Nortel Networks Network Router 8000 User manual

Category
Networking
Type
User manual

This manual is also suitable for

Nortel Secure Router 8000 Series
Configuration -WAN Access
Release:
Document Revision:
5.3
01.01
www.nortel.com
NN46240-503 324557-A Rev01
Nortel Secure Router 8000 Series
Release: 5.3
Publication: NN46240-503
Document Revision: 01.01
Document status: Standard
Document release date: 30 March 2009
Copyright © 2009 Nortel Networks
All Rights Reserved.
Printed in Canada, India, and the United States of America
LEGAL NOTICE
While the information in this document is believed to be accurate and reliable, except as otherwise expressly
agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF
ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are
subject to change without notice.
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
All other trademarks are the property of their respective owners.
ATTENTION
For information about the safety precautions, read "Safety messages" in this guide.
For information about the software license, read "Software license" in this guide.
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
i
Contents
About this document.......................................................................................................................1
1 WAN access overview ...............................................................................................................1-1
1.1 Introduction.................................................................................................................................................1-2
1.1.1 WAN interface types .........................................................................................................................1-2
1.1.2 Link layer protocols of WAN............................................................................................................1-4
1.2 Configuring WAN interface parameters......................................................................................................1-6
1.2.1 Establishing the configuration task ...................................................................................................1-6
1.2.2 Entering the WAN interface view......................................................................................................1-7
1.2.3 Configuring interface description......................................................................................................1-7
1.2.4 Configuring interval of flow statistics...............................................................................................1-8
1.2.5 Enabling the WAN interface..............................................................................................................1-9
1.2.6 Checking the configuration...............................................................................................................1-9
1.3 Maintaining interfaces...............................................................................................................................1-10
1.3.1 Clearing interface statistics .............................................................................................................1-10
1.3.2 Debugging interfaces.......................................................................................................................1-10
2 Serial interface configuration ..................................................................................................2-1
2.1 Introduction.................................................................................................................................................2-2
2.1.1 Synchronous serial interface .............................................................................................................2-2
2.1.2 HSSI interface...................................................................................................................................2-2
2.2 Configuring the synchronous serial interface..............................................................................................2-3
2.2.1 Establishing the configuration task ...................................................................................................2-3
2.2.2 Configuring link layer protocol type.................................................................................................2-4
2.2.3 Configuring baud rate........................................................................................................................2-4
2.2.4 Configuring clock inversion..............................................................................................................2-5
2.2.5 Configuring DCD or DSR signal detection.......................................................................................2-5
2.2.6 Configuring link coding mode ..........................................................................................................2-6
2.2.7 Configuring idle mark between frames .............................................................................................2-7
2.2.8 Configuring the MTU........................................................................................................................2-7
2.2.9 Configuring the parity bit..................................................................................................................2-8
2.2.10 Checking the configuration .............................................................................................................2-9
2.3 Configuring the HSSI interface.................................................................................................................2-10
Nortel Secure Router 8000 Series
Configuration -WAN Access
ii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
2.3.1 Establishing the configuration task .................................................................................................2-10
2.3.2 Configuring the link layer protocol.................................................................................................2-10
2.3.3 Configuring the MTU......................................................................................................................2-11
2.3.4 Configuring the parity bit................................................................................................................2-11
2.3.5 Configuring the loopback mode......................................................................................................2-12
2.3.6 Checking the configuration.............................................................................................................2-12
2.4 Maintaining serial interface.......................................................................................................................2-12
2.4.1 Resetting interface statistics............................................................................................................2-12
2.4.2 Setting loopback to detect whether the interface is normal.............................................................2-13
3 E-Carrier and T-carrier interface configuration ...................................................................3-1
3.1 Introduction.................................................................................................................................................3-2
3.1.1 E-carrier and t-carrier........................................................................................................................3-2
3.1.2 Related concepts................................................................................................................................3-2
3.1.3 Introduction to E1 interface...............................................................................................................3-3
3.1.4 Introduction to CE1 interface............................................................................................................3-3
3.1.5 Introduction to CT1 interfaces ..........................................................................................................3-4
3.1.6 Introduction to CE3 Interfaces ..........................................................................................................3-5
3.2 Configuring E1 interfaces............................................................................................................................3-5
3.2.1 Establishing the configuration task ...................................................................................................3-5
3.2.2 Configuring working mode of E1 interface.......................................................................................3-6
3.2.3 Configuring coding or decoding format of E1 interface....................................................................3-6
3.2.4 Configuring clock mode of E1 interface...........................................................................................3-7
3.2.5 Configuring timeslot binding of E1 interface....................................................................................3-8
3.2.6 Configuring cable mode of E1 interface............................................................................................3-8
3.2.7 Checking the configuration...............................................................................................................3-9
3.3 Configuring CE1 interfaces.........................................................................................................................3-9
3.3.1 Establishing the configuration task ...................................................................................................3-9
3.3.2 Configuring working mode of CE1 interface..................................................................................3-10
3.3.3 Configuring coding or decoding format of CE1 interface...............................................................3-11
3.3.4 Configuring clock mode of CE1 interface.......................................................................................3-12
3.3.5 Configuring frame format of CE1 interface....................................................................................3-12
3.3.6 Configuring timeslot binding of CE1 interface...............................................................................3-13
3.3.7 Configuring cable mode of CE1 interface.......................................................................................3-13
3.3.8 Checking the configuration.............................................................................................................3-14
3.4 Configuring CT1 interfaces.......................................................................................................................3-14
3.4.1 Establishing the configuration task .................................................................................................3-15
3.4.2 Configuring working mode of CT1 interface..................................................................................3-16
3.4.3 Configuring coding or decoding format of CT1 interface...............................................................3-16
3.4.4 Configuring clock mode of CT1 interface.......................................................................................3-17
3.4.5 Configuring frame format of CT1 interface....................................................................................3-17
3.4.6 Configuring timeslot binding of CT1 interface...............................................................................3-18
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
iii
3.4.7 Configuring cable mode of CT1 interface.......................................................................................3-18
3.4.8 Checking the configuration.............................................................................................................3-19
3.5 Configuring CE3 interfaces.......................................................................................................................3-20
3.5.1 Establishing the configuration task .................................................................................................3-20
3.5.2 Configuring working mode of CE3 interface..................................................................................3-20
3.5.3 Configuring clock mode of CE3 interface.......................................................................................3-21
3.5.4 Configuring national bit of CE3 interface.......................................................................................3-21
3.5.5 Checking the configuration.............................................................................................................3-22
3.6 Configuring CE1channels of CE3 interfaces.............................................................................................3-22
3.6.1 Establishing the configuration task .................................................................................................3-22
3.6.2 Configuring working mode of CE1 channel....................................................................................3-23
3.6.3 Configuring clock mode of CE1 channel ........................................................................................3-24
3.6.4 Configuring Frame Format of CE1 Channel...................................................................................3-24
3.6.5 Disabling or enabling CE1 channel.................................................................................................3-25
3.6.6 Checking the configuration.............................................................................................................3-25
3.7 Configuring synchronous serial interfaces ................................................................................................3-26
3.7.1 Establishing the configuration task .................................................................................................3-26
3.7.2 Configuring attribute parameters of synchronous serial interface...................................................3-27
3.7.3 Configuring link layer protocol of synchronous serial interface.....................................................3-28
3.7.4 Configuring hold-interval of the link layer protocol of the synchronous serial interface................3-28
3.7.5 Checking the configuration.............................................................................................................3-29
3.8 Maintaining e-carrier and t-carrier interface..............................................................................................3-30
3.8.1 Resetting interface statistics............................................................................................................3-30
3.8.2 Setting loopback to detect whether the interface is normal.............................................................3-30
3.9 Configuration examples.............................................................................................................................3-30
3.9.1 Example for configuring communication over CE1 interfaces bundle ...........................................3-31
3.9.2 Example for configuring communication over E1 interfaces Bundle .............................................3-34
3.9.3 Example for configuring CE3 interfaces.........................................................................................3-38
4 POS and CPOS interface configuration.................................................................................4-1
4.1 Introduction.................................................................................................................................................4-2
4.1.1 SONET..............................................................................................................................................4-2
4.1.2 SDH...................................................................................................................................................4-2
4.1.3 POS ...................................................................................................................................................4-6
4.1.4 CPOS.................................................................................................................................................4-6
4.2 Configuring POS interfaces.........................................................................................................................4-9
4.2.1 Establishing the configuration task ...................................................................................................4-9
4.2.2 Configuring link layer protocol.......................................................................................................4-10
4.2.3 Configuring clock mode..................................................................................................................4-10
4.2.4 Configuring overhead bytes ............................................................................................................4-11
4.2.5 Configuring frame format ...............................................................................................................4-11
4.2.6 Configuring scramble function........................................................................................................4-12
Nortel Secure Router 8000 Series
Configuration -WAN Access
iv
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
4.2.7 Configuring check word length of CRC..........................................................................................4-12
4.2.8 Configuring MTU ...........................................................................................................................4-13
4.2.9 Checking the configuration.............................................................................................................4-14
4.3 Configuring STM-1 CPOS interfaces........................................................................................................4-15
4.3.1 Establishing the configuration task .................................................................................................4-15
4.3.2 Configuring clock mode..................................................................................................................4-15
4.3.3 Configuring frame format ...............................................................................................................4-16
4.3.4 Configuring overhead bytes ............................................................................................................4-17
4.3.5 Configuring AUG multiplexing route .............................................................................................4-17
4.3.6 Checking the configuration.............................................................................................................4-18
4.4 Configuring E1/T1 channels of the CPOS interface..................................................................................4-18
4.4.1 Establishing the configuration task .................................................................................................4-18
4.4.2 Creating E1/T1 channels.................................................................................................................4-19
4.4.3 Configuring frame format ...............................................................................................................4-20
4.4.4 Configuring clock mode..................................................................................................................4-21
4.4.5 Disabling or enabling the E1/T1 channel........................................................................................4-21
4.4.6 Checking the configuration.............................................................................................................4-22
4.5 Configuring synchronous serial interfaces ................................................................................................4-23
4.5.1 Establishing the configuration task .................................................................................................4-23
4.5.2 Configuring attribute parameters of synchronous serial interface...................................................4-24
4.5.3 Configuring link layer protocol of synchronous serial interface.....................................................4-24
4.5.4 Configuring hold-interval of the link layer protocol for synchronous serial interface....................4-25
4.5.5 Checking the configuration.............................................................................................................4-25
4.6 Maintaining POS and CPOS interface.......................................................................................................4-26
4.6.1 Resetting interface statistics............................................................................................................4-26
4.6.2 Setting loopback to detect whether the interface is normal.............................................................4-26
4.7 Configuration examples.............................................................................................................................4-27
4.7.1 Example for directly connecting routers through POS interfaces ...................................................4-27
4.7.2 Example for configuring STM-1 CPOS interfaces..........................................................................4-29
4.8 Troubleshooting.........................................................................................................................................4-34
4.8.1 Physical status of POS interfaces is Down......................................................................................4-34
4.8.2 Line protocol status of POS interfaces is Down..............................................................................4-35
4.8.3 Severe packet loss on a POS interface.............................................................................................4-35
5 Logical interface configuration ...............................................................................................5-1
5.1 Introduction.................................................................................................................................................5-2
5.1.1 Sub-interface overview......................................................................................................................5-2
5.1.2 Virtual template and virtual access interface.....................................................................................5-3
5.1.3 Virtual ethernet interface...................................................................................................................5-3
5.1.4 Loopback interface............................................................................................................................5-4
5.1.5 Null interface.....................................................................................................................................5-4
5.2 Creating sub-interfaces................................................................................................................................5-4
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
v
5.2.1 Establishing the configuration task ...................................................................................................5-4
5.2.2 Creating FR sub-interfaces................................................................................................................5-5
5.2.3 Creating X.25 sub-interfaces.............................................................................................................5-6
5.2.4 Creating ATM sub-interfaces.............................................................................................................5-7
5.2.5 Checking the configuration...............................................................................................................5-7
5.3 Configuring the virtual template..................................................................................................................5-8
5.3.1 Establishing the configuration task ...................................................................................................5-8
5.3.2 Creating a VT....................................................................................................................................5-9
5.3.3 Setting maximum number of links supported by a VT......................................................................5-9
5.3.4 Checking the configuration.............................................................................................................5-10
5.4 Configuring virtual ethernet interfaces......................................................................................................5-11
5.4.1 Establishing the configuration task .................................................................................................5-11
5.4.2 Creating a VE interface...................................................................................................................5-12
5.4.3 Configuring a MAC address for a VE interface..............................................................................5-12
5.4.4 Checking the configuration.............................................................................................................5-13
5.5 Configuring a loopback interface..............................................................................................................5-13
5.5.1 Establishing the configuration task .................................................................................................5-13
5.5.2 Creating a loopback interface and configuring its IP address..........................................................5-14
5.5.3 Checking the configuration.............................................................................................................5-14
5.6 Configuring a null interface.......................................................................................................................5-15
5.6.1 Establishing the configuration task .................................................................................................5-15
5.6.2 Entering the null interface view ......................................................................................................5-15
5.6.3 Checking the configuration.............................................................................................................5-16
5.7 Configuration examples.............................................................................................................................5-16
5.7.1 Example for configuring the sub-interface......................................................................................5-16
5.7.2 Example for configuring the virtual template..................................................................................5-18
5.7.3 Example for configuring the loopback interface.............................................................................5-18
5.8 Troubleshooting.........................................................................................................................................5-20
6 PPP and MP configuration .......................................................................................................6-1
6.1 Introduction.................................................................................................................................................6-3
6.1.1 PPP....................................................................................................................................................6-3
6.1.2 MP.....................................................................................................................................................6-5
6.1.3 references ..........................................................................................................................................6-6
6.2 Encapsulating an interface with PPP and MRU negotiation........................................................................6-7
6.2.1 Establishing the configuration task ...................................................................................................6-7
6.2.2 Encapsulating the interface with PPP................................................................................................6-8
6.2.3 Enabling PPP MRU negotiation........................................................................................................6-8
6.2.4 Checking the configuration...............................................................................................................6-9
6.3 Configuring unidirectional PAP ..................................................................................................................6-9
6.3.1 Establishing the configuration task ...................................................................................................6-9
6.3.2 Configuring a local router to authenticate iIts peer in PAP mode....................................................6-10
Nortel Secure Router 8000 Series
Configuration -WAN Access
vi
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
6.3.3 Configuring the peer to be authenticated by the local router in PAP mode.....................................6-11
6.3.4 Checking the configuration.............................................................................................................6-11
6.4 Configuring unidirectional CHAP.............................................................................................................6-12
6.4.1 Establishing the configuration task .................................................................................................6-12
6.4.2 Configuring a local router with user a name to authenticate its peer in CHAP mode .....................6-13
6.4.3 Configuring a local router without user name to authenticate its peer in CHAP mode...................6-15
6.4.4 Checking the configuration.............................................................................................................6-17
6.5 Configuring PPP optional parameters........................................................................................................6-17
6.5.1 Establishing the configuration task .................................................................................................6-17
6.5.2 Configuring the call back................................................................................................................6-19
6.5.3 Configuring packet or packet header compression..........................................................................6-20
6.5.4 Configuring the timeout period of negotiation................................................................................6-22
6.5.5 Configuring the timeout period of polling.......................................................................................6-22
6.5.6 Configuring DNS server address negotiation..................................................................................6-23
6.5.7 Configuring the PPP link quality detection .....................................................................................6-23
6.5.8 Configuring peer host router to be suppressed for adding into the local end direct routing table...6-24
6.5.9 Checking the configuration.............................................................................................................6-25
6.6 Configuring MP direct binding through the VT ........................................................................................6-26 T
6.6.1 Establishing the configuration task .................................................................................................6-26
6.6.2 Creating a VT and assigning an IP address .....................................................................................6-27
6.6.3 Directly binding the interface to an existing VT.............................................................................6-27
6.6.4 Checking the configuration.............................................................................................................6-28
6.7 Configuring MP authentication binding through the VT...........................................................................6-29
6.7.1 Establishing the configuration task .................................................................................................6-29
6.7.2 Creating a VT..................................................................................................................................6-30
6.7.3 Configuring a PPP interface to work in MP mode ..........................................................................6-31
6.7.4 Checking the configuration.............................................................................................................6-32
6.8 Configuring MP binding using the MP-group...........................................................................................6-33
6.8.1 Establishing the configuration task .................................................................................................6-33
6.8.2 Adding an interface to an MP-group ...............................................................................................6-34
6.8.3 Disabling the endpoint discriminator negotiation............................................................................6-36
6.8.4 Checking the configuration.............................................................................................................6-37
6.9 Configuring MP limiting parameters.........................................................................................................6-38
6.9.1 Establishing the configuration task .................................................................................................6-38
6.9.2 Configuring the MTU of the MP group...........................................................................................6-39
6.9.3 Configuring the maximum number of MP bundled links................................................................6-39
6.9.4 Configuring the minimum number of MP bundled links ................................................................6-40
6.9.5 Configuring the damping of the MP bundled links .........................................................................6-41
6.9.6 Checking the configuration.............................................................................................................6-41
6.10 Configuring MP fragment function .........................................................................................................6-42
6.10.1 Establishing the configuration task ...............................................................................................6-42
6.10.2 Configuring the minimum packet length of the fragment of the outbound packet........................6-43
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
vii
6.10.3 Disabling the re-group of the fragments of the MP packets..........................................................6-43
6.10.4 Configuring the packet order guarantee function on the MP-group interface...............................6-44
6.10.5 Checking the configuration ...........................................................................................................6-45
6.11 Maintaining PPP and MP.........................................................................................................................6-46
6.12 Configuration examples...........................................................................................................................6-47
6.12.1 Example for configuring PAP authentication ................................................................................6-47
6.12.2 Example for configuring unidirectional CHAP authentication .....................................................6-50
6.12.3 Example for configuring bidirectional CHAP authentication .......................................................6-52
6.12.4 Example for binding MPs into the MP-group...............................................................................6-54
6.12.5 Example for configuring MP direct binding using the VT............................................................6-59
6.12.6 Example for configuring MP authentication binding using the VT...............................................6-62
6.13 Troubleshooting.......................................................................................................................................6-68
6.13.1 Physical link is not in the up state.................................................................................................6-68
6.13.2 Link is always in the down state....................................................................................................6-69
6.13.3 CHAP authentication of a PPP link fails .......................................................................................6-69
6.13.4 MP configured through the VT works abnormally........................................................................6-70
7 LAPB and X.25 configuration...................................................................................................7-1
7.1 Introduction.................................................................................................................................................7-3
7.1.1 X.25...................................................................................................................................................7-3
7.1.2 X.25 Principle....................................................................................................................................7-4
7.1.3 LAPB.................................................................................................................................................7-5
7.1.4 X.25 switching function....................................................................................................................7-6
7.1.5 X.25 load balancing...........................................................................................................................7-6
7.1.6 XOT ..................................................................................................................................................7-8
7.2 LAPB configuration....................................................................................................................................7-9
7.2.1 Establishing the configuration task ...................................................................................................7-9
7.2.2 Configuring the link layer protocol of an interface as LAPB..........................................................7-10
7.2.3 Configuring LAPB parameters........................................................................................................7-10
7.2.4 Checking the configuration.............................................................................................................7-12
7.3 Configuring an X.25 interface...................................................................................................................7-12
7.3.1 Establishing the configuration task .................................................................................................7-12
7.3.2 Configuring X.25 attributes.............................................................................................................7-13
7.3.3 Configuring X.25 interface supplementary parameter ....................................................................7-18
7.3.4 Configuring an X.25 sub-interface..................................................................................................7-21
7.3.5 Checking the configuration.............................................................................................................7-22
7.4 Configuring X.25 datagram transmission..................................................................................................7-22
7.4.1 Establishing the configuration tTask ...............................................................................................7-22
7.4.2 Configuring X.25 datagram transmission........................................................................................7-23
7.4.3 Configuring supplementary parameters of X.25 datagram Transmission .......................................7-25
7.4.4 Configuring X.25 switching............................................................................................................7-29
7.4.5 Checking the configuration.............................................................................................................7-30
Nortel Secure Router 8000 Series
Configuration -WAN Access
viii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
7.5 Configuring load balancing.......................................................................................................................7-31
7.5.1 Establishing the configuration task .................................................................................................7-31
7.5.2 Enabling or disabling X.25 switching .............................................................................................7-32
7.5.3 Configuring X.25 hunt group..........................................................................................................7-32
7.5.4 Configuring X.25 switching route...................................................................................................7-33
7.5.5 Checking the configuration.............................................................................................................7-33
7.6 Configuring XOT......................................................................................................................................7-34
7.6.1 Establishing the configuration task .................................................................................................7-34
7.6.2 Starting X.25 switching...................................................................................................................7-34
7.6.3 Configuring local switching (SVC).................................................................................................7-35
7.6.4 Configuring XOT route...................................................................................................................7-35
7.6.5 Configuring optional keepalive and Xot-source attributes..............................................................7-36
7.6.6 Checking the configuration.............................................................................................................7-37
7.7 Maintaining LAPB and X.25.....................................................................................................................7-37
7.7.1 Clearing the serial interface LAPB statistics...................................................................................7-37
7.7.2 Debugging X.25..............................................................................................................................7-38
7.8 Configuration examples.............................................................................................................................7-38
7.8.1 Example for configuring LAPB ......................................................................................................7-39
7.8.2 Example for directly connecting two routers by Using X.25..........................................................7-41
7.8.3 Example for connecting routers to an X.25 public packet network.................................................7-44
7.8.4 Example for configuring the VC range...........................................................................................7-48
7.8.5 Example for transmitting IP datagrams through X.25 PVC............................................................7-50
7.8.6 Example for configuring X.25 sub-interfaces .................................................................................7-52
7.8.7 Example for configuring the SVC function of XOT.......................................................................7-57
7.8.8 Example for configuring the PVC function of XOT.......................................................................7-61
7.8.9 Example for configuring the X.25 load balancing...........................................................................7-65
7.8.10 Example for configuring the X.25 load balancing carrying IP Datagrams....................................7-69
7.8.11 Example for configuring the TCP/IP header compression ............................................................7-73
7.9 Troubleshooting.........................................................................................................................................7-75
7.9.1 LAPB is always disconnected.........................................................................................................7-75
7.9.2 LAPB protocol is up, VC cannot be established .............................................................................7-75
7.9.3 X.25 Protocol cannot enter the up status.........................................................................................7-76
7.9.4 X.25 Protocol is up, VC cannot be established ...............................................................................7-76
7.9.5 Frequently reset or cleared during data transmission ......................................................................7-77
7.9.6 Request to set PVCs is rejected.......................................................................................................7-77
7.9.7 After SVC application of XOT is configured, the ping fails ...........................................................7-78
7.9.8 After PVC application of XOT is configured, the ping fails ...........................................................7-78
8 Frame relay configuration ........................................................................................................8-1
8.1 Introduction.................................................................................................................................................8-3
8.1.1 FR protocol and related concepts......................................................................................................8-3
8.1.2 PVC standby of frame relay switching..............................................................................................8-7
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
ix
8.1.3 Frame relay compression...................................................................................................................8-8
8.1.4 multilink frame relay.........................................................................................................................8-8
8.1.5 References.........................................................................................................................................8-9
8.2 Configuring frame relay ..............................................................................................................................8-9
8.2.1 Establishing the configuration task ...................................................................................................8-9
8.2.2 Configuring frame relay UNI interworking.....................................................................................8-10
8.2.3 Configuring frame relay NNI interworking.....................................................................................8-12
8.2.4 Configuring frame relay sub-interfaces capability ..........................................................................8-13
8.2.5 Checking the configuration.............................................................................................................8-14
8.3 Configuring frame relay static address mapping.......................................................................................8-14
8.3.1 Establishing the configuration task .................................................................................................8-14
8.3.2 Configuring frame relay static address mapping.............................................................................8-15
8.3.3 Checking the configuration.............................................................................................................8-16
8.4 Configuring MFR......................................................................................................................................8-16
8.4.1 Establishing the configuration task .................................................................................................8-16
8.4.2 Creating and configuring an MFR interface....................................................................................8-17
8.4.3 Bundling an interface to the MFR interface....................................................................................8-19
8.4.4 Checking the configuration.............................................................................................................8-20
8.5 Configuring frame relay LMI type and related parameters.......................................................................8-21
8.5.1 Establishing the configuration task .................................................................................................8-21
8.5.2 Configuring frame relay LMI and related parameters of DTE........................................................8-21
8.5.3 Configuring frame relay LMI and related parameters of DCE........................................................8-22
8.5.4 Checking the configuration.............................................................................................................8-23
8.6 Configuring frame relay switching............................................................................................................8-23
8.6.1 Establishing the configuration task .................................................................................................8-23
8.6.2 Configuring frame relay switching route.........................................................................................8-24
8.6.3 Configuring the PVC used for frame relay switching.....................................................................8-25
8.6.4 Checking the configuration.............................................................................................................8-25
8.7 Configuring PVC standby groups of frame relay switching......................................................................8-26
8.7.1 Establishing the configuration task .................................................................................................8-26
8.7.2 Configuring the switching PVC backup function............................................................................8-27
8.7.3 Configuring the automatic switching mode.....................................................................................8-28
8.7.4 Configuring the manual switching mode.........................................................................................8-29
8.7.5 Checking the configuration.............................................................................................................8-29
8.8 Configuring frame relay over an IP network.............................................................................................8-30
8.8.1 Establishing the configuration task .................................................................................................8-30
8.8.2 Configuring frame relay switching route.........................................................................................8-31
8.8.3 Configuring frame relay switching PVC.........................................................................................8-32
8.8.4 Checking the configuration.............................................................................................................8-32
8.9 Configuring frame relay FRF.9 compression ............................................................................................8-32
8.9.1 Establishing the configuration task .................................................................................................8-32
8.9.2 Configuring FRF.9 compression on a point-to-point sub-interface.................................................8-33
Nortel Secure Router 8000 Series
Configuration -WAN Access
x
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
8.9.3 Configuring FR FRF.9 compression on a main-interface or a point-to-multipoint sub-interface....8-34
8.9.4 Checking the configuration.............................................................................................................8-35
8.10 Configuring frame relay IP header compression.....................................................................................8-36
8.10.1 Establishing the configuration task ...............................................................................................8-36
8.10.2 Configuring IPHC on an frame relay main interface.....................................................................8-37
8.10.3 Configuring IPHC on an freame relay P2MP sub-interface..........................................................8-37
8.10.4 Checking the configuration ...........................................................................................................8-38
8.11 Configuring MFR bundle and MFR bundle Link....................................................................................8-38
8.11.1 Establishing the configuration task................................................................................................8-38
8.11.2 Configuring MFR bundle identifier...............................................................................................8-39
8.11.3 Configuring MFR bundle link identifier........................................................................................8-40
8.11.4 Configuring hello packet parameters of MFR bundle link............................................................8-40
8.11.5 Checking the configuration ...........................................................................................................8-41
8.12 Configuring MFR restriction parameters.................................................................................................8-41
8.12.1 Establishing the configuration task ...............................................................................................8-41
8.12.2 Configuring the MFR fragment size..............................................................................................8-42
8.12.3 Configuring the MFR sliding window size ...................................................................................8-43
8.12.4 Checking the configuration ...........................................................................................................8-44
8.13 Maintaining frame relay and MFR..........................................................................................................8-44
8.13.1 Clearing the statistics of frame relay and dynamic address mapping entries ................................8-44
8.13.2 Debugging frame relay and MFR..................................................................................................8-45
8.14 Configuration examples...........................................................................................................................8-45
8.14.1 Example for connecting LANs through the frame relay network..................................................8-46
8.14.2 Example for connecting LANs through the private line................................................................8-49
8.14.3 Example for configuring frame relay switching routes.................................................................8-51
8.14.4 Example for configuring the frame realy switching PVC .............................................................8-55
8.14.5 Example for configuring the PVC backup of frame relay switching.............................................8-58
8.14.6 Example for configuring the backup of frame relay over IP.........................................................8-61
8.14.7 Example for configuring frame relay over IP................................................................................8-66
8.14.8 Example for configuring the frame relay frf9 compression ..........................................................8-69
8.14.9 Example for configuring MFR......................................................................................................8-71
8.15 Troubleshooting.......................................................................................................................................8-73
8.15.1 Failure of binding MFR interface to a specified interface.............................................................8-73
8.15.2 Failure of pinging the peer after configuring the frame relay........................................................8-74
8.15.3 Failure of pinging the peer after configuring the frame relay switch over IP................................8-74
8.15.4 Only one end can ping through the other end after configuring the frame relay PVC..................8-75
9 HDLC configuration..................................................................................................................9-1
9.1 Introduction.................................................................................................................................................9-2
9.2 Configuring HDLC......................................................................................................................................9-2
9.2.1 Establishing the configuration task ...................................................................................................9-2
9.2.2 Encapsulating an interface with HDLC.............................................................................................9-2
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
xi
9.2.3 Configuring the IP address of the interface.......................................................................................9-3
9.2.4 Setting the Polling Interval................................................................................................................9-4
9.2.5 Checking the configuration...............................................................................................................9-4
9.3 Maintaining HDLC......................................................................................................................................9-4
9.3.1 Clearing HDLC statistics...................................................................................................................9-5
9.3.2 Debugging HDLC.............................................................................................................................9-5
9.4 Configuration examples...............................................................................................................................9-5
9.4.1 Example for configuring HDLC........................................................................................................9-6
9.4.2 Example for configuring IP address unnumbered for HDLC............................................................9-8
10 Low-speed ATM configuration...........................................................................................10-1
10.1 Introduction.............................................................................................................................................10-3
10.1.1 ATM protocol stack.......................................................................................................................10-3
10.1.2 ATM interface................................................................................................................................10-4
10.1.3 ATM OAM ....................................................................................................................................10-5
10.1.4 ATM applications ..........................................................................................................................10-5
10.1.5 references ......................................................................................................................................10-6
10.2 Configuring ATM interfaces....................................................................................................................10-7
10.2.1 Establishing the configuration task ...............................................................................................10-7
10.2.2 Configuring the parameters of ATM OC-3/STM-1 interfaces.......................................................10-7
10.2.3 Configuring the parameters of the ATM E3 interface .................................................................10-10
10.2.4 Checking the configuration .........................................................................................................10-12
10.3 Configuring ATM-classes......................................................................................................................10-13
10.3.1 Establishing the configuration task .............................................................................................10-13
10.3.2 Creating an ATM-class................................................................................................................10-13
10.3.3 Applying the ATM-class..............................................................................................................10-14
10.3.4 Checking the configuration .........................................................................................................10-15
10.4 Configuring the IPoA application..........................................................................................................10-16
10.4.1 Establishing the configuration task .............................................................................................10-16
10.4.2 Configuring IPoA mapping on a PVC.........................................................................................10-16
10.4.3 Checking the configuration .........................................................................................................10-17
10.5 Configuring the IPoEoA application .....................................................................................................10-18
10.5.1 Establishing the configuration task .............................................................................................10-18
10.5.2 Configuring IPoEoA mapping on a PVC ....................................................................................10-18
10.5.3 Checking the configuration .........................................................................................................10-19
10.6 Configuring the PPPoA application.......................................................................................................10-20
10.6.1 Establishing the configuration task .............................................................................................10-20
10.6.2 Configuring PPPoA mapping on a PVC......................................................................................10-20
10.6.3 Checking the configuration .........................................................................................................10-21
10.7 Configuring the PPPoEoA application..................................................................................................10-22
10.7.1 Establishing the configuration task .............................................................................................10-22
10.7.2 Configuring PPPoEoA mapping on a PVC .................................................................................10-22
Nortel Secure Router 8000 Series
Configuration -WAN Access
xii
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
10.7.3 Checking the configuration .........................................................................................................10-23
10.8 Creating a PVC-group and configuring the PVC service mapping.......................................................10-24
10.8.1 Establishing the configuration task .............................................................................................10-24
10.8.2 Creating a PVC-group and configuring PVC service mapping...................................................10-25
10.8.3 Checking the configuration .........................................................................................................10-26
10.9 Configuring the service type of PVC and the OAM parameters ...........................................................10-26
10.9.1 Establishing the configuration task .............................................................................................10-26
10.9.2 Configuring the service type of a PVC........................................................................................10-28
10.9.3 Configuring the OAM F5 loopback ............................................................................................10-28
10.9.4 Checking the configuration .........................................................................................................10-29
10.10 Maintaining ATM ................................................................................................................................10-29
10.10.1 Clearing the ATM interface statistics ........................................................................................10-29
10.10.2 Setting loopback to detect if the interface is normal .................................................................10-29
10.10.3 Debugging ATM........................................................................................................................10-30
10.11 Configuration examples.......................................................................................................................10-31
10.11.1 Example for configuring IPoA..................................................................................................10-31
10.11.2 Example for configuring IPoEoA..............................................................................................10-34
10.11.3 Example for configuring PPPoA...............................................................................................10-36
10.11.4 Example for configuring PPPoEoA...........................................................................................10-38
10.12 Troubleshooting...................................................................................................................................10-41
10.12.1 ATM Interface is down..............................................................................................................10-41
10.12.2 Interfaces cannot successfully ping each other..........................................................................10-42
10.12.3 PVC is down though the ATM interface is up...........................................................................10-42
10.12.4 Pinging the peer fails though PVC is UP ..................................................................................10-43
10.12.5 Severe packet dropping and CRC errors occur though the ping succeeds.................................10-44
10.12.6 Link is not up when using IPoA or PPPoA ...............................................................................10-44
10.12.7 Packet loss caused by the deletion of some PVCs in the PVC-group .......................................10-45
11 High-speed ATM configuration..........................................................................................11-1
11.1 Introduction .............................................................................................................................................11-2
