Enterasys X-Pedition XSR, X-PeditionTM User manual

  • Hello! I am an AI chatbot trained to assist you with the Enterasys X-Pedition XSR User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
X-Pedition Security Router
XSR User’s Guide
Version 7.6
P/N 9033837-09
i
Notice
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthisdocumentand
itswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networkstodeterminewhetheranysuch
changeshavebeenmade.
Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice.
INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL,OR
CONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS)ARISINGOUTOF
ORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDINTHEM,EVENIF
ENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWNOF,THEPOSSIBILITYOF
SUCHDAMAGES.
Enterasys Networks, Inc.
50MinutemanRoad
Andover,MA01810
©2005Enterasys Networks, Inc.Allrightsreserved.
PartNumber: 903383709 September 2005
ENTERASYSNETWORKS,ENTERASYSXSR,andanylogosassociatedtherewith,aretrademarksorregisteredtrademarksof
EnterasysNetworks,Inc.intheUnitedStatesandothercountries.Allotherproductnamesmentionedinthismanualmaybe
trademarksorregisteredtrademarksoftheirrespectiveowners.
DocumentationURL:http://www.enterasys.com/support/manuals
DocumentacionURL:http://www.enterasys.com/support/manuals
DokumentationURL:http://www.enterasys.com/support/manuals
Electrical Hazard: Only qualified personnel should perform installation procedures.
Riesgo Electrico: Solamente personal calificado debe realizar procedimientos de instalacion.
Elektrischer Gefahrenhinweis: Installationen sollten nur durch ausgebildetes und qualifiziertes Personal
vorgenommen werden.
ii
Regulatory Compliance Information
Federal Communications Commission (FCC) Notice
TheXSRcomplieswithTitle47,Part15,ClassAofFCCrules.Operationissubjecttothefollowingtwoconditions:
•Thisdevicemaynotcauseharmfulinterference.
•Thisdevicemustacceptanyinterferencereceived,includinginterferencethatmaycauseundesiredoperation.
NOTE:TheXSRhasbeentestedandfoundtocomplywiththelimitsforaclassAdigitaldevice,pursuanttoPart15oftheFCC
rules.TheselimitsaredesignedtoprovidereasonableprotectionagainstharmfulinterferencewhentheXSRisoperatedina
commercialenvironment.ThisXSRuses,generates,andcanradiateradiofrequencyenergyandifnotinstalledinaccordance
withtheoperatorsmanual,maycauseharmfulinterferencetoradiocommunications.OperationoftheXSRinaresidential
areaislikelytocauseinterferenceinwhichcaseyouwillberequiredtocorrecttheinterferenceatyourownexpense.
WARNING:ModificationsorchangesmadetotheXSR,andnotapprovedbyEnterasysNetworksmayvoidtheauthority
grantedbytheFCCorothersuchagencytooperatetheXSR.
TheXSRcomplieswithPart68oftheFCCrulesandtherequirementsadoptedbytheAdministrativeCouncilforTerminal
Attachments(ACTA).AlabelonthecircuitboardoftheNetworkInterfaceModulecontains,amongotherinformation,a
productidentifierintheformatlistedinthefollowingtable.Ifrequested,thisnumbermustbeprovidedtothetelephone
company.
AplugandjackusedtoconnecttheXSRtothepremiseswiringandtelephonenetworkmustcomplywiththeapplicableFCC
Part68rulesandrequirementsadoptedbyACTA.Refertothefollowingtableandinstallationinstructionsfordetails.
Codesapplicabletothisequipment:
IftheXSRharmsthetelephonenetwork,thetelephonecompanywillnotifyyouinadvancethatitmayneedtotemporarily
discontinueservice.Butifadvancenoticeisnotpractical,thetelephonecompanywillnotifyyouassoonaspossible.Also,you
willbeadvisedofyourrighttofileacomplaintwiththeFCCifyoubelieveitisnecessary.
Thetelephonecompanymaymakechangesinitsfacilities,equipment,operations,orproceduresthatcouldaffecttheoperation
oftheXSR.Ifthishappens,thetelephonecompanywillprovideadvancenoticeforyoutomakenecessarymodificationsand
maintainuninterruptedservice.
IfyouexperiencetroublewiththeXSR,forrepairorwarrantyinformation,pleasecontactEnterasysNetworks,Inc.,at978684
1000.IftheXSRiscausingharmtothetelephonenetwork,thetelephonecompanymayrequestthatyoudisconnectthe
equipmentuntiltheproblemissolved.TheXSRisnotintendedtoberepairedbythecustomer.
Product Product Identifier
NIM-T1/E1-xx, NIM-CT1E1/PRI-xx US: 5N5DENANET1
NIM-BRI-U-xx US: 5N5DENANEBU
NIM-ADSL-AC-xx US: 5N5DL02NEAA
NIM-DIRELAY-xx US: 5N5DENANEDI
NIM-TE1-xx, NIM-CTE1-PRI-xx US: 5N5DENANECT
Product Jack Used
NIM-T1/E1-xx, NIM-CT1E1/PRI-xx,
NIM-DIRELAY-xx, NIM-TE1-xx,
NIM-CTE1-PRI-xx
RJ48C
NIM-BRI-U-xx RJ49C
NIM-ADSL-AC-xx RJ11C
Product Facilities Interface Code (FIC) Service Order Code (SOC)
NIM-T1/E1-xx, NIM-CT1E1/PRI-xx,
NIM-DIRELAY-xx, NIM-TE1-xx,
NIM-CTE1-PRI-xx
04DU9.BN, 04DU9.DN,
04DU9.1KN, 04DU9.1SN
6.0N
NIM-BRI-U-xx 02IS5 6.0N
NIM-ADSL-AC-xx 02LS2 7.0Y
iii
Industry Canada Notices
ThisdigitalapparatusdoesnotexceedtheclassAlimitsforradionoiseemissionsfromdigitalapparatussetoutintheRadio
InterferenceRegulationsoftheCanadianDepartmentofCommunications.
Leprésentappareilnumériquen’émetpasdebruitsradioélectriquesdépassantleslimitesapplicablesauxappareils
numériquesdelaclassAprescritesdansleRèglementsurlebrouillageradioélectriqueédictéparleministèredes
CommunicationsduCanada.
Equipment Attachments Limitations
“NOTICE:TheIndustryCanadalabelidentifiescertifiedequipment.Thiscertificationmeansthattheequipmentmeets
telecommunicationsnetworkprotective,operationalandsafetyrequirementsasprescribedintheappropriateTerminal
EquipmentTechnicalRequirementsdocument(s).Thedepartmentdoesnotguaranteetheequipmentwilloperatetotheuserʹs
satisfaction.
Beforeinstallingthisequipment,usersshouldensurethatitispermissibletobeconnectedtothefacilitiesofthelocal
telecommunicationscompany.Theequipmentmustalsobeinstalledusinganacceptablemethodofconnection.Thecustomer
shouldbeawarethatcompliancewiththeaboveconditionsmaynotpreventdegradationofserviceinsomesituations.
Repairstocertifiedequipmentshouldbecoordinatedbyarepresentativedesignatedbythesupplier.Anyrepairsoralterations
madebytheusertothisequipment,orequipmentmalfunctions,maygivethetelecommunicationscompanycausetorequest
theusertodisconnecttheequipment.
Usersshouldensurefortheirownprotectionthattheelectricalgroundconnectionsofthepowerutility,telephonelinesand
internalmetallicwaterpipesystem,ifpresent,areconnectedtogether.Thisprecautionmaybeparticularlyimportantinrