network 151.1.1.0
[RouterA-rip]route-policy lab1 permit 10
[RouterA-route-policy]if-match length 64 100
[RouterA-route-policy] apply ip next-hop 150.1.1.2
[RouterA-route-policy]route-policy lab1 permit 20
[RouterA-route-policy]if-match length 101 1000
[RouterA-route-policy]apply ip next-hop 151.1.1.2
2 Configure Router B:
[RouterB]interface serial 0
[RouterB-Serial0]ip address 150.1.1.2 255.255.255.0
[RouterB-Serial0]interface serial 1
[RouterB-Serial1]ip address 151.1.1.2 255.255.255.0
[RouterB-Serial1]quit
[RouterB]rip
[RouterB-rip]network 150.1.1.0
[RouterB-rip]network 151.1.1.0
Monitor policy routing with debug ip policy command on Router A. Note: the
messages of 64 bytes match the entry item whose serial number 10 as shown in
the routing diagram lab1, therefore they are forwarded to 150.1.1.2.
496 CHAPTER 32: CONFIGURING IP POLICY ROUTING
[RouterA]debugging ip policy-routing
IP: s=151.1.1.1(local),d=152.1.1.1, len 64, policy match
IP: route map lab1, item 10, permit
IP: s=151.1.1.1(local),d=152.1.1.1, len 64, policy routed
IP: local to serial 150.1.1.2
On Router A, change the message size to 101 bytes and monitor policy routing
with debug ip policy command. Note: the messages of 101 bytes match the entry
item whose serial number 20 as shown in the routing diagram lab1. They are sent
to 151.1.1.2.
[RouterA]debugging ip policy-routing
IP: s=151.1.1.1(local),d=152.1.1.1, len 101, policy match
IP: route map lab1, item 20, permit
IP: s=151.1.1.1(local),d=152.1.1.1, len 101, 64, policy routed
IP: local to serial 151.1.1.2
On Router A, change the message size to 1001 bytes and monitor policy routing
with debug ip policy command. Note that this message does not match any entry
item in lab1, so it is forwarded in regular mode.
[RouterA]debugging ip policy-routing
IP:s=151.1.1.1(local),d=152.1.1.1, len 1001, policy rejected-normal forwarding
IP:s=151.1.1.1(local),d=152.1.1.1, len 1001, policy rejected-normal forwarding
VII MULTICAST
Chapter 33 IP Multicast
■ IP Multicast Overview
■ IP Multicast Addresses
■ IP Multicast Features
■ IP Multicast Routing Protocols
■ IP Multicast Packet Forwarding
■ IP Multicast Application
IP Multicast Overview When the destination addresses carrying information (data, voice, and video)
transmit with only a few subscribers in the network, multiple transmission
methods such as unicast and broadcast can be employed. Unicast transmission
means establishing a separate data transmission channel for each subscriber, while
broadcast transmissionmeans sending the message to all the subscribers in the
network no matter whether they need it or not. If 200 subscribers in network
require receiving the same message, traditionally there are two solutions for this.
One is to send such message 200 times to ensure that all the subscribers are able
to get it. The other one is to transmit the data within the whole network to enable
subscribers to get the necessary data directly from the network by adopting the
broadcast method.
IP Multicast Addresses IP multicasting uses Class D addressing. Each multicast address stands for a
multicast group, not for a host. Because the maximum four-digit number of a
500 CHAPTER 33: IP MULTICAST
Class D address is 1110, the range of the multicast addresses is from 224.0.0.0 to
239.255.255.255.
The multicast group can be either permanent or temporary. The permanent group
has a constant group address assigned by IANA, while the number of members in
the group can be random, even zero. Temporary multicast groups can use that
group address, which is not reserved, but the number of members in the
temporary multicast group cannot be zero.
The reserved multicast addresses, which are frequently used, are as follows:
The multicast protocol changes the Class D address into the hardware/media
address. For example, in an Ethernet MAC address, the range of the reserved
corresponding Ethernet addresses that IANA obtains the IEEE-802 MAC is from
01-00-5e-00-00-00 to 01-00-5E-ff-ff-ff.
IP Multicast Features In simple TCP/IP routing, the path of a data packet transmission is from the source
address to the destination address following the principle of hop-by-hop. But in
IP Multicast Routing Protocols 501
the IP multicast environment, the destination address of a data packet is not one
address but a group, forming a group address. All the information receivers are
added to a group, and once they access the group, data flowing to the destination
address begin to transmit to the receivers of that particular group. All the group
members can receive the data packet. Therefore, to get the data packet, they have
to become group members first. The data packet transmitter is not required to be
a group member. In the multicast environment, data will be sent to all the group
members, and the subscribers who are not group members will not receive the
data packets.
IP Multicast Routing The multicast protocol includes two parts. One part is the Internet Group
Protocols Management Protocol (IGMP) acting as the IP multicast basic signaling protocol.
The other part includes the multicast routing protocols such as DVMRP, PIM-SM,
PIM-DM, which implement IP multicast flow routing.
Internet Group IGMP is a simple protocol for the support of multicast transmission. IGMP is a
Management Protocol simple leave/join protocol that allows end-user nodes and their multicast-enabled
(IGMP) routers to exchange messages that describe the wishes of hosts to participate in
multicast groups. It defines the multicast membership establishment and
maintenance mechanism between hosts and routers, and it is the foundation of
the entire IP multicast.
IGMP informs routers about the group members, and enables routers to know the
information about other members within the group through the hosts directly
connected to them. Application programs can learn that information coming from
one data source goes to a specific group. If a LAN subscriber announces that it has
joined a certain multicast group via IGMP, the multicast routers in the LAN
propagate this information by the multicast routing protocol, and finally add this
LAN as a branch to the multicast tree. When the host, as a member of a certain
group, begins to receive information, the routers periodically carry out queries on
this group, and check whether the group members are still participating. As long
as there is a host still participating, routers can continue to receive data. Only after
all the subscribers in the LAN exit this multicast group, are the related branches
deleted from the multicast tree.
502 CHAPTER 33: IP MULTICAST
Multicast Routing The group address in the multicast protocol is a virtual address. Therefore, unlike
Protocol unicast, data packets cannot be routed directly from the data source to the
specific destination address. The multicast application program sends the data
packet to a group of receivers instead of a single receiver .
Multicast routing establishes a cyclic data transmission path from one data source
end to multiple receiving ends. The task of the multicast routing protocol is to
establish a distribution tree structure. The multicast routers can adopt many
methods to establish a data transmission path distribution tree. Protocol
Independent Multicast (PIM) is the protocol that allows multicast routers to
identify other multicast routers that will receive the packets. Depending on actual
network conditions, the multicast routing protocol can be divided into two kinds -
dense mode and sparse mode.
Protocol Independent The dense mode of the multicast routing protocol is suitable for small networks
Multicast--Dense Mode with abundant bandwidth. Suppose that each subnet in the network has at least a
(PIM-DM)) pair of receiving sites interested in multicast. Therefore, multicast data packet are
distributed to all the sites in the network. Together with this process there is
consumption of the related resources (bandwidth and the CPU of the router). To
decrease the consumption of these precious network resources, the dense mode
of the multicast routing protocol “prunes” the branches that do not have
multicast data forwarding, and retains only the branches that contain the receiving
sites.
To enable the receiving sites with the multicast forwarding demand in the pruned
branches to receive multicast data flow, the pruned branches can return to
forwarding state periodically. To reduce the time delay for the pruned branch to
recover to the forwarding state, the dense mode of the multicast routing protocol
adopts a grafting mechanism to actively add to the multicast distribution tree. This
cyclic diffusion and pruning phenomenon is the feature of the dense mode of the
multicast routing protocol. Generally, the data packet forwarding path in the
dense mode is an “active tree” with the source being its root and the group
members being its leaves.
Protocol Independent Dense mode uses the flood-prune technology, which is not applicable for a WAN.
Multicast-Sparse Mode In a WAN, multicast receivers are sparse and the sparse mode is used. In sparse
(PIM-SM) mode, all hosts do not need to receive multicast packets unless there is an explicit
request for the packets by default. A multicast router must send a join message to
the rendezvous point (RP), which is created in the network as the virtual place for
data exchange. The RP corresponds to the group that receives the multicast data
traffic from the specified group. The join message passes routers and finally
reaches the root, the RP. The path that the join message used becomes a branch of
the shared tree. In PIM sparse mode, multicast packets are sent to the RP first and
then are forwarded along the shared tree rooted at the RP and with members as
the branches. To prevent the branches of the shared tree from being deleted
because they are not updated, PIM sparse mode sends join messages to branches
periodically to maintain the multicast distribution tree.
IP Multicast Packet Forwarding 503
IP Multicast Packet In the multicast model, the source host sends information to any host group
Forwarding represented by the multicast group addresses in the destination address segment
of the IP information packet. In contrast to the unicast model, the multicast model
cannot base forwarding decisions on the destination addresses contained in the
information packet. Instead, it must forward the multicast information packet to
multiple external interfaces to send it to all the receiving sites. Therefore, the
multicast forwarding process is more complicated than the unicast forwarding
process.
To guarantee that all the multicast information reaches routers by the shortest
route, the multicast model must use the unicast routing table or the independent
multicast routing table and check the multicast information packet receiving
interfaces. This checking mechanism is the basis for most multicast routing
protocols to carry out the multicast forwarding reverse path forwarding (RPF)
check. The multicast module checks the source address in the received multicast
data packet. If the active tree is adopted, this source address is that of the host
sending the multicast data packet. If the shared tree is adopted, this source
address is the root address of the shared tree. Thus, the multicast module can
determine whether the input interface of the arrived data packet is on the shortest
path from the receiving site to the source address. When the multicast data arrives
at the router, if the examination has passed, the information packet is forwarded
according to the multicast forwarding items. Otherwise, the information is
discarded.
IP Multicast IP multicast allows the internal data of the company to be distributed to a large
Application number of subscribers. For example, for a company with many chain stores,
multicast can be used to send its price information to the cash register in each
chain store. The real-time information can be sent to multicast subscribers by
media over the Internet, such as the current remote employee management and
education.
The traditional data broadcast is based on the broadcast transmission form, which
requires much Internet bandwidth. Using multicast technology, TV and wireless
sites can not only multicast data to Internet subscribers who really need them, but
can also reduce the cost of network maintenance to a large extent.
504 CHAPTER 33: IP MULTICAST
34 CONFIGURING IGMP
■ IGMP Overview
■ Configuring IGMP
■ Displaying and Debugging IGMP
■ IGMP Configuration Example
IGMP Overview The Internet Group Management Protocol (IGMP) is a protocol that is responsible
for the IP multicast member management among the TCP/IP protocol family. It is
the basis for IP multicast, and it is used to establish and maintain multicast
membership between the IP hosts and the multicast routers directly adjacent to
the hosts. IGMP does not include the propagation and maintenance of the
membership relationship information between multicast routers, which is
accomplished by each multicast routing protocol. IGMP operates on a physical
network, such as a single Ethernet segment.
At present, IGMP Version 1 and IGMP Version 2 are extensively used. IGMP Version
2 specifies the following three kinds of messages:
IGMP is asymmetric between hosts and routers. The host responds to the IGMP
query message of the multicast router, and makes a response in the membership
report message. The router periodically sends a general query message. Then it
determines, based on the response message received, whether a specific group
has a host access on its own subnet. Meanwhile, when a router exits from a
group, it sends a message to the multicast router when it exits. When it receives
the message, the multicast router sends a packet to inquire about the group to
ensure that the member has already gone.
Configuring IGMP To configure the IGMP protocol, the multicast routing function is first enabled, and
then each feature of the IGMP protocol can be configured.
IGMP configuration includes tasks that are covered in the following sections:
■ Enabling Multicast Routing
■ Configuring Router Interfaces as Group Members
■ Configuring the Version Number of IGMP at the Router Interface
■ Configuring the Time Interval of IGMP Host Sending Query Messages
■ Configuring IGMP Maximum Query Response Time
■ Configuring Subnet Querier Survival Time
Enabling Multicast Start the IGMP protocol on all interfaces to enable routers to send multicast
Routing messages. Only after enabling multicast routing can all the other configurations
related to the multicast be valid.
Operation Command
Enable multicast routing multicast routing-enable
Disable multicast routing undo multicast routing-enable
Configuring Router Configuring router interfaces as group members can not only enable routers to
Interfaces as Group access the multicast group by simulating host behaviors, but also enables the static
Members multicast group to access the multicast group.
Operation Command
Configure router interface to be group igmp host-join groups-address
members
Delete router interface from group undo igmp host-join groups-address
members
Configuring the Version IGMP Version 2 is able to configure query message timeout and the maximum
Number of IGMP at the query response time. All the systems in the same subnet must run the same IGMP
Router Interface version because the routers are not able to check the version number of IGMP
currently running on the interface.
Table 578 Configure the IGMP Version Number Run at Router Interface
Operation Command
Configure the version number of IGMP igmp version { 1 | 2 }
operating at router interface
Restore the default value of the version undo igmp version
number of IGMP operating at router
interface
If the host does not support IGMP Version 2, then the router must be configured
to use IGMP Version 1.
Configuring the Time The router periodically sends membership query messages to the network it
Interval of IGMP Host connects to. The query interval timer sets the time interval. Subscribers can change
Sending Query the time interval of the IGMP host that sends query messages by configuring the
Messages query interval timer.
Table 579 Configure the Time Interval of IGMP Host Sending Query Messages
Operation Command
Configure the time interval of IGMP host igmp timer query seconds
sending query messages
Restore the default value of the time undo igmp timer query
interval of IGMP host sending query
messages
Configuring IGMP After the host receives the query message periodically sent by the router, it starts
Maximum Query delay timers for each of the multicast groups it joins. A random number between
Response Time zero and the maximum response time will be adopted to serve as the initial value.
The maximum response time is the query message assigned maximum response
time (the maximum response time of IGMP Version 1 is fixed at 10 seconds). The
host broadcasts the membership report to the router before the timer times out. If
the router does not receive a membership report when the maximum query
response time times out, it assumes that there is no local group member, and it
does not send the received multicast message to the network it connects to.
Operation Command
Configure IGMP maximum query response igmp max-response-time seconds
time
508 CHAPTER 34: CONFIGURING IGMP
The default maximum query response time is 10 seconds but ranges from 1 to 25
seconds.
This configuration can only be carried out if the current router interface is
operating IGMP Version 2.
Configuring Subnet When there are several routers operating IGMP in a subnet, one router is chosen
Querier Survival Time to serve as a querier to take charge of sending query messages to other routers in
the network segment. In the network initialization, all the routers in the network
segment act as querier by default, and send general query messages to all the
multicast hosts in the subnet the routers connect to. Meanwhile, they compare
the receiving IP address of the query message interface with the sending IP address
of the query message interface. The router with the minimum IP address in the
subnet will be chosen as querier, and the other routers become non-queriers.
All the non-queriers start the other querier present interval timer. Before the timer
times out, if the query message from the querier is received, the timer resets. If the
timer times out, all the routers reset as querier. The querier selection process
restarts.
Operation Command
Configure subnet Querier survival time igmp timer querier-present seconds
Restore the default value of the subnet undo igmp timer querier-present
Querier survival time
This configuration can only be carried out if the current router interface is
operating IGMP Version 2.
After the previous configuration, execute the display command in all views to
display IGMP configuration, and to verify the effect of the configuration. Execute
the debugging command in system view to debug IGMP.
IGMP Configuration Router A, Router B and a PC connect to one another through a Hub, and their
Example interfaces are all fast Ethernet (FE).
IGMP Configuration Example 509
RouterA
Quidway A Router
QuidwayB
B
10.16.1.3 10.16.1.2
10.16.1.0/24
HUB
10.16.1.1
PC
1 Configure the IP addresses of the interfaces of Router A, Router B and the PC.
[RouterA]interface e0
[RouterA-Ethernet0]ip address 10.16.1.3 24
[RouterB]interface e0
[RouterB-Ethernet0]ip address 10.16.1.2 24
2 Execute the multicast routing-enable command on 3Com A and 3Com B to
enable multicast routing.
[RouterA] multicast routing-enable
[RouterB] multicast routing-enable
510 CHAPTER 34: CONFIGURING IGMP
35 CONFIGURING PIM-DM
■ PIM-DM Overview
■ PIM-DM Configuration
■ Displaying and Debugging PIM-DM
■ PIM-DM Configuration Example
PIM-DM constructs a multicast distribution tree from the source PIM router to all
the other nodes employing unicast routing table. When sending a multicast
packet, PIM-DM assumes that all the hosts in the network are ready for receiving
the multicast packet. The multicast source begins distributing multicast packets to
the downstream nodes of the network. The nodes without multicast group
members will send prune message to the upstream router and inform it that there
is no need for it to distribute data to the downstream nodes any more. When new
members appear in the prune area, PIM-DM sends graft message to enable the
pruned path to restore to distribution status. This mechanism is called
broadcast-prune process.
PIM-DM itself does not have a routing discovery mechanism, so it has to depend
on a specific unicast routing protocol. Thus the protocol implementation is quite
simple.
PIM-DM Configuration PIM-DM configuration includes tasks that are described in the following sections:
■ Enabling Multicast Routing
■ Starting the PIM-DM Protocol
■ Configuring the Time Interval for Hello Messages
Enabling Multicast Only after the multicast routing is enabled, can routers receive multicast packets.
Routing
Make the following configuration in the system view.
Operation Command
Enable multicast routing multicast routing-enable
Disable multicast routing undo multicast routing-enable
Starting the PIM-DM You must start the PIM-DM protocol at each interface. By default, the system
Protocol disables the PIM-DM protocol.
Operation Command
Start PIM-DM protocol pim dm
Disable PIM-DM protocol undo pim dm
Configuring the Time After the interface starts PIM-DM protocol, it will periodically send to all the PIM
Interval for Hello routers (group address is 224.0.0.13) hello messages to find neighbors. PIM
Messages query-interval timer determines the time interval. If the interface receives the hello
message, it means that there are adjacent PIM routers for this interface, and this
interface adds the neighbor to its interface neighbor list. If the interface does not
receive any hello message from the neighbors in the interface neighbor list within
a specific period, it is assumed that the neighbor has left the multicast network.
The time interval of sending hello message can be configured according to the
bandwidth and the type of the network to which the interface connects.
Table 585 Configure the Time Interval of Interface Sending Hello Messages
Operation Command
Set the time interval of interface sending pim timer hello seconds
hello messages
Restore the default value of the time undo pim timer hello
interval of interface sending hello
messages
Turn on the switch of PIM-DM debugging debugging pim dm { alert | all | mrt
information | timer | warning | { recv | send } {
all | assert | graft | graft-ack |
join | prune } }
After making the previous configuration, execute the display command in all
views to display the running of the PIM-DM configuration, and to verify the effect
of the configuration. Execute the debugging command in system view to debug
PIM-DM.
PIM-DM Configuration In this example, the multicast source server is the multicast source, while RECEIVER
Example 1 and RECEIVER 2 are the two receivers of this multicast group.
Router
RECEIVER 1
Multicast Router
source
Router
RECEIVER 2
■ PIM-SM Overview
■ PIM-SM Configuration
■ Displaying and Debugging PIM-SM
■ PIM-SM Configuration Example
■ Troubleshooting PIM-SM
PIM-SM Overview Protocol Independent Multicast--Sparse Mode (PIM-SM) is used in the following
conditions:
■ The distribution of the group members is relatively separate and the range is
comparatively wide.
■ The network bandwidth resource is limited.
PIM-SM is independent of any specific unicast routing protocol. PIM -SM is called
protocol independent because it can use the route information entered by any
routing protocol, such as unicast protocols like OSPF, RIP, or multicasting protocols
like DVRMP in the multicasting routing information base (RIB). It supposes that all
the routers will not send multicast packets to the multicast group unless there is an
explicit transmission request. PIM-SM informs all the PIM-SM routers of multicast
information by configuring a rendezvous point (RP) and a bootstrap router (BSR).
And it reduces data messages and controls the network bandwidth occupied by
the messages occupy by allowing routers to explicitly join and leave multicast
groups. PIM-SM constructs an RP path tree (RPT) with the RP its root so as to make
the multicast packets transmitted along with the RPT.
When a host joins a multicast group, the directly connected router sends a joining
message to the RP PIM. The first hop router of the transmitter registers the
transmitter at RP. The receiver's DR adds the receiver to the RPT. Using the RPT
with the RP its root not only reduces the protocol state that routers need
maintenance, which improves the scalability of the protocol and reduces the
router's processing cost, but also supports a large number of simultaneous
multicast groups. When the data traffic flow reaches a certain degree, the data
will switch from the RPT to the shortest path tree based on source so as to reduce
the network delay.
neighbors. The hello message also takes charge of choosing a DR for the router
operating IGMPv1.
■ Register Message: When the DR receives the multicast message sent by the
host in the local network, it encapsulates it in the register message and unicasts
it to the RP to distribute the message along the RP tree. The source address in
the IP header of the register message is DR address, and the destination
address is RP address.
■ Register-Stop Message: It is unicast to the transmitter of the register message
by RP to inform the transmitter to stop sending register messages.
■ Join/Prune Message: This message is sent in the direction of the source or RP.
The join message establishes the RPT or SPT. When the receiver leaves the
group, the prune message is used to prune the RPT or SPT. The join message
and the prune message are placed in one message, but either of such two
kinds of messages can be empty.
■ Bootstrap Message: The router sends this message from all the interfaces
except on that interface receiving this kind of message. This kind of message is
generated in BSR, and is forwarded by all the routers. It is used to inform all the
routers of the RP-Set information collected by BSR.
■ Assert Message: When there are multiple routers in the multiple access
network, and the output interface for the routing item of a router receives
multicast message, this kind of message is used to specify the transmitter.
■ Candidate-RP-Advertisement Message: This message is unicast to BSR by the
candidate RP to report the service group address set of this candidate RP.
PIM-SM Configuration PIM-SM configuration includes tasks that are discribed in the following sections:
■ Enabling Multicast Routing
■ Starting the PIM-SM Protocol
■ Configuring the Candidate BSR
■ Configuring the Candidate RP
■ Configuring the PIM-SM Domain Boundary
■ Configuring the Time Interval for Sending a Hello Message
■ Configuring the Threshold of the Shortest Path
Operation Command
Enable multicast routing multicast routing-enable
Disable multicast routing undo multicast routing-enable
Starting the PIM-SM The PIM-SM protocol is configured at each interface in turn. In normal conditions,
Protocol the PIM-SM protocol should be started at all interfaces.
Operation Command
Enable PIM-SM protocol pim sm
Disable PIM-SM protocol undo pim sm
Note that PIM-SM only runs on specific interfaces. One interface can only run one
multicast routing protocol at one time.
Configuring the In a PIM-SM domain, there must be a unique bootstrap router to enable PIM-SM
Candidate BSR router to function normally. BSR takes charge of collecting and sending RP
information. Several candidate bootstrap routers (C-BSR) generate one publicly
acknowledged BSR by bootstrap message selection. Before the BSR information is
known, C-BSRs view themselves as BSRs. They periodically broadcast bootstrap
messages in PIM-SM domain (the broadcast address is 224.0.0.13). Such a
message contains BSR address and priority.
BSR manages RP, and it collects and distributes the RP information in the whole
network. RP is generated from the BSR election.
Operation Command
Configure an interface to be candidate c-bsr interface-type
BSR interface-number hash-mask-length [
priority ]
Disable an interface from being candidate undo c-bsr
BSR
Configuring the In the PIM-SM protocol, the shared tree (RP Path Tree) constructed by the routing
Candidate RP multicast data regards the rendezvous point (RP) as its root, and the group
members as its leaves. RP is generated from BSR selection. After the BSR is
selected, all the C-RPs periodically unicast to BSR C-RP advertisements. BSR then
selects the RP, and propagates it to the whole network. There may be several RPs,
and each has different group service range. In this way, all the routers can get RP
information.
In configuring candidate RP, we can specify the RP group service range. It can serve
all the multicast groups, or just part of the groups.
Operation Command
518 CHAPTER 36: CONFIGURING PIM-SM
Generally, only one C-BSR and one C-RP are configured in the network, and
usually it is the same router. Only one C-BSR can be configured for a single router.
The latter configured C-BSR replaces the formerly configured C-BSR. Subscribers
are recommended to configure the C-RP and C-BSR at the loopback interface of
the same router. This reduces the network oscillation caused by physical interface
alternating UP/DOWN, because the router loopback interface is always UP.
Configuring the PIM-SM When the scale of a network is large, the network needs to be divided into several
Domain Boundary multicast domains. A different multicast domain can be in charge of a different RP.
After the PIM domain boundary has been configured, the BSR message and RP
message do not break through this boundary, but the other PIM messages are able
to pass through the domain boundary.
Operation Command
Set PIM domain boundary pim bsr-boundary
Delete PIM domain boundary undo pim bsr-boundary
Configuring the Time After the interface starts PIM-SM protocol, it will periodically transmits a hello
Interval for Sending a message to all the PIM routers (group address is 224.0.0.13) to find PIM
Hello Message neighbors. the query interval timer determines this time interval. If the interface
receives the Hello message, it means that there are adjacent PIM routers for this
interface, and this interface can add the neighbor to its interface neighbor list. If
the interface does not receive a hello message from the neighbors in the interface
neighbor list within a specific period, it is assumed that the neighbor must have
left the multicast network. The time interval for sending a hello message can be
configured according to the bandwidth and the type of the network the interface
connects to.
Table 592 Configure the Time Interval of Interface Sending Hello Message
Operation Command
Configure the time interval of interface pim timer hello seconds
sending Hello message
Restore the default value of the time undo pim timer hello
interval of interface sending Hello
message
Displaying and Debugging PIM-SM 519
Configuring the The PIM-SM router first forwards multicast data packets by the shared tree. But if
Threshold of the the multicast data rate exceeds a certain threshold value, the router for the last
Shortest Path hop of multicast packets starts the switch from the shared tree to the shortest
path tree.
Table 593 Configure the Threshold of the Shortest Path Switching From the Shared Tree
to Source
Operation Command
Configure the threshold value of the spt-switch-threshold { traffic-rate |
shortest path switching from the shared infinity } [ accept-policy acl-number
tree to source ]
Restore the default threshold value of the undo spt-switch-threshold [
shortest path switching from the shared accept-policy acl-number ]
tree to source
By default, the threshold value of the shortest path switches from the shared tree
to source is zero. That is to say, after the router receives the first multicast data
packet in the last hop, it switches immediately to the shortest path tree.
After the above configuration, execute the display command in all views to
display PIM-SM configuration, and to verify the effect of the configuration.
Executethe debugging command in system view for the debugging of PIM-SM.
PIM-SM Configuration In the actual network, because different manufacturers provide routing
Example equipment, the routing protocols are different. Because the PIM protocol is
independent of any specific unicast protocol, there is no need to pay attention to
the unicast protocol. The the purpose of this example, the routers are mutually
accessible.
Host A Host B
e0 e0
s0 s0
Router A Router C
s1 s1
s1
s0
Router B s2
s0
Router D
1 Configure Router A
a Enable PIM-SM protocol
[RouterA] multicast routing-enable
[RouterA] interface ethernet 0
[RouterA-Ethernet0] pim sm
[RouterA-Ethernet0] interface serial 0
[RouterA-Serial0] pim sm
[RouterA-Serial0] interface serial 1
[RouterA-Serial1] pim sm
b Configure the threshold value of the multicast group switching from the shared
tree to the shortest path tree to be 10kbps.
[RouterA]acl 5
[RouterA-acl-5]rule permit source 225.0.0.0 255.0.0.0
[RouterA-acl-5]pim
[RouterA-pim] spt-switch-threshold 10 accept-policy 5
2 Configure Router B
a Enable PIM-SM protocol
[RouterB] multicast routing-enable
[RouterB] interface serial 0
[RouterB-Serial0] pim sm
[RouterB] interface serial 1
Troubleshooting PIM-SM 521
[RouterB-Serial1] pim sm
[RouterB] interface serial 2
[RouterB-Serial2] pim sm
b Configure the candidate BSR
[RouterB-pim] c-bsr serial 0 30 2
c Configure the candidate RP
[RouterB-pim] acl 5
[RouterB-acl-5] rule permit source 225.0.0.0 255.0.0.0
[RouterB-acl-5] pim
[RouterB-pim] c-rp serial 0 accept-policy 5
d Configure PIM domain boundary
[RouterB-Serial2] pim bsr-boundary
When the Serial 2 has been configured to be BSR, Router D will not be able to
receive the BSR information sent by Router B, which will be excluded from this PIM
domain.
3 Configure the Router C
a Enable PIM-SM protocol
[RouterC] multicast routing-enable
[RouterC] interface ethernet 0
[RouterC-Ethernet0] pim sm
[RouterC] interface serial 0
[RouterC-Serial0] pim sm
[RouterC] interface serial 1
[RouterC-Serial1] pim sm
Suppose Host A is the receiver of 225.0.0.1. Host B now begins sending data with
the destination address 225.0.0.1. Router A receives the multicast data sent by
Host B via Router B. When the multicast data rate of Host B exceeds 10kbps,
Router A will be added to the shortest path tree, and the multicast data message
sent by Host B will be received directly from Router C.
Troubleshooting The router cannot correctly establish the multicast routing table.
PIM-SM
Follow these steps:
■ Use the PIM-SM protocol to configure RP and BSR. First, use the display pim
bsr-info command to check whether there is BSR information. If there is no
such information, check whether there is unicast routing to the BSR. Then, use
the display pim rp-info command to check whether the RP information is
correct. If there is no RP information, check the unicast routing again.
■ The display pim neighbor command can be used to check whether the
neighbors have discovered each other.
522 CHAPTER 36: CONFIGURING PIM-SM
VIII SECURITY
This chapter provides an overview to the security features provided for terminal
access of 3Com routers and covers the following topics:
■ Terminal Access Security Overview
■ Configuring Terminal Access Security
■ EXEC Configuration Example
Terminal Access 3Com routers adopt cascade protection for the command line interface, and
Security Overview divide terminal access users into three types:
■ Administrators
■ Operators
■ Guests
A guest user can only log onto the router to execute the interconnectivity test
commands, such as ping, tracert, pad. An operator user can only view the running
and debugging information of the router. An administrator user can not only view
all the router information, but can also configure and maintain the router. All users
need to authenticate the usernames and passwords when visiting the router.
The command line interface (CLI) provides the following features for terminal
users:
■ For security, password input is not displayed on the terminal screen.
■ If an illegal user attempts to break into the system by testing different
passwords, access is automatically denied if the wrong password is entered
consecutively three times.
Users can set the terminal timeout time. If a terminal user makes no keyboard
input within a certain time, the access is disconnected automatically, so as to avoid
illegal access to the router.
Configuring Terminal Terminal access security includes tasks described in the following sections:
Access Security ■ Configuring a User
■ Configuring User Login Authentication
Operation Command
526 CHAPTER 37: CONFIGURING TERMINAL ACCESS SECURITY
Configuring User Login All users who access a router through a terminal are called terminal users. 3Com
Authentication routers divide terminal users into five types:
■ Asynchronous port terminal user
■ X.25 PAD calling user
■ Console port user
■ Dumb terminal user
■ Telnet terminal user
3Com routers now support command line interpreters that access terminals from
four types of interfaces:
Operation Command
Configure login authentication of terminal login async
user from asynchronous port
Cancel login authentication of terminal undo login async
user from asynchronous port
Configure login authentication of terminal login con
user from Console port
Cancel login authentication of terminal undo login con
user from Console port
Configure login authentication to dumb login hwtty
terminal access user
Cancel terminal user login authentication undo login hwtty
to dumb terminal access user
Configure login authentication to remote login pad
X.25 PAD calling user
Cancel login authentication to remote undo login pad
X.25 PAD calling user
Configure login authentication of terminal login telnet
user via telnet
Cancel login authentication of terminal undo login telnet
user via telnet
EXEC Configuration The following examples demonstrate how to configure login authentication for:
Example
EXEC Configuration Example 527
■ AAA Overview
■ RADIUS Overview
■ Configuring AAA and RADIUS
■ Displaying and Debugging AAA and RADIUS
■ AAA and RADIUS Configuration Examples
■ Troubleshooting AAA and RADIUS
RADIUS Overview Remote Authentication Dial-In User Service (RADIUS) is a distributed client/server
system that provides AAA functions and protects networks from being intruded by
unauthorized visitors, so it is mainly applied in network environments that require
high security and support remote login.
responsible for receiving a user's request for connection, authenticating the user,
and returning the required information to NAS.
RADIUS Server
In addition, a RADIUS server can act as the client of other AAA servers to perform
authentication or accounting. A RADIUS server supports multiple ways to
authenticate the user, such as PPP-based PAP, CHAP and UNIX-based login.
Basic Information The RADIUS server usually uses the agent authentication function of the devices
Interaction Procedure of like NAS to authenticate the user. The RADIUS client and server authenticate their
RADIUS interactive messages through shared keys, and the user password is transmitted
over the network in ciphertext mode to enhance security. The RADIUS protocol
integrates the authentication and authority processes and the response packet
carries authority information. The operation process is shown in the following
figure.
RADIUS Overview 531
PSTN/
ISDN
PC
Enter username and password
Access-Request
Access-Accept
Accounting-Request £̈ start£
©
Accounting-Response
Accounting-Request stop
£̈ ©
£
Accounting-Response
Notify the end of access
Packet Structure of the RADIUS uses UDP to transmit messages. By employing a timer management
RADIUS protocol mechanism, retransmission mechanism, and slave server mechanism, it can ensure
that the interactive message between the RADIUS server and client can be
processed correctly. Figure 167 illustrates the contents of a RADIUS packet.
532 CHAPTER 38: CONFIGURING AAA AND RADIUS PROTOCOL
Authenticator
Attribute
The Identifier field is used to match request packets and response requests. It
varies with the Attribute field and the valid received response packets, but remains
unchanged during retransmission. The Authenticator field (16 bytes) is used to
authenticate the request transmitted by the RADIUS server, and it can also be used
on the password hidden algorithm. There are two kinds of Authenticator packets:
The Code field decides the type of RADIUS packets, as shown in Table 597.
The Attribute field carries special AAA information, and provides the configuration
details of request and response packets in the triplet form of type, length, and
value. Table 598 lists the explanation of Attribute fields defined by RFC.
Configuring AAA and RADIUS 533
Figure 168 Fragment of the RADIUS packet that includes extension attribute
type length
Vendor-ID
(specified) (specified)
Configuring AAA and Configuring AAA and RADIUS includes tasks that are described in the following
RADIUS sections:
■ Enabling and Disabling AAA
■ Configuring the Authentication Method List for Login Users
■ Configuring an Authentication Method List for PPP Users
■ Configuring the Local-First Authentication of AAA
■ Configuring the AAA Accounting Option
■ Configuring a Local IP Address Pool
534 CHAPTER 38: CONFIGURING AAA AND RADIUS PROTOCOL
Enabling and Disabling Please perform the following configurations in the system view.
AAA Table 599 Enable/Disable AAA
Operation Command
Enable AAA aaa-enable
Disable AAA undo aaa-enable
Configuring the An authentication method list defines the authentication methods, including the
Authentication Method authentication types, which can be executed, and their execution sequence. This
List for Login Users list is used in sequence to authenticate users.
Login users are divided into FTP users and EXEC users. EXEC means logging on the
router through Telnet or other methods, such as the console port, asynchronous
serial port, telnet, X.25 PAD calling, for router configuration. The two types of
users have to be authorized in a local user database with the command
local-user service-type. If a RADIUS server is used for authentication, the
authorization details for the corresponding user (defining user name and
password) should be set on the RADIUS server, before it is started.
Operation Command
Configure login authentication method list aaa authentication-scheme login {
of AAA default | methods-list } [ template
server-template-name ] [ method1 ] [
method2 ]…
Delete login authentication method list of undo aaa authentication-scheme login
AAA { default | methods-list }
If the user does not define the methods-list, the execution sequence of default
method list will be used.
By default, the method list combination for the PPP login users is aaa
authentication-scheme ppp default local.
If users do not define the method methods-list, the executing sequence defined in
the default method list (defined by default) is used.
Configuring the When local-first authentication is configured, the user is authenticated locally first.
Local-First If local authentication fails, then the authentication method configured in the
Authentication of AAA method list is used instead. Once local-first authentication is configured, it is
applied to all users using PPP and login.
Operation Command
Enable local-first authentication aaa authentication-scheme
local-first
Disable local-first authentication undo aaa authentication-scheme
local-first
Configuring the AAA In case there is no available RADIUS accounting server or if communication with
Accounting Option the RADIUS accounting server fails, and if only aaa accounting-scheme
optional command is configured then the user is be disconnected and can still
use the network resources.
Operation Command
Turn on accounting option switch aaa accounting-scheme-scheme
optional
Turn off accounting option switch undo aaa accounting-scheme-scheme
optional
By default, the accounting option is disabled and users are charged. When the
method list designated by the user is none, accounting is unnecessary.
Configuring a Local IP A local address pool is mainly used to assign an IP address for users who log in
Address Pool remote PPP. If the end IP address of the pool is not specified when the IP address
pool is defined, there will be only one IP address in the address pool.
Operation Command
Configure local IP address pool ip pool pool-number low-ip-address [
high-ip-address ]
Cancel local IP address pool undo ip pool pool-number
The pool-number ranges from 0 to 99. Addresses in each address pool must be
consecutive, and each address pool can have at most 256 addresses.
Assigning an IP Address For a user accessing the Internet through remote PPP dialing, the system either
for a PPP User specifies an address or allocates an unoccupied address selected from a local
address pool to the user.
Operation Command
Assign IP address for PPP user remote address { ip-address | pool [
pool-number ] }
Cancel IP address of PPP user undo remote address
By default pool-number is 0.
Configuring a Local User When a user dials in to access the network, user information is looked up
Database according to the following steps in the local user database:
1 Information about the user is sought in the local database. If the information is
present, the login of the user is permitted.
2 If the user information is not in the local database and if the RADIUS server
authentication is configured, the user information is sent to the RADIUS server for
authentication. If authentication succeeds, the user can log on normally.
Otherwise, the user is rejected.
3 If the user information is not in the local database and the RADIUS server
authentication is not configured, the login of the user is rejected.
Various configuration tasks conducted in the local user database can be nested or
combined and all local user databases can be configured in one command.
Operation Command
Configure the user and password local-user user-name [ password {
simple | cipher } password ] ...
Delete the user undo local-user user-name
The security devices in 3Com routers support the callback technique that is divided
into ISDN caller authentication callback and callback participated in by PPP.
ISDN caller authentication callback does not involve PPP, it directly authenticates
whether the call-in number matches with the number configured by the server.
Hence, only the server end needs a corresponding configuration and the client
needs no modification.
Operation Command
Configure the callback user and the local-user user [ callback-number
callback number number ] ...
Delete the callback user and the callback undo local-user user
number
Operation Command
Configure a user with caller number local-user user [ call-number number
] [ :sub-number ] ...
Delete a user with caller number undo local-user user-name
Operation Command
Configure an FTP user and the usable local-user user [ ftp-directory
directory directory ] ...
Delete an FTP user and the usable undo local-user user
directory
Operation Command
Configure authorizing a user with usable local-user user [ service-type {
services exec-administrator | exec-guest |
exec-operator | ftp | ppp } ... ] ...
Delete authorizing a user with usable undo local-user user-name
services
■ When the RADIUS server used first does not respond, the succeeding servers
are used in sequence.
Table 611 Configure IP Address, Authentication Port Number and Accounting Port
Number
Operation Command
Configure IP address (or host name), radius server { hostname | ip-address
authentication port number and } [authentication-port port-number ]
accounting port number of RADIUS server [accounting-port port-number ]
host.
Cancel RADIUS server with designated undo radius server { hostname |
host address or host name ip-address }
The default authentication port number is 1812. When configured as 0, this server
is not used as an authentication server. The default accounting port number is
1813. When configured as 0, this server is not used as an accounting server.
Operation Command
Configure shared secret of RADIUS server radius shared-key string
Delete shared secret of RADIUS server undo radius shared-key
Configure the Time Interval at Which the Request Packet is Sent Before the
RADIUS Server Fails
To determine whether a RADIUS server is invalid, the router will send
authentication request packets to the RADIUS server periodically.
Table 613 Configure the Time Interval at which the Request Packet is Sent Before RADIUS
Server Fails
Operation Command
Configure the time interval at which the radius timer response-timeout
authentication request packet is sent seconds
Restore default value of the time interval undo radius timer response-timeout
at which the authentication request
packet is sent
Operation Command
Configure the times of request radius retry times
retransmission
Restore default value of times of request undo radius retry
retransmission
By default, the times of request retransmission are three and the number ranges
from 1 to 255.
Operation Command
Configure the time interval at which the radius timer quiet minutes
inquiry packet is sent after RADIUS server
breaks down
Restore default value of time interval at undo radius timer quiet
which the inquiry packet is sent
By default, the inquiry packet is sent at intervals of 5 minutes after the RADIUS
server fails, and the interval ranges from 1 to 255 minutes.
Usually, the server sends the accounting packet only according to the access time
and disconnection time. But for higher reliability, the time interval at which the
real-time accounting packet is sent to the RADIUS server can be configured.
Operation Command
542 CHAPTER 38: CONFIGURING AAA AND RADIUS PROTOCOL
Displaying and Use the debugging and display commands in all modes.
Debugging AAA and Table 617 Display and debug AAA and RADIUS
RADIUS
Operation Command
Display status of dial-in users display aaa user
View local user database display user
Enable RADIUS event debugging debugging radius event
Enable RADIUS packet debugging debugging radius packet
Enable RADIUS primitive language debugging radius primitive
debugging
AAA and RADIUS This section provides examples of using AAA and Radius within a network, with a
Configuration suggested procedure for each configuration
Examples
Accessing User The RADIUS server is used for authentication. 129.7.66.66 acts as the first
Authentication Case 1 authentication and accounting server, and 129.7.66.67 as the second
authentication and accounting server, both using default authentication port
number 1812 and default accounting port number 1813.
AAA and RADIUS Configuration Examples 543
lqz lst
1 Enable AAA and configure default authentication method list of PPP user.
[Router]aaa-enable
[Router]aaa authentication-scheme ppp default radius
2 Configure IP address and port of RADIUS server.
[Router]radius server 129.7.66.66
[Router]radius server 129.7.66.67
3 Configure RADIUS server shared secret, retransmission times, and accounting
option
[Router] radius shared-key this-is-my-secret
[Router] radius retry 2
[Router] aaa accounting-scheme optional
[Router] radius timer response-timeout 5
Accessing User 129.7.66.66 acts as the first authentication and accounting server, port numbers
Authentication Case 2 being 1000 and 1001 respectively.
Authenticate by the local database first, and if there is no response, use the
RADIUS server.
Charge all users in real time. The real-time accounting packet is sent at the interval
of 5 minutes.
Authenticating an FTP The authentication server is 129.7.66.66, numbers of ports being 1812 and 1813.
User
Authenticate and charge FTP users using RADIUS server first, and if there is no
response, do not authenticate or charge them.
unavailable. Moreover as the radius timer quiet command has not been
configured (defaulted as 5 minutes), or a relative long dead-time has been
configured, the system does not know that the server has recovered. Use undo
radius server command to delete the original RADIUS server, and reconfigure it
by radius server command to activate the server immediately.
5 If none of the above operations work, check whether the RADIUS server has been
configured correctly, and whether the modification has been activated
■ Firewall Overview
■ Configure Firewall
■ Displaying and Debugging Firewall
■ Firewall Configuration Example
Firewall Overview A firewall is used to control the network equipment, which accesses the internal
network resources. Setting a firewall at the access entry point of the intranet can
control access to the internal network resources by the external network devices.
In case of multiple entry points, every access entry point should be configured with
a firewall to effectively control the external access. To ensure that all data entering
the intranet is detected by the firewall, the firewall should be set at the intranet
entry point.
A firewall is used not only to connect the Internet, but also to control the access to
some special part of the internal network, such as to protect mainframes and
important resources, such as data, in the network. Access to the protected data
must be filtered through the firewall even if the access is from inside.
The firewall can screen the information, structure and operation of the intranet
from outside by detecting, restricting and modifying data flow overriding the
firewall. At present many firewalls also have other characteristics, for example, to
identify the user, and conduct security processing (encryption) for information.
Figure 170 A firewall isolates the internal network from the Internet
Internet
Firewall
Ethernet
PC PC PC PC
Server
548 CHAPTER 39: CONFIGURING FIREWALL
Classification of Firewalls
Usually firewalls are divided into two types: network layer firewalls and application
layer firewalls. A network layer firewall mainly obtains the packet head
information of data packets, such as protocol number, source address and source
port, destination address and destination port, or directly obtains the data of a
packet head. But an application layer firewall analyzes the whole information
stream.
Packet Filtering Usually, packet filtering refers to filtering for IP data packets forwarded. For the
data packets that need to be forwarded by a router, first the packet header
information, including the number of the upper layer protocol carried by the IP
layer, the packet's source/destination address and source/destination port is
obtained. Then the information is compared with the set rules. Finally, it is decided
whether to transfer or discard the data packet according to the comparison result.
Packet filtering (for IP data packets) selects the following elements for judgment
(in the figure, the upper layer protocol carried by IP is TCP), as shown in the figure
below.
Firewall Overview 549
Access Control List To filter data packets, rules need to be configured. A rule identifies a packet to be
considered by an Access Control List.
The access control list is generally employed to configure the rules to filter data
packets, and the types of access control lists are as follows:
The above command can also be written in following formats due to the different
protocol.
Only the TCP and UDP protocols require specifying the port range. Listed below
are supported operators and their syntax.
In specifying the port number, following mnemonic symbols may be used to stand
for the actual meaning.
Firewall Overview 551
As for the ICMP, you can specify the ICMP packet type. You can use a number
(ranging 0 to 255) or a mnemonic symbol to specify the packet type.
Firewall Overview 553
By configuring the firewall and adding appropriate access rules, you can use
packet filtering to check IP packets that pass the router. The passing of unexpected
packets can thus be prohibited. In this way the packet filtering helps to protect the
network security.
The maximum number of rules configured under an acl-number is 500 (that is,
500 rules can be configured in normal time range, and 500 rules can also be
configured in special time range), and the number of total rules under all
acl-number are not more than 500. When there is a conflict among several rules,
the system will configure the match rules according to the following principle:
■ Rules with the same serial number can be defined. If two rules with the same
serial number conflict, use the “depth-first” principle to judge the source-addr,
source-wildcard-mask, destination-addr, destination-wildcard-mask, protocol
number and port number, then determine the sequence of the rule.
■ If the ranges defined by the rules are the same, then determine the sequence
of the rules according to the time sequence of definition. The system will
choose the rule defined earlier.
554 CHAPTER 39: CONFIGURING FIREWALL
The “depth-first” principle means matching the access rules with the smallest
definition range of data packets. It can be achieved by comparing the wildcards of
address. The smaller the wildcards are, the smaller the range specified by the host
is. For example, 129.102.1.1.0.0.0.0 specifies a host (the address is 129.102.1.1),
while 129.102.1.1.0.0.255.255 specifies a network segment (the range of the
address is from 129.102.1.1 to 129.102.255.255), obviously the former is
arranged in the front of access control rule.
The display acl acl-number command can be used to view the executive
sequence of the system access rules, and the rules listed ahead will be selected
first.
Enabling and Disabling a A firewall should be enabled for filtering messages to set other configurations into
Firewall effect.
Operation Command
Enable firewall firewall enable
Disable firewall firewall disable
Configuring Standard The value of the standard access control list is an integer from 1 to 99. First of all,
Access Control List enter the ACL view through acl command, and configure the match sequence of
the access control list, and then configure specific access rules through rule
command. If the matching sequence is not configured, it will be conducted by
auto mode.
Operation Command
Enter the ACL view and configure the acl acl-number [ match-order config |
match sequence of access control list auto ]
Configure standard access list rule rule { normal | special }{ permit |
deny } [source source-addr
source-wildcard | any ]
Delete specific access list rule undo rule { rule-id | normal |
special }}
Delete access list undo acl {acl-number| all }
normal means that this rule functions during normal time range, while special
means that this rule will function during the special time range. Users shall set the
special time segment when using special. Multiple rules with the same serial
number will be matched according to “depth-first”command.
Configuring Extended The value of the extended access control list is an integer from 100 to 199. First of
Access Control List all, enter the ACL view through acl command, and configure the match
sequence of the access control list, and then configure specific access rules
through rule command. If the matching sequence is not configured, it will be
conducted in auto mode.
Operation Command
Enter the ACL view and configure the acl acl-number [ match-order config |
match sequence of access control list auto ]
Configure extended access control list rule rule { normal | special }{ permit |
of TCP/UDP protocol deny } { tcp | udp } [source
source-addr source-wildcard | any ]
[source-port operator port1 [ port2 ]
] [ destination dest-addr dest-
wildcard | any ] [destination-port
operator port1 [ port2 ] ] [logging]
Configure extended access control list rule rule { normal | special }{ permit |
of ICMP protocol deny } ICMP [source source-addr
source-wildcard | any ] [ destination
dest-addr dest- wildcard | any ]
[icmp-type icmp-type icmp-code]
[logging]
556 CHAPTER 39: CONFIGURING FIREWALL
Operation Command
Configure extended access control list rule rule { normal | special }{ permit |
of other protocols deny } pro-number [source
source-addr source-wildcard | any ] [
destination dest-addr dest- wildcard
| any ] [logging]
Delete specific access list rule undo rule { rule-id | normal |
special }
Delete access list undo acl {acl-number| all }
normal means that this rule functions during normal time range, while special
means that this rule will function during the special time range. Users shall set the
special time range when using special. Multiple rules with the same serial
number will be matched according to “depth-first”principle.
Setting the Default The default firewall-filtering mode means that when there is no suitable access
Firewall Filtering Mode rule to determine whether a user data packet can pass through, the default
firewall-filtering mode set by the user will determine whether to permit or inhibit
this data packet to pass.
Operation Command
Set the default firewall filtering mode as firewall default permit
message pass permitted
Set the default firewall filtering mode as firewall default deny
message pass inhibited
The time ranges are classified into two types according to actual applications:
■ Special time range: Time within the set time range (specified by key word
special)
■ Normal time range: Time beyond the specified time range (specified by key
word normal)
Similarly, the access control rules are also classified into two types:
■ Normal packet-filtering access rules
■ Special time range packet-filtering access rules
These two types of time ranges define different access control lists and access
rules, which are not affected by each other. In actual applications, they can be
considered as two independent sets of rules, and the system will determine which
Configure Firewall 557
one to use after viewing the current time range (special or normal). For example,
the current system time is in special time range (which is defined by rule special
acl-number), and then the special time range rules will be used for filtering. But
when the current system time is switched to the normal time range (which is
defined by rule normal acl-number), the normal time range rules will be used
for filtering.
Operation Command
Enable filtering according to timerange timerange enable
Disable filtering according to timerange timerange disable
Only when the switch of filtering according to time range is enabled will the
special time range access rules set by the user be effective. But when this switch is
disabled, the normal time range access rules will be applied.
Operation Command
Set special time range settr begin-time end-time [
begin-time end-time...... ]
Cancel special time range undo settr
By default, the system adopts the access rules defined for normal time range for
message filtering. The command settr can define 6 time ranges at the same time.
The format of the time range is hh:mm. The value of hh is 0 - 23 hours and the
value of mm is 0- - 59 minutes.
The command display clock can be used to view the current clock status of the
system.
Configuring Rules for To apply access rules to specific interfaces to filter messages, it is necessary to
Applying Access Control apply the access control list rules to the interfaces. Users can define different
List on Interface access control rules for messages of both inbound and outbound directions at one
interface.
Table 627 Configure Rules for Applying Access Control List on Interface
Operation Command
Specify rule for filtering receive/send firewall packet-filter acl-number [
messages on interface inbound | outbound ]]
Cancel rule for filtering receive/send undo firewall packet-filter
messages on interface acl-number [ inbound | outbound ]]
If two rules with different sequence numbers conflict, then the number with
greater acl-number should be matched preferentially.
Specifying Logging Host Firewall supports a logging function. When an access rule is matched, and if the
user has specified to generate logging for this rule, logs can be sent to and
recorded and saved by the logging host.
Operation Command
Specify logging host ip host unix-hostname ip-address
Cancel logging host undo ip host
Displaying and Use debugging, reset and display commands in all views.
Debugging Firewall Table 629 Display and Debug Firewall
Operation Command
Display firewall status display firewall
Display packet filtering rule and its display acl [ all | acl-number |
application on interface interface type number ]
Display current timerange display timerange
Display whether the current time is within display isintr
special timerange
Clear access rule counters reset acl counters [ acl-number ]
Enable the information debugging of debugging filter { all | icmp | tcp |
firewall packet filtering udp}
■ Only specific users from external network can access the internal server.
■ Only a specific internal host can access the external network.
Enterprise Ethernet
129.38.1.5
129.38.1.4
Router router
Quidway
WAN
Specific external PC
1 Enable firewall
[Router]firewall enable
2 Configure firewall default filtering mode as packet pass permitted
[Router]firewall default permit
3 Configure access rules to inhibit passing of all packets
[Router] acl 101
[Router-acl-101] rule deny ip source any destination any
4 Configure rules to permit specific host to access external network, to permit
internal server to access external network.
[Router-acl-101] rule permit ip source 129.38.1.4 0 destination any
[Router-acl-101] rule permit ip source 129.38.1.1 0 destination any
[Router-acl-101] rule permit ip source 129.38.1.2 0 destination any
[Router-acl-101] rule permit ip source 129.38.1.3 0 destination any
5 Configure rules to permit specific external user to access internal server
[Router] acl 102
[Router-acl-102] rule permit tcp source 202.39.2.3 0 destination
202.38.160.1 0
560 CHAPTER 39: CONFIGURING FIREWALL
6 Configure rules to permit specific user to obtain data (only packets of port greater
than 1024) from an external network
[Router-acl-102] rule permit tcp source any destination 202.38.160.1
0.0.0.0 destination-port greater-than 1024
7 Apply rule 101 on packets coming in from interface Ethernet0
[Router-Ethernet0] firewall packet-filter 101 inbound
8 Apply rule 102 on packets coming in from interface Serial0
[Router-Serial0] firewall packet-filter 102 inbound
40 CONFIGURING IPSEC
IPSec Protocol IPSec is the general name of a series of network security protocols that provide
Overview services such as access control, connectionless integrity, data authentication,
anti-replay, encryption and classified encryption of data flow for both
communication parties.
NDEC Card In actual implementation, the packets processing performed by IPSec includes
processing ESP protocol, adding an authentication header to packets after
encryption, and deleting the authentication header after packets are
authenticated. To ensure security, the algorithms of encryption, decryption, and
authentication are very complicated. The encryption and decryption algorithm
process of the router occupies large quantities of resources; as a result the
performance of the integrated machine is affected. Using crypto cards (modular
plug-in cards), the 3Com modular series routers process encryption and decryption
operation in a way of hardware. It improves performance of the router when
software is processing the IPSec, and improves the operating efficiency of the
router.
Dividing the works of processing user data among multiple crypto cards. 3Com
modular series routers can support multiple crypto cards. The host software
divides the work of processing the user data among the crypto cards in normal
562 CHAPTER 40: CONFIGURING IPSEC
state by polling. Thus, crypto cards can synchronously process user data, which
improves the speed of data encryption and decryption.
For the IPSec applied at the crypto card side, the crypto cards will be unable to
implement the IPSec processing if all the crypto cards on the router are in
abnormal state. In this case, given that the host has been enabled to backup the
crypto cards, the IPSec module of the operating system will replace the crypto
cards to implement the IPSec processing, if the IPSec module supports the
encryption/authentication algorithm used by the crypto cards. Thus, the software
IPSec module fulfills the backup of crypto cards.
The processing mechanism of the crypto cards and that of the software IPSec
module is almost the same. The only difference is that the former implements the
encryption/decryption processing through the software and the latter through the
the main operating system.
IPSec Message IPSec can process messages as follows (with AH protocol as an example):
Processing ■ Add authentication header to messages: IP messages sent by the module block
from IPSec queue are read, and an AH header is added according to the
configured protocol mode (transport or tunnel mode), then forward it by IP
layer.
■ Cancel the authentication header after messages are authenticated: The IP
message received at the IP layer is analyzed as a local host address with
protocol number 51, then the corresponding protocol switch table item is
searched and the corresponding input processing function is called. This
processing function authenticates the message to make a comparison with the
original authentication value. If the values are the same, the added AH is
canceled, and the original IP message is restored. Then IP input flow is recalled
for processing. Otherwise, this message is discarded.
policy with smaller sequence number in the same security policy group is of
higher priority.
■ SA (Security Association): IPSec provides security service for data streams
through security association, which includes protocol, algorithm, key and other
contents and specifies how to process IP messages. An SA is a unidirectional
logical connection between two IPSec systems. Inbound data stream and
outbound data stream are processed separately by inbound SA and outbound
SA. SA is identified uniquely by a triple (SPI, IP destination address and security
protocol number (AH or ESP). SA can be established through manual
configuration or automatic negotiation. A SA can be manually established after
some parameters set by the users at two ends are matched and the agreement
is reached through negotiation. Automatic negotiation mode is created and
maintained by IKE, i.e., both communication parties are matched and
negotiated based on their own security policies without user's interface.
■ SA Update Time: There are two SA update time modes: time-based during
which SA is updated at regular intervals and traffic-based, during which SA is
updated whenever certain bytes are transmitted.
■ SPI (Security Parameter Index): a 32-bit value, which is carried by each IPSec
message. The trio of SPI, IP destination address, security protocol number,
identify a specific SA uniquely. When SA is configured manually, SPI should also
be set manually. To ensure the uniqueness of an SA, you must specify different
SPI values for different SAs. When SA is generated with IKE negotiation, SPI will
be generated at random.
■ IPSec Proposal: It includes security protocol, algorithm used by security
protocol, and the mode how security protocol encapsulates messages, and
prescribes how ordinary IP messages are transformed into IPSec messages. In
security policy, a IPSec proposal is quoted to prescribe the protocol and
algorithm adopted by this security policy.
Creating an Encryption Matching the encrypted access control list determines which IP packets are
Access Control List encrypted and sent, and which IP packets are directly forwarded. Encryption
access control lists are different from the ordinary ones, because the ordinary ones
only determine which data can pass an interface. An encryption access list is
defined by an extended IP access list.
For one kind of communication to accept one security protection mode (only
authentication, for instance), and another kind to accept a different one (both
564 CHAPTER 40: CONFIGURING IPSEC
Encryption access control list can be used to judge both inbound communication
and outbound communication.
Operation Command
Establish encryption access control list acl acl-number [ match-order config |
(applicable to IPSec software and crypto auto ]
card) rule { normal | special }{ permit |
deny } pro-number [source
source-addr source-wildcard | any ]
[source-port operator port1 [ port2 ]
] [ destination dest-addr dest-
wildcard | any ] [destination-port
operator port1 [ port2 ] ]
[icmp-type icmp-type icmp-code]
[logging]
Delete encryption access control list undo rule { rule-id | normal |
(applicable to IPSec software and crypto special }
card) undo acl {acl-number| all }
The deny key word does not allow the defined policy to be applied in the security
policy. This can prevent the router from encrypting or decrypting communication
information. (that is to say not allowing the policy defined in this security policy to
be applied). If all the security policies on an interface are denied, this
communication is not protected by encryption.
Do not use the wildcard any in the source address and destination address of the
command rule when creating an encryption ACL. This is because when the data
packet enters the router, and is sent to a router not configured with encryption,
the key word any will cause the router to try to establish encryption session with a
router without encryption.
The encryption access list defined at local router must have a mirror encryption
access list defined by the remote router so that the communication contents
encrypted locally can be decrypted remotely.
When the user uses the display acl command to browse the access lists of the
router, all extended IP access lists, including those for both communication
filtering and for encryption, will be displayed in the command outputs. That is to
say, these two kinds of extended access lists for different purposes are not
distinguished in the screen output information.
Configuring IPSec 565
Operation Command
Enable the crypto card encrypt-card enable [ slot-id ]
Disable the crypto card encrypt-card disable [ slot-id ]
Synchronize the crypto card clock with the router host clock
NDEC cards have their own clock. To synchronize the crypto card clock and the
host clock, the host will send the command of synchronizing clocks to the crypto
card periodically. The users can synchronize the crypto card clock and the host
clock immediately using this command.
Table 632 Synchronize the NDEC Card Clock and the Router Host Clock
Operation Command
Synchronize the crypto card clock encrypt-card set time [ slot-id ]
(applicable to crypto cards)
Operation Command
Enable/Disable the output of log encrypt-card set syslog { enable |
(applicable to crypto cards) disable } [ slot-id ]
Enable the main For the SAs applied at the encrypt-card side, the works of IPSec processing on the
software backup traffic will be shared among the normal encrypt-cards as long as there are
encrypt-cards in normal status on the router. If all the encrypt-cards are abnormal,
there will be no encrypt-cards can conduct the IPSec processing. In this case, given
that the host has already been enabled to backup the encrypt-cards, the IPSec
module will replace the encrypt-cards to conduct IPSec processing on the packets,
if the IPSec module (the main software) supports the encryption/authentication
algorithm used by this SA. If it does not, the packets will be discarded.
Operation Command
Enable the host to backup the crypto encrypt-card backuped
cards
Disable the host to backup the crypto undo encrypt-card backuped
cards
Defining IPSec Proposal The IPSec saved in conversion mode needs a special security protocol and
encryption/authentication algorithm to provide various security parameters for the
IPSec negotiation security confederation. Both ends must use the same conversion
mode for successfully negotiating IPSec security confederation.
Operation Command
Define IPSec proposal to enter the view of ipsec proposal proposal-name
IPSec proposal view (applicable to IPSec
software)
Delete IPSec proposal view (applicable to undo ipsec proposal proposal-name
IPSec software)
Define the IPSec proposal and enter view crypto ipsec card-proposal
of IPSec proposal view (applicable to proposal-name
crypto card)
Delete IPSec proposal view of the crypto undo crypto ipsec card-proposal
card (applicable to crypto card) proposal-name
Configure the following in IPSec proposal view (or proposal view of crypto card).
Table 636 Set the Mode for Security Protocol to Encapsulate Messages
Operation Command
Set the mode for security protocol to encapsulation-mode { transport |
encapsulate messages (applicable to IPSec tunnel }
software and crypto card)
Configuring IPSec 567
The data encapsulation forms of various security protocols in transport and tunnel
mode are shown in the following figure:
Transmission mode
Encryption transport tunnel
protocol
Please configure the following in IPSec Proposal view (or proposal view of crypto
card).
Operation Command
Set security protocol used for IPSec transform { ah-new | esp-new |
proposal (applicable to IPSec software and ah-esp-new }
crypto card)
Restore the default security protocol undo transform
(applicable to IPSec software and crypto
card)
Selecting the Encryption AH protocol cannot encrypt but authenticate packets. ESP in IPSec software
and Authentication supports five security encryption algorithms that are 3des, des, blowfish, cast
Algorithm and skipjack. There are seven kinds of security encryption algorithms supported
by ESP crypto card, which are 3des, des, blowfish, cast, skipjack, aes, and qc5.
Both ends of security tunnel must select the same encryption algorithm and
authentication algorithm.
568 CHAPTER 40: CONFIGURING IPSEC
Perform the following configurations in IPSec proposal view (or proposal view of
crypto card)
Operation Command
Set the encryption algorithm adopted by esp-new encryption-algorithm { 3des |
ESP protocol (applicable to IPSec software) des | blowfish | cast | skipjack }
Set the encryption algorithm adopted by esp-new encryption-algorithm { 3des |
ESP protocol (applicable to crypto card) des | blowfish | cast | skipjack |
aes | qc5 }
Cancel the encryption algorithm adopted undo esp-new encryption-algorithm
by ESP protocol(applicable to IPSec
software and crypto card)
Set the authentication algorithm adopted esp-new authentication-algorithm {
by ESP protocol (applicable to IPSec md5-hmac-96 | sha1-hmac-96 }
software and crypto card)
Cancel the authentication algorithm undo esp-new
adopted by ESP protocol (applicable to authentication-algorithm
IPSec software and crypto card)
Set the authentication algorithm adopted ah-new authentication-algorithm {
by AH protocol (applicable to IPSec md5-hmac-96 | sha1-hmac-96 }
software and crypto card)
Restore the authentication algorithm undo ah-new authentication-algorithm
adopted by AH protocol (applicable to
IPSec software and crypto card)
Creating a Security The following questions should be answered before a security policy is created:
Policy ■ Which data needs IPSec protection?
■ How long should the data stream be protected by SA?
■ What security policy will be used?
■ Is the security policy created manually or through IKE negotiation?
Operation Command
Create security policy manually to enter ipsec policy policy-name
IPSec policy view(applicable to IPSec sequence-number manual
software and crypto card)
Modify the created security policy ipsec policy policy-name
manually (applicable to IPSec software and sequence-number
crypto card)
Delete the created security policy undo ipsec policy policy-name
(applicable to IPSec software and crypto sequence-number
card)
Operation Command
Configure encryption access control list security acl access-list-number
quoted in security policy (applicable to
IPSec software and crypto card)
Cancel encryption access control list undo security acl
quoted in security policy (applicable to
IPSec software and crypto card)
Operation Command
Set local address of security tunnel tunnel local ip-address
(applicable to IPSec software and crypto
card)
570 CHAPTER 40: CONFIGURING IPSEC
Operation Command
Delete local address of security tunnel undo tunnel local ip-address
(applicable to IPSec software and crypto
card)
Set remote address of security tunnel tunnel remote ip-address
(applicable to IPSec software and crypto
card)
Delete remote address of security tunnel undo tunnel remote ip-address
(applicable to IPSec software and crypto
card)
By default, the start point and the end point of the security tunnel are not
specified.
Operation Command
Set IPSec proposal quoted in security proposal proposal-name
policy (applicable to IPSec software and
crypto card)
Cancel IPSec proposal quoted in security undo proposal
policy (applicable to IPSec software and
crypto card)
Operation Command
Set SPI parameters of inbound SA of sa inbound {ah |esp} spi spi-number
AH/ESP protocol (applicable to IPSec
software and crypto card)
Delete SPI parameters of inbound SA of undo sa inbound {ah |esp} spi
AH/ESP protocol (applicable to IPSec
software and crypto card)
Set SPI parameters of outbound SA of sa outbound {ah |esp} spi spi-number
AH/ESP protocol (applicable to IPSec
software and crypto card)
Delete SPI parameters of outbound SA of undo sa outbound {ah |esp} spi
AH/ESP protocol (applicable to IPSec
software and crypto card)
Operation Command
Set authentication key of AH protocol sa { inbound | outbound } ah
(input in hexadecimal mode) (applicable to hex-key-string hex-key
IPSec software and crypto card)
Delete authentication key of AH protocol undo sa { inbound | outbound } ah
(in hexadecimal mode) (applicable to IPSec hex-key-string
software and crypto card)
Set authentication key of AH protocol sa { inbound | outbound } { ah
(input in string mode) (applicable to IPSec string-key string-key
software and crypto card)
Delete authentication key of AH protocol undo sa { inbound | outbound } ah
(character string) (applicable to IPSec string-key
software and crypto card)
Configure authentication key of ESP sa { inbound | outbound } esp
protocol (input in hexadecimal system) authentication-hex hex-key
(applicable to IPSec software and crypto
card)
Delete authentication key of ESP protocol undo sa { inbound | outbound } esp
(applicable to IPSec software and crypto authentication-hex
card)
Set ciphering key of ESP protocol (input in sa { inbound | outbound } esp
hexadecimal system) (applicable to IPSec encryption-hex hex-key
software and crypto card)
Delete ciphering key of ESP protocol undo sa { inbound | outbound } esp
(applicable to IPSec software and crypto encryption-hex
card)
Configure both ciphering and sa { inbound | outbound } esp
authentication keys of ESP protocol (input string-key string-key
in string) (applicable to IPSec software and
crypto card)
Delete the ciphering and authentication undo sa { inbound | outbound } esp
keys of ESP protocol (applicable to IPSec string-key
software and crypto card)
The keys are input in two modes and those input in string mode are preferred. At
both ends of the security tunnel, the keys should be input in the same mode. If the
key is input at one end in string mode, but at the other end in hexadecimal mode,
the security tunnel cannot be created correctly. To set a new key, the previous key
must be deleted first.
Operation Command
Configure encryption access control list security acl access-list-number
quoted in security policy (applicable to
IPSec software and crypto card)
Cancel encryption access control list undo security acl access-list-number
quoted in security policy (applicable to
IPSec software and crypto card)
Operation Command
Set remote address of security tunnel tunnel remote ip-address
(applicable to IPSec software and crypto
card)
Creating a Security Policy 573
Operation Command
Set IPSec proposal quoted in security proposal proposal-name1
policy (applicable to IPSec software and [proposal-name2...proposal-name6]
crypto card)
Cancel IPSec proposal quoted in security undo proposal
policy (applicable to IPSec software and
crypto card)
Set SA lifetime
There are two types of SA lifetime (or lifecycle): time-based and traffic-based. The
SA becomes invalid on the first expiration of either type of lifetime. Before the SA
becomes invalid, IKE establishes a new SA for IPSec negotiation, so a new SA is
ready when the previous one becomes invalid. If the global lifetime is modified
during the valid period of the current SA, the new one will be applied, not to the
present SA but to the later SA negotiation.
The SA lifetime is only effective for an SA established with IKE, and the SA
established manually does not involve the concept of lifetime.
If a security policy is not configured with lifetime value, when the router applies
for a new SA, it sends a request to the remote end to set up a security tunnel
negotiation and gets the SA lifetime of the remote end, and applies it as the new
SA lifetime. If the local end has configured the SA lifetime when creating security
policy, when it receives the application for security tunnel negotiation from the
remote end, it will compare the lifetime proposed by the remote end with its own
lifetime, and choose the smaller one as the SA lifetime.
SA is timeout based on the first expiration of the lifetime by seconds (specified by
the key word time-based) or kilobytes of communication traffic (specified by the
key word traffic-based).
The new SA should have completed the negotiation before the original SA times
out, so that the new SA can be put into use as soon as the original SA expires. Soft
timeout of SA occurs when a new SA is negotiated at the time when the existing
SA lives for a certain percentage of lifetime defined by seconds (such as 90%), or
when the traffic reaches a certain percentage (such as 90%) of the lifetime
574 CHAPTER 40: CONFIGURING IPSEC
defined by kilobytes. Hard timeout of SA means that the SA lives for the whole
lifetime.
Perform the following configurations in system view.
Table 649 Configure Global SA LIfetime
Operation Command
Set global SA “Time-based” lifetime ipsec sa global-duration time-based
(applicable to IPSec software and crypto seconds
card)
Restore the default value of the global SA undo ipsec sa global-duration
(applicable to IPSec software and crypto time-based
card) “Time-based” lifetime
Set global SA “Traffic-based” lifetime ipsec sa global-duration
(applicable to IPSec software and crypto traffic-based kilobytes
card)
Restore the default value of the global SA undo ipsec sa global-duration
“Traffic-based” lifetime (applicable to traffic-based
IPSec software and crypto card)
Operation Command
Set separate SA lifetime (applicable to sa duration { time-based seconds |
IPSec software and crypto card) traffic-based kilobytes }}
Restore the default value of separate SA undo sa duration { time-based seconds
lifetime (applicable to IPSec software and | traffic-based kilobytes }
crypto card)
Enable the detection on the reach ability of router at the remote end of
the tunnel
When there are primary and backup links between two routers, and both ends
adopt IKE mode to create the SA dynamically, once the primary link goes into
DOWN state, the communication switches to the backup link automatically. In this
case, a new SA pair (including phase 1 SA and phase 2 SA) that correspond to the
backup link are created, but the original SA pair on the primary link is not deleted
in time. Once the phase 2 SA on the primary link times out and is released (phase
1 SA still exists), if the primary link is restored and the communication switches
back to the primary link, the phase 1 SAs saved on the local router and the remote
router may be inconsistent, so that the IPSec tunnel cannot be established.
Enabling the monitoring function can ensure that the phase 1 SA can be released
when the phase 2 SA us released, so that a new SA pair can be reestablished
between the two routers when the primary link goes into UP state, then the IPSec
tunneling can be created correctly.
Please perform the following configurations in system view.
Displaying and Debugging IPSec 575
Table 651 Enable Detection of the Router at the Remote End of the Tunnel
Operation Command
Enable the detect on the reachability of ipsec sa dynamic-detect
router at the remote end of the tunnel (It
is applicable to the operating system host
software IPSec, NDEC)
Disable the detect on the reachability of undo ipsec sa dynamic-detect
router at the remote end of the tunnel (It
is applicable to the operating system host
software IPSec, NDEC)
By default, detection of the router at the remote end of the tunnel is disabled.
Apply Security Policy To put the defined SA into effect, it is necessary to apply a security policy to each
Group on Interface interface (logical or physical) that will encrypt site-out data and decrypt site-in
data. According to the encryption set configured on the interface, the interface
cooperates with the remote encryption router to perform the packet encryption.
When the security policy group is deleted from the interface, this interface will not
have IPSec security protection function.
One interface can be applied with only one security policy group, and one security
policy group can be applied to only one interface.
Operation Command
Apply security policy group on interface ipsec policy policy-name
(applicable to IPSec software and crypto
card)
Delete the security policy group applied on undo ipsec policy
interface (applicable to IPSec software and
crypto card)
Displaying and Use debugging, reset and display commands in all views.
Debugging IPSec
576 CHAPTER 40: CONFIGURING IPSEC
Operation Command
Display all created SA (applicable to IPSec display ipsec sa all
software)
Display all SA information briefly display ipsec sa brief
(applicable to IPSec software)
Display the specific SA information display ipsec sa parameters
(applicable to IPSec software) dest-address protocol spi
Display global SA lifetime (applicable to display ipsec sa duration
IPSec software)
Display SA established with specific peer display ipsec sa remote ip-address
ends (applicable to IPSec software)
Display all security policy base information display ipsec sa policy policy-name [
(applicable to IPSec software) sequence-number ]
Display statistic information related to display ipsec statistics
security message (applicable to IPSec
software)
Display configured IPSec proposal display ipsec proposal [
(applicable to IPSec software) proposal-name ]
Display all security policy base information display ipsec policy all
(applicable to IPSec software)
Display brief security policy base display ipsec policy brief
information (applicable to IPSec software)
Display all security policy base information display ipsec policy name policy-name
by name (applicable to IPSec software) [ sequence-number ]
Clear all SA (applicable to IPSec software) reset ipsec sa all
Clear specific SA information (applicable reset ipsec sa parameters
to IPSec software) dest-address protocol spi
Clear SA of the specified security policy reset ipsec sa policy policy-name [
base (applicable to IPSec software) sequence-number ]
Clear SA established with specified peer reset ipsec sa remote ip-address
ends (applicable to IPSec software)
Clear statistic information related to reset ipsec statistics
security messages (applicable to IPSec
software)
information debugging related to IPSec debugging ipsec { sa | packet | misc }
(applicable to IPSec software)
Operation Command
Reset crypto card (applicable to crypto encrypt-card reset [ slot-id ]
card)
IPSec Configuration Example 577
Operation Command
Display the detailed information of crypto display encrypt-card details [
cards (applicable to crypto cards) slot-id ]
Display all established Security Association display encrypt-card ipsec sa all [
on crypto card (applicable to crypto card) slot-id ]
Display a specified Security Association on display encrypt-card ipsec sa
crypto card (applicable to crypto card) parameters remote-address protocol
spi-number
Display statistical information of the display encrypt-card statistic [
security packets processing on crypto card slot-id ]
(applicable to crypto card)
Display current operating status of crypto display encrypt-card status [ slot-id
card (applicable to crypto card) ]
Display current operating logging of display encrypt-card syslog [ slot-id
crypto card (applicable to crypto card) ]
Display version number of crypto card display encrypt-card version [
(applicable to crypto card) slot-id ]
Delete all established Security Association reset encrypt-card sa all [ slot-id ]
(applicable to crypto card)
Delete the specified Security Association reset encrypt-card sa parameters
on crypto card (applicable to crypto card) remote-address protocol spi-number
Clear the statistical information of security reset encrypt-card statistic [
packets on crypto card (applicable to slot-id ]
crypto card)
Clear all the logging information on the reset encrypt-card syslog [ slot-id ]
crypto card (applicable to crypto cards)
Enable the debugging of information, debugging encrypt-card { all | packet
packets, SA, command, error and other | sa | command | error | misc } [
information (applicable to crypto cards) slot-id ]
Enable the debugging of the main debugging encrypt-card host { all |
software on the crypto card (applicable to packet | sa | command | error | misc
crypto cards) }
IPSec Configuration The following sections demonstrate the following IPSec configurations:
Example ■ Creating an SA Manually
■ Creating an SA in IKE Negotiation Mode
■ Encrypting, Decrypting, and Authenticating NDEC Cards
Creating an SA Manually Establish a security tunnel between Router-A and Router-B to perform security
protection for the data streams between PC-A represented subnet (10.1.1.x) and
PC-B represented subnet (10.1.2.x). The security protocol adopts ESP protocol,
algorithm adopts DES, and authentication algorithm adopts sha1-hmac-96.
578 CHAPTER 40: CONFIGURING IPSEC
10.1.1.1 10.1.2.1
Internet
Router A Router B
PC A PC B
s0:202.38.163.1 s0:202.38.162.1
10.1.1.2 10.1.2.2
Prior to the configuration, you should ensure that Router A and Router B can
interwork at the network layer through a serial interface.
1 Configure Router A:
a Configure an access list and define the data stream from Subnet 10.1.1x to
Subnet 10.1.2x.
[RouterA] acl 101 permit
[RouterA-acl-101] rule permit ip source 10.1.1.0 0.0.0.255
destination 10.1.2.0 0.0.0.255
[RouterA-acl-101] rule deny ip source any destination any
b Create the IPSec proposal view named tran1
[RouterA] ipsec proposal tran1
c Adopt tunnel mode as the message-encapsulating form
[RouterA-ipsec-proposal-tran1] encapsulation-mode tunnel
d Adopt ESP protocol as security protocol
[RouterA-ipsec-proposal-tran1] transform esp-new
e Select authentication algorithm and encryption algorithm
[RouterA-ipsec-proposal-tran1] esp-new encryption-algorithm des
[RouterA-ipsec-proposal-tran1] esp-new authentication-algorithm
sha1-hmac-96
f Create a security policy with negotiation view as manual
[RouterA] ipsec policy policy1 10 manual
g Quote access list
[RouterA-ipsec-policy-policy1-10] security acl 101
h Quote IPSec proposal
[RouterA-ipsec-policy-policy1-10] proposal tran1
i Set local and remote addresses
[RouterA-ipsec-policy-policy1-10] tunnel local 202.38.163.1
[RouterA-ipsec-policy-policy1-10] tunnel remote 202.38.162.1
j Set SPI
[RouterA-ipsec-policy-policy1-10] sa outbound esp spi 12345
[RouterA-ipsec-policy-policy1-10] sa inbound esp spi 54321
k Set session key
[RouterA-ipsec-policy-policy1-10] sa outbound esp string-key abcdefg
[RouterA-ipsec-policy-policy1-10] sa inbound esp string-key gfedcba
IPSec Configuration Example 579
After the configuration is complete and the security tunnel between Router A and
Router B is established, the data stream between Subnet 10.1.1.x and Subnet
10.1.2.x will be transmitted with encryption.
Creating an SA in IKE Establish a security tunnel between Router A and Router B to perform security
Negotiation Mode protection for the data streams between PC-A represented subnet (10.1.1.x) and
PC-B represented subnet (10.1.2.x). The security protocol adopts ESP protocol,
algorithm adopts DES, and authentication algorithm adopts sha1-hmac-96. See
Figure 174 for an illustration of the configuration.
Prior to configuring, you should ensure that Router A and Router B can interwork
at the network layer through a serial interface.
1 Configure Router A:
a Configure an access list and define the data stream from Subnet 10.1.1x to
Subnet 10.1.2x.
[RouterA] acl 101
[RouterA-acl-101] rule permit ip source 10.1.1.0 0.0.0.255
destination 10.1.2.0 0.0.0.255
[RouterA-acl-101] rule deny ip source any destination any
b Create the IPSec proposal view named trans1
[RouterA] ipsec proposal tran1
c Adopt tunnel mode as the message-encapsulating form
[RouterA-ipsec-proposal-tran1] encapsulation-mode tunnel
d Adopt ESP protocol as security protocol
[RouterA-ipsec-proposal-tran1] transform esp-new
e Select authentication algorithm and encryption algorithm
[RouterA-ipsec-proposal-tran1] esp-new encryption-algorithm des
[RouterA-ipsec-proposal-tran1] esp-new authentication-algorithm
sha1-hmac-96
f Create a security policy with negotiation mode as isakmp
[RouterA] ipsec policy policy1 10 isakmp
g Set remote addresses
[RouterA-ipsec-policy-policy1-10] tunnel remote 202.38.162.1
h Quote IPSec proposal
[RouterA-ipsec-policy-policy1-10] proposal tran1
i Quote access list
[RouterA-ipsec-policy-policy1-10] security acl 101
j Exit to system view
[RouterA-ipsec-policy-policy1-10] quit
k Enter serial interface view
IPSec Configuration Example 581
[RouterA]interface serial 0
l Configure ip address of the serial interface
[RouterA-Serial0] ip address 202.38.163.1 255.255.255.0
m Apply security policy group on serial interface
[RouterA-Serial0] ipsec policy policy1
n Configure the route.
[RouterA] ip route-static 10.1.2.0 255.255.255.0 202.38.162.1
o Configure corresponding IKE
[RouterA] ike pre-shared-key abcde remote 202.38.162.1
2 Configure Router B:
a Configure an access list and define the data stream from Subnet 10.1.2x to
Subnet 10.1.1x.
[RouterB] acl 101
[RouterB-acl-101] rule permit ip source 10.1.2.0 0.0.0.255
destination 10.1.1.0 0.0.0.255
[RouterB-acl-101] rule deny ip source any destination any
b Create the IPSec proposal view named trans1
[RouterB] ipsec proposal tran1
c Adopt tunnel mode as the message-encapsulating form
[RouterB-ipsec-proposal-tran1] encapsulation-mode tunnel
d Adopt ESP protocol as security protocol
[RouterB-ipsec-proposal-tran1] transform esp-new
e Select authentication algorithm and encryption algorithm
[RouterB-ipsec-proposal-tran1] esp-new encryption-algorithm des
[RouterB-ipsec-proposal-tran1] esp-new authentication-algorithm
sha1-hmac-96
f Create a security policy with negotiation view as isakmp
[RouterB] ipsec policy use1 10 isakmp
g Quote access list
[RouterB-crypto-map-use1-10]match address 101
h Set remote address
[RouterB-ipsec-policy-policy1-10] security acl 101
i Quote IPSec proposal
[RouterB-ipsec-policy-policy1-10] proposal tran1
j Configure serial interface Serial0
[RouterB] interface serial 0
[RouterB-Serial0] ip address 202.38.162.1 255.255.255.0
k Apply security policy group on serial interface
[RouterB-Serial0] ipsec policy use1
l Configure the route.
[RouterB] ip route-static 10.1.1.0 255.255.255.0 202.38.163.1
582 CHAPTER 40: CONFIGURING IPSEC
After the above configurations are completed, if the messages between Subnet
10.1.1.x and Subnet 10.1.2x transmits between Router-A and Router-B, IKE will be
triggered to negotiate to establish SA. After IKE negotiates successfully and SA is
established, the data stream between Subnet 10.1.1.x and Subnet 10.1.2.x will be
transmitted with encryption.
Encrypting, Decrypting, Establish a security tunnel between Router A and Router B to conduct security
and Authenticating protection to data stream between subnet (10.1.1.x) represented by PC A and
NDEC Cards subnet (10.1.2.x) represented by PC B. It is to establish security association with
manual method. The security protocol adopts ESP protocol, and the encryption
algorithm adopts DES, and the authentication algorithm adopts sha1-hmac-96.
Figure 175 Establish networking diagram of security tunnel using crypto cards
10.1.1.1 10.1.2.1
e0 e0
Internet
s0 s0
Router A 202.38.163.1 202.38.162.1 Router B
PC A
PC B
10.1.1.2 10.1.2.2
1 Configure Router A
a Configure an access list and define a data stream from subnet 10.1.1.x to
subnet 10.1.1.2.x.
[RouterA] acl 101 permit
[RouterA-acl-101] rule permit ip source 10.1.1.0 0.0.0.255
destination 10.1.2.0 0.0.0.255
[RouterA-acl-101] rule deny ip source any destination any
b Establish proposal view of crypto card in the name of tran1.
[RouterA] crypto ipsec card-proposal tran1
c Adopt tunnel module for packets encapsulation form.
[RouterA-ipsec-card-proposal-tran1] encapsulation-mode tunnel
d Adopt ESP protocol for security protocol
[RouterA-ipsec-card-proposal-tran1] transform esp-new
e Select algorithm
[RouterA-ipsec-card-proposal-tran1] esp-new encryption-algorithm des
[RouterA-ipsec-card-proposal-tran1] esp-new authentication-algorithm
sha1-hmac-96
f Return to system view.
[RouterA-ipsec-card-proposal-tran1] quit
g Establish a security policy with manual negotiation mode.
[RouterA] ipsec policy policy1 10 manual
h Quote access list.
IPSec Configuration Example 583
Do the following:
■ Display the plugging conditions of the crypto card to check whether the crypto
card was plugged in correctly. Under normal condition, the “run” indicator of
the crypto card will blink normally (one second on, one second off).
■ Use the display encrypt-card version command to check the crypto card
status. It shall display the card and version condition of the crypto card under
normal conditions. If nothing displayed, it means that the host does not detect
the crypto card. The crypto card may be enabled (“run” indicator blinks
quickly). If 5 seconds later the crypto card is still enabled, the router may be
restarted (it must be noted that the configuration of the router must be saved
first).
Do the following:
■ Check whether security policy was applied on the interface. Use the display
current-configuration interface command to check whether it is
configured policy on the interface. It shall display configuration policy under
normal condition. If no policy is configured, map shall be configured under
interface view.
■ Check the matching of the security policy. If the security policy map was
established manually, the local and remote address of the security association
must be correct and the parameters of security association must be identified.
After changing the parameters of security association, it is necessary to delete
the security policy map and then to re-apply security policy map.
■ Check the identity of the security protocol. For security policy established
manually, the security protocol selected by the IPSec proposal of the both ends
of the router shall be the same.
■ Check Access Control List. If no problem was found through above check
procedure, or the problem is not eliminated after correcting the above
checkup, the access control list may be checked. Check whether the access
control list allows both interconnection parties to pass.
■ Check the hardware link. If the problem cannot be eliminated through above
methods, please check whether the hardware link is normal or not.
586 CHAPTER 40: CONFIGURING IPSEC
41 CONFIGURING IKE
IKE Protocol Overview The Internet Key Exchange (IKE) protocol , implements hybrid protocols of both
Oakley and SKEME key exchanges in an ISAKMP network. This protocol defines
standards for automatically authenticating IPSec peer end, negotiating security
service and generating shared key, and provide services such as automatic key
exchange negotiation and security association creation, thus simplifying the use
and management of IPSec.
IKE has a set of self-protection mechanism, which enables to securely deliver keys,
authenticate ID and establish IPSec secure association in insecure network.
The following figure shows the relationship between IKE and IPSec.
588 CHAPTER 41: CONFIGURING IKE
SA negotiation
IKE IKE
Router A Router B
TCP/UDP TCP/UD
SA SA
P
IPSec IPSec
IP
Encrypted IP message
IKE features ■ Avoid specifying manually all IPSec security parameters in password mapping of
both communication ends.
■ Allow specifying the lifetime of IPSec SA
■ Allow exchanging ciphering key during IPSec session
■ Can provide anti-replay service by IPSec
■ Allow manageable and scalable IPSec to implement certificate authorization
support.
■ Allow dynamic end-to-end authentication.
Creating an IKE Security IKE negotiation determines whether IKE policies at both ends are matched and
Policy then reach a negotiation using an IKE policy. During the subsequent negotiation,
the security data provided by this IKE policy will be used to protect negotiation
data.
Multiple policies with priority must be created on each terminal to ensure that at
least one policy can match that of the remote terminal.
To negotiate the IKE policies used by two ends, the initiator sends all the IKE
policies to the peer to negotiate the public IKE policy used by both sides. The
remote terminal will match the received policy with all of its IKE policies as per the
precedence order. The one of highest precedence will be first judged. If one IKE
policy is found to have the same encryption, hash, authentication and
Diffie-Hellman parameters with the received IKE policy, and its life cycle is equal to
or longer than that specified by the received IKE policy, then the common IKE
policy at both ends can be determined. (Note that if no life cycle is specified for
the IKE policy, the relatively short policy life cycle of the remote terminal will be
selected.) Then, IPSec security path will be created by using the IKE policy to
protect the following data. Otherwise, IKE refuses negotiation, and will not create
IPSec security path.
The user can create multiple IKE policies, but must allocate a unique priority value
for each created policy. Both parties in negotiation must have at least one
matched policy for successfully negotiation, that is to say, a policy and the one in
the remote terminal must have the same encryption, hashing, authentication and
Diffie-Hellman parameters (the lifetime parameters may be a little different). If it is
found that there are multiple matching policies after negotiation, the matching
policy with higher priority will be matched first.
Operation Command
Create IKE policy and enter IKE proposal ike proposal policy-number
view
Delete IKE policy undo ike proposal policy-number
590 CHAPTER 41: CONFIGURING IKE
The system creates only the default IKE security policy that cannot be deleted or
modified by users.
Selecting an Encryption The two types of encryption algorithms that are supported are the 56-bit
Algorithm DES-Cipher Block Chaining (DES-CBC) algorithm and the 168-bit 3DES-CBC
algorithm. Before being encrypted, each plain text block performs exclusive-OR
operation with an encryption block, thus the same plain text block never maps the
same encryption and the security is enhanced.
Operation Command
Select encryption algorithm encryption-algorithm { des-cbc |
3des-cbc }
Set the encryption algorithm to the undo encryption-algorithm
default value
Operation Command
Select authentication method authentication-method pre-share
Restore the authentication method to the undo authentication-method pre-share
default value
Operation Command
Configure pre-shared key ike pre-shared-key key remote
remote-address
Delete pre-shared key to restore its default undo ike pre-shared-key key remote
value remote-address
Selecting the Hashing Hashing algorithms use HMAC framework to achieve its function. HMAC
Algorithm algorithm adopts an encryption hashing function to authenticate messages,
providing frameworks to insert various hashing algorithms, such as SHA-1 and
MD5.
Configuring IKE 591
There are two hashing algorithm options: SHA-1 and MD5. Both algorithms
provide data source authentication and integrity protection mechanism.
Compared with MD5, SHA-1 contained more summary information, and is more
secure, but the authentication speed is relatively slow. A kind of attack subject to
MD5 can be successful, though difficult, but HMAC anamorphous used by IKE can
stop such attacks.
Operation Command
Select hashing algorithm authentication-algorithm { md5 | sha
}
Set hashing algorithm to the default value undo authentication-algorithm
Selecting DH Group ID There are two DH (Diffie-Hellman) group ID options: 768-bit Diffie-Hellman group
(Group 1) or 1024-bit Diffie-Hellman group (Group 2). The 1024-bit Diffie-Hellman
group (Group 2) takes longer CPU time
Operation Command
Select DH group ID dh { group1 | group2 }
Restore the default value of DH group ID undo dh
Setting the Lifetime of Lifetime means how long IKE exists before it becomes invalid. When IKE begins
IKE Association SA negotiation, it must first make its security parameters of the two parties be
consistent. SA quotes the consistent parameters at each terminal, and each
terminal keeps SA until its lifetime expires. Before SA becomes invalid, the sequent
IKE negotiation can use it again. The new SA is negotiated before the current SA
becomes invalid.
IKE negotiation can be set with a relatively short life cycle for the purpose of
improving IKE negotiation security. There is a critical IKE life cycle value. If the
policy lifetimes of the two terminals are different, that of the originating party will
be taken as the lifetime of the IKE SA.
If the policy lifetimes of two terminals are different, only when the lifetime of
originating terminals is reater than or equal to that of the peer end can the IKE
policy be selected, and the shorter lifetime selected as IKE SA lifetime.
Operation Command
Set lifetime of IKE SA sa duration seconds
Set lifetime as the default value undo sa duration
592 CHAPTER 41: CONFIGURING IKE
Configuring IKE The Keepalive function detects and deletes idle security association when the peer
Keepalive Timer party is invalid and cannot operate. Usually, the initiator transmits a packet proving
itself still alive to the peer party, while the responder confirms that the peer party is
still alive after receiving it. The keepalive function includes two timers, interval and
timeout.
■ The interval timer mainly assists in transmitting keepalive packets to the peer
party, following a set time interval, to prove that it is still alive.
■ The timeout timer mainly assists timing events to query the status of security
tunnel periodically, and deletes the timed out security tunnel.
Operation Command
Configure transmitting time interval of IKE ike sa keepalive-timer interval
keepalive packets (interval) seconds
Delete interval timing event of IKE undo ike sa keepalive-timer
keepalive function interval
Configure IKE keepalive link timeout time ike sa keepalive-timer timeout
(timeout) seconds
Delete timeout timing event of IKE
keepalive function undo ike sa keepalive-timer timeout
By default, the system does not enable IKE keepalive timing (interval and timeout)
event.
Usually, the interval and timeout timers are applied in pairs at the initiator side or
the receiver side. If an interval timer is configured at one side, the other side
should be configured with a timeout timer. In the actual application, if one side is
configured with the timeout timer, the other side must be configured with the
interval timer or the SA will be deleted. If one side is configured with the interval
timer, it is not necessary to configure the timeout timer at the other side. To avoid
the negative influence of network congestion on the keepalive function, you
should set the value of the timeout timer three times higher than that of the
interval timer.
Displaying and Use debugging, reset and display commands in all views.
Debugging IKE Table 664 Display and Debug IKE
Operation Command
Display IKE security association parameter display ike sa
Display IKE security policy display ike proposal
Delete the security channel established by reset ike sa { connection-ike-sa-id |
IKE all }
Clear an SA debugging ike { all | crypto | error
| message | misc | sysdep | timer |
transport }
IKE Configuration Example 593
IKE Configuration ■ Hosts A and B communicates securely, and a security channel is established
Example with IKE automatic negotiation between security gateways A and B.
■ Configure an IKE policy on Gateway A, with Policy 10 is of highest priority and
the default IKE policy is of the lowest priority.
■ Pre-shared key authentication algorithm is adopted.
Serial 0 Serial 0
202.38.160.1 171.69.224.33
Internet
Host A Host B
These steps configure IKE negotiation. To establish an IPSec security channel for
secure communication, it is necessary to configure IPSec correspondingly. For
detailed contents, see the configuration examples in IPSec Configuration.
Troubleshooting IKE When configuring parameters to establish IPSec security channel, you can use the
debugging ike error command to enable error debugging of IKE.
User ID information is the data for the user originating IPSec communication to
identify itself. In practical applications user ID establishes a different security path
594 CHAPTER 41: CONFIGURING IKE
for protecting different data streams. At present, we use the user IP address to
identify the user.
or
Unmatched policy
Enable the debugging ike error command to see the debugging information.
or
Both parties of negotiation have no matched policy. Check the protocol used by
ipsec policy configured on interfaces of both parties to see whether the
encryption algorithm and authentication algorithm are the same.
■ Check whether the state of network is stable and whether the security channel
has been properly established. You may encounter the situation as follows: the
two parties cannot communicate via the existing security channel, while the
access control list of two parties have been properly configured and there is a
matching policy. This case is generally due to a party restarting the router after
establishing the security channel.
■ Use the command display ike sa to check whether both parties have
established SA of Phase 1.
■ Use the command display ipsec sa policy to check whether the ipsec
policy on interface has established IPSec SA.
■ If the above two results show that one party has SA but the other does not,
then use the command reset ike sa to clear SA with error and re-originate
negotiation.
IX VPN
■ VPN Overview
■ Basic Networking Applications of VPN
■ Classification of IP VPN
VPN Overview VPN establishes private networks on public networks by creating a “virtual”, or
logical network from resources of the existing network. Carriers can make use of
their spare network resources to provide VPN service and profit from the network
resources to the maximum extent. In addition:
The VPN with service quality guarantee can provide different levels of service
quality guarantees for users by charging for different services.
Basic Networking An enterprise that has an intranet established with VPN is shown in the following
Applications of VPN figure.
Remote user
PSTN/ISDN
POP
PC POP
Internet
POP Headquarters
Internal server
Partner
In this configuration, the users who need the internal resources of enterprises, can
access the POP (Point of Presence) server of local ISP via PSTN or ISDN, and further
access the internal resources of the enterprises. Traditional WAN construction
techniques only supply the service with the aid of leased line between them. After
a VPN is established, the remote users and the clients in other places can access
internal resources of enterprises even if they do not have the Internet access
authority given by local ISP.
Classification of IP IP VPN is the emulation of leased line services (remote dial-up and DDN) of WAN
VPN equipment using IP facilities (including public Internet or private IP backbone
network). IP VPN classification is based on:
■ Operation Mode
■ Tunnel Protocols
■ Service Purpose
■ Networking Model
Operation Mode VPNs can be CPE- or network-based. CPE-based VPN's require installation of
networking and authentication equipment to support establishment of the VPN. It
requires configuration and administration of WAN resources and bandwidth
management.
Tunnel Protocols The tunnel protocols can be divided into layer 2 tunneling protocols and layer 3
tunneling protocols depending on the layer at which the tunneling is implemented
based on OSI model.
GRE and IPSec are mainly used for VPN leased line services.
ISP gateway and PPP session ends at NAS, it is unnecessary for the gateway at the
user end to manage and maintain the status of every PPP session, thus improving
system performance.
Service Purpose VPNs are also classified according to the types of service they provide:
■ Intranet VPN: In an intranet VPN, the branches of an enterprise located
everywhere are interconnected through the public network, which is the
extension or substitute of traditional leased line networks or other enterprise
networks.
■ Access VPN: Access VPN provides a means to establish private connections with
the intranet or extranet of enterprises through the public networks for those
staff members on business errands, remote personnel and SOHO. Access VPN
has two types: client-initiated VPN connections and NAS-initiated VPN
connections.
■ Extranet VPN: Extranet VPN extends an intranet to partners and clients through
VPN so that different enterprises can build their VPNs using public networks.
Networking Model VPNs are classified by the type of networking model that they use:
■ Virtual Leased Line (VLL): VLL emulates the traditional leased line service with
the help of the IP network and hence providing asymmetrical and inexpensive
leased line service. For the users at both ends of the VLL, the VLL is similar to
the traditional leased line.
■ Virtual Private Dial-up Network (VPDN): VPDN is implemented utilizing dial-up
and access services of the public network (ISDN and PSTN), which provides
access services for enterprises, small-sized ISPs, and mobile offices.
■ Virtual Private LAN Segment (VPLS) service: In VPLS, LANs can be
interconnected through virtual private segment with the help of IP public
networks. It is the extension of LAN across IP public network.
■ Virtual Private Routing Network (VPRN) service: VPRN implements the
interconnection of headquarters, branches and remote offices by means of
managing virtual routers, with the aid of the IP public networks. There are two
ways to implement the services: one is to utilize the traditional VPN protocols
as IPSec and GRE, and the other is to utilize the MPLS (Multiple Protocol Label
Switching) technology.
43 CONFIGURING L2TP
VPDN and L2TP Virtual Private Dial Network (VPDN) is fulfilled with the help of dial-up and access
Overview services of public network (ISDN and PSTN), which provides access services for
enterprises, small ISPs, and mobile offices.
Remote dial-up users access local ISP NAS by dialing via the local PSTN or ISDN.
With the aid of a onnection to the local ISP and proper tunneling protocol
encapsulating a higher-level protocol, a VPN is established between the NAS and
the peer gateway.
VPDN Operation The VPDN tunneling protocol can be PPTP, L2F, or L2TP, the dominant protocol.
When adopting the L2TP to build a VPDN, the typical networking is illustrated in
Figure 179.
602 CHAPTER 43: CONFIGURING L2TP
Remote users
PC
LAC Internet backbone LNS
network
PSTN/ISDN
L2TP channel
Router
Access server
Remote users
Internal server
In this figure, LAC stands for L2TP Access Concentrator, which is a switch network
device with a PPP end system and L2TP client-side processing ability. Usually, LAC is
a NAS, which provides access service for users through PSTN/ISDN. LNS stands for
L2TP Network Server, which is the device with a PPP end system and L2TP
server-side processing ability.
LAC resides between the LNS and the remote system (remote users and remote
branches) and is responsible for transmitting packets between them. It
encapsulates the packets received from the remote system according to L2TP and
sends them to the LNS, then de-encapsulates the packets from the LNS and sends
them to the remote system. A local connection or PPP link can be used between
the LAC and the remote system, but in a VPDN application, the PPP link is often
adopted. Being an end of the L2TP tunnel, LNS is the peer device of LAC and is the
logical terminating end of the PPP sessions transmitted by the LAC through the
tunnel.
LAC Client
HomeLAN
LAC Internet LNS
Remote
Client PSTN/ISDN
HomeLAN
Overview of L2TP The L2TP (Layer 2 Tunneling Protocol) supports transmitting PPP frames by
tunneling, and the end of layer 2 data link and the PPP session can reside on
different devices, communicating based on packet switching which extends the
PPP model. Integrating the respective advantages of L2F protocol and PPTP, L2TP
has become the industrial standard of layer 2 tunneling protocol. The architecture
of the protocol stack to which the L2TP belongs is illustrated in Figure 181.
PPP Frames
The L2TP architecture illustrated in Figure 181 describes the relation among PPP
frames, control channels and data channels. A PPP frame is first transmitted in the
unreliable data channel after being encapsulated with the L2TP header, and then
undergoes the packet transmission process of UDP, Frame Relay and ATM. A
control message is transmitted in the reliable L2TP control channel.
The L2TP header includes the information of tunnel and session IDs, which are
used to identify different tunnels and sessions. The messages with the same tunnel
ID and different session IDs is multiplexed in one tunnel. Tunnel ID and session ID
are distributed to the opposite end of the tunnel.
L2TP detects the connectivity of a tunnel using a Hello message. When the tunnel
is idle for some time, LAC and LNS begin to transmit the Hello message to the
opposite end. If no response to the Hello message is received for some time, the
sessionis cleared up.
L2TP is transmitted in the form of a UDP message. L2TP registers UDP Port 1701,
which is used only for initial tunnel establishment. Originating side of L2TP tunnel
randomly selects an idle port (it need not to be 1701) and transmits a message to
1701 port of receiving side. After receiving the message, the receiving side
randomly selects an idle port (it need not to be 1701 and transmits a message
back to the specified port of the originating side. By now, the selected ports of
both sides are selected and remain unchanged during the time segment when the
tunnel is connected.
After being transmitted to L2TP and encapsulated with L2TP header, the PPP
frame will be eventually encapsulated into UDP messages and transmitted on a
TCP/IP network.
PSTN/ISDN WAN
Router A Router B
PC PC
LAC LNS
(1) Call Setup
V. Features of L2TP
■ Flexible identity authentication mechanism and high security
L2TP protocol by itself does not provide connection security, but it can depend
on the authentication (e.g. CHAP and PAP) provided by PPP, so it has all security
features of PPP. L2TP can be integrated with IPSec to fulfill data security, so it is
difficult to attack the data transmitted with L2TP. As required by specific
network security, L2TP adopts channel encryption technique, end-to-end data
encryption or application layer data encryption on it to improve data security.
■ Multi-protocol transmission
L2TP transmits PPP packets, so multiple protocols can be encapsulated in
PPP packets.
■ Supports the authentication of RADIUS server
LAC requires the authentication of RADIUS with user name and password.
RADIUS server receives authentication request of the user, fulfils the
authentication and returns the configuration information to establish the
connection to LAC.
■ Supports internal address allocation
LNS can be put behind the Intranet firewall. It can dynamically distribute and
manage the addresses of remote users and support the application of private
606 CHAPTER 43: CONFIGURING L2TP
Enable L2TP The L2TP on a router can work normally only after it is enabled. If it is disabled, the
router will not provide the related function even if the L2TP parameters are
configured.
Operation Command
Enable L2TP l2tp enable
Disable L2TP undo l2tp enable
Create a L2TP Group To configure related parameters of L2TP, an L2TP group should be added. The L2TP
group is used to configure the L2TP functions on the router and facilitate the
networking applications of one-to-one, one-to-multiple, multiple-to-one and
multiple-to-multiple connections between the LAC and LNS. L2TP group is
numbered separately on the LAC and the LNS. Hence, it is only necessary to keep
the corresponding relations between the related configurations of L2TP group at
LAC and LNS side (e.g., the peer end name of the tunnel originating L2TP
connection request and the LNS address).
After a L2TP group is created, other configurations related to this L2TP group,
such as local name, originating L2TP connection request and LNS address, can be
performed in L2TP group view. L2TP group1 works as the default L2TP group.
Operation Command
Create a L2TP group l2tp-group group-number
Delete a L2TP group. undo l2tp-group group-number
Originate L2TP After a dial-up user passes VPN authentication successfully, LAC conveys the
Connection Request and request of creating tunnel to a designated LNS. Besides the IP address of the LNS,
Configure LNS Address LAC can fulfill authentication for 3 types (namely, 3 triggering conditions) of
dial-up users based on this configuration: full user name (fullusername), user
with a particular domain (domain) and called number (dnis). A maximum of 5
LNSs can be configured and LNSs will be searched for according to the address
order configured.
Operation Command
Configure to authenticate whether the start l2tp { ip ip-address [ ip
user is a VPN user and set the IP address of ip-address … ] } { domain domain-name
the corresponding LNS | dnis dialed-number | fullusername
user-name }
Remove the connection request undo start l2tp [ ip ip-address ]
configuration
Configure AAA and When configuring the AAA at LAC side, the local user name and password should
Local Users be configured at LAC side if the local (authenticating locally) mode is selected.
LAC will authenticate remote dial-in user name and password to see whether they
are compliant with the local registered user name and password, and hence to
check whether these users are legal VPN users. Only after passing authentication
successfully, can the request of establishing tunnel connection be processed,
otherwise the user will be turned to services of other types except VPN.
When user ID authentication is implemented at LAC side, user name can be given
in by the following means:
■ Adopting the authentication based on particular domain (domain), the local
user name and password configured are respectively the full user name and
password registered.
■ Adopting the authentication based on full user name (fullusername), the local
user name configured is the domain name of the VPN user and the user's
password.
Operation Command
Enable AAA. aaa-enable
Configure the authentication method aaa authentication-scheme ppp {
table of PPP user default | list-name } { method1} [
method2 ... ]
Specify accounting scheme configure aaa accounting-scheme optional
information
Configure to authenticate users. ppp authentication-mode { pap | chap
}
Set user name and password. local-user username password { simple
| cipher } password
Remove the user name and password undo local-user username
By default, the local user name and password are not configured.
As the AAA attributes of L2TP are not standard attributes of RADIUS protocol, it is
necessary to add the definition of L2TP attributes to the attribute set of RADIUS
server.
Enable L2TP The L2TP on a router can work normally only after it is enabled. If it is disabled, the
router will not provide the related function even if the L2TP parameters are
configured.
Operation Command
Enable L2TP l2tp enable
Disable L2TP undo l2tp enable
Create an L2TP Group To configure related parameters of L2TP, L2TP group should be added. The L2TP
group is used to configure the L2TP functions on the router and facilitate the
networking applications of one-to-one, one-to-multiple, multiple-to-one and
multiple-to-multiple connections between the LAC and LNS. L2TP group is
numbered separately on the LAC and the LNS. Hence, it is only necessary to keep
the corresponding relations between the related configurations of L2TP group at
LAC and LNS side (e.g., the peer end name of the tunnel originating L2TP
connection request and the LNS address).
After a L2TP group is created, other configurations related to this L2TP group,
such as local name, originating L2TP connection request and LNS address, can be
performed in L2TP group view. L2TP group1 works as the default L2TP group.
Operation Command
Create a L2TP group l2tp-group group-number
Delete a L2TP group undo l2tp-group group-number
Create a Virtual Virtual template is mainly used to configure working parameters of the virtual
Template interfaces dynamically created by the router in the process of operation, such as
configuring MP-bounding logic interface and L2TP logic interface.
Operation Command
Create a virtual template interface virtual-template
virtual-template-number
Delete a virtual template undo interface virtual-template
virtual-template-number
By far, the virtual template in L2TP application only supports one peer but does not
support IP unnumbered, that is, the virtual template has to be configured with its
own IP address.
When using the ip pool command to configure the address allocated to the peer,
the user should ensure that the virtual template address and the address pool are
on the same segment.
Configure the Name of The LNS can receive the requests of establishing tunnels from different LACs using
the Receiving End of the different virtual templates. After a request of this is received, the LNS will check
Tunnel whether the name of LAC is compliant with that of the legal remote end of the
tunnel first, then decide whether the tunnel will be created.
Table 673 Configure the Name of the Receiving End of the Tunnel
Operation Command
Set the name of the receiving end of theallow l2tp virtual-template
tunnel. virtual-template-number [ remote
remote-name ]
Remove the name of the receiving end of undo allow
the tunnel.
When the group number of L2TP is 1 (the default L2TP group number), it is
unnecessary to specify the remote-name. If the name of remote end is still
specified in the view of L2TP group 1, L2TP group 1 will not work as the default
L2TP group.
The start l2tp command and the allow l2tp command are mutually exclusive.
That means after one is configured, the other will automatically become invalid. A
L2TP group cannot serve LAC and LNS at the same time.
Configure the Local VPN In the mode of “fullusername@domain” and password, LAC conveys these
User information input by VPN users to LNS for authentication, LNS will perform the
local authentication first and then the RADIUS authentication to ensure these
users are legal VPN users. The process of RADIUS authentication will be removed
once users have passed local authentication. These VPN users can access internal
resource after the authentication at LNS.
Operation Command
Enable AAA. aaa-enable
Configure the authentication method aaa authentication-scheme ppp {
table of PPP user default | list-name } { method1} [
method2 ... ]
Specify accounting scheme configure aaa accounting-scheme optional
information
Configure to authenticate users. ppp authentication-mode { pap | chap
}
Set user name and password. local-user username password { simple
| cipher } password
Operation Command
Set the local name. tunnel name name
Restore the default value of the local undo tunnel name
name.
The tunnel name configured through the tunnel name command at LAC side
must be consistent with the name of the remote receiving tunnel configured
through the allow l2tp command at LNS side.
It can be found that either LAC or LNS can originate tunnel authentication
request. However, if one side enables the tunnel authentication, the tunnel can be
established only when the passwords on both ends of the tunnel are exactly the
same. If tunnel authentication is disabled on both ends, whether or not the tunnel
authentication passwords are the same will make no sense.
Operation Command
Enable tunnel authentication tunnel authentication
Disable tunnel authentication. undo tunnel authentication
Set the password of tunnel tunnel password { simple | cipher }
authentication. password
Remove the password of tunnel undo tunnel password
authentication.
To ensure the tunnel security, it is recommended that the user should not disable
tunnel authentication.
The tunnel authentication password is the router host name, so you must
manually configure the tunnel authentication password after the authentication is
enabled, and ensure that the password at the LAC side is the same as that at the
LNS side.
Operation Command
Set the interval for sending tunnel hello tunnel timer hello hello-interval
packet
Restore the interval for sending tunnel undo tunnel timer hello
hello packet
Advanced Configuration at LAC or LNS 613
By default, the interval for sending the tunnel Hello message is 60 seconds. If this
configuration is not implemented, LAC or LNS will adopt the default value as the
interval to send the Hello message to the peer.
The delimiters fall into prefix delimiter and suffix delimiter, including @, # , & and /.
The user with prefix delimiter can be “3Com.com#vpdnuser” and correspondingly
the suffix delimiter will be “[email protected]”. During the searching,
separating user name from prefix/suffix delimiter, based on the defined rules will
greatly speed up the searching.
In domain name mode, there are four optional searching rules on condition that
the prefix/suffix delimiter is set:
Operation Command
Set prefix/suffix delimiter l2tp domain { prefix-separator |
suffix-separator } delimiters
Delete the prefix/suffix delimiter undo l2tp domain { prefix-separator |
suffix-separator } delimiters
Set searching order l2tp match-order { dnis-domain | dnis
| domain-dnis | domain }
Restore the default searching order undo l2tp match-order
The l2tp match-order command merely configures the order of dialed number
and domain name for searching. In an actual searching process, the searching is by
all means conducted according to the full user name first, and then the configured
order of this command.
information (ACK) and wait for some time before clearing the tunnel, so that the
request transmitted again from the peer can be properly received when ACK
message is lost. After disconnecting the tunnel by force, all control connections
and session connections on the tunnel will also be cleared. After tunnel
disconnection, a new tunnel will be established again when new users dial in.
Operation Command
Force to disconnect tunnel reset l2tp tunnel remote-name
■ The priority of LCP renegotiation has the highest priority among the three
types, which means if LCP renegotiation and forcing CHAP authentication are
configured at LNS at the same time, L2TP will adopt LCP renegotiation first and
then use authentication methods configured on corresponding virtual
template.
■ If only forcing CHAP authentication is configured, LNS will authenticate users
by means of CHAP. Only after user name, password and authentication are
configured at LNS, and AAA function is enabled, can the process of forcing
CHAP authentication locally take effect.
■ If neither LCP renegotiation nor forcing CHAP authentication is configured, LNS
will perform the proxy authentication for the users. In this case, LAC conveys all
the authentication information received from users and the information
configured at LAC itself to LNS, and LNS will authenticate users according to
the information and authentication mode of LAC. When proxy authentication
is used at LNS, if LAC is configured with PAP, while the virtual interface
template at LNS is configured with CHAP, which is higher than PAP, the process
of authentication fails all the time and no sessions can be created.
Operation Command
Force local end to perform CHAP mandatory-chap
authentication.
Remove the local CHAP authentication. undo mandatory-chap
But in some specific cases (e.g., when it is necessary to authenticate and charge at
LNS side), the LCP renegotiation between the LNS and the user will be
implemented by force, at that time, the proxy authentication information at NAS
side will be ignored.
Operation Command
Force LCP to renegotiate. mandatory-lcp
Disable LCP to renegotiate. undo mandatory-lcp
After LCP renegotiation is enabled, LNS will not reauthenticate users if there is no
authentication information configured on the virtual template, then users are
authenticated only once at LAC.
Table 682 Set the Local Address and the Address Pool
Operation Command
Set the local IP address ip address ip-address netmask [ sub ]
Remove the local IP address undo ip address [ ip-address netmask
[ sub ] ]
Specify the address pool remote address { ip-address | pool [
pool-number ] }
Delete the address pool undo remote address
616 CHAPTER 43: CONFIGURING L2TP
By default, address pool 0 (the default one) will be used by the peer for allocating
addresses.
When specifying the address pool from which addresses are allocated for users,
the default address pool will be used for allocating addresses if no specific
pool-number value is configured after the key word pool.
Table 683 Set the Size of Receiving Window for Controlling Flow Over Tunnel
Operation Command
Set the receiving window size for tunnel flow-control receive-window
controlling flow over tunnel. size
Restore the receiving window size for undo tunnel flow-control
controlling flow over tunnel to default receive-window
value.
By default, the receiving window size for controlling flow on tunnel is 0 (no flow
control).
Enable/Disable Hiding This configuration is used at the LAC and LNS sides.
Attribute Value Pairs (AV
pairs) L2TP enables hiding AV pairs, and it is very useful when PAP or proxy
authentication is employed between LAC and LNS. Only after the tunnel
authentication and tunnel password are configured first, can the AV pairs hiding
be meaningful. After the AV pairs are hidden, the L2TP hiding algorithm will be
implemented, so that the username and password transmitted in plaintext during
proxy authentication can be encrypted in AV pairs.
Operation Command
Enable hiding AV pairs tunnel avp-hidden
Disable hiding AV pairs undo tunnel avp-hidden
Operation Command
Configure the maximum number of L2TP l2tp session-limit session-number
sessions at local
Restore the maximum number of L2TP undo l2tp session-limit
sessions at local to default value
Given that a certain number of sessions have existed on the router, the system will
display the information indicating misconfiguration if the l2tp session-limit
command is used to configure a session-number smaller than the current one.
Operation Command
Display the current L2TP tunnel display l2tp tunnel
information.
Display the current L2TP session display l2tp session
information
Enable the debugging of L2TP. debugging l2tp { all | control |
error | event | hidden | payload |
time-stamp }
L2TP Configuration
Examples
A user can have access to the LAN of a company through dialup. Both the LAC
(NAS) and LNS connect to the Internet through serial interfaces, and transmit data
through Tunnel. The PC is installed with Windows2000 operation system.
The Async2 interface of LAC and PC are connected to a Modem, and the numbers
are 5660046 and 5660040 separately.
618 CHAPTER 43: CONFIGURING L2TP
■ Click <Next> and input the telephone number at the NAS side in the popup
dialog box (if it is a local telephone number, you should deselect “Use area
code and dialing rules”), as shown in the following figure.
L2TP Configuration Examples 621
■ Click <Next> and input username and password (such as the username lac and
password lac) in the popup dialog box so as to access ISP. The input contents
must be the same as the configuration at the NAS side, as shown in the
following figure.
622 CHAPTER 43: CONFIGURING L2TP
■ Click <Next> and input the name of dialup connection (such as “Connection to
660046”) in the popup dialog box, as shown in the following figure.
■ Click <Next> and deselect "To connect to the Internet immediately, select this
box and then click Finish" in the popup dialog box, as shown in the following
figure.
■ Click <Finish> and double click “Connection to 66046” icon, then after
inputting the username and password, you can dial up to access NAS. As
receiving the call, NAS will establish a tunnel and session to LNS, as shown in
the following figure. The input username and password must be the same as
those configured at LAC and LNS side.
624 CHAPTER 43: CONFIGURING L2TP
To determine the IP address assigned to your computer by the LNS, use the
DOS-based command ipconfig.
LAC (NAS) and LNS are connected to a 3Com router. They connect to the Internet
through serial interfaces and transmit data through Tunnel. The PC named
win2000 in installed with Windows2000. The Async2 interface and the PC are
connected to a Modem, and the number are 660046 and 600040 separately.
NAS Router
Company
PSTN Internet headquarters
Tunnel
■ Click <Next>, choose “Automatic dial this initial connection”, and select
“Connection to 660046”, as shown in the following figure:
L2TP Configuration Examples 627
■ Click <Next>, and configure the IP address of LNS in the popup dialog box (The
address is the address of LNS interface connected to the Internet), as shown in
the following figure.
■ After the VPN is established, execute ipconfig command in the CLI mode of
Windows2000, and then you can view the IP addresses assigned by LAC (NAS)
and LNS, as shown in the following figure.
Windows 2000 IP Configuration
Ethernet adapter
Media State. . . . . . . . . . . .:Cable Disconnected
PPP adapter
Connection-specific DNS Suffix . .:
IP Address. . . . . . . . . . . . .:192.168.0.3
Subnet Mask . . . . . . . . . . . .:255.255.255.255
Default Gateway . . . . . . . . . .:192.168.0.3
PPP adapter:
Connection-specific DNS Suffix. . .:
IP Address. . . . . . . . . . . . .:192.170.0.3
Subnet Mask . . . . . . . . . . . .:255.255.255.255
Default Gateway . . . . . . . . . .:192.170.0.3
through the Internet. Through setting up a VPN, the user can have access to the
information in the internal network.
Modem
Quidway2
PSTN Router1
Quidway1
Router 2
PC1 Tunnel
Internet Headquarter
Modem
PSTN Router1
Quidway1
IPSec encryption tunnel Router2
Quidway2
PC1 Tunnel
Internet Company
Headquarters
headquarters
ISDN LAC LNS
PC2 WAN
III. Procedures
1 Configuration at the user side
Set up a dialup network whose number is the access number of Router1, and it
receives the IP address assigned by the LNS server. Input “vpdnuser” as the
username and “Hello” as the password in the dialup terminal window.
2 Configuration at Router1 (LAC side)
a Configure the username and password.
[Router1] local-user vpdnuser password simple Hello
L2TP Configuration Examples 631
Troubleshooting L2TP Before debugging VPN, please confirm that both LAC and LNS are on the same
public network. The connectivity between them can be tested by ping command.
Troubleshooting:
1 Fail to establish the tunnel. The reasons are as follows:
■ At LAC side, the LNS address is improperly configured.
■ LNS (usually a router) is not configured to receive L2TP group of the peer of the
tunnel. For details, refer to the description of the allow l2tp command.
■ Tunnel authentication fails. If the authentication is configured, make sure that
the tunnel passwords of both sides are consistent with each other.
■ If the local end forcedly disconnects the connection and the peer fails to receive
the corresponding “disconnect” message due to network transmission errors,
a new tunnel connection immediately originated will not be established
successfully. The reason is that the peer can only detect that the link is
disconnected after a certain interval, and the tunnel connections originated by
two sides with the same IP address are not allowed.
2 PPP negotiation fails. The reasons may be:
Troubleshooting L2TP 633
■ Errors occur to user name and password set at LAC, or the corresponding user
information is not set at LNS.
■ LNS cannot allocate addresses, e.g., the address pool is set too small, or is not
set at all.
■ The types of tunnel password authentication are inconsistent. Given that the
default authentication type of VPN connection created by Windows 2000 is
MSCHAP, if the peer does not support MSCHAP, CHAP is recommended.
GRE Protocol The Generic Routing Encapsulation (GRE) protocol encapsulates datagram of
Overview network layer protocols, such as IP and IPX, and enables these encapsulated
datagrams to transmit in another network layer protocol, such as IP. GRE is a Layer
3 protocol that creates Virtual Private Network (VPN) tunnels. A tunnel is a virtual
point-to-point connection and is a virtual interface that only supports
point-to-point connections. It is necessary to encapsulate and de-encapsulate it
when a message is transmitted on the tunnel. The interface provides a channel
where the encapsulated datagram can be transmitted. The interface also
encapsulates and de-encapsulates the datagram at both ends of a tunnel.
Encapsulation As shown in Figure 198, after receiving an IPX datagram, the interface connecting
“Group1” first delivers it to be processed by the IPX protocol which checks the
destination address domain in the IPX header and determines how to route the
packet.
If it is found that the destination address of the message will route through the
network with network number 1f (virtual network number of the tunnel), the
message will be transmitted to the tunnel port with network number 1f. After
receiving the packet, the tunnel port will perform GRE and then, the packet will be
processed by the IP module. After IP header is encapsulated, the packet will be
processed by the corresponding network interface according to the destination
address and router table.
which examines the key, checksum or message sequence number. After the GRE
header is removed, the IP message is processed by the IPX protocol in the same
way as an ordinary datagram.
Delivery Header
(Transport Protocol)
GRE Header
(Encapsulation Protocol)
Payload Packet
(Passenger Protocol)
IP GRE IPX
Passenger Protocol
Carrier Protocol or
Encapsulation Protocol
Transport Protocol
GRE Protocol Overview 637
Internet
In Figure 201, Group1 and Group2 are the local networks running the Novell IPX
protocol. Term1 and Term2 is the local network running the IP protocol. The tunnel
encapsulated by the GRE protocol is created between Router A and Router B. Thus
Group1 and Group2 can communicate without affecting each other, as can Term1
and Term2.
IP network IP network
Router Router
PC IP network PC
r r
When using RIP, if the hop count between two terminals in Figure 202 is more
than 15, the two terminals cannot communicate with each other. If tunneling is
used in the network, hop counts will not be incremented inside the tunnel, that is,
hops can be hidden, which enlarges the operating range of the network.
3 Connect some discontinuous sub-networks to establish a VPN.
Router Router
IP network novel
novell l
Tunnel
638 CHAPTER 44: CONFIGURING GRE
The two sub-networks group1 and group2 that are running the Novell IPX
protocol are in different cities. With the tunnel available, the trans-WAN VPN can
be established.
In addition, GRE also allows users to select and record an identification key word
for the tunnel interface, a check of the encapsulated message, and the use of
synchronous sequence numbers to ensure channel safety and correctness of
transmission data.
Encapsulation and de-encapsulation on the GRE receiving side and transmitting
side increases overhead cost and the increase in data volume caused by
encapsulation also increases bandwidth cost. for these reasons, GRE decreases the
forwarding rate of router data to some extent.
Creating a Virtual Tunnel Perform the following tasks in the system view.
Interface Table 687 Create Virtual Tunnel Interface
Operation Command
Create virtual tunnel interface and enter interface tunnel tunnel-number
tunnel view.
Cancel virtual tunnel interface. undo interface tunnel
Setting the Source After a tunnel interface is created, the source address of tunnel channel must be
Address of a Tunnel configured. The source address is the address of the physical interface where the
Interface GRE packets are transmitted. The source address and destination address of the
tunnel interface uniquely identifies a channel. These configurations must be
implemented at both tunnel ends, and furthermore, the source address of one end
must be the destination address of another end.
Operation Command
Set the source address of tunnel interface. source ip-address
Delete the configured source address of undo source
tunnel the interface.
Setting the Destination After a tunnel interface is created, the destination address of the tunnel channel
Address of a Tunnel must be configured
Interface
The destination address is the address of the physical interface where the GRE
packets are received. The source address and destination address of a tunnel
interface uniquely identifies a channel. These configurations must be done at both
tunnel ends. The source address of one end must be the destination address of the
other end.
Operation Command
Designate the destination address of destination ip-address
tunnel interface.
Cancel the destination address of tunnel undo destination
interface.
Setting the Network Two private networks are interconnected by a GRE tunnel. This kind of connection
Address of the Tunnel is like a virtual “direct” connection between two private networks. To establish a
Interface direct route between these two networks, you must configure the network
address of the tunnel interface and make sure that the network addresses at both
ends of the channel are in the same network segment. Thus, the system can
produce a direct tunnel route automatically.
Operation Command
Set the IP address of tunnel interface. ip address { ip-address mask |
unnumbered interface-type
interface-number }
Delete the IP address of tunnel interface. undo ip address { ip-address mask |
unnumbered interface-type
interface-number }
Set the IPX address of tunnel interface. ipx network network-number
Delete the IPX address of tunnel interface. undo ipx network
Setting the It is stipulated in RFC 1701 that if the key field of the GRE header is set, the
Identification Key Word receiving side and transmitting side check the identification key word of the
of the Tunnel Interface channel. Only when the set identification key words at both ends of the tunnel are
totally identical can the check pass, or the message will be discarded.
Operation Command
640 CHAPTER 44: CONFIGURING GRE
Setting the Tunnel It is stipulated in RFC 1701 that if the checksum field of the GRE header is set, the
Interface to Check with checksum is valid. The transmitting side calculates the checksums of GRE header
Checksum and payload. The receiving side calculates the checksum of the received message
and compares it with the checksum field in the message. If the two checksums are
identical, the message will be processed, otherwise it will be discarded.
If only one end of the tunnel is configured to check with the checksum, the
message will not be checked with checksum. Only when both ends of the tunnel
are configured to check the checksum, the message will be checked with the
checksum.
Operation Command
Set tunnel interface to check with check gre checksum
sum.
Disable tunnel interface to check with undo gre checksum
check sum.
By default, the tunnel interface to check with the field of checksum is disabled.
Settng the Tunnel It is stipulated in RFC 1701 that if the sequence-datagram in the GRE header is set,
Interface to Synchronize both the receiving side and the transmitting side will synchronize the sequence
the Datagram Sequence numbers. The synchronized message should be further processed, or it is
Number discarded.
With the sequence numbers, the message is unreliable but in order. The receiving
end establishes sequence numbers for the message, which is received by the local
end and successfully de-encapsulated. The sequence numbers are integers
between 0 and 232–1 and the sequence number of the first packet is 0. After the
channel is established, the sequence numbers is accumulated and cyclically
counted. If the receiving end receives a message whose sequence number is less
than or equal to that of the message received the last time, the packet will be
considered illegal. If the receiving end receives an out-of-order message, the
packet will be discarded automatically.
Operation Command
Set tunnel interface to synchronize gre sequence-datagrams
sequence numbers.
Displaying and Debugging GRE 641
Displaying and To view the working status of the tunnel interface, use the display command in
Debugging GRE all views.
Table 694 Display and Debug GRE
Operation Command
Display the working status of tunnel display interfaces tunnel [
interface. tunnel-number ]
GRE Configuration
Example
Application of IP-over-IP VPN should be built across the WAN for the operation of Novell IPX's two subnets
GRE group1 and group2. It can be implemented by using GRE.
Internet
PC A PC B
10.110.24.100 tunnel 30.110.1.200
10.110.24.1 30.110.1.1
1 Configure PC A and PC B:
a Configure the IP address of PC_A to 10.110.24.100, add a default gateway in
the network attribute (i.e., default route), or use the following command in
DOS mode.
C:\WINDOWS> route add 0.0.0.0 mask 0.0.0.0 10.110.24.1
b Configure the IP address of PC_B to 30.110.1.200, add a default gateway in
the network attribute (i.e., default route), or use the following command in
DOS mode.
C:\WINDOWS> route add 0.0.0.0 mask 0.0.0.0 30.110.1.1
2 Configure Router A:
a Configure the IP address of Serial0 interface.
[RouterA] interface serial 0
[RouterA-Serial0] ip address 10.1.1.1 255.255.255.0
642 CHAPTER 44: CONFIGURING GRE
Application of The two subnets group1 and group2 that running Novell IPX protocol need to set
IPX-over-IP GRE up a virtual private network across a LAN using GRE technology.
GRE Configuration Example 643
192.10.1.1 202.18.3.2
1 Configure Router A:
a Activate IPX.
[RouterA] ipx enable node a.a.a
b Configure the IP address and IPX address of Ethernet0.
[RouterA] interface ethernet 0
[RouterA-Ethernet0] ip address 10.1.1.1 255.255.255.0
[RouterA-Ethernet0] ipx network 1e
c Configure the IP address of Serial0 interface.
[RouterA] interface serial 0
[RouterA-Serial0] ip address 192.10.1.1 255.255.255.0
d Create a virtual tunnel interface, and configure the IP address, source address
and destination address.
[RouterA] interface tunnel 0
[RouterA-Tunnel0] ip address 10.1.2.1 255.255.255.0
[RouterA-Tunnel0] ipx network 1f
[RouterA-Tunnel0] source 192.10.1.1
[RouterA-Tunnel0] destination 202.18.3.2
e Configure the static route to Novell Group2.
[RouterA] ipx route 31 1f.b.b.b tick 2000 hop 15
2 Configure Router B:
a Activate IPX.
[RouterB] ipx enable node b.b.b
b Configure the IP address and IPX address of Ethernet0 interface.
[RouterB] interface ethernet 0
[RouterB-Ethernet0] ip address 10.1.3.1 255.255.255.0
[RouterB-Ethernet0] ipx network 31
c Configure the IP address of Serial0 interface.
[RouterB] interface serial 0
[RouterB-Serial0] ip address 202.18.3.2 255.255.255.0
d Create a virtual Tunnel interface, and configure the IP address, source address
and destination address.
[RouterB] interface tunnel 0
[RouterB-Tunnel0] ip address 10.1.2.2 255.255.255.0
[RouterB-Tunnel0] ipx network 1f
[RouterB-Tunnel0] source 202.18.3.2
[RouterB-Tunnel0] destination 192.10.1.1
e Configure the static route to Novell Group.
644 CHAPTER 44: CONFIGURING GRE
Troubleshooting GRE The two interfaces at both ends of the tunnel are correctly configured and
the ping operation is successful, but the ping operation between PC A and
PC B fails.
Check whether there is a route passing through the Tunnel interface, that is, on
Router A, the route to 10.2.0.0/16 passes through Tunnel0 interface; on Router B,
the route to 10.1.0.0/16 passes through Tunnel0 interface (it is implemented by
adding a static route).
PC A PC B
10.1.1.1 tunnel 10.2.1.1
X RELIABILITY
Standby Center To enhance a network's reliability, 3Com routers provide perfect standby functions
Overview through the use of standby centers
■ Interfaces that have standby are called main interfaces. Every physical interface
or sub-interface on a router can serve as a main interface. A logic channel, such
as X.25 or frame-relay virtual circuits, on any interface can also serve as a main
interface.
■ The interfaces serving as the standby for other interfaces are called standby
interfaces. Any physical interface or logic channel on an interface of a router
can serve as the standby interface of another interface or logic channel.
■ One main interface can have several standby interfaces; if the main interface
goes down work resumes on a standby interface, based on priority.
■ Interfaces (such as ISDN BRI and ISDN PRI interfaces) that have multiple physical
channels can provide standbys to multiple main interfaces by using dialer route.
Standby centers support the standby load sharing function. When the traffic of
the all-active interfaces on the standby center reaches the set enable threshold,
routers will start a standby interface with the highest priority to share the load
with the started interfaces. When the traffic of all active interfaces on the standby
center is less than the set disable threshold, routers close the standby interface
with the lowest priority.
Entering the View of the On a 3Com router, not only every physical interface or sub-interfaces of the router,
Main Interface but every virtual circuit of X.25 or frame relay can work as a main interface. If the
648 CHAPTER 45: CONFIGURING A STANDBY CENTER
Operation Command
Enter the view of the main interface interface type number
Operation Command
Specify a logic channel number for an x25 map protocol address x121-address
X.25 virtual circuit. (interface view) x.121-address logic-channel number
Specify a logic channel number for a fr map protocol address dlci dlci
frame relay virtual circuit (interface view) logic-channel number
Specify a logic channel number for a dialer dialer route protocol
route (interface view) next-hop-address dialer-number
logic-channel number
Enter corresponding logic channel view. logic-channel number
(system view)
Specifying a Standby Any physical interface or logic channel, including a virtual circuit or dialer route,
Interface and the can work as a standby interface of the main interface.
Priority Used by the
Main Interface Use the following commands in the view of the main interface.
Table 697 Specify Standby Interface and Priority Used by the Main Interface
Operation Command
Specify a physical interface to back up the standby interface type number [
main interface; its priority can also be set priority ]
here.
Specify a logic channel to back up the standby logic-channel number [
main interface, its priority can also be set priority ]
here.
If one main interface has multiple standby interfaces, repeat these operations. In
addition, if the standby interface is a logic channel, the logic channel should be
made to correspond to the actual virtual circuit or dialer route.
Please perform the following tasks in the views of the physical interface to which
the virtual circuit or the dialer route belongs, and specify the corresponding logic
channel number.
Table 698 Establish a Corresponding Relation Between Logic Channel and Virtual Circuit
or Dialer Route
Operation Command
Specify a logic channel number for X.25 x25 map protocol address x121-address
virtual circuit x.121-address logic-channel number
Configuring the Standby Center 649
Specify a logic channel number for frame fr map protocol address dlci dlci
relay virtual circuit logic-channel number
Specify a logic channel number for Dialer dialer route protocol
Route next-hop-address dialer-number
logic-channel number
Setting the Delay Time When the state of the main interface changes from up to down, the system
for Switchover between doesn't switch to a standby interface immediately, but waits for a preset time
Main and Standby delay instead. The system switches to the standby interface only if the state of the
Interface main interface remains down after the delay times out. If the main interface
recovers within the delay time, the system will not switch to the standby interface.
Table 699 Set the Delay Time for the Switchover from the Main Interface to the Standby
Interface
Operation Command
Set the delay time for the switchover from standby timer enable-delay seconds
the main interface to the standby interface
Restore the default delay time for the undo standby timer enable-delay
switchover from the main interface to the
standby interface
By default, the delay time for the switchover from the main interface to the
standby interface is 0 second, meaning that the switchover is instanteous.
When the state of the main interface changes from down to up, the system
doesn't switch to the main interface immediately, but wait for a preset time delay
instead. The system will switch back to the main interface only if the state of the
main interface remains 'up' after the delay time runs out; if the main interface
restores its down state again within the delay time, the system will not switch to
the main interface.
Perform the following configurations in the view of the backed up main interface.
Table 700 Set the Delay Time for the Switchover from the Standby Interface to the Main
Interface
Operation Command
Set the delay time for the switchover from standby timer disable-delay seconds
the standby interface to the main interface
Restore the default delay time for the undo standby timer disable-delay
switchover from the standby interface to
the main interface
By default, the delay time for the switchover from the standby interface to the
main interface is 0 second, meaning that the switchover is instanteous.
Setting State-judging When the main interface is a logic channel, the logic channel is regarded as down
Conditions of the Logic after a specified number of unsuccessful calls. After it switches over to the standby
Channel State interface, regular inspections at specified time intervals must be made on the logic
channel to check whether it has recovered.
If the main interface has multiple standby interfaces, of which one is a logic
channel, it's necessary to judge whether the logic channel is down or up before
opening it. If it is down, open the standby interface with the second highest
650 CHAPTER 45: CONFIGURING A STANDBY CENTER
priority; after the logic channel changes to up, it's required to switch from the
standby interface with the second highest priority to this logic channel.
Table 701 Set the State-judging Conditions When the Main Interface is a Logic Channel
Operation Command
Set the condition for judging the logic channel as standby state-down times
down: the logical channel is regarded as down after
the specified number of unsuccessful calls.
seconds is set to make regular inspections so as to standby state-up seconds
check whether the original logic channel has
recovered its “up” state.
Configuring Standby Conduct the following configuration under the interface view or logic channel
Load Sharing view.
Table 702 Configure Interface or Logic Channel Load Sharing
Operation Command
Configure the standby load sharing of standby threshold enable-threshold
interface or logic channel disable-threshold
Disable the standby load sharing undo standby threshold
configuration of interface and logic enable-threshold disable-threshold
channel
Standby Center This section describes several different configurations for standby centers with a
Configuration suggested procedure for each configuration
Examples
Standby Between Take interface Serial 2 as the standby interface for interface Serial 1.
Interfaces
1 Enter the view of Serial 1.
[Router]interface serial 1
2 Set Serial 2 as its standby interface.
[Router-Serial1]standby interface serial 2
3 Set the time for switchover between main and standby interfaces as 10 seconds.
[Router-Serial1]standby timer enable-delay 10
[Router-Serial1]standby timer disable-delay 10
Standby Center Configuration Examples 651
Multiple Standby Take both interfaces Serial 1 and Serial 2 as the standby interface of interface
Interfaces Serial 0, and use interface Serial 1 as a preference.
1 Enter the view of Serial 0.
[Router] interface serial 0
2 Set interfaces Serial 1 and Serial 2 as the standby interfaces, their priorities being
30 and 20, respectively.
[Router-Serial0] standby interface serial 1 30
[Router-Serial0] standby interface serial 2 20
Logical Channel Standby In this example, set interface Serial 1 as the standby interface for an X.25 virtual
Interface circuit on interface Serial 0.
1 Configure interface Serial 0 so that it encapsulates X.25 and specify its IP address
and X.121 address.
[Router]interface serial 0
[Router-Serial0]link-protocol x25
[Router-Serial0]ip address 1.1.1.2 255.0.0.0
[Router-Serial0]x25 x121-address 1
2 Match an X.25 virtual circuit on interface Serial 0 with logic channel 10.
[Router-Serial0]x25 map ip 2.2.2.3 x121-address 2 logic-channel 10
3 Enter the view of logic channel 10.
[Router-Serial0]logic-channel 10
4 Specify interface Serial 1 as the standby interface of this logic channel.
[Router-logic-channel10]standby interface serial 1
5 Set the time interval as 10 seconds for judging the logic channel as up.
[Router-logic-channel10]standby state-up 10
Multiple Standby Take both logic channel 3 on interface Serial 1 and interface Serial 2 as the
Interfaces with a Logic standby interfaces of logic channel 5 on interface Serial 0.
Channel
1 Configure that interface Serial 0 encapsulates X.25 and specify its IP address and
X.121 address.
[Router]interface serial 0
[Router-Serial0]link-protocol x25
[Router-Serial0]ip address 1.1.1.2 255.0.0.0
[Router-Serial0]x25 x121-address 1
2 Match an X.25 virtual circuit on interface Serial 0 with logic channel 5.
[Router-Serial0]x25 map ip 2.2.2.3 x121-address 2 logic-channel 5
3 Configure that interface Serial 1 encapsulates X.25 and specify its IP address and
X.121 address.
[Router-Serial0]interface serial 1
[Router-Serial1]link-protocol x25
[Router-Serial1]ip address 3.3.3.4 255.0.0.0
[Router-Serial1]x25 x121-address 3
4 Match logic channel 3 with an X.25 virtual circuit on interface Serial 1.
[Router-Serial1]x25 map ip 4.4.4.5 x121-address 4 logic-channel 3
652 CHAPTER 45: CONFIGURING A STANDBY CENTER
5 Enter the view of logic channel 5 and set logic channel 3 and interface Serial 1 as
its standby interfaces, their priorities being 50 and 20 respectively.
[Router-Serial1]logic-channel 5
[Router-logic-channel5]standby logic-channel 3 50
[Router-logic-channel5]standby interface serial 2 20
46 CONFIGURING VRRP
■ VRRP Overview
■ Configuring VRRP
■ Displaying and Debugging VRRP
■ VRRP Configuration Examples
■ Troubleshooting VRRP
VRRP Overview Virtual Router Redundancy Protocol (VRRP) is a fault-tolerant protocol. In general,
a default route (the next hop is 10.100.10.1) is configured for a network host so
that packets sent by the host with destination addresses not in the local network
segment go through the default route to Router 1 to implement communication
between the host and the external network. When Router 1 breaks down, in this
network segment all the hosts that regard Router 1 as the default route next-hop
stop the communication with the external network.
Network
Router 10.10.100.1
Ethernet
PC PC PC
To solve this problem, VRRP is designed for LANs with multi-casting and
broadcasting capabilities, such as Ethernet. VRRP combines a group of LAN routers
including a MASTER router and several BACKUP routers into a virtual router, called
a standby group.
654 CHAPTER 46: CONFIGURING VRRP
Router Router
MASTER BACKUP
Virtual IP Address:
10.10.100.1
Ethernet
PC PC PC
This virtual router has its own IP address: 10.100.10.1 (it can be the same as the
interface address of a router within the standby group). The routers within the
standby group have their own IP addresses (10.100.10.2 for the master routers
and 10.100.10.3 for the backup routers). The host within the LAN only knows the
IP address of this virtual router but not the specific IP addresses of the master
router and the backup router. They configure their own default routes as the IP
address of this virtual router. Therefore, hosts within the network communicate
with the external network through this virtual router. If a master router in the
virtual group breaks down, another backup router function as the new master
router to continue serving the host with routing to avoid interrupting the
communication between the host and the external networks.
Configuring VRRP ■ Configuring VRRP includes tasks that are described in the following section:s
■ Add Virtual IP AddAdding a Virtual IP Addressress
■ Configuring Router Priority in a Standby Group
■ Configuring Preemption Mode and Delay of Standby Group Routers
■ Configuring the Authentication Method and Authentication Key
■ Configure Standby Group Timer
■ Monitoring the Specified Interface
Adding a Virtual IP Add one IP address of the standby group network-segment to this standby group
Address (also called a virtual router).
Operation Command
Add Virtual IP Address vrrp vrid virtual_router_id
virtual-ip ip-address
Delete virtual IP address undo vrrp vrid virtual_router_id
virtual-ip [ ip-address ]
The standby group numbers ranges from 1 to 255. The virtual IP address should be
the address of the network segment where the interface resides. It can be an
unused IP address in the network segment, or the router's own IP address. When
the virtual IP address is the router’s own IP address, this router is called an IP
address owner. When the first IP address is added to a standby group, the system
establishes this standby group. Whenever this command is executed after that, the
system only adds this address to the virtual IP address list of this standby group.
One router interface can be added into 14 standby groups at the same time, while
one standby group can configure up to 16 virtual IP addresses. Before performing
other configurations for one standby group, this command must be used first to
establish this standby group.
After the last virtual IP address has been deleted from the standby group, this
standby group is also deleted. Then this standby group no longer exists on this
interface and all the configurations of this standby group are no longer valid.
Configuring Router The status of each router in a standby group can be determined by its priority in
Priority in a Standby VRRP. The router with the highest priority becomes the master. Those with the
Group same priority are judged by comparing the master IP addresses of their interfaces.
The range of priority is 0 to 255 (the bigger the number, the higher the priority)
with 100 as the default. However the range to be configured is from 1 to 254.
Priority 0 is reserved for special use by the system and 255 is reserved for the IP
address owner.
Operation Command
Configure the priority of the standby vrrp vrid virtual_router_id priority
group priority
Restore the default value of the priority undo vrrp vrid virtual_router_id
priority
The priority for IP address owners cannot be configured and it always remains
255.
656 CHAPTER 46: CONFIGURING VRRP
Configuring Preemption Once a router in the standby group becomes the master router, so long as it still
Mode and Delay of functions properly, other routers, even configured with higher priority later, cannot
Standby Group Routers become the master router unless they are configured with preemption mode. The
router in preemption mode becomes the master router if it finds its own priority is
higher than that of the present master router. Accordingly, the former master
router becomes the backup router.
Along with preemption mode, delay can also be configured. This delays the
coming of the point when the backup router becomes the master router. The
purpose for this is: in an unstable network if the backup router has not received
the packets from the master router punctually, it will become the master router
(failure of backup to receive the packets may be due to network congestion, not
due to malfunction of the master router). Therefore, a delay insures the reception
of the packet from the master router and thus avoids frequent state switches.
The default mode is preemption without delay. The delay is set in seconds, ranging
from 1 to 255.
Table 706 Configure Preemption Mode and Delay of Standby Group Routers
Operation Command
Configure the preemption mode and vrrp vrid virtual_router_id
delay for standby group. preempt-mode [ timer-delay seconds ]
Delete preemption mode undo vrrp vrid virtual_router_id
preempt-mode
Operation Command
Configure authentication method and vrrp authentication-mode simple [ key
authentication key ]
Disabled VRRP authentication undo vrrp authentication-mode simple
The same authentication method and authentication key should be configured for
the standby group of an interface.
Displaying and Debugging VRRP 657
Configure Standby The master router of a VRRP standby group notifies its normal operation state to
Group Timer the routers within the group by sending them VRRP packets regularly
(adver_interval). If the backup routers fail to receive the VRRP packets over a
certain period of time (master_down_interval), they reach the conclusion that the
master routers are not functioning properly and will change their own state to
master.
The user can adjust the master routers' sending interval (adver_interval) of VRRP
packets by configuring the timer command. The master_down_interval of the
backup routers are three times that of the adver_interval. Too much network
traffic or the differences of different router timers will result in abnormal
master_down_interval and state switchover. Such problems can be solved through
prolonging the adver_interval and configuring delay time.
Operation Command
Configure VRRP timer vrrp vrid virtual_router_id
timer-advertise seconds
Restore the default value of VRRP timer undo vrrp vrid virtual_router_id
timer-advertise
Monitoring the The interface monitoring function of VRRP expands backup function: when the
Specified Interface interface of the router is unavailable, it is regarded that the router is not stable,
hence it should not act as a master router. After the interface monitoring function
is set, the router's priority will be adjusted dynamically according to the state of
the interface that is under monitoring. Once the monitored interface becomes
unavailable, the priority value of this router is reduced, so that another router with
a more stable interface state in the same backup group can act as a master router
more easily
Operation Command
Set to monitor the specified interface vrrp vrid virtual_router_id track
interface_type interface_number [
reduced priority ]
Cancel the monitoring of the specified undo vrrp vrid virtual_router_id
interface track interface_type
interface_number
Displaying and Perform the display and debugging commands in all views.
Debugging VRRP
658 CHAPTER 46: CONFIGURING VRRP
Operation Command
Display VRRP State Information display vrrp
Enable the debugging of VRRP debugging vrrp { packet | state }
VRRP Configuration This section describes several different configurations of VRRP with a suggested
Examples procedure for each configuration
VRRP Single Standby Host A uses the VRRP standby group which combines router A and router B as its
Group default gateway to visit host B on the Internet.
A VRRP standby group consists of the following parts: standby group number1,
virtual IP address 202.38.160.111, router A as the MASTER and router B as the
backup with preemption aII. Networking diagram
Host B
10.2.3.1
Internet
Visual IP address
Router A Router B
202.38.160.111
202.38.160.1 202.38.160.2
Host A
202.38.160.3
1 Configure router A:
[Router-Ethernet0] vrrp vrid 1 virtual-ip 202.38.160.111
[Router-Ethernet0] vrrp vrid 1 priority 120
2 Configure router B:
[Router-Ethernet0] vrrp vrid 1 virtual-ip 202.38.160.111
The standby group can be used immediately after configuration. The default
gateway of host A can be set as 202.38.160.111.
Under normal conditions, router A functions as the gateway, but when router A is
turned off or malfunctioning, router B will function as the gateway instead.
VRRP Monitoring As shown in Figure 209, even when router A is still functioning, it may want router
Interface B to function as a gateway when the Internet interface connected with it does not
function properly. This can be implemented by configuring the monitoring
interface.
1 Configure router A:
[Router-Ethernet0] vrrp vrid 1 virtual-ip 202.38.160.111
[Router-Ethernet0] vrrp vrid 1 priority 120
[Router-Ethernet0] vrrp authentication-mode simple 3Com Router
[Router-Ethernet0] vrrp vrid 1 timer-advertise 5
[Router-Ethernet0] vrrp vrid 1 track serial0 reduced 30
2 Configure router B:
[Router-Ethernet0] vrrp vrid 1 virtual-ip 202.38.160.111
[Router-Ethernet0] vrrp authentication-mode simple 3Com Router
[Router-Ethernet0] vrrp vrid 1 timer-advertise 5
Under normal conditions, router A functions as the gateway, but when the
interface Serial0 of router A is malfunctioning, its priority will be reduced by 30,
lower than that of router B so that router B will preempt to function as master for
gateway services instead.
When Serial0, the interface of router A, recovers, this router will resume its
gateway function as the master.
Multiple Standby One 3Com router is allowed to function as the standby router for many standby
Groups Configuration groups. See Figure 209.
1 Configure router A:
[Router-Ethernet0] vrrp vrid 1 virtual-ip 202.38.160.111
[Router-Ethernet0] vrrp vrid 1 priority 120
[Router-Ethernet0] vrrp vrid 2 virtual-ip 202.38.160.112
2 Configure router B:
[Router-Ethernet0] vrrp vrid 1 virtual-ip 202.38.160.111
[Router-Ethernet0] vrrp vrid 2 virtual-ip 202.38.160.112
[Router-Ethernet0] vrrp vrid 2 priority 120
Troubleshooting VRRP As the configuration of VRRP is not very complicated, almost all the malfunctions
can be located through checking the information of configuration and debugging.
Explanations are made of common failures trouble-shooting in the following part.
660 CHAPTER 46: CONFIGURING VRRP
The first possibility can be solved through modifying the configuration. The second
possibility is caused by the malicious attempt of some devices so non-technical
measures should be attempted.
To solve these problems, try to ping the many master routers. If that fails, it
indicates faults in the links between routers and it is necessary to check the links. If
they can be pinged through, it indicates that the problems may be caused by an
inconsistent configuration. For the configuration of the same VRRP standby group,
complete consistence for the number of virtual IP addresses, each virtual IP
address, timer interval and authentication method must be guaranteed.
■ What Is QoS?
■ Three Types of QoS Services
■ Benefits of QoS for the Network Service
What Is QoS? In the traditional IP network, all the packets are treated identically. Each router has
to handle these packets a following first in first out (FIFO) policy. That is, it makes
best effort to transmit the packets to the destination without considering the
throughput, delay, jitter, drop rate of the packets, etc. This may be advantageous
or disadvantageous, depending on the conditions of the network. With the rapid
development of the computer networks, the voice, image, and important data
that are sensitive to the bandwidth, delay and jitter are simultaneously transmitted
over the network, which enrich the network resources. However, at the same
time, there are more strict requirements for the network transmission data quality.
They expect that a certain service guarantee in terms of the throughput, delay,
delayed jitter, and packet loss ratio of the packets can be obtained, and that
different services may be provided on the basis of the client types. One way to
solve these problems is to increase the bandwidth of the network, however, the
increase in bandwidth is so limited and so expensive that it only relieves this
problem to some extent. The provision of QoS is the basic requirements for future
IP networks.
Three Types of QoS Generally, the services of QoS are usually divided into the following three types:
Services ■ Best-effort service: This is the default service model provided by IP. It uses a
FIFO (first in, first out) queue, offers the most primitive service of
"routing-forwarding", and provides no guarantee for delay and reliability. It
can satisfy most early networks' requirement (e.g., FTP, E-mail), but cannot
provide high quality services for the developing voice and multimedia services.
■ Integrated service: This model is usually applied on the edge routers. In this
model, before sending a packet, it is necessary to apply for network resource
and service quality through signal. After the confirmation of Resource
Reservation Protocol (RSVP), the packets can be sent, and the size of the traffic
is not larger than the preset traffic parameters.
664 CHAPTER 47: QOS OVERVIEW
The QoS of the 3Com router is implemented based on the differentiated service,
and has the following functions:
Benefits of QoS for QoS can provide controllable and predictable services for network applications and
the Network Service network traffic. Using QoS in the network can realize:
■ Control of network resources. The user can control the usage of network
resources. For example, the user may limit the bandwidth resource consumed
in the FTP transmission on a connection, or provide higher priority for the data
that are more important.
Benefits of QoS for the Network Service 665
■ Adjustable network service. If the user is ISP, by using QoS, the adjustable
network services of different priority levels can be provided to various types of
clients.
■ Secure network services for specific data flows. For example, it can ensure that
the multimedia data flows and voice flows sensitive to the delay will acquire
the service in time.
666 CHAPTER 47: QOS OVERVIEW
48 TRAFFICPOLICING, TRAFFIC SHAPING
AND LINE RATE
Traffic Classification Traffic classification means classifying packets into multiple priority levels or
Overview multiple service types according to the ToS (Type of Service) of IPv4 packet header.
The other two values are reserved for other uses. After the packets are classified,
QoS will be applied to different classifications respectively.
The network administrator sets the packet classification rules which define the
specific flow according to the source address, source port number, protocol
number, destination address, destination port number. Packet classification rules
can also perform the classification based on the MAC address.
■ All the packets received from the specified interface are set to the highest
priority.
■ All FTP traffic is classified at a low priority.
■ Video traffic sent from specific IP addresses are classified at a medium priority
level.
The traffic flow to the specific destination addresses are classified at a high priority
level.
Traffic Policing An Internet service provider (ISP) must control the traffic and load sent by users in
Overview the network. For an enterprise network, if the control can be performed on the
traffics of some applications, it must be an effective method for controlling the
network conditions.
The typical function of t traffic policing is to limit traffic that enters the network to
an allowable range by supervising its specification. If the packet traffic of a certain
connection is too large, the packet is dropped or the priority level of the packet is
specified. For example, an HTTP packet may be limited to less than 50% of the
network bandwidth to save network resources and protect the benefits of
operators.
The committed access rate (CAR) is a technology that polices the network traffic
that enters an ISP, including the flow classification service of the policed traffic.
CAR classifies the packets by using the ToS field of the IP v4 header, and takes
actions for different classes of traffic. Such actions may be:
■ Dropping directly — CAR drops the packets that do not "conform to" the
traffic specifications.
■ Forwarding after modifying the packet priority level — The packets with the
estimated result of "partial conformance" are forwarded after they are marked
as the lower priority level flows.
■ Entering the next level of policing — Traffic policing may be stacked level by
level, and each level concerns and polices more specific targets. A downstream
network can receive the estimated result from an upstream network, or it can
be classified according to its own standard.
Traffic policing uses the Token Bucket algorithm, and each service has tokens
which are transmitted at a specified rate. If the reaching speed of the user packets
is faster than the speed at which the tokens are transmitted, it is necessary to take
measures for the data exceeding the specified rate, for example, they are marked
and allowed to pass through the network only when the network is not congested
and they are dropped first when the network is congested. These data packets can
also be dropped directly, which is completely dependent on the agreement and
rules between the operators and users.
Token bucket feature The token bucket may be regarded as a container that
stores tokens. The system puts tokens into the bucket at the set speed. When the
bucket is full of tokens, the excessive tokens overflow, and the number of the
tokens in the bucket does not increase.
Figure 210 Schematic diagram of packet line classification and traffic policing
classify
Token Bucket
Discarded
packets
Measuring the traffic by the token bucket Evaluating the traffic specification
by the token bucket is based on whether the number of the tokens in the token
bucket is enough for packet forwarding. If the bucket has sufficient tokens to
forward packets, the traffic does not exceed the specification, otherwise, it
exceeds the specification. Usually, one token is associated with one bit of
forwarding authority.
■ Time Interval: Evaluates the traffic in every other period. This parameter is set
by the system. For every evaluation, if the bucket has sufficient tokens to be
used by one or more packets, it is considered “in conformance”. If the bucket
Committed Access Rate (CAR) 669
Complex evaluation If there is only one token bucket, the evaluation result is
limited to “conformance” and “nonconformance”.
To evaluate more complex situations and implement more flexible adjusting and
controlling rules, two token buckets can be set. For example, the committed
access rate (CAR) has three parameters:
■ Committed Information Rate (CIR): The long period average rate, at which the
service quality of the transmitted data can be completely guaranteed.
■ Committed Burst Size (CBS): The burst data traffic size before the amount of
some traffic exceeds the line rate. At this rate, the service quality of the data
can be guaranteed.
■ Excess Burst Size (EBS): The burst data traffic size before the amount of all
traffic exceeds the line rate. At this rate, the service quality of the data cannot
be guaranteed.
With two token buckets, the rates for putting in the tokens are the same, that is,
CIR. While they are in different size--respectively CBS and EBS (CBS<EBS, both of
the buckets are briefly called C bucket and E bucket respectively), which refer to
the different allowable burst levels. Every time for evaluation, based on the cases
of “C bucket has sufficient token”, “C bucket is short of tokens and E bucket has
sufficient tokens” and “both C and E buckets are short of tokens”, the evaluation
results are “conformance”, “partial conformance”, and “nonconformance”.
Committed Access The functions provided by the committed access rate (CAR) technology include the
Rate (CAR) execution of classification service and the execution of traffic policing by line rate.
It is an approach to perform traffic policing. With CAR classification service, you
can sort the packets into different classes, and handle the packets of different
classes in different ways.
The user can use the priority fields in the ToS domain of the IP packet header to
define up to six types of services. The rules used to classify the packets can be
based on the following features:
■ Physical port
■ Source IP address
■ Source MAC address
670 CHAPTER 48: TRAFFIC POLICING, TRAFFIC SHAPING AND LINE RATE
■ Destination IP address
■ Destination MAC address
■ Application port
■ IP protocol type
■ Other standards that may be identified through the access list and extended
access list.
The packets can also be classified based on the external conditions of the network.
For example, the client types may classify the packets. After the packet is
classified, the user can apply the ACL or CARL on a specified interface and set the
corresponding actions for the interface, such as rate limiting (to specify CIR, CBS,
EBS), discard, resetting priority and direct forwarding.
■ IP access control list (standard access control list or extended access control list)
■ CAR rule list (CARL, when defining CARL, you can perform traffic classification
according to IP priority and MAC address).
The CAR rules can be independent of each other. That is, each CAR rule reacts to a
certain type of the packets separately. A cascade of CAR rules can also be used in
which a packet is matched with successive CAR rules.
Multiple CAR rules can be used on an interface. The router can attempt to match
the CAR rules in configured order until it matches one successfully. If no matched
rules are found, rate limiting is not implemented.
Defining Rules
On the network border, it is necessary to classify the packets. The classification
standards can set varied priorities for the varied classifications of either all the
packets received from a specified interface or a group of packets defined by the
rule command. Inside a network, the modified priority can be used as the
classification standard. At the same time, for the packets of each category,
different processing can be defined for those exceeding and those not exceeding
the traffic limit in a unit time.
Operation Command
Define the CAR rule qos carl carl-index { precedence
precedence-value | mac mac-address }
Delete the CAR rule undo qos carl carl-index
Committed Access Rate (CAR) 671
Operation Command
Enter the acl view acl acl-number [ match-order config |
auto ]
Configure the extended access control list rule { normal | special }{ permit |
deny } pro-number [source
source-addr source-wildcard | any ]
[ destination dest-addr dest-
wildcard | any ] [source-port
operator port1 [ port2 ] ]
[destination-port operator port1 [
port2 ] ] [icmp-type icmp-type
icmp-code] [logging]
For the same carl-index, only one CAR rule can be defined. The later defined CAR
rule will overwrite the earlier CAR rule. However, multiple CAR rules with different
carl-index may be defined.
Operation Command
Apply the CAR policy or ACL rule on the qos car { inbound | outbound } { any |
interface acl acl-index | carl carl-index }
cir committed-rate cbs burst-size ebs
excess-burst-size conform action
exceed action
Delete the CAR policy or ACL rule applied undo qos car { inbound | outbound } {
to the interface any | acl acl-index | carl
carl-index } cir committed-rate cbs
burst-size ebs excess-burst-size
conform action exceed action
You must disable fast forwarding before applying the CAR policies.
672 CHAPTER 48: TRAFFIC POLICING, TRAFFIC SHAPING AND LINE RATE
Operation Command
Display one or all carl display qos carl [ carl-index ]
Display the parameter configuration and display qos car [ interface type
operation statistic information of CAR on number ]
various interfaces
Figure 211 Networking diagram of configuring the CAR policy to be applied to all
packets
E0 E1
190.0.0.2 191.0.0.1
E0 E0
Router C 190.0.0.1 Router A 191.0.0.2 Router B
1 Configure Router A:
CAR policy is applied to all the packets that are input to router A Ethernet 0
[RouterA-Ethernet0] ip address 190.0.0.1 255.255.255.0
[RouterA-Ethernet0] qos car inbound any cir 8000 cbs 15000 ebs 8000
conform pass exceed discard
CAR policy is applied to all the packets that are output from router A Ethernet 1
[RouterA-Ethernet1] ip address 191.0.0.1 255.255.255.0
[RouterA-Ethernet1] qos car outbound any cir 8000 cbs 15000 ebs 8000
conform pass exceed discard
Figure 212 Networking diagram of configuring the priority level based CAR policy
S0 S1
10.0.0.2 11.0.0.1
S0 S0
Router C 10.0.0.1 Router A 11.0.0.2 Router B
1 Configure Router A:
The CAR policy is applied to the packet inputted to router A serial interface 0 and
matching priority level 1.
[RouterA] qos carl 1 precedence 1
[RouterA]acl 1
[RouterA-acl-1]rule permit source 10.0.0.0 0.0.0.255
[RouterA-acl-1]interface serial 0
[RouterA-Serial0] ip address 10.0.0.1 255.255.255.0
[RouterA-Serial0] qos car inbound acl 1 cir 8000 cbs 15000 ebs 8000
conform pass exceed discard
The CAR policy is applied to the packet outputted from Router A serial interface 1
and matching priority level is 2
[RouterA] qos carl 2 precedence 2
[RouterA] acl 2
[RouterA-acl-2] rule permit source 10.0.0.0 0.0.0.255
[RouterA-acl-2] interface serial 0
[RouterA-Serial0] ip address 11.0.0.1 255.255.255.0
[RouterA-Serial0] qos car outbound acl 2 cir 8000 cbs 15000 ebs 8000
conform pass exceed discard
Figure 213 Networking diagram of configuring CAR policy based on the MAC address
S0 S1
10.0.0.2 11.0.0.1
S0 S0
Router C 10.0.0.1 Router A 11.0.0.2 Router B
1 Configure Router A:
The packet that is inputted to router A serial interface 0 is matched with the CAR
policy based on MAC address
[RouterA] qos carl 1 mac 00-e0-34-b0-76-76
[RouterA]acl 1
[RouterA-acl-1]rule permit source 10.0.0.0 0.0.0.255
[RouterA-acl-1]interface serial 0
[RouterA-Serial0] ip address 10.0.0.1 255.255.255.0
[RouterA-Serial0] qos car inbound acl 1 cir 8000 cbs 15000 ebs 8000
conform pass exceed discard
674 CHAPTER 48: TRAFFIC POLICING, TRAFFIC SHAPING AND LINE RATE
Figure 214 Configure the CAR rule to be applied to the packet that matches the ACL
policy
S0 S1
10.0.0.2 11.0.0.1
S0 S0
Router C Router A Router B
10.0.0.1 11.0.0.2
1 Configure Router A:
The CAR policy is applied to the packet input to router A serial interface 0 and
matching the ACL
[RouterA]acl 1
[RouterA-acl-1]rule permit source 10.0.0.2 0.0.0.0
[RouterA-acl-1]interface serial 0
[RouterA-Serial0] ip address 10.0.0.1 255.255.255.0
[RouterA-Serial0] qos car inbound acl 1 cir 8000 cbs 15000 ebs 8000
conform pass exceed discard
The CAR policy is applied to the packet that is output from router A serial interface
1 and matches ACL
[RouterA]acl 1
[RouterA-acl-1]rule permit source 11.0.0.1 0.0.0.0
[RouterA-acl-1]rule permit source 11.0.0.2 0.0.0.0
[RouterA-acl-1]interface serial 0
[RouterA-Serial0] ip address 11.0.0.1 255.255.255.0
[RouterA-Serial0] qos car inbound acl 1 cir 8000 cbs 15000 ebs 8000
conform pass exceed discard
Traffic Shaping Generic Traffic Shaping (GTS) restricts packets that are sent from an interface at
relative uniform speed by limiting the traffic and burst of a certain connection
from a network. This is usually carried out with buffer and token bucket that is
used to control the transmission speed. Even buffering the packets that exceed a
specified traffic and sending them after a specified time can make the speed of
the packets.
classify
Token Bucket
queue
Discarded
packets
If an interface does not use the rule defined by rule to classify the packet, the
interface has only one queue. If GTS uses the rule defined by rule to classify the
packet, it maintains a separate queue for every type of flow. In every interface,
GTS can select either of the following two methods:
■ Processing all the flows of the interface: At this time, if the sending queue of
this interface is empty, and the traffic of the packets in unit time does not
exceed the limitation, the packet is sent immediately, otherwise, the packet
enters the sending buffered queue of the interface.
■ Processing different flows of the interface: Different flows are compared with
acl-number. When they are matched with the rule and the interface sending
queue is empty, and the traffic of the packet in unit time does not exceed the
limitation, the packet is sent immediately, otherwise, the packet enters the
sending buffered queue of the interface.
To reduce the unnecessary loss of the packet, GTS processing is performed on the
packet in the upstream router egress, and the packet that exceeds the GTS traffic
characteristics are buffered on the interface buffer. When the network congestion
is removed, GTS again takes out the packet from the buffer queue and continues
to send. Thus, the packets sent to the downstream router will all conform to the
traffic specification of the router to reduce the drop of the packet in the
downstream router. If GTS processing is not performed in the upstream router
egress, all the packets that exceed the CAR specified traffic of the downstream
router would be dropped by the downstream router.
Operation Command
Configure the shaping parameters for a qos gts acl acl-index cir
specified flow committed-rate [ cbs burst-size [ ebs
excess-burst-size [ queue-length
queue-length ] ] ]
Cancel shaping parameters for a specified undo qos gts acl acl-index
flow
This command may be repeatedly used to set different shaping parameters for
different flows.
This command cannot be used together with the qos gts any command in the
same interface.
Operation Command
Configure shaping parameters for all qos gts any cir committed-rate [ cbs
flows burst-size [ ebs excess-burst-size [
queue-length queue-length ] ] ]
Cancel the shaping parameters of the flow undo qos gts any
This command cannot be used along with the qos gts acl command on the same
interface. You must disable fast forwarding before configuring all the traffic
shaping parameters.
GTS Configuration
Example
1 Configure the ACL.
[Router]acl 110
[Router-acl-110] rule permit udp source any destination any
Physical Interface Line By using the physical interface line rate (LR), the total rate for sending packets
Rate (including the emergency packet) on a physical interface can be limited.
LR also uses the token bucket to perform the traffic control. If LR is configured in
an interface of the router, the LR token bucket first processes all the packets sent
by this interface. If the token bucket has sufficient tokens, the packet can be sent;
otherwise, the packet enters the QoS queue for congestion management. Thus,
the packet traffic through this physical interface can be controlled.
incoming packets
outgoing packets
buffer
As the token bucket is used to control the traffic, when there is any token in the
token bucket, the burst transmission of the packet is allowed. When there is no
token in the token bucket, the packet cannot be sent until a new token is
generated in the token bucket. Thus, there is a limitation that packet traffic cannot
be larger than the generating speed of the token, therefore, it realizes that the
traffic is limited and burst traffic is allowed to pass through at the same time.
Compared with CAR, LR can limit all the packets passing through the physical
interface. CAR is implemented in the IP layer and is ineffective on the packets that
are not processed by the IP layer. It is simple to use LR when the user only requires
the limitation of all packets.
LR Configuration To configure the physical interface line rate, perform the following configurations
in the interface view.
Table 717 Configure the Physical Interface LIne Rate
Operation Command
Configure the physical interface qos lr cir committed-rate [ cbs
bandwidth burst-size [ ebs excess-burst-size ]
]
Delete the configured physical interface undo qos lr
bandwidth
■ What is Congestion?
■ Congestion Management Policy Overview
■ Selecting Congestion Management Policies
■ Operating Principle of the Congestion Management Policies
■ Configuring Congestion Management
■ Congestion Management Configuration Examples
What is Congestion? For a network unit, when the speed of the data packet is faster than the speed at
which this interface sends the data packet, congestion occurs on the interface. If
not enough memory space can be provided to store these data packets, some of
them will be lost. The loss of the data packet can cause the host or router that is
sending the data packet to resend this data packet because of a timeout which
can cause a communication failure.
There are many factors causing congestion. For example, when the data packet
flow enters the router through the high-speed link and is then transmitted
through the low speed link, congestion can occur. When the data packet flow
enters the router simultaneously from multiple interfaces and is transmitted from
one interface or the processor slows down, congestion may occur.
As shown in Figure 217, two LANs of one company are connected with each other
through the low speed link. When a user on LAN 1 sends a large number of data
packets to a user on LAN 2, it may cause congestion on the interface through
which router A of LAN 1 is connected to the low speed link. If an important
application is running between the servers of both LANs, while an unimportant
application is running between two PCs, the important application will be
influenced.
680 CHAPTER 49: CONGESTION MANAGEMENT
Quidway
P
DDN/FR/ISDN/PSTN RouterB Router C
10 M Ethernet
Occurrence of
congestion
Company LAN2
P
C
Server
RouterA
Ethernet
100 M
Company LAN1
Server
Congestion When the congestion occurs, if not enough memory space is provided to buffer
Management Policy the packets, some of the packets will be lost. The loss of the packets may cause
Overview the host or router that is sending the packet to resend this packet because of
overtime, re-congesting and resending, and so on, thereby causing a vicious circle.
Therefore, some policies are used to manage network congestion. When
congestion occurs, the router takes some policies to dispatch the data packets,
deciding which data packets may be sent first and which ones may be discarded.
These policies are called the congestion management policy.
For the congestion management, the queuing mechanism is generally used. When
congestion occurs, the packet is queued at the router egress by a given policy.
During dispatching, the order for sending the packet out of the queue is decided
by a given policy.
FIFO Queuing In the FIFO mode, the concept of no communication priority and classification is
adopted. During the use of FIFO, the sending order of data packet from the
interface depends on the order in which the data packet arrives at this interface, at
this time, the queuing and de-queuing orders of the packet are the same.
Priority Queuing In Priority Queueing (PQ) mode, you can flexibly specify the priority queues which
the packets enter according to the fields packet length, source address, and
destination address in the packets header and the interface into which the packets
will come. The packets belonging to a higher priority queue can be sent first. In
this way, the most important data can be handled first.
Custom Queuing In the Custom Queueing (CU) model, according to the user's requirements, the
traffic can be classified in terms of TCP/UDP port number, ACL and interface type.
Each type of traffic is allocated with a certain percent of bandwidth. When
network congestion occurs, the traffic that has high demands on delay (such as
voice) can obtain reliable service. If a type of traffic cannot occupy all the reserved
bandwidth, other types of traffic will occupy the reserved bandwidth
automatically, thus making full use of the resource.
Selecting Congestion Management Policies 681
For the interface with the lower rate, customizing the queue for it can guarantee
that the data flows passing through this interface may also obtain the network
services to certain extent.
Weighted Fair Queuing Weighted Fair Queuing (WFQ) provides a dynamic and fair queuing mode, which
distinguishes the traffic based on the priority/weight and decides the bandwidth
size of each session according to the session situation. Thus, it guarantees that all
communications can be fairly treated according to the weight allocated to them.
The foundation based on which WFQ classifies the traffic includes the source
address, destination address, source port number, destination port number, and
protocol type.
Selecting Congestion 3Com routers implement the four congestion management policies (FIFO, PQ, CQ
Management Policies and WFQ) discussed previously, in the Ethernet interface and serial interface
(encapsulated PPP, FR, HDLC), which may satisfy the requirements for various
service qualities to a certain extent.
FIFO implements the no priority policy of the data packet in user data
communication, which is not needed to determine the priority or type of the
communication. However, when using the FIFO policy, some low priority data in
abnormal operation may consume most of available bandwidths and occupy the
entire queue, which causes the delay of the burst data source, and the important
communication may be thereby discarded.
PQ can assure some communication transmission with higher priority. That is, the
strict priority sequence is conducted at the cost of transmission failure of data
packets with lower priority. For example, the packets in the lower priority queue
may not be transmitted in the worst case where the available bandwidth is very
limited and emergency communication occurs frequently.
WFQ uses the fair queuing algorithm to dynamically divide the communications
into messages. The message is a part of a session. With the use of WFQ, the
interactive communication with a small capacity can obtain the fair allocation of
the bandwidth, as the same as the communication with a large capacity (such as
file transmission).
Number of
queues Advantage Disadvantage
FIFO 1 1. It does not need to be 1. No matter how urgent they are,
configured and is easy to use. all the packets, voice or data, will
enter the FIFO (First In, First Out)
2. The processing is simple with
queue. The bandwidth used for
small delay.
sending packets, delay time, drop
rate are decided by the arrival
sequence of the packets.
2. It has no restriction on the
uncoordinated data sources (such as
the packet transmission of UDP), and
the unmatched data sources will
cause the damage of the
coordinated data source bandwidth
(such as the TCP packet
transmission).
3. The delay of the real time
application sensitive to time (such as
VolP) cannot be guaranteed.
PQ 4 The absolute priority can be 1. It needs to be configured, and the
provided to various service data, processing speed is slow.
and the delay of the real time
2. If the bandwidth of the packet
application sensitive to time
with high priority is not restricted, it
(such as VolP) can be
will cause that the packet with low
guaranteed. The bandwidth
priority cannot obtain the
occupation of the packet with
bandwidth.
the priority service may have the
absolute priority.
CQ 1 1. The packets of various services It needs to be configured, and the
may be allocated with the processing speed is slow.
bandwidths based on the
bandwidth proportion.
2. When there is no packet, the
available bandwidth occupied by
the existing types of packets can
be automatically increased.
WFQ It is decided 1. It is easily configured. The processing speed is slower than
by users FIFO.
2. The bandwidth of the
(256 by coordinated (interactive) data
default) source (such as the TCP packet
transmission) can be protected.
3. The delayed jitter can be
reduced.
4. The small packet has priority.
5. The flows with various priority
levels may be allocated with
different bandwidths.
6. When the traffic is reduced,
the available bandwidth
occupied by the existing flows
may be automatically increased.
Operating Principle of For congestion management, queuing technology is used. When congestion
the Congestion occurs, the data packet is queued at the router by a policy. When dispatching, the
Management Policies order for sending the data packet is decided by the policy.
Operating Principle of the Congestion Management Policies 683
queue i nt er f ace
queuei ng
First-In, First-Out (FIFO) As shown in Figure 218, the data packets are input to the first-in, first-out (FIFO)
Queuing queue according to the priority order of their arrivals. Data packets that first arrive
are first transmitted, and the data packets that later arrive are transmitted later. All
the packets that will be transmitted from the interface are input to the end of the
FIFO queue of the interface in the priority order of their arrivals. At the time when
the interface transmits the packets, the packets are transmitted in order, starting
from the head of the FIFO queue. During the transmission process of all packets,
there is no difference and no guarantee is provided for the quality of the packet
transmission. Therefore, a single application can occupy all the network resources,
seriously affecting the transmission of key service data.
Priority Queuing (PQ) As shown in Figure 219, the PQ queue is used to provide strict priority levels for
important network data. It can flexibly specify the priority order according to the
network protocol (such as IP or IPX), the interface into which the data are input,
the length of the packet, and the source address, destination address, and other
features.
t op queue
i ncomi ng packet s out goi ng packet s
mi ddl e queue
i nt er f ace
cl assi f yi ng queuei ng
bot t om queue
When the packets arrive at the interface, all of them are first classified (up to 4
classifications), and then they are input to the ends of respective queues according
to the classifications of the packets. Upon the transmission of the packets,
according to different priority levels, the packets in the low priority queue are not
transmitted until all the packets in the high priority queues are transmitted. Thus,
it is guaranteed that, at the network unit where the PQ is utilized, the most
important data can be processed the soonest and the packets of the higher
priority queues have very low delay. Both packet performance exponents of loss
684 CHAPTER 49: CONGESTION MANAGEMENT
rate and throughput rate can be guaranteed to a certain extent in case of network
congestion.
The key service (such as ERP) data packets may be put into the higher priority
queue, while the non-key service (such as E-Mail) data packets are put into the
lower priority queue, so that the data packets of the non-key service are
transmitted in the idle intervals during the processing of the key service data. In
this way, the priority of the key service is guaranteed and network resources are
optimized. However, it brings the problem that the data packets in the lower
priority queue may be blocked in the packet queue of the transmission interface
for a long period because of the existence of the data packets in the higher
priority queue.
Custom Queuing (CQ) As shown in Figure 220, custom queuing (CQ) divides the data packets into 17
classifications (corresponding to 17 queues of CQ) according a given policy, and
data packets are input respective CQ queues based on their own classifications
following the FIFO policy. In 17 queues of CQ, the queue 0 is the system queue,
and queues 1 to 16 are the user queues. The users can configure the proportional
relationship of the occupied interface bandwidth between various user queues.
When dispatching the queue, the data packets in the system queue are first
transmitted. Before the system queue is empty, a certain number of data packets
from user queues 1 to 16 are not extracted and sent out according to the
predetermined configured proportion using polling method.
queue1 10%
i ncomi ng packet s out goi ng packet s
queue2 30%
i nt er f ace
¡- -¡
cl assi f yi ng queue15 10% queuei ng
queue16
5%
PQ assigns the absolute priority to the data packets with higher priority compared
to data packets with the lower priority level. In this way, though the priority
transmission of the key service data can be guaranteed, when a number of data
packets with higher priority need to be transmitted, all bandwidths may be
occupied, causing the data packets with lower priority to be completely blocked.
With the use of CQ, such a case can be avoided. CQ has total of 7 queues. Queue
0 is the system queue that is first dispatched, and the queues 1 to 16 are the user
queues that are dispatched by a polling method based on the bandwidth settings.
The users may configure the proportional relationship of the occupied bandwidth
between the queues and the enqueuing policy of the packets. Thus, the data
packets of various services can be provided with different bandwidths, to
guarantee that the key services can be provided with more bandwidth. In addition,
it is not likely that non-key services may not be allocated with the bandwidth.
Operating Principle of the Congestion Management Policies 685
In the network shown in Figure 217, it is assumed that the server of LAN 1
transmits the data of the key service to the server of LAN 2, and the PC of LAN 1
transmits the data of the non-key service to PC of LAN 2. If the serial interface to
be connected with the WAN is configured for congestion management with CQ,
and the data flows of the key services between the servers are input to queue A,
while the data flows of the non-key services are input to queue B, the proportional
relationship of the occupied interface bandwidth between queue A and queue B is
configured as 3:1 (for example, during dispatching, queue A may continuously
transmit 6000 bytes of data packets every time, while queue B may continuously
transmit 2000 bytes of data packets every time). Thus, CQ will treat the data
packets of both different services differently. Each time queue A is dispatched, the
data packets are continuously transmitted, before the transmitted bytes are not
less than 6000 or queue A is empty, the next user queue will not be dispatched.
When queue B is dispatched, the condition to stop dispatching is that the
continuously transmitted bytes are not less than 2000 or queue B is empty.
Therefore, when congestion occurs and there are data packets in queues A and B
ready to be transmitted, in the view of the statistic results, the proportion between
the bandwidths allocated to the key services and the bandwidths allocated to the
non-key services is approximately 3:1.
Weighted Fair Queuing Weighted fair queuing (WFQ), is based on the guarantee of fair bandwidth delay,
(WFQ) and reflects the weighted value that is dependent on the PI priority carried in the
IP packet header. As shown in Figure 221, weighted fair queuing classifies the
packets based on the flows (identical source IP address, destination IP address,
source port number, destination port number, protocol number, and ToS packets
that belong to the same flow), with each flow allocated to one queue. When
dequeuing, WFQ allocates the available bandwidth of the egress to each flow. The
smaller the value of the priority is, the less the allocated bandwidth is. The larger
the value of the priority is, the more the allocated bandwidth is.
¡- ¡-
cl assi f yi ng queueN- 1 wei ght N- 1 queuei ng
(its own priority level+1)/(the sum of all of them (the priority levels of the flows+1))
For example, there are 5 types of traffic on an interface, and their priority levels are
0,1,2,3 and 4 respectively, the total quota of the bandwidth is the sum of each
priority plus 1, that is 1 + 2 + 3 + 4 + 5 = 15. The percentage of the bandwidth
686 CHAPTER 49: CONGESTION MANAGEMENT
occupied by each traffic is (each priority + 1)/ the sum of each priority plus 1, that
is, 1/15, 2/15, 3/15, 4/15 and 5/15.
For example, there are total 4 flows currently, and the priority levels of three of
them are 4, and that of one of them is 5, and then the total number of the
allocated bandwidth is:
(4 + 1) x 3 + (5 + 1) = 21
Then, the bandwidths of the three flows with the priority levels of 4 are 5/21, and
the bandwidth of the flows with the priority level of 5 is 6/21.
Configuring FIFO To configure FIFO queuing, perform the following configurations in the interface
Queuing view.
Table 720 Configure the First In First Out Queuing
Operation Command
Configure the length of FIFO queue qos fifo queue-length queue-length
Recover the default value of the FIFO undo qos fifo queue-length
queue length
By default, the length of the FIFO queue is 75, with the value ranging 1 to 1024.
lengths of various queues, and the number of bytes that may be continuously
transmitted by polling of every queue.
Operation Command
Configure the priority queue according to qos pql pql-index protocol
the network layer protocol protocol-name queue-option queue {
top | middle | normal | bottom }
Delete the classification policy in the undo qos pql pql-index protocol
priority queue protocol-name queue-option queue {
top | middle | normal | bottom }
queue-option Meaning
Empty All IP packets can be processed into queue
acl acl-number (1∼199) All IP packet fragments can be processed into
priority queue
fragments IP packets defined by theacl-number (normal) can
be processed into priority queue
greater-than bytes (0∼65535) IP packet with a length less than a certain value can
be processed into queue
less-than bytes (0∼65535) IP packet with a length greater than a certain value
can be processed into queue
tcp port (0∼6553) With the source or destination TCP port of IP packet
being the specified port, the packet can be
processed into queue.
udp port (0∼65535) With the source or destination UDP port of IP
packet being the specified port, the packet can be
processed into priority queue.
Operation Command
Configure the priority-list queuing qos pql pql-index inbound-interface
according to the interface interface-type interface-number
queue { top | middle | normal |
bottom }
688 CHAPTER 49: CONGESTION MANAGEMENT
Operation Command
Configure the default priority-list queuing qos pql pql-index default-queue { top
| middle | normal | bottom }
Recover the default priority of the priority undo qos pql pql-index default-queue
queue
Multiple policies may be defined for the group of the priority queues, which is
then applied to an interface. When the data packet arrives at the interface, the
data packet is matched by the system according to the configured policy. The data
packet is inputted into the specified queue if it matches with the policy. If the data
packet does not match with any policy, it is inputted into the default priority
queue. If the default priority queue is not configured, the default priority queue
group is 16 with the priority level as normal.
Operation Command
Apply the priority-list queuing group on qos pq pql pql-index
the interface
Cancel applying the priority-list queuing undo qos pq
group on the interface
Operation Command
Configuring Congestion Management 689
Configure the queue length of the qos pql pql-index queue { top |
priority-list queuing middle | normal | bottom }
queue-length queue-length
Recover the default value of the priority undo qos pql pql-index queue { top |
queue length middle | normal | bottom }
queue-length
queue-length is the queues lengths of the 4 priority levels. They range 1 to 1024
packets.
The default length of each priority queue is shown in the following table:
Queue Length
top 20
middle 40
normal 60
bottom 80
Operation Command
Display the priority queue configuration display qos pql [ interface type
conditions and statistic information of the number ]
interface
Display the content of the priority list display qos pql
Multiple custom queues can be configured, and the data packet will be matched
by the system according to the specified sequence order in the policy list. If it is
found that the data packet is matched with a policy, the entire searching process
comes to an end.
Table 729 Configure the Custom Queue According to the Network Layer Protocol
Operation Command
Configure the custom queue according to qos cql cql-index protocol
the network layer protocol protocol-name queue-option queue
queue-number
Delete the classification policy in the undo qos cql cql-index protocol
custom queue protocol-name queue-option queue
queue-number
Among them, cql-index is the group number of the custom queue; queue-number
is the queue number with the value ranging 0 to 16. protocol-name may be ip,
and the value range of queue-option is the same as that of the priority queue.
Operation Command
Configure the custom-list queuing qos cql cql-index inbound-interface
according to the interface interface-type interface-number
queue queue-number
Delete the policy in the custom queue undo qos cql cql-index
inbound-interface interface-type
interface-number
Configure the default custom-list queuing The data packets that are not
matched with any policy in the custom queue will be allocated to the default
custom queue.
Operation Command
Configure the default custom-list queuing qos cql pql-index default-queue
queue-number
Recover the default queue number of the undo qos cql pql-index default-queue
custom-list queue
Multiple policies can be defined for the group of the custom-list queues, which is
then applied to an interface. When the data packet arrives at the interface, the
data packet is matched by the system according to the configured policy, and the
data packet is input to the specified custom queue if it matches with the policy. If
the data packet does not match with any policy, it is input to the default queue. If
the default custom-list queue is not configured, the priority level is normal.
Configuring Congestion Management 691
To put the custom-list queue into operation, the configured custom-list queue
must be applied to the specific interface. Every interface can only use one custom
queue, but one custom queue can be applied to multiple interfaces. Multiple
different custom queues may be established to apply to different interfaces.
Operation Command
Apply the custom-list queuing group on qos cq cql cql-index
the interface
Cancel the application of the custom-list undo qos cq
queuing group on the interface
The queue length of each priority queue (the maximum number of the data
packets that can be accommodated) can be specified.
Operation Command
Configure the queue length of the qos cql cql-index queue queue-number
custom-list queuing queue-length queue-length
Recover the default value of the undo qos cql cql-index queue
custom-list queue length queue-number queue-length
By default, the length of the custom-list queue is 20, and the range of the value is
1 to 1024.
The number of bytes of the continuously transmitted packets (the total number of
the accommodated bytes) may be specified for each custom queue.
Table 734 Configure the Number of the Continuously Transmitted Bytes of the Custom
Queuing
Operation Command
Configure the number of the continuously qos cql cql-index queue queue-number
transmitted bytes of the custom queuing serving byte-count
Recover the default value of the undo qos cql cql-index queue
continuously transmitted bytes of the queue-number serving
custom queuing
byte-count: When the router dispatches the user queue of CQ, it continuously
extracts and sends the data packets from this queue, until the number of the
transmitted bytes is not less than the byte-count value configured for this queue
or the queue is empty, the next user queue of CQ is to be transmitted. Therefore,
the byte-count value will affect the proportional relationship of the occupied
interface bandwidth between various user queues of CQ, and determine how long
the router will dispatch the next queue of CQ.
If the byte-count value is too small, the router will go to the next queue after at
least one data packet is transmitted, and the bandwidths allocated to various
queues may be far from the expected result. If the byte-count is too large, it may
cause the too long delay of the switching between the queues.
Operation Command
Display the custom queue configuration display qos cql [ interface type
conditions and statistic information of the number ]
interface
Display the content of the custom list. display qos cql
Configuring WFQ To configure weighted fair queuing, perform the following configurations in the
interface view.:
■ Configuring Weighted fair queuing
■ Displaying and debugging the weighted fair queue
Operation Command
Configure the weighted fair queuing qos wfq [ queue-length
max-queue-length [ queue-number
total-queue-number ] ]
Recover the default queue congestion undo qos wfq
management policy of the interface
Operation Command
Display the custom-list queue display qos wfq [ interface type
configuration conditions and statistic number ]
information of the interface
Congestion Management Configuration Examples 693
Congestion
Management
Configuration
Examples
PQ Configuration
Example
1 Define the access control table, and allow the packets from 10.10.0.0 network
segment to pass through.
[Router]acl 1
[Router-acl-1]rule permit source 10.10.0.0
2 Define one policy for the group 1 of the priority queue: The IP packet that meets
the acl-number value being 1 is inputted into the queue with the priority level of
top.
[Router] qos pql 1 protocol ip acl 1 queue top
3 Set the length of the group 1 top queue of the priority queue to 10, while the
lengths of other queues utilize the default values.
[Router] qos pql 1 queue top queue-length 10
4 Apply the priority queue 1 to Serial 0.
[Router-Serial0] qos pq pql 1
5 One policy is defined for the group 2 of the priority queue, so that all the IP
packets from the Serial 1 interface are inputted into the queue with the priority
level of middle.
[Router] qos pql 2 inbound-interface serial 0 queue middle
6 Apply the priority queue 2 to Serial 1.
[Router-Serial0] qos pq pql 2
CQ Configuration Establish two parallel Tunnel channels (encapsulated GRE) that correspond to the
Example same physical line in WAN. The proportional allocation of the physical line
bandwidth should be implemented for the services on both tunnels.
694 CHAPTER 49: CONGESTION MANAGEMENT
PC1:10.1.3.10 PC2:10.1.5.10
PC3:10.1.4.10 PC4:10.1.6.10
1 Configure Router A
[RouterA]acl 105
[RouterA-acl-105]rule normal permit ip source 10.1.4.0 0.0.0.255
destination 10.1.5.0 0.0.0.255
[RouterA-acl-105] rule normal deny ip source any destination any
[RouterA-acl-105]acl 107
[RouterA-acl-107] rule normal permit ip source 192.168.0.2 0.0.0.0
destination 192.168.0.1 0.0.0.0
[RouterA-acl-108]rule normal permit ip source 192.168.1.2 0.0.0.0
destination 192.168.1.1 0.0.0.0
a Configure the CQ queue
[RouterA] qos cql 1 queue 1 queue-length 100
[RouterA] qos cql 1 queue 1 serving 5000
[RouterA] qos cql 1 queue 2 queue-length 100
[RouterA] qos cql 1 queue 2 serving 1000
[RouterA] qos cql 1 protocol ip acl 107 queue 1
[RouterA] qos cql 1 protocol ip acl 108 queue 2
b Configure Serial0 master/slave addresses
[RouterA-Serial0] ip address 192.168.0.1 255.255.255.252
[RouterA-Serial0] ip address 192.168.1.1 255.255.255.252 sub
c Apply the CQ queue 1 to Serial0
[RouterA-Serial0] qos cq cql
d Configure Tunnel0
[RouterA-Tunnel0] ip address 10.1.1.1 255.255.255.0
[RouterA-Tunnel0] source 192.168.0.1
[RouterA-Tunnel0] destination 192.168.0.2
e Configure Tunnel1
[RouterA-Tunnel1] ip address 10.1.7.1 255.255.255.0
[RouterA-Tunnel1] source 192.168.1.1
[RouterA-Tunnel1] destination 192.168.1.2
2 Configure Router B
a Configure the access control list
[RouterB]acl 105
Congestion Management Configuration Examples 695
WFQ Configuration
Example
1 Configure a WFQ queue with congestion discard threshold as 64 packets and 512
dynamic queues.
[Router] interface ethernet 0
[Router-Ethernet0] qos wfq queue-length 64 queue-number 512
696 CHAPTER 49: CONGESTION MANAGEMENT
50 CONGESTION AVOIDANCE
Congestion Avoidance The purpose of the congestion avoidance technology is to monitor the network
Overview traffic flow, predict the congestion and effectively prevent the congestion
occurring at the bottleneck of the network. In a number of the congestion
avoidance mechanisms, Random Early Detection (RED) technology is widely used.
Excessive congestion can create damage on the network resource, and measures
must be taken to avoid it. Here, the so-called congestion avoidance refers to a
traffic control mechanism that, by monitoring the usage of the network resources
(such as the queue or memory buffer), removes the network overload by dropping
packets on its own initiative to adjust the network traffic in case of the network
congestion.
Compared to the end-to-end flow control, steam control here has wide-range
meaning, it affects more service steam load in the router. Of course, when the
router discards the packet, it does not reject the cooperation with the flow control
action, such as the TCP flow control, of the source end, so as to adjust the traffic
of the network to a rational load status in a more efficient way. The combination
of a good drop policy and source end flow control mechanism always pursue the
maximization of the network throughput and service efficiency and the
minimization of the packet drop and delay.
Traditional Drop Policy The traditional drop policy utilizes the tail-drop method. The tail-drop applies to all
the traffic flow. It can not distinguish the service level. During the occurrence of
the congestion, the data packet of the queue tail will be dropped, until the
congestion is settled.
The host running the TCP protocol responds to numerous drops by reducing the
packet transmission rate. When the congestion is cleared, the transmission rate of
the data packet is increased. In this way, tail-drop can cause the TCP Global
Synchronization. When the queue drops multiple TCP packets simultaneously, it
causes multiple TCP connections to come into congestion avoidance and slow
startup states simultaneously, and reduces and adjusts the traffic at the same time,
then the traffic peak occurs as the same time as the reduction of the congestion,
698 CHAPTER 50: CONGESTION AVOIDANCE
and it causes the sudden increase and decrease of the network traffic, and the line
traffic always fluctuates between the states of few or none and full.
RED and WRED RED and WRED can avoid global synchronization of TCP by dropping packets
randomly. When the packets of a TCP connection are dropped, and transmission
slows down, other TCP connections can still send packets at high rates, thus
improving the utilization of the bandwidth.
RED and WRED avoids the TCP global synchronization phenomenon through the
random drop packets--when the packet of a TCP connection is dropped and the
transmission speed is reduced, other TCP connections still have the higher
transmission speeds. Thus, it is always the case that some TCP connection
performs the faster transmission, increasing the use ratio of the line bandwidth.
Both RED and WRED compare between the queue length, and minimum and
maximum thresholds, to perform the drop (this is to set the absolute length of the
queue). It will cause the unfair treatment on the burst data flow and be
disadvantageous for the transmission of the data flow. Therefore, when
comparing the minimum and maximum thresholds, and when dropping, the
average lengths of the queue are adopted (this is to set the relative value of the
comparison between the queue threshold and the average length). The average
length of the queue is the result of the low pass filtering of the queue length, it
reflects the variation trend of the queue, and is not sensitive to the burst change
of the queue length, so as to avoid the unfair treatment on the burst data flows.
The relationship between WRED and queue mechanism is shown in Figure 223
Figure 223 Schematic diagram of the relationship between WRED and queue mechanism
¡- ¡- ¡- ¡-
classify queueN-1 weightN-1 transmit
scheduler queue
queueN weightN
Discarded
packets
In the RED class algorithm, a pair of minimum threshold and maximum threshold is
set for each queue, and the following specification is set:
■ When the length of the queue is less than the minimum threshold, no packet is
dropped.
■ When the length of the queue is larger than the maximum threshold, all
incoming packets are dropped.
WRED Configuration 699
■ When the length of the queue is between the minimum threshold and
maximum threshold, the WRED algorithm is used to calculate and determine
whether the packet is dropped. The specific method is that each incoming
packet is allocated with a random number, which is compared with the drop
probability of the current queue, if it is larger than the drop probability, the
packet is dropped. The longer the queue is, the higher the drop probability
is--but there is a maximum drop probability.
When WRED and WFQ is cooperated, the flow based WRED can be implemented.
During the classification, different flows have their own queues, for the flow with
small traffic, as its queue length is always smaller, the drop probability will be
smaller, too. However, as the flow with large traffic will have larger queue length,
more packets are discarded, protecting the benefit of the flow with smaller traffic.
Different from RED, the random number generated by WRED is based on the IP
priority, it considers the benefit of the high priority packets, and relatively reduce
the drop probability of the high priority packets. The 3Com router takes WRED as
its congestion avoidance policy.
Enable the WRED WRED must first be enabled, and then other parameters related to WRED can be
Function of the Interface configured.
Operation Command
Enable the WRED function of the interface qos wred
Disable the WRED function on the undo qos wred
interface
By default, the system disables WRED so the queue avoids congestion by using the
tail-drop policy.
WRED can only operate with WFQ, and cannot be used separately or coperated
with other queue. Therefore, before the startup of WRED, WFQ must have been
applied to the interface.
Enabling WRED can be effective only in all physical interfaces, while this command
is ineffective in the logic interface.
Configure Weight Please perform the following configurations in the interface view.
Factors when Table 739 Configure the WRED Weighted Factor for Calculating the WRED Average
Calculating WRED Queue Length
Average Queue Length
Operation Command
700 CHAPTER 50: CONGESTION AVOIDANCE
Configure the WRED weighted factor for qos wred weighting-constant exponent
calculating the WRED average queue
length.
Recover the default value of the WRED undo qos wred weighting-constant
weighted factor for calculating the WRED
average queue length.
exponent is the filtering coefficient for calculating the average queue length, and
the range of the value is 1 to 16, and the default value is 9.
When exponent=0 and the queue length exceeds the threshold, WRED will act
accordingly. When exponent is higher, WRED will act slowly to the change of
queue status.
This configuration should be performed after enabling WRED in the interface view.
Set the Priority You can set WRED drop lower threshold value, upper threshold value, and drip
Parameters for WRED probability denominator according to packet priority. The reciprocal value of the
denominator discard-prob will be taken as the maximum drop probability. The
system will handle the queues according to the length of the queues.
■ If the queue length is lower than the low-limit, no packet will be dropped.
■ If the queue length is between low-limit and high-limit, the drop probability
will increase with the queue length till it is almost equal to the reciprocal value
of discard-prob.
■ If the queue length is equal to or greater than high-limit, all the packets will be
dropped.
Table 740 Configure the Related Parameters for the Packets of Specific IP Priority
Operation Command
Configure the related parameters for the qos wred ip-precedence ip-precedence
packets of specific IP priority low-limit low-limit high-limit
high-limit discard-probability
discard-prob
Recover the default values of the related undo qos wred ip-precedence
parameters for the packets of specific IP ip-precedence
priority
low-limit and high-limit are the minimum and maximum thresholds respectively.
The default values are 10 and 30 respectively, and the range of the value is 1 to
1024.
discard-prob is the drop probability denominator and its default value is 10. The
reciprocal of discard-prob will be the maximum drop probability. The range of this
parameter is 1 to 255.
It should be noted that this configuration can only be performed after WRED is
enabled in interface view.
Displaying and Debugging Congestion Avoidance 701
Congestion Avoidance
Configuration
Example
1 Configure a WFQ queue.
[Router] interface ethernet 0
[Router-Ethernet0] qos wfq
2 Enable WRED.
[Router-Ethernet0] qos wred
3 Configure the exponent to calculate the average WRED queue length.
[Router-Ethernet0] qos wred weighting-constant 1
4 Configure the lower threshold, upper threshold, and drop probability denominator
of the WRED queue with precedence 0 to be 10, 1024 and 30 respectively.
[Router-Ethernet0] qos wred ip-precedence 0 low-limit 10 high-limit
1024 discard-probability 30
702 CHAPTER 50: CONGESTION AVOIDANCE
XII DIAL-UP
■ DCC Overview
■ Configuring DCC
■ Displaying and Debugging DCC
■ DCC Configuration Examples
■ Troubleshooting DCC
DCC Overview Dial Control Center (DCC) is the routing technique adopted when the routers
interconnect via a PSTN (Public Switched Telephone Network) or ISDN (Integrated
Services Digital Network). In DCC, the routers are interconnected through PSTN.
The connections are established through dialing when data transmissions are
required. A DCC dialing is required to set up a link for transmitting information.
When the link becomes idle, the link established by DCC will be automatically
disconnected.
Frame Relay network through a leased line. To reduce the cost, you can adopt
frame relay over ISDN to access the frame relay network through ISDN line.
Meanwhile, ISDN network can act as the backup of frame relay network.
Terms in DCC The following terms are commonly used in DCC configurations:
Configuration ■ Physical interface: The physical interface that actually exists, like the serial, BRI,
asynchronous, and AM interfaces.
■ Dialer interface: Logical interface set for configuring DCC parameters. A
physical interface can inherit the DCC configuration after it is bound to the
dialer interface.
■ Dial interface: A general term describing an interface for dialup connection. It
can be a dialer interface, a physical interface bound to the dialer interface, or a
physical interface directly configured with DCC parameters.
706 CHAPTER 51: CONFIGURING DCC
DCC Configuration 3Com routers provide two DCC configuration methods: circular DCC, and
Methods resource-shared DCC. With distinguishing features, these two methods are
applicable to different applications. In applications, the participating parties of a
call can flexibly select either method as needed. In other words, one party can
adopt circular DCC while the other party adopt resource-shared DCC to originate
a call.
Circular DCC
Circular DCC has the following features:
■ A logical dial (dialer) interface can use the services provided by multiple physical
interfaces (such as Serial0). However, a physical interface can only belong to
one dialer interface. That is, a physical interface can only provide one type of
dial service.
■ The user can either bind a physical interface to a dialer interface for inheriting
the DCC parameters by assigning it to a dialer circular group, or directly
configure DCC parameters on the physical interface.
■ All the physical interfaces served for the same dialer circular group inherit the
attributes of the same dialer interface.
■ Through configuring the dialer route command, a dialer interface can be
associated with multiple dialing destination addresses. Through configuring the
dialer number command, however, a dialer can only be associated with one
dialing destination address.
In addition, all the B channels on an ISDN BRI interface inherit the configuration of
this physical interface, and the dial route will become more complicated as the
network grows and more protocols are supported. Therefore, the application of
circular DCC is restricted due to the static binding between the dialing destination
addresses and the physical interface configuration.
Figure 224 Association between the physical interfaces and dialer interfaces in Circular
DCC
Physical Dialer
interfaces interfaces
dialer number
Serial0 Destination A
Dialer1
Bri1
Serial2
dialer route
Async0 Destination C
As shown in Figure 224, in the case that dialer interfaces are used, a physical
interface can only belong to one dialer interface, but each dialer interface can
DCC Overview 707
associate with multiple destination addresses. Each dialer interface can contain
multiple physical interfaces. In addition, a physical interface does not necessarily
belong to any dialer interface, and can directly route to one or multiple destination
addresses.
As shown in Figure 224, physical interfaces Serial1, Bri0 and Serial2 belong to
Dialer2, and on Dialer2 there are the maps of the string dialed and destination
addresses.
Resource-Shared DCC
Compared to circular DCC, resource-shared DCC is simpler, and is more flexible due to
the separation of logical and physical configurations. Specifically, resource-shared DCC
has the following features:
■ Separate the configuration of physical interfaces from the logical configuration
required for calls and then dynamically binds them. Thus, a physical interface
can provide services for various dial applications.
■ A dialer interface only associates with a dialing destination address, which is
specified in the dialer number command.
■ Each logical dial (dialer) interface can use the services provided by multiple
physical interfaces, and each physical interface can serve multiple dialer
interfaces at the same time.
■ Dial attributes are described based on RS-attributes set in implementing
resource-shared DCC. All the calls originated to the same destination network
use the same RS-attribute set (including the parameters like dialer interface,
dialer bundle, physical interface).
■ Resource-Shared DCC parameters cannot be directly configured on a physical
interface. The physical interface can implement resource-shared DCC only after
it is bound to a dialer interface.
■ The figure below shows the association of the physical interfaces, dialer
bundles and dialer interfaces in resource-shared DCC
Figure 225 Association of the physical interfaces, dialer bundles and dialer interfaces in
Resource-Shared DCC
Physical Dialer
Dialer interfaces interfaces
bundle3
Serial0 dialer number
Dialer1 Destination A
Bri0
Dialer Bri1
dialer number
bundle2 Destination B
Dialer2
Bri2
As shown in Figure 225, a physical interface can belong to multiple dialer bundles
and hence serve multiple dialer interfaces, but each dialer interface associates with
only one destination address. Each dialer interface can use only one dialer bundle
that contains multiple physical interfaces having different priorities.
In Figure 225, Dialer2 uses Dialer bundle2, and physical interfaces Bri0, Bri1 and
Bri2 are members of Dialer bundle2. These physical interfaces have different
priorities. Suppose that Bri0 in Dialer bundle2 is assigned with the priority 100,
Bri1 with 50, and Bri2 with 75. Since the priority of Bri0 is higher than that of Bri1
and Bri2, Bri0 will be selected first when Dialer2 selects a physical interface from
Dialer bundle2.
DCC Features Available 3Com routers provide flexible and practical dial interface solutions, as described in
with 3Com Routers the following sections.
3Com routers provide the PPP callback and ISDN caller identification callback
features. The PPP callback conforms to and can be adopted to a RFC1570 system
regardless of whether the client and server own fixed network addresses, or that
the client accepts the network address that is dynamically assigned.
Configuring DCC 709
Configuring DCC Configuring DCC includes tasks that are described in the following sections:
■ Configuring DCC Prepared Parameters
■ Configuring Circular DCC
■ Configuring Resource-Shared DCC
■ Configuring MP Binding for DCC
■ Configuring PPP Callback
■ Configuring ISDN Caller Identification Callback
■ Configuring Special DCC Functions
■ Configuring Attributes of DCC Dial Interface
Configuring DCC Regardless of which method is used, circular DCC or resource-shared DCC, the
Prepared Parameters following two basic DCC configuration tasks should be performed:
■ Configuring the mode of the physical interface
■ Configuring link layer and network and routing protocols on the interface
710 CHAPTER 51: CONFIGURING DCC
Operation Command
Configure a synchronous/asynchronous physical-mode { async | sync }
serial interface to work in asynchronous or
synchronous mode
Configure the asynchronous serial modem [ in | out | auto-answer ]
interface to work in dial mode
Configuring link layer and network and routing protocols on the interface
Set the link layer protocol in dial interface (physical or dialer interface) view
through the link-protocol command, configure an IP or IPX address for the dial
interface through the ip address or ipx network command, and perform other
configurations in system view.
Table 743 Configure Link Layer and Network and Routing Protocols on the Interface
Operation Command
Set a link layer protocol on the dial link-protocol
interface linklayer-protocol-type
Configure an IP address for the dial ip address ipaddress mask
interface
Activate IPX ipx enable ipx-address
Configure an IPX address for the dial ipx network network-number
interface
Configure IPX static route ipx route network.node tick ticks hop
hops [ preference value]
Configure RIP route protocol rip
Configure OSPF route protocol ospf [ enable ]
Configure BGP route protocol bgp as-number
becomes the same as that on the Dialer interface, which allows the same B
channel to be used by different link layer protocols, improving flexibility. When the
B channel is disconnected, the encapsulation protocol on the ISDN interface will
be automatically restored to PPP.
To enable DCC to originate a call normally, the user must configure a DCC dialer
ACL and associate the corresponding interface (physical or dialer interface) to the
dialer ACL through the dialer-group command. Otherwise, DCC cannot
normally renominate a call. The user can either directly configure the conditions
for filtering packets in the DCC dialer ACL, or reference the filtering rules in an
ACL.
Operation Command
Configure a DCC dialer ACL dialer-rule dialer-group {
protocol-name { permit | deny } | acl
acl-number }
Delete the DCC dialer ACL undo dialer-rule dialer-group
Configure a access control group for the dialer-group dialer-group
dial interface
Remove the dial interface from the undo dialer-group
specified access control group
Create and enter a ACL acl acl-number
Configure a standard ACL rule [ normal | special ] { deny |
permit } source { any | source-addr [
source-wildcard-mask ] }
Configure an extended ACL rule [ normal | special ] { deny |
permit } { tcp | udp } source { any
| source-addr source-wildcard-mask }
source-port [ operator port-number ]
destination { any | destination-addr
destination-wildcard-mask }
destination-port [ operator
port-number ] [ log ]
By default, neither DCC dialer ACL, nor the access control group assigned with a
dial interface is configured.
712 CHAPTER 51: CONFIGURING DCC
Configuring Circular DCC If Circular DCC is used, each physical interface can either be directly configured
with the DCC parameters, or bound to a dialer interface to inherit the DCC
parameters through a dialer circular group. Between these two options,
configuring the DCC parameters directly on a physical interface is only applicable
for a single interface to originate calls to one or more remote ends. However, a
dialer circular group is also applicable for multiple interfaces to originate calls to
one or more remote ends in addition to that.
Depending on the network topology and DCC dialing demands, such as one
interface or multiple interfaces can both originate and receive calls, the user can
flexibly use one configuration or the combination of several configurations in the
Circular DCC configurations introduced below.
In the circular DCC implementation of DCC, the two dial parties can configure
Password Authentication Protocol (PAP) or Challenge-Handshake Authentication
Protocol (CHAP) authentication. However, the other party must configure
authentication if one party has done that. For security of the dialing ID, you should
configure authentication in actual networking applications. For configuration
methods, see the section in Operation Manual - Link Layer Protocol and note the
following items at the same time:
■ At the sending side, if DCC is directly enabled on the physical interface, directly
configure PAP or CHAP authentication on the physical interface. If DCC is
enabled through a dialer circular group, configure PAP or CHAP authentication
on the dialer interface.
■ When configuring PAP or CHAP authentication at the receiving end, the user is
recommended to make the configuration on both physical and dialer
interfaces. That is because the physical interface will first implement PPP
negotiation and authenticate the validity of the dialing user when receiving a
DCC call request, and then deliver the call to the upper layer DCC module for
processing.
if1
Local end if0 Remote end
(Single interface) (Single interface)
As shown in this figure, the single local interface interface0 (if0) originates a DCC
call to the single remote interface if1. Since the call originates at a single remote
end the dialer string can be configured using the dialer number or dialer route
command. When the call originates from the single interface at the local end, the
dialer circular group can be used to configure the DCC. The user can choose to
configure either PAP or CHAP authentication on the interface.
Operation Command
Enable Circular DCC dialer enable-circular
Configure a dialer number for calling a dialer number [ dial-number ]
remote end
Delete the dialer number for calling the undo dialer number
remote end
By default, Circular DCC is enabled on ISDN BRI and PRI interfaces, but disabled on
other interfaces (serial, asynchronous, AUX, etc.) and the user should manually
configure the dialer enable-circular command. No dialer number for calling
the remote end is configured by default.
if1
Local end if0 Remote end A
(Single interface) (Single interface)
Router Router
714 CHAPTER 51: CONFIGURING DCC
As shown in this figure, the single local interface interface0 (if0) receives a DCC
call from a single remote interface if1. Since the call is received by a single local
interface, the dialer circular group can be used to configure DCC. You can choose
to configure either PAP or CHAP authentication.
Table 746 Configure a local interface to receive calls from a remote interface
Operation Command
Enable Circular DCC dialer enable-circular
By default, Circular DCC is enabled on ISDN BRI and PRI interfaces, but disabled on
other interfaces (serial, asynchronous, AUX, etc.) and you should manually
configure the dialer enable-circular command.
if1
Remote end A
Single/Multiple interface(s)
Router
if0 if2
Local end Remote end B
(Single interface) Single/Multiple interface(s)
Router Router
if3
Remote end C
Single/Multiple interface(s)
Router
As shown in the above figure, a single local interface interface0 (if0) originates
DCC calls to the remote interfaces if1 and if2. Since calls are originated to multiple
remote ends, the user must use the dialer route command to configure the
dialer numbers and destination addresses. Since the calls originate from a single
local interface, the dialer circular group can be used to configure DCC. The user
can select to configure either PAP or CHAP authentication.
Table 747 Configure a Local Interface to Originate Calls to Multiple Remote Ends
Operation Command
Enable Circular DCC dialer enable-circular
Configure destination address(es) and dialer route protocol
dialer number(s) for calling one or more next-hop-address dial-number
remote ends
Configuring DCC 715
By default, Circular DCC is enabled on ISDN BRI and PRI interfaces, but disabled on
other interfaces (serial, asynchronous, AUX, etc.) and the user should manually
configure the dialer enable-circular command. No dialer numbers for calling
the remote ends are configured by default.
Remote end C
if4
Single/Multiple interface(s)
Router
As shown in this figure, the single local interface interface0 (if0) receives DCC calls
from the remote interfaces if1 and if4. Since the local end is a single interface, the
dialer circular group can be used to configure DCC. The user can select to
configure either PAP or CHAP authentication.
Use the local-user password command to set up the user name and password
to allow for dial in the system view, and then perform other configuration steps in
the dial interface (physical or dialer interface) view.
Table 748 Configure a Local Interface to Receive Calls from Multiple Remote Ends
Operation Command
Enable Circular DCC dialer enable-circular
By default, circular DCC is enabled on ISDN BRI and PRI interfaces, but disabled on
other interfaces (serial, asynchronous, AUX, etc.) and the user should manually
configure the dialer enable-circular command. No authentication
parameters or dial-in user information are configured by default.
if1
Remote end A
Single/Multiple interface(s)
Router
if0
if2 Remote end B
Local end if1
(Multiple interfaces) Single/Multiple interface(s)
Router if2 if3
Router
Remote end C
Single/Multiple interface(s)
Router
As shown in Figure 230, the local interfaces interface0 (if0), if1, and if2 originate
DCC calls to the remote interfaces if1, if2 and if3. For allowing calls to originate
from multiple remote ends, the user must use the dialer route command to
configure the dialer strings and destination addresses. For the calls to originate
from multiple interfaces, the dialer circular group must be used to configure DCC.
The user can select to configure either PAP or CHAP authentication.
Instead of using their own IP addresses, the physical interfaces in the dialer circular
group will use the IP address of the dialer interface in making the calls. The
argument number of the dialer circular-group number command configured
in physical interface view must be the same as the number used in the interface
dialer number command configured in the view of the dialer interface to
properly associate the physical interface. ISDN BRI or PRI interface is regarded as
the dialer circular group for the B channels connected through either of these
interfaces. At the same time, they can be regarded as the physical interfaces by
other dialer circular groups.
Use the interface dialer command to create a dialer interface in global view,
add it to the specified dialer circular group through the dialer circular-group
command, and perform other configuration processes in dialer interface view.
Table 749 Configure Multiple Local Interfaces to Originate Calls to Multiple Remote Ends
Operation Command
Enable Circular DCC dialer enable-circular
Configure the destination address(es) and dialer route protocol
the dialer number(s) for calling one (or next-hop-address dial-number
more) remote end(s).
Delete the destination address(es) and undo dialer route protocol
dialer number(s) for calling one (or more) next-hop-address
remote ends.
Create a dialer interface and enter the interface dialer number
dialer interface view.
Delete the existing configurations of the undo interface dialer number
dialer interface
Bundle a physical interface with the dialer circular-group number
specified dialer circular group
Remove the physical interface from the undo dialer circular-group
specified dialer circular group
Configure the priority of the physical dialer priority priority
interface in the dialer circular group.
Restore the default priority of the physical undo dialer priority
interface in the dialer circular group.
Configuring DCC 717
By default, circular DCC is enabled on ISDN BRI and PRI interfaces, but disabled on
other interfaces (serial, asynchronous, AUX, etc.) and the user should manually
configure the dialer enable-circular command. In addition, when no dialer
interface is created, the physical interface does not belong to any dialer circular
group, and the default priority is assigned to physical interface 1, and this is added
to a dialer circular group.
Figure 231 Multiple interfaces receiving calls from multiple remote ends
if0 Router
if2
Local end if1 Remote end B
(Multiple interface) Single/Multiple interface(s)
Router if2 Router
if3
As shown in Figure 231, the local interfaces interface1 (if0), if1, and if2 receive
DCC calls from the remote interfaces if1, if2 and if3. Since the local end is multiple
interfaces, the dialer circular group must be used to configure DCC. The user can
select to configure either PAP or CHAP authentication.
Use the local-user password command to configure the user name and
password permitted to dial in system view, and perform other configurations in
dial interface (physical or dialer interface) view.
Table 750 Configure Multiple Local Interfaces to Receive Calls From Multiple Remote Ends
Operation Command
Enable Circular DCC dialer enable-circular
Create a dialer interface and enter the dialer
interface dialer number
interface view
Delete the existing configuration of the dialer
undo interface dialer number
interface
Add a physical interface to the specified dialer
dialer circular-group number
circular group
Delete the physical interface from the specified
undo dialer circular-group
dialer circular group
By default, circular DCC is enabled on ISDN BRI and PRI interfaces, but disabled on
other interfaces (serial, asynchronous, AUX, etc.) and the user should manually
configure the dialer enable-circular command. If no dialer interface is
created then by default, the physical interfaces do not belong to any dialer circular
group.
718 CHAPTER 51: CONFIGURING DCC
Configuring Each RS-attribute set consists of a dialer interface, the attributes of the interface,
Resource-Shared DCC and a dialer bundle. Specifically,
■ Only one dialer number can be defined for a dialer interface. Since this dialer
number has its own dial attributes set, all the calls originated by dialing this
number can use the same DCC attribute parameters (such as dialing rate).
■ Each dialer interface can use only one dialer bundle, which contains multiple
physical interfaces of different priorities. However, each physical interface can
be used by different dialer bundles. For an ISDN BRI or PRI interface, the user
can set the number of B channels that will be used through setting dialer
bundles.
■ All the calls aimed to the same destination segment use the same RS-DCC set.
Figure 232 Multiple interfaces placing calls to multiple remote ends in the
Resource-Shared DCC implementation
Physical interface
if1
groups Remote end A
Local end
Single/Multiple interface(s)
(multiple interfaces)
Call Router
Remote end A Dialer0
if2 Remote end B
Call Dialer1 Single/Multiple interface(s)
Remote end B Router Router
if3
Call Dialer2
Remote end C Remote end C
Single/Multiple interface(s)
Router
As shown in Figure 232, different dialer interfaces are used for placing calls to
different remote ends. (That is, one dialer interface only corresponds to one
remote end.) Through adding a physical interface to the bundle of some dialer
interfaces, the interface can originate calls as needed.
Operation Command
Disable Circular DCC undo dialer enable-circular
Enable Resource-Shared DCC and dialer bundle number
configure the dialer bundle used by Dialer
interface
Disable Resource-Shared DCC and delete undo dialer bundle
the dialer bundle.
By default, circular DCC has been enabled on ISDN BRI and PRI interfaces, so you
need to configure the undo dialer enable-circular command when enable
resource-shared DCC. Circular DCC has been disabled on other interfaces (serial,
asynchronous, AUX, etc). Resource-shared DCC are disabled by default, and no
dialer bundle is created.
Use the interface dialer command to create a dialer interface in system view,
then perform other configurations in dialer interface view.
Operation Command
Create a dialer interface, and enter the interface dialer number
dialer interface view
Delete the existing configuration of the undo interface dialer number
dialer interface
Configure a dialer number for calling a dialer number dial-number
remote end
Delete the dialer number for calling a undo dialer number
remote end
Table 753 Create a Dialer Bundle and Assigning the Physical Interfaces to it
Operation Command
Add a physical interface to the specified dialer bundle-member number [
dialer bundle priority priority ]
Delete the physical interface from the undo dialer bundle-member number
dialer bundle
By default, no dialer bundle is created, and the physical interfaces do not belong
to any dialer bundle. If a physical interface is assigned to a dialer bundle, a default
priority of 1 is assigned.
Use the dialer user command in dialer interface view then use the local-user
password command in the system view to perform other configuration steps in
dial interface (physical or dialer interface) view.
Table 754 Configure Multiple Interfaces to Receive Calls From Multiple Remote Ends
Operation Command
Configure the remote user name dialer user username
When PPP is encapsulated on a Dialer interface, the remote user name gained
through PPP authentication procedure will determine the Dialer interface for
receiving calls, then the command dialer user is a must and the command
dialer number is optional. While Frame Relay is encapsulated on a Dialer
interface, because of no username negotiation procedure, the called end will
distinguish Dialer interfaces according to the received number dialed by calling
end, hence the command dialer user is optional and the command dialer
number is a must.
Configuring DCC 721
Configuring MP Binding In DCC applications, the user can configure a traffic threshold for links. Setting the
for DCC traffic threshold to 0 means that the max bandwidth of all the channels is enabled
and there is no flow control. If the traffic threshold is in the range 1 to 100, MP
binding will adjust the allocated bandwidth by the actual traffic percentage.
Specifically, if the percentage of the actual traffic on a link to the bandwidth
exceeds the defined traffic threshold, the system will automatically enable the
second link, and implement MP binding on these two links. If the percentage of
the actual traffic on these two links to the bandwidth exceeds the defined traffic
threshold, the system will enable the third link, and implement MP binding, so on
and so forth. Thereby, an appropriate traffic can be ensured for the DCC links. On
the contrary, if the percentage of the traffic of N (which is an integer greater than
2) links to the bandwidth of N-1 links is smaller than the defined traffic threshold,
the system will automatically shutdown a link, so on and so forth. Thereby, the
utility rate of the DCC links can be kept within an appropriate range.
Operation Command
Bundle a physical interface with the dialer circular-group number
specified dialer circular group.
Set the traffic-percentage threshold for dialer threshold traffic-percentage
MP binding [ in-out | in | out ]
Restore the default traffic-percentage undo dialer threshold
threshold of MP binding (that is, no flow
control will be implemented).
Enable PPP encapsulation. link-protocol ppp
Configure MP binding on the physical ppp mp [ interface virtual-template
interface. number ]
Operation Command
Set a traffic-percentage threshold for MP dialer threshold traffic-percentage
binding [ in-out | in | out ]
Restore the default traffic-percentage undo dialer threshold
threshold of MP binding (that is, no flow
control will be implemented).
Enable PPP encapsulation link-protocol ppp
Configure MP binding on interfaces ppp mp [ interface virtual-template
number ]
Configuring PPP When configuring PPP callback, one endpoint of a connection should be
Callback configured as client, and the other endpoint as server. The calling party is the
callback client and the called party is the callback server. The client first originates
a call, and the server determines whether to originate a return call. If it determines
to do that, the callback server disconnects and then originates a return call
according to the information such as user name or callback number.
Configure PPP callback after completing the basic configuration of Circular DCC or
Resource-Shared DCC.
Operation Command
Configure PPP encapsulation link-protocol ppp
Configure the local end to send the user ppp pap local-user username password
name and password for PAP { cipher | simple } password
authentication
Configure the local user name sent to the ppp chap user username
remote end for CHAP authentication
Configure the password that the local end ppp chap password { cipher | simple }
will send to the remote end for CHAP password
authentication
Configure the user name and password local-user username password { cipher
that the remote end is allowed to dial in | simple } password
Configure the local end to be the PPP ppp callback client
callback client
Disable the local end to be the PPP undo ppp callback client
callback client
Configure the destination addresses and dialer route protocol
dial number(s) for calling one (or more) next-hop-address dial-number
remote ends
Configure the dial number for a Windows ppp callback ntstring dial-number
NT server to originate return calls to the
router
Delete the dial number that a Windows undo ppp callback ntstring
NT server needs for placing return calls to
the router
By default, the system does not enable callback function and is not configured
with any Windows NT server callback dial number.
2 Configure the PPP callback server in the circular DCC implementation
The callback server can originate a return call according to either the network
address configured in the dialer route command (PPP authentication must be
configured in this case), or the dial number configured in the local-user
callback-number command. Therefore, the user must configure either method in
the dialer callback-center command for placing the return call.
The user should configure the callback client user name in the dialer route
command, so that the callback server can authenticate whether a calling party is a
legal callback user when receiving its call requesting callback.
Use the local-user callback-number command to configure the callback user
and callback dial number in system view, and perform other configurations in dial
interface (physical or dialer interface) view.
Table 758 Implement PPP Callback (Server Configuration) in Circular DCC
Operation Command
Configure PPP encapsulation link-protocol ppp
Configure an authentication mode ppp authentication-mode { pap | chap
}
Configure the user name that the local ppp chap user username
end will send to the remote end for CHAP
authentication
Configure the password that the local end ppp chap password { cipher | simple }
will send to the remote end for CHAP password
authentication
724 CHAPTER 51: CONFIGURING DCC
Operation Command
Configure the callback user and callback local-user username callback-number
number telephone-number
Configure the local end to be the PPP ppp callback server
callback server
Disable the local end to be the PPP undo ppp callback server
callback server
Configure the PPP callback reference dialer callback-center [ user ] [
dial-number ]
Disable the callback server function of the undo dialer callback-center
router
Configure the destination address(es) and dialer route protocol
dial number(s) for calling one (or more) next-hop-address user username
remote ends dial-number
By default, the system does not enable the callback function. Once it is enabled,
the server will originate return calls according to the user name configured in the
dialer route command.
If the callback client adopts the dynamically assigned network address, the server
will be unable to use the dialer route command to configure a callback dial
number to associate with the network address. In this case, the callback client can
only use the local-user callback-number command to configure a callback dial
number to associate with the callback user name, and hence determine the
callback reference.
Operation Command
Configure the local end to be the PPP ppp callback client
callback client
Disable the local end to be the PPP undo ppp callback client
callback client
Configure the dialer number for calling a dialer number dial-number
remote end
Configure the dial number for a Windows ppp callback ntstring dial-number
NT server to originate return calls to the
router
Delete the dial number that a Windows undo ppp callback ntstring
NT server needs for placing return calls to
the router
Configuring DCC 725
By default, the system does not enable callback function and is not configured
with any Windows NT server callback dial number.
2 Configure the PPP callback server in the resource-shared DCC implementation
When resource-shared DCC are adopted to implement PPP callback, the PPP
authentication configuration at server end is the same as that of circular DCC,
except that the server in the resource-shared DCC implementation can only
originate a return call according to the dial number configured in the local-user
callback-number command. See “Configure the PPP callback server in the
circular DCC implementation” in Dial-up.
Use the local-user callback-number command to configure the callback user
and callback dial number in system view, and perform other configurations in
dialer interface view.
Table 760 Implement PPP Callback (Server Configuration) in Resource-Shared DCC
Operation Command
Configure the callback user and callback local-user username callback-number
number telephone-number
Configure the local end to be the PPP ppp callback server
callback server
Disable the local end to be the PPP undo ppp callback server
callback server
Configure the PPP callback reference dialer callback-center dial-number
Disable the callback server function of the undo dialer callback-center
router
Configuring ISDN Caller In an ISDN environment, implementing DCC callback through the ISDN caller
Identification Callback identification function requires no authentication, nor are there other
configurations requirements.
The best match for the incoming number and the dialer call-in commands is
determined on the basis of right-most matching. The character “*” in the number
represents any characters. If multiple dialer call-in commands match the
incoming number, the following rules will apply for determining the best match:
■ Primary rule: The best match is the number with the fewest “*”.
726 CHAPTER 51: CONFIGURING DCC
■ Secondary rule: The best match is the one that is found first.
Confirm which dialer call-in at server end is associated with the incoming call
■ In circular DCC, upon receiving an incoming call, the server searches for the
dialer call-in matching the incoming number in the dialer call-in
commands configured on the physical interface or the dialer interface to which
the physical interfaces belongs.
■ In resource-shared DCC, upon receiving an incoming call, the server searches
for the dialer call-in matching the incoming number in the dialer call-in
commands configured for the dialer interfaces on it.
Table 761 Implement ISDN Caller Identification Callback (Client Configuration) in Circular
DCC
Operation Command
Configure the destination addresses and dialer route protocol
dial number(s) for calling one (or more) next-hop-address dial-number
remote ends
To configure the ISDN caller identification callback server in the circular DCC
implementation perform the following configuration in dial interface (physical or
dialer interface) view.
Table 762 Implement ISDN Caller Identification Callback (Server Configuration) in Circular
DCC
Operation Command
Configure the local end to implement dialer call-in remote-number [
ISDN callback according to the ISDN caller callback ]
identification
Disable the local end to implement ISDN undo dialer call-in remote-number [
callback according to the ISDN caller callback ]
identification
Configure the destination address(es) and dialer route protocol
dial number(s) for calling one (or more) next-hop-address dial-number
remote ends
The dialer route command configured on the dial interface (physical or dialer)
at the server should be exactly the same dialer route in the dial-in dialer number.
Operation Command
Configure the dial number for calling a dialer number [ dial-number ]
remote end
Operation Command
Configure the local end to implement dialer call-in remote-number [
ISDN callback according to the ISDN caller callback ]
identification
Disable the local end to implement ISDN undo dialer call-in remote-number [
callback according to the ISDN caller callback ]
identification
Configure the dialer number for calling a dialer number [ dial-number ]
remote end
Perform the following configuration in dial interface (ISDN BRI or PRI interface)
view.
Operation Command
Configure a B channel for ISDN leased line dialer isdn-leased channel-number
connection
Delete the B channel for ISDN leased line undo dialer isdn-leased
connection channel-number
Configuring auto-dial
This function can only be used with circular DCC. With a circular DCC, after the
router is started, the DCC will automatically attempt to dial the remote end of the
connection without requiring a triggering packet. If a normal connection cannot
be established with the remote end, DCC will automatically retry at a certain
interval. Compared with the auto-dial DCC triggered by packets, such connections
728 CHAPTER 51: CONFIGURING DCC
Operation Command
Configure one (or more) remote dialer route protocol
destination address(es) and dialer next-hop-address dialer-number
number(s) that the router will auto-dial autodial
Configure an auto-dial interval dialer autodial-interval seconds
Restore the default auto-dial interval undo dialer autodial-interval
Operation Command
Configure one remote destination dialer route protocol
address(es) and dialer number(s) next-hop-address dialer-number
autodial
Configuring Attributes Circular DCC and resource-shared DCC also have some optional parameters to
of DCC Dial Interface improve configuration flexibility improve DCC efficiency, and hence satisfies
various requirements.
idle time, no the packet which complies with the “permit” statements are
transmitted over the line.
Operation Command
Configure the link idle time dialer timer idle seconds
Restore the link idle time to the default undo dialer timer idle
value
Configuring the link disconnection time before initiating the next call
After a line for DCC calls enters the down status due to faults or disconnection, a
specified period of time must be elapsed (the interval before it can originate the
next call) before a new dialup connection can be established again. Thereby, the
possibility of overloading the remote PBX can be prevented.
Table 769 Configure the Link Disconnection Time Before Initiating the Next Call
Operation Command
Configure the link disconnection time dialer timer enable seconds
before initiating the next call
Restore the link disconnection time before undo dialer timer enable
initiating the next call to the default value
Table 770 Configure the Link Idle Time When Interface Competion
Operation Command
Configure the link idle time when dialer timer compete seconds
interface competion
Restore the link idle time when interface undo dialer timer compete
competion to the default value
By default, the link idle time is 20 seconds when the interface competion occurs.
730 CHAPTER 51: CONFIGURING DCC
Operation Command
Configure the timeout of call setting up dialer timer wait-carrier seconds
Restore the timeout of call setting up to undo dialer wait-carrier
the default value
Table 772 Configure the Buffer Queue Length of the Dial Interface
Operation Command
Configure the buffer queue length of the dialer queue-length packets
dial interface
Remove the buffer queue length of the undo dialer queue-length
dial interface
Displaying and After completing the above configuration steps, execute the display command in
Debugging DCC all views to display the running of the DCC configuration, and to verify the effect
of the configuration.
Operation Command
Display the dial interface information display dialer interface [
interface-type interface-number ]
Display the statically configured or display dialer route [ detail ]
dynamically formed dial number route.
Enable DCC debugging debugging dialer { event | packet }
DCC Configuration Examples 731
DCC Configuration
Examples
DCC Applications in RouterA can call RouterB and RouterC via multiple interfaces. Likewise, RouterB
Common Use and RouterC can respectively call RouterA. However, RouterB and RouterC cannot
call each other.
As shown in Figure 233, when circular DCC is used, the addresses of RouterA,
RouterB and RouterC are on the same segment. In this case, 100.1.1.1, 100.1.1.2,
and 100.1.1.3 are the addresses respectively for RouterA, RouterB and RouterC.
When resource-shared DCC are used, the addresses of RouterA and RouterB are
on the same segment, so are the addresses of RouterA and RouterC. The
addresses of the interfaces Dialer0 and Dialer1 on RouterA are respectively
100.1.1.1 and 122.1.1.1. The address of the Dialer0 on RouterB is 100.1.1.2, and
that of the Dialer0 on RouterC is 122.1.1.2.
Serial0
8810048 8810052
Serial0 Modem
Modem Router B
PSTN
Serial0
Router A 8810049 8810063
Serial1 Modem Modem
Bri0
Bri0
8810152
8810148 NT1 Router E
ISDN
NT1 Bri0
Router D 8810163
NT1
Connecting via ISDN BRI or PRI interfaces across ISDN
Router F
Solution 1
Establish a connection via the serial interface by using Circular DCC, configure the
DCC parameters on the dialer interface for RouterA with the help of a dialer
circular group, and directly configure the DCC parameters on the physical
interfaces on RouterB and RouterC.
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] interface dialer 0
[Router-Dialer0] ip address 100.1.1.1 255.255.255.0
[Router-Dialer0] dialer enable-circular
[Router-Dialer0] dialer-group 1
[Router-Dialer0] dialer route ip 100.1.1.2 8810052
[Router-Dialer0] dialer route ip 100.1.1.3 8810063
[Router-Dialer0] interface serial 0
[Router-Serial0] physical-mode async
[Router-Serial0] modem
732 CHAPTER 51: CONFIGURING DCC
Solution 2
Establish a connection via the serial interfaces by using Resource-Shared DCC, and
configure the DCC parameters on the dialer interfaces.
a Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] local-user userb password simple userb
[Router] local-user userc password simple userc
[Router] interface dialer 0
[Router-Dialer0] ip address 100.1.1.1 255.255.255.0
[Router-Dialer0] undo dialer enable-circular
[Router-Dialer0] dialer bundle 1
[Router-Dialer0] dialer user userb
[Router-Dialer0] dialer-group 1
[Router-Dialer0] ppp authentication-mode pap
[Router-Dialer0] ppp pap local-user usera password simple usera
[Router-Dialer0] dialer number 8810052
[Router-Dialer0] interface dialer 1
[Router-Dialer1] ip address 122.1.1.1 255.255.255.0
[Router-Dialer1] undo dialer enable-circular
[Router-Dialer1] dialer bundle 2
[Router-Dialer1] dialer user userc
[Router-Dialer1] dialer-group 1
[Router-Dialer1] ppp authentication-mode pap
[Router-Dialer1] ppp pap local-user usera password simple usera
[Router-Dialer1] dialer number 8810063
[Router-Dialer1] interface serial 0
[Router-Serial0] physical-mode async
[Router-Serial0] modem
DCC Configuration Examples 733
Solution 3:
Establish a connection via ISDN BRI or PRI interfaces by using Circular DCC, and
configure the DCC parameters on the physical interfaces.
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] interface bri 0
[Router-Bri0] ip address 100.1.1.1 255.255.255.0
[Router-Bri0] dialer enable-circular
[Router-Bri0] dialer-group 1
[Router-Bri0] dialer route ip 100.1.1.2 8810052
[Router-Bri0] dialer route ip 100.1.1.3 8810063
2 Configure RouterB:
[Router] dialer-rule 2 ip permit
[Router] interface bri 0
[Router-Bri0] ip address 100.1.1.2 255.255.255.0
[Router-Bri0] dialer enable-circular
[Router-Bri0] dialer-group 2
[Router-Bri0] dialer route ip 100.1.1.1 8810048
3 Configure RouterC:
[Router] dialer-rule 1 ip permit
[Router] interface bri 0
[Router-Bri0] ip address 100.1.1.3 255.255.255.0
[Router-Bri0] dialer enable-circular
[Router-Bri0] dialer-group 1
[Router-Bri0] dialer route ip 100.1.1.1 8810048
Solution 4:
Establish a connection via the ISDN BRI or PRI interfaces by using Resource-Shared
DCC, and configure the DCC parameters on the dialer interfaces.
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] local-user userb password simple userb
[Router] local-user userc password simple userc
[Router] interface dialer 0
[Router-Dialer0] ip address 100.1.1.1 255.255.255.0
[Router-Dialer0] undo dialer enable-circular
[Router-Dialer0] dialer bundle 1
[Router-Dialer0] dialer user userb
[Router-Dialer0] dialer-group 1
[Router-Dialer0] ppp authentication-mode pap
[Router-Dialer0] ppp pap local-user usera password simple usera
[Router-Dialer0] dialer number 8810152
[Router-Dialer0] interface dialer 1
[Router-Dialer1] ip address 122.1.1.1 255.255.255.0
[Router-Dialer1] undo dialer enable-circular
[Router-Dialer1] dialer bundle 2
[Router-Dialer1] dialer user userc
[Router-Dialer1] dialer-group 1
[Router-Dialer1] ppp authentication-mode pap
[Router-Dialer1] ppp pap local-user usera password simple usera
[Router-Dialer1] dialer number 8810163
[Router-Dialer1] interface bri 0
[Router-Bri0] undo dialer enable-circular
DCC Configuration Examples 735
DCC Application The local router is connected to the remote end via two ISDN BRI interfaces.The
Providing MP Binding traffic threshold must be set to distribute the traffic. Thus, the bandwidth
resources can be allocated according to the actual traffic. The maximum available
bandwidth is specified.
As shown in Figure 234, the ISDN BRI interfaces on RouterA and the ISDN PRI
interface on RouterB are connected through an ISDN network. RouterA must
adopt resource-shared DCC to call RouterB, and RouterB adopts circular DCC to
call RouterA. The addresses of RouterA and RouterB are 100.1.1.1 and 100.1.1.2,
respectively.
736 CHAPTER 51: CONFIGURING DCC
Bri0 8810148
8810152
NT ISDN
1 Pri0
NT 8810149 Router B
Router A Bri1 1
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] local-user userb password simple userb
[Router] flow-interval 3
[Router] interface dialer 0
[Router-Dialer0] ip address 100.1.1.1 255.255.255.0
[Router-Dialer0] undo dialer enable-circular
[Router-Dialer0] dialer bundle 1
[Router-Dialer0] ppp mp
[Router-Dialer0] dialer threshold 50
[Router-Dialer0] dialer user userb
[Router-Dialer0] dialer-group 1
[Router-Dialer0] ppp authentication-mode pap
[Router-Dialer0] ppp pap local-user usera password simple usera
[Router-Dialer0] dialer number 8810152
[Router-Dialer0] interface bri 0
[Router-Bri0] undo dialer enable-circular
[Router-Bri0] dialer bundle-member 1
[Router-Bri0] ppp mp
[Router-Bri0] link-protocol ppp
[Router-Bri0] ppp authentication-mode pap
[Router-Bri0] ppp pap local-user usera password simple usera
[Router-Bri0] interface bri 1
[Router-Bri1] undo dialer enable-circular
[Router-Bri1] dialer bundle-member 1
[Router-Bri1] ppp mp
[Router-Bri1] link-protocol ppp
[Router-Bri1] ppp authentication-mode pap
[Router-Bri1] ppp pap local-user usera password simple usera
2 Configure RouterB:
[Router] dialer-rule 2 ip permit
[Router] local-user usera password simple usera
[Router] flow-interval 3
[Router] controller e1 0
[Router-E1-0] pri-set
[Router-E1-0] interface serial 0:15
[Router-Serial0:15] link-protocol ppp
[Router-Serial0:15] ppp mp
[Router-Serial0:15] ip address 100.1.1.2 255.255.255.0
[Router-Serial0:15] ppp authentication-mode pap
[Router-Serial0:15] ppp pap local-user userb password simple userb
[Router-Serial0:15] dialer enable-circular
[Router-Serial0:15] dialer-group 2
[Router-Serial0:15] dialer route ip 100.1.1.1 8810148
[Router-Serial0:15] dialer route ip 100.1.1.1 8810149
DCC Configuration Examples 737
DCC Application Using To implement circular DCC, use a B channel on the ISDN BRI interface to provide a
ISDN BRI Interface to leased line, and another B channel to implement remote dialing connection.
Dial and Providing
Leased Line As shown in Figure 235, the B2 channel on the interface Bri0 of RouterA is
connected to the B1 channel on the interface Bri0 of RouterC to provide a leased
line, whereas the B1 channel is connected to RouterB to implement dialing
connection. In the ISDN network, configure the correlation of virtual circuits on the
switches respectively corresponding to RouterA and RouterC, so as to ensure both
RouterA and RouterC can set up virtual circuit connections to the ISDN network.
RouterA adopts Circular DCC to call RouterB and RouterC, so do RouterB and
RouterC. The addresses of RouterA, RouterB and RouterC are respectively
100.1.1.1, 100.1.1.2, and 100.1.1.3.
Figure 235 Network for the DCC application using the ISDN BRI interface to dial and
providing a leased line
Bri1
Bri0 8810152
8810148
NT1 Router B
ISDN Bri0
NT1
Router A
NT1
Router C
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] interface bri 0
[Router-Bri0] ip address 100.1.1.1 255.255.255.0
[Router-Bri0] dialer isdn-leased 2
[Router-Bri0] dialer-group 1
[Router-Bri0] dialer route ip 100.1.1.2 8810152
2 Configure RouterB:
[Router] dialer-rule 2 ip permit
[Router] interface bri 1
[Router-Bri1] ip address 100.1.1.2 255.255.255.0
[Router-Bri1] dialer isdn-leased 1
[Router-Bri1] dialer-group 2
[Router-Bri1] dialer route ip 100.1.1.1 8810148
3 Configure RouterC:
[Router] dialer-rule 1 ip permit
[Router] interface bri 0
[Router-Bri0] ip address 100.1.1.3 255.255.255.0
[Router-Bri0] dialer-group 1
[Router-Bri0] dialer route ip 100.1.1.1 8810148
Router-to-Router Two routers implement PPP callback via the serial interfaces across PSTN, and ISDN
Callback for DCC callback with the ISDN caller identification technique across ISDN.
callback servers. RouterA and RouterC use the same address 100.1.1.1, whereas
RouterB and RouterD use the same address 100.1.1.2.
Figure 236 Network for the DCC application providing router-to-router callback
Serial0 Serial1
8810048 8810052
PSTN
Router A Modem Modem Router B
Bri0 Bri1
8810148 ISDN 8810152
Router C
NT1 NT1 Router D
Callback Client Networking for ISDN caller ID callback Callback Server
Solution 1:
Use Circular DCC to implement PPP callback. The server determines whether to
originate a return call to a client according to the user names configured in the
dialer routes.
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] interface serial 0
[Router-Serial0] ip address 100.1.1.1 255.255.255.0
[Router-Serial0] physical-mode async
[Router-Serial0] modem
[Router-Serial0] dialer enable-circular
[Router-Serial0] dialer-group 1
[Router-Serial0] dialer route ip 100.1.1.2 8810052
[Router-Serial0] link-protocol ppp
[Router-Serial0] ppp pap local-user usera password simple usera
[Router-Serial0] ppp callback client
2 Configure RouterB:
[Router] dialer-rule 2 ip permit
[Router] local-user usera password simple usera
[Router] interface serial 1
[Router-Serial1] ip address 100.1.1.2 255.255.255.0
[Router-Serial1] physical-mode async
[Router-Serial1] modem
[Router-Serial1] dialer enable-circular
[Router-Serial1] dialer-group 2
[Router-Serial1] dialer route ip 100.1.1.1 user usera 8810048
[Router-Serial1] dialer callback-center user
[Router-Serial1] link-protocol ppp
[Router-Serial1] ppp authentication-mode pap
[Router-Serial1] ppp callback server
Solution 2:
Use Circular DCC to implement PPP callback. The server dynamically creates dialer
routes and originates return calls to the clients according to the dialer numbers.
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] interface serial 0
DCC Configuration Examples 739
Solution 3:
Use Circular DCC to implement ISDN caller identification callback.
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] interface bri 0
[Router-Bri0] ip address 100.1.1.1 255.255.255.0
[Router-Bri0] dialer-group 1
[Router-Bri0] dialer route ip 100.1.1.2 user usera 8810152
2 Configure RouterB:
[Router] dialer-rule 2 ip permit
[Router] interface bri 1
[Router-Bri1] ip address 100.1.1.2 255.255.255.0
[Router-Bri1] dialer-group 2
[Router-Bri1] dialer route ip 100.1.1.1 user usera 8810148
[Router-Bri1] dialer call-in 8810148 callback
Router-to-PC Callback A router and a PC implement PPP callback via the serial interfaces over PSTN. As
for DCC shown in the following figure, the PC and RouterA are interconnected via the
modems across PSTN. Circular DCC is adopted in this case. The PC is specified to
be the callback client whereas RouterA to be the callback server. They implement
callback according to the configuration of the dialer route command. RouterA
uses the address 100.1.1.1 and the PC accepts the address assigned by RouterA.
740 CHAPTER 51: CONFIGURING DCC
Figure 237 Network for the DCC application providing router-to-PC callback
Serial0
8810048 PSTN 8810052
Modem Router A
Modem
PC
Callback Client Callback Server
NT Server-to-Router A router and an NT server implement PPP callback via the serial interfaces across
Callback for DCC PSTN.
As shown in Figure 238, RouterA and the NT server are interconnected via the
modems across PSTN. In this case, circular DCC is adopted. RouterA is specified as
the callback client and the NT server as the callback server. Callback is
implemented according to the configuration of the dialer route command. The
NT server uses the address 100.1.1.254, and RouterA accepts the address assigned
by the NT server.
DCC Configuration Examples 741
Figure 238 Network for the DCC application providing NT server-to-router callback
Async1
8810048 PSTN 8810052
Modem Modem
Router A
Callback Client Callback Server
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] interface async 0
[Router-Async0] async mode protocol
[Router-Async0] link-protocol ppp
[Router-Async0] ppp callback client
[Router-Async0] ppp pap local-user Router password simple Router
[Router-Async0] ip address ppp-negotiate
[Router-Async0] dialer enable-circular
[Router-Async0] dialer-group 1
[Router-Async0] dialer route ip 100.1.1.254 8810052
2 Configure NT server:
a Configure the modem connected to the PC to be in “autoanswer mode”, open
[Start/Programs/Accessories/Communications/Dialup Network], click [Set up
new connection] in the [Dialup Network] window, select the [Server type] page
in the established new connection, and perform the following operations:
b First, open the [Network attributes/Services] page, add “remote access server”
in it and configure RAS attribute, click the <Add> button to install the modem,
and set the modem attribute to “Dial-out and dial-in”. If the modem has been
installed, click <Configure>. Click the <Network> button on the right to set the
network attributes of RAS, including:
■ Select “TCP/IP” in both [Dial-out protocol] and [Server setting].
■ Click <Configure> on the right to configure an address assignment method
for the dial-in client. It can be either “Use DHCP” or “Use static address
set”.
■ Select [Allow any authentication] to configure “Encryption setting”.
c Then, select the menu bar [Management tools/Server management] to enable
remote accessing service.
d Finally, select the menu bar [Management tools/Remote access management]
to enter the management interface, select [Users/Authorities] in it, and choose
the user that can implement remote access. Three callback attributes are
available, including:
■ No callback
■ Set by the dial-in party: The ppp callback ntstring dial-number
command should be configured on the router if this method is selected.
■ Preset to number: If this method is selected, the dial-number set on the
router will be invalid and the NT system will dial the preset number when
placing a return call.
742 CHAPTER 51: CONFIGURING DCC
Dial Number Circular In PSTN, the dial number circular standby is fulfilled through configuring the
Standby and Internet dialer route command at the dialing side. The access side provides the
Access for DCC accessing service for DCC via the asynchronous serial interface, and adopts the
PAP authentication to authenticate the validity of the dialing party. In ISDN, single
dialer number and CHAP authentication are adopted, and other configurations are
similar to the PSTN side.
As shown in the following figure, RouterB and RouterD work as access server,
RouterA and RouterC at the dialing side accept the negotiated addresses assigned
by the remote ends. The address pool for allocation is in the range of 100.1.1.1 to
100.1.1.16. RouterB and RouterD use the address 100.1.1.254, and obtain the
dialer numbers 8810048 to 8810055 from the telecommunications service
provider. ISDN dial number is 8810148, which provides services for 16 network
users.
Figure 239 Network for the DCC application providing dial number circular standby and
accessing service
8810048
Modem
Serial0
8810049
Modem
Modem 8810050
Router A Async0 to
Serial0 Modem Async7
8810051
Modem PSTN Modem Internet
Router
8810052 Router B
……
Modem
8810053
Modem
Modem 8810054
PC Modem
8810055
Modem interfaces
Provide accessing service on asynchronous
Bri0
Serial2:15
Solution 1:
Configure dial number circular standby on the dialing parties, adopt Circular DCC
to set up connections on the 8 asynchronous serial interfaces at the access side,
and configure the DCC parameters on the dialer interfaces.
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] local-user userb password simple passb
[Router] interface serial 0
[Router-Serial0] physical-mode async
[Router-Serial0] modem
DCC Configuration Examples 743
c Start dialing, and input the user name user1 and the password pass1.
Solution 2:
The dialing side uses a single number to dial, and the accessing side uses circular
DCC to set up the connection via the ISDN PRI interface. Configure the DCC
parameters on the dialer interface.
1 Configure RouterC:
[Router] dialer-rule 1 ip permit
[Router] local-user userb password simple passb
[Router] interface bri 0
[Router-Bri0] ip address ppp-negotiate
[Router-Bri0] dialer-group 1[Quidway-Bri0] dialer enable-circular
[Router-Bri0] dialer route ip 100.1.1.254 8810148
[Router-Bri0] link-protocol ppp
[Router-Bri0] ppp chap user user1
[Router-Bri0] ppp chap password simple pass1
2 Configure RouterD:
[Router] dialer-rule 2 ip permit
[Router] local-user user1 password simple pass1
[Router] local-user user2 password simple pass2
……
[Router] local-user user16 password simple pass6
[Router] ip pool 1 100.1.1.1 100.1.1.16
[Router] controller e1 2
[Router-E1-2] pri-set
[Router-E1-2] interface serial 2:15
[Router-Serial2:15] ip address 100.1.1.254 255.255.255.0
[Router-Serial2:15] remote address pool 1
[Router-Serial2:15] dialer enable-circular
[Router-Serial2:15] dialer-group 2
[Router-Serial2:15] link-protocol ppp
[Router-Serial2:15] ppp authentication-mode chap
[Router-Serial2:15] ppp chap user userb
[Router-Serial2:15] ppp chap password simple passb
Logical Interface RouterA and RouterB are directly connected via the serial interfaces. At the same
Standby through Dialer time, RouterA forms a dialup connection with RouterB via a modem through
route for DCC PSTN. RouterB cannot call RouterA via dialing.
Figure 240 Network for the DCC application providing logic interface standby through
dialer route
Modem Modem
8810059 8810060
PSTN
Serial0 Serial0
Serial1 Serial1
Router A Router B
Solution 1:
Adopt circular DCC and use the logic interface configured through the dialer
route command as the standby interface.
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] interface serial 0
[Router-Serial0] physical-mode async
[Router-Serial0] modem
[Router-Serial0] ip address 100.1.1.1 255.255.255.0
[Router-Serial0] dialer enable-circular
[Router-Serial0] dialer-group 1
[Router-Serial0] dialer route ip 100.1.1.2 8810060 logic-channel 1
[Router-Serial0] interface serial 1
[Router-Serial1] ip address 200.1.1.1 255.255.255.0
[Router-Serial1] link-protocol ppp
[Router-Serial1] standby logic-channel 1
2 Configure RouterB:
[Router] dialer-rule 2 ip permit
[Router] interface serial 0
[Router-Serial0] physical-mode async
[Router-Serial0] modem
[Router-Serial0] ip address 100.1.1.2 255.255.255.0
[Router-Serial0] dialer enable-circular
[Router-Serial0] dialer-group 2
[Router-Serial0] dialer route ip 100.1.1.1 8810059 logic-channel 1
[Router-Serial0] interface serial 1
[Router-Serial1] ip address 200.1.1.2 255.255.255.0
[Router-Serial1] link-protocol ppp
[Router-Serial1] standby logic-channel 1
Solution 2:
Adopt circular DCC and use the logical interface configured through the dialer
route command as the main interface.
1 Configure RouterA:
[Router] dialer-rule 1 ip permit
[Router] interface serial 0
[Router-Serial0] physical-mode async
[Router-Serial0] modem
[Router-Serial0] ip address 100.1.1.1 255.255.255.0
[Router-Serial0] dialer enable-circular
[Router-Serial0] dialer-group 1
746 CHAPTER 51: CONFIGURING DCC
Troubleshooting DCC Modem does not dial when the router forwards the data, so the DCC
dialup connection cannot be set up.
Do the following:
■ Check whether the modem and phone cable connections are correct, and
whether the modem initialization process is correct.
■ For the synchronous/asynchronous serial interface, check whether it is
configured to asynchronous and dialing mode.
■ Check whether DCC has been enabled on the dial interface.
■ Check whether the corresponding dialer route or dialer number command
has been configured for the packet.
Do the following:
■ Check whether the same encapsulation protocol is configured on the local and
remote ends, and whether the configured PPP authentication parameters are
correct. Use the debugging ppp all command to enable PPP debugging to
view the PPP negotiation process, and make sure that the PPP negotiation
parameters are correct.
■ Check whether the network address has been correctly configured on the dial
interface (physical interface or dialer interface).
■ Check whether DCC has been enabled on the dial interface.
■ Check whether the commands dialer-group and dialer rule have been
configured, and whether the configurations are correct. Make sure that dialer
rule is configured to permit the packet and the two commands are associated.
■ Use the commands debugging dialer event and debugging dialer packet
to debug DCC, and locate the problem according to the output information.
Troubleshooting DCC 747
In this section, the debugging information that may be output when DCC cannot
reach the remote end will be displayed and explained. The user can solve the
problems with the solutions recommended in this section.
Message Fault
DCC: Receive CALL_DISC_IND The debugging information is probably output
because:
The physical connection between the local and
remote ends is down, phone cable is not securely
connected to the router, or the quality of phone
line is not good.
PPP authentication is not correctly configured, so
the PPP authentication is failed.
Remote DCC authentication is failed, because
name in the commands dialer user and dialer
route configured for DCC is inconsistent with
name configured for PPP authentication, and the
dialer route at the remote end does not contain
the local network address.
The remote end disconnects the connection
because the remote DCC idle-timeout timer has
timed out.
Solution:
If PPP configuration is incorrect or name
configurations are inconsistent, implement the
configuration as shown in the above example.
If it is the problem of the network address, apply
the following measures in the configuration of the
remote end: Add the dialer route corresponding to
the network address of the local router on the
remote router. Alternatively, remove all the dialer
routes configured at the remote end, and use the
dial number.
DCC: link negotiation Down on The link is probably disconnected because PPP
interface *** negotiation is failed due to a wrong PPP
configuration. To solve the problem, refer to the
previous example to make the configuration.
DCC: NAME authentication ERROR, The debugging information is probably outputted
failed because name configured in the commands dialer
user and dialer route is inconsistent with that
configured in PPP authentication. The connection is
disconnected since the local DCC authentication
has been failed. To solve the problem, refer to the
previous example to make the configuration.
748 CHAPTER 51: CONFIGURING DCC
Message Fault
DCC: peeraddr matching error The debugging information is probably outputted
on interface ***, shutdown link because the local dialer route does not contain the
remote network address. To solve the problem, add
the dialer route corresponding to the remote
network address on the local router or use the dial
number after removing all the dialer routes
configured on the local router.
DCC: idle-timeout on interface The debugging information does not indicate any
*** , shutdown! start error. DCC normally disconnects the connection,
enable-time because the local DCC idle-timeout timer has been
timed out.
DCC: wait-for-carrier-timeout The debugging information is probably outputted
on a link on interface ***, because the local router cannot contact the remote
shutdown!start enable-time end for a long time. It may occur because the
remote end is busy or the quality of the phone line
is bad.
DCC: The interface has no The debugging information is probably outputted
dialer-group, discard the because the dialer-group command has not been
packet! configured on the corresponding dialer interface or
the physical interface on which DCC is directly
enabled. To solve the problem, refer to the previous
example to make the configuration.
DCC: there is not a dialer The debugging information is probably outputted,
number on the interface, because neither dialer route nor the dialer
failed, discard packet number is configured on the corresponding dialer
interface or the physical interface on which DCC is
enabled directly. To solve the problem, configure
the dialer route and the dialer number on the local
end for the outbound call at the local end.
DCC: Enable-timeout is Rather than indicating an error, the outputted
effective , failed debugging information means that the
enable-timeout timer on the corresponding physical
interface have not timed out yet. The physical
interface can be used for dialing upon the timeout
of the timer.
52 CONFIGURING MODEM
Modem Function To offer the optimal flexibility, 3Com routers provide the following modem
Provided by 3Com management functions:
Routers ■ Provide the scripts (modem script) for modem management to enable the user
to better control the modems connected to the router. A modem script can be
executed by the following two means:
■ Executes a modem script directly through the script-string command to
initialize the modem or other configurations.
■ Triggers the modem script with particular events, such as router startup,
modem dial-in connection, and the start-chat command.
■ Using the script along with the related commands can enhance the remote
configuration function of router. If the asynchronous serial interface works in
flow mode, the user can establish a remote connection to the interface
through the dumb terminal or modem dialup, to configure and manage the
router.
■ Directly send AT commands to the modem via the serial interface for managing
the modem.
■ Interwork with the equipment of other equipment vendors. That is, the
asynchronous serial interfaces of the participating parties are working in the
flow mode and interconnected through modems.
■ Provides rich debugging information for modem monitoring and maintenance.
Modem Script 3Com routers provide t modem scripts, which are mainly used for:
■ Flexibly controlling the modems of different models. For example, using
different initialization AT commands able to interoperate with 3Com routers.
■ Implementing the interactive login to remote systems. Interactive negotiation
of the scripts can enable the system enters different link states. For example,
after the asynchronous serial interfaces on the two routers set up a connection
through the modem, routers can negotiate the protocol to be encapsulated
with the physical link and its operating parameters.
750 CHAPTER 52: CONFIGURING MODEM
Where:
■ Normally, receive-string and send-string appear in pairs, and the script must
begin with a receive-string. For example, “receive-string1 send-string1”
represents the execution flow: Expect to receive receive-string1, and send
send-string1 to the modem if the received string matches receive-string1
before timing out. Otherwise, the execution of the subsequent script will be
terminated.
■ If the last string is a send-string, it indicates that the execution of the script will
be terminated after the string is sent without waiting for any receive-string.
■ If it is unnecessary to receive a string at the beginning of a script, and the
system can directly wait for the send-string, then the user can set the first
receive string to "", which will be explained later.
■ Except for ending with “\c”, the send-string will be automatically added with
an additional return character to its end when it is sent.
■ A receive-string is matched via the location-independent matching method.
That is, the match is considered successful as long as the received contents
contain the expected string.
■ The match operation on a receive-string will be considered successful if the
receive-string is matched with any expected receive-strings which are separated
with “-“.
■ The default timeout time waiting for a receive-string is 5 seconds. TIMEOUT
seconds can be inserted into the script anytime to adjust the timeout time
waiting for the receive-string, which is valid till a new TIMEOUT is set in the
same script.
■ All the strings and keywords in a script are case sensitive.
■ Both the strings and keywords are separated by spaces. If a space is contained
in a string, it should be put in the double quotation marks (" "). A pair of
empty quotation marks (that is, "") have two meanings. Being a leading "" in
a script, it means that no string is expected from the modem and the system
will directly send the strings to the modem. If "" locates in any other locations,
the string content will be regarded to be "".
■ ABORT receive-string can be inserted at any point in a script to change the
script execution flow. Its presence in the script indicates that the script
execution will be terminated if a received string is fully matched the
receive-string set by ABORT receive-string. Multiple ABORT entries can be
defined in a script, and they will take effect concurrently. Once a received string
matches any of them, the script execution will be terminated. Regardless of
where the ABORT receive-string is placed, it will take effect in the whole script
execution process.
■ Escape characters can be inserted in a script for the purpose of better
controlling the script and increasing its flexibility. In addition, all the escape
characters are the delimiters in the string at the same time.
Configuring a Modem 751
Keyword Description
ABORT receive-string The string following ABORT will be compared with the strings sent
from a modems or remote DTE device for a match. The match mode
is full match. Multiple ABORT entries can be configured for a script,
and all of them take effect in the whole script execution period.
TIMEOUT seconds The digit following TIMEOUT is used to set the timeout interval that
the device waits for receiving strings. If no expected strings are
received within the interval, the execution of the script will fail.
Once being set, the setting will be valid till a new TIMEOUT is set.
Configure the Modem Perform the following configuration in interface (asynchronous serial, AUX or AM
Dial-in and Dial-out interface) view.
Authorities Table 777 Configure the Modem Dial-In and Dial-Out Authorities
Operation Command
Enable only modem dial-in modem in
Enable only modem dial-out modem out
Enable both modem dial-in and dial-out modem
Disable both modem dial-in and dial-out undo modem
Configure Modem Perform the following configuration in interface (asynchronous serial, AUX or AM
Through the AT interface) view.
Command Table 778 Configure a Modem Script
Operation Command
Configure modem through the AT sendat at-string
Command
Operation Command
Define a modem script script-string script-name
script-content
Delete the modem script undo script-string script-name
For the format of script, refer to the modem script syntax description.
Execute a Modem Script If necessary, the user can execute the modem script through the start-chat
Manually command for managing the external modem to which the interface is connected.
Operation Command
Manually execute a modem script start-chat script-name
Specify the Events that Associating modem scripts with events, is to automatically execute the
Trigger Modem Scripts corresponding script after a particular event occurs to the router. In 3Com routers,
the following script events are supported:
■ An outgoing call is established to a line: The specified script will be executed if
a modem outgoing call is established.
■ An incoming call is established to a line: The specified script will be executed if
a modem incoming call is established.
■ DCC dial: Start the dial script when implementing DCC dial.
■ Line reset: Execute the specified script when a line is disconnected.
■ Power on the system and reboot it: Execute the specified script on the
corresponding asynchronous serial interface when the system is powered on
and initialized.
For the the events in the previous list, the corresponding scripts can be specified
through the script command.
Configuring a Modem 753
Operation Command
Specify the automatically executed modem script trigger login script-name
script when the calling-out connection is set
up successfully.
Specify the automatically executed modem script trigger connect script-name
script when the calling-in connection is set up
successfully.
Specify the automatically executed modem script trigger dial script-name
script before DCC dialing.
Specify the automatically executed modem script trigger logout script-name
script at the time of line reset.
Specify the automatically executed modem script trigger init script-name
script at the time of system power-on and
restart.
Specify the default modem initialization string script init-string init-string
for initializing modem.
Configure the Modem This configuration depends on whether the external modem to which the
Answer Mode asynchronous interface is connected is in auto-answer mode (whether the AA LED
on the modem is on). If the modem is in auto-answer mode, the user should
execute modem-autoanswer before using the dial function. If not, the user should
execute undo modem-autoanswer. Inconsistency of the configuration and the
modem status may cause the abnormal acceptance of some modem incoming
calls.
Operation Command
Configure the modem to work in modem auto-answer
auto-answer mode
Configure the modem to work in undo modem auto-answer
non-auto answer mode
Configure The command modem-login is configured to authenticate the name and password
Authentication for a of the dial-in user. Generally this command is used together with the command of
Modem Dial-in User script trigger connect, thus many usernames can login at the same interface.
Operation Command
Configure authentication for modem modem-login
dial-in user
Delete authentication for modem dial-in undo modem-login
user
Displaying and Executethe debugging command in all views for the debugging.
Debugging a Modem Table 784 Display and Debug Modem
Operation Command
Enable debugging of the AT command of debugging modem at [ interface type
modem number ]
Enable modem event debugging debugging modem event [ interface
type number ]
Figure 241 Network of the configuration for the router to manage the modem
PSTN
Modem
PC Router
Power-on Initialization Enable the router to initialize the modem to which the asynchronous interface is
through the connected when powering on the router or rebooting it.
Initialization Script [Router] script-string init "" AT OK AT&B1&C1&D2&S0=1 OK AT&W OK
[Router] interface async 0
[Router-Async0] modem
[Router-Async0] start-chat init
Use the Script to Dial Configure a modem script and direct dial.
Directly [Router] script-string dial "" AT OK ATDT8810058 CONNECT
[Router] interface async 0
[Router-Async0] modem
[Router-Async0] start-chat dial
Authentication for Before logging in network through dialing, multiple users who connect with
Modem Dial-in User modem are authenticated on 3Com router based on username and password.
Only the authenticated users can logging in network, and those who have failed
the authentication are not allowed to log in.
PSTN
Modem
PC Router
Troubleshooting The modem is in abnormal status (such as the dial tone or busy tone
remains for a long time).
Do the following:
■ Execute the commands shutdown and undo shutdown on the router physical
interface connected to the modem to check whether the modem has been
restored to normal status.
Troubleshooting 757
■ If the modem is still in abnormal status, proceed to run the AT string, such as
“AT&F OK ATE0S0=0&C1&D2 OK AT&W” on the router physical interface
connected to the modem.
758 CHAPTER 52: CONFIGURING MODEM