11.1.1 ATM protocol stack .......................................................................................................................11-2
11.1.2 ATM interface................................................................................................................................11-3
11.1.3 ATM applications ..........................................................................................................................11-4
11.1.4 references.......................................................................................................................................11-4
11.2 Configuring ATM interfaces....................................................................................................................11-4
11.2.1 Establishing the configuration task................................................................................................11-4
11.2.2 Configuring the clock mode..........................................................................................................11-5
11.2.3 Configuring the frame format........................................................................................................11-6
11.2.4 Configuring the overhead byte ......................................................................................................11-6
11.2.5 Configuring the scrambling...........................................................................................................11-7
11.2.6 Configuring the loopback mode....................................................................................................11-8
11.2.7 Checking the configuration ...........................................................................................................11-8
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
xiii
11.3 Configuring the IPoA application............................................................................................................11-9
11.3.1 Establishing the configuration task................................................................................................11-9
11.3.2 Configuring IPoA mapping on a PVC.........................................................................................11-10
11.3.3 Checking the configuration .........................................................................................................11-11
11.4 Configuring the service type of PVC and PVP......................................................................................11-11
11.4.1 Establishing the configuration task..............................................................................................11-11
11.4.2 Configuring the service type of a PVC........................................................................................11-12
11.4.3 Configuring the service type of a PVP........................................................................................11-13
11.4.4 Checking the configuration .........................................................................................................11-13
11.5 Maintaining ATM ..................................................................................................................................11-14
11.6 Configuration example of IPoA.............................................................................................................11-14
12 PPPoE configuration..............................................................................................................12-1
12.1 Introduction.............................................................................................................................................12-2
12.1.1 Concept of PPPoE.........................................................................................................................12-2
12.1.2 Phase of discovery.........................................................................................................................12-2
12.1.3 Phase of PPP session.....................................................................................................................12-3
12.2 Configuring basic PPPoE functions ........................................................................................................12-3
12.2.1 Establishing the configuration task ...............................................................................................12-3
12.2.2 Enabling PPPoE ............................................................................................................................12-4
12.2.3 Configuring the PPPoE service name at the server side................................................................12-4
12.2.4 Checking the configuration ...........................................................................................................12-5
12.3 Configuring PPPoE parameters...............................................................................................................12-5
12.3.1 Establishing the configuration task ...............................................................................................12-5
12.3.2 Configuring to log the state changes of PPPoE users....................................................................12-6
12.3.3 Setting the maximum number of sessions available on a local MAC address ..............................12-6
12.3.4 Setting the maximum number of sessions available on a peer MAC address ...............................12-7
12.3.5 Setting the maximum number of sessions available on the local system......................................12-7
12.3.6 Checking the configuration ...........................................................................................................12-7
12.4 Maintaining PPPoE .................................................................................................................................12-8
12.5 Configuration examples...........................................................................................................................12-8
12.6 Troubleshooting.....................................................................................................................................12-10
13 Medium-MIB configuration ................................................................................................13-1
13.1 Introduction.............................................................................................................................................13-2
13.2 Configuring attributes of the medium-MIB.............................................................................................13-2
13.2.1 Establishing the configuration task ...............................................................................................13-2
13.2.2 Enabling the MIB collecting of the interface ................................................................................13-3
13.2.3 Enabling the router to send the trap packet ...................................................................................13-3
A Glossary .................................................................................................................................... A-1
B Acronyms and Abbreviations ................................................................................................B-1
Nortel Secure Router 8000 Series
Configuration -WAN Access
xiv
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Index ................................................................................................................................................ i-1
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
xv
Figures
Figure 3-1 CE1 interfaces binding..................................................................................................................3-31
Figure 3-2 E1 interfaces binding ....................................................................................................................3-35
Figure 3-3 Schematic diagram of CE3 interface configuration......................................................................3-38
Figure 4-1 STM-N frame structure...................................................................................................................4-3
Figure 4-2 Process of multiplexing E1 to STM-1.............................................................................................4-4
Figure 4-3 Process of multiplexing T1 to STM-1.............................................................................................4-4
Figure 4-4 Sequence of arrangement of TUG-3, TUG-2 and TU-12 in VC-4..................................................4-5
Figure 4-5 Networking diagram of connecting routers directly through POS interfaces ...............................4-27
Figure 4-6 Networking diagram of using STM-1 CPOS interface.................................................................4-30
Figure 5-1 Networking diagram of configuring the sub-interface..................................................................5-16
Figure 5-2 Networking diagram of configuring the loopback interface .........................................................5-18
Figure 6-1 PPP link operation process..............................................................................................................6-4
Figure 6-2 Networking diagram of PAP or CHAP authentication..................................................................6-47
Figure 6-3 Networking diagram of the MP-group binding.............................................................................6-54
Figure 6-4 Networking diagram of the MP binding .......................................................................................6-59
Figure 6-5 Networking diagram of the MP configuration ..............................................................................6-70
Figure 7-1 X.25 network model........................................................................................................................7-3
Figure 7-2 X.25 protocol Layer........................................................................................................................7-4
Figure 7-3 X.25 packet and LAPB frame.........................................................................................................7-5
Figure 7-4 Interrelationship between LAPB, X.25 and X.25 switching...........................................................7-6
Figure 7-5 Diagram of X.25 network load balancing.......................................................................................7-7
Figure 7-6 XOT typical application diagram....................................................................................................7-8
Figure 7-7 X.25 channel division...................................................................................................................7-16
Figure 7-8 LAN interconnection through X.25..............................................................................................7-24
Figure 7-9 X.25 switching networking diagram.............................................................................................7-30
Figure 7-10 Direct connection between two routers through serial interfaces (LAPB)..................................7-39
Nortel Secure Router 8000 Series
Configuration -WAN Access
xvi
Nortel Networks Inc.
Issue 5.3 (30 March 2009)
Figure 7-11 Direct connection of two routers through serial interface (X.25)................................................7-41
Figure 7-12 Connecting routers to an X.25 public packet network................................................................7-45
Figure 7-13 Networking diagram for configuring VC....................................................................................7-48
Figure 7-14 X.25 PVC bearing IP datagram...................................................................................................7-50
Figure 7-15 One VC consisting of several LCs..............................................................................................7-51
Figure 7-16 Diagram of X.25 sub-interface configuration.............................................................................7-53
Figure 7-17 SVC application networking diagram of XOT ...........................................................................7-57 T
Figure 7-18 Networking diagram of typical configuration of X.25 hunt group..............................................7-65
Figure 7-19 X.25 hunt group carrying IP data transmission...........................................................................7-69
Figure 7-20 Direct connection of two routers through serial interfaces (X.25)..............................................7-73
Figure 8-1 FR interface type.............................................................................................................................8-3
Figure 8-2 Schematic diagram of switching in a PVC standby group..............................................................8-7
Figure 8-3 Schematic diagram of bundle and bundle links ..............................................................................8-9
Figure 8-4 Typical application diagram of FR over IP...................................................................................8-30
Figure 8-5 Interconnecting LANs through FR network..................................................................................8-46
Figure 8-6 Connecting LANs through private line.........................................................................................8-49
Figure 8-7 Networking diagram of FR switching routes................................................................................8-51
Figure 8-8 Networking diagram of PVC standby groups of FR switching.....................................................8-59
Figure 8-9 Networking diagram of the FR standby groups over IP................................................................8-61
Figure 8-10 Networking diagram of FR over IP.............................................................................................8-66
Figure 8-11 Networking diagram of FR compression ....................................................................................8-69
Figure 8-12 Networking diagram of MFR bundle configuration....................................................................8-71
Figure 8-13 Diagram of configuring the FR PVC..........................................................................................8-75
Figure 9-1 Networking diagram of the HDLC functions..................................................................................9-6
Figure 9-2 Networking diagram of the HDLC basic function..........................................................................9-8
Figure 10-1 ATM protocol model...................................................................................................................10-4
Figure 10-2 Networking diagram for IPoA configuration............................................................................10-31
Figure 10-3 Networking diagram of IPoEoA configuration.........................................................................10-34
Figure 10-4 PPPoA configuration networking diagram................................................................................10-36
Figure 10-5 PPPoEoA configuration networking diagram ...........................................................................10-39
Figure 11-1 ATM protocol model...................................................................................................................11-3
Figure 11-2 Networking diagram for IPoA configuration ............................................................................11-15
Figure 12-1 PPPoE networking diagram........................................................................................................12-8
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (30 March 2009)
Nortel Networks Inc.
xvii
Tables
Table 1-1 Command line views and prompts of WAN physical interfaces.......................................................1-2
Table 1-2 Command line views and prompts of WAN logical interfaces.........................................................1-3
Table 1-3 Interface numbering..........................................................................................................................1-6
Table 2-1 Index mode of the synchronous serial interface................................................................................2-2
Table 7-1 Description of X.25 channel range delimitation parameters...........................................................7-16
Table 7-2 X.25 layer 3 timer...........................................................................................................................7-19
Table 8-1 Meanings of FR LMI protocol parameters .......................................................................................8-5
Nortel Secure Router 8000 Series
Configuration -WAN Access
Issue 5.3 (
30 March 2009)
Nortel Networks Inc.
i
Contents
About this document.......................................................................................................................1
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450
  • Page 451 451
  • Page 452 452
  • Page 453 453
  • Page 454 454
  • Page 455 455
  • Page 456 456
  • Page 457 457
  • Page 458 458
  • Page 459 459
  • Page 460 460
  • Page 461 461
  • Page 462 462
  • Page 463 463
  • Page 464 464
  • Page 465 465
  • Page 466 466
  • Page 467 467
  • Page 468 468
  • Page 469 469
  • Page 470 470
  • Page 471 471
  • Page 472 472
  • Page 473 473
  • Page 474 474
  • Page 475 475
  • Page 476 476
  • Page 477 477
  • Page 478 478
  • Page 479 479
  • Page 480 480
  • Page 481 481
  • Page 482 482
  • Page 483 483
  • Page 484 484
  • Page 485 485
  • Page 486 486

Nortel Networks Network Router 8000 User manual

Category
Networking
Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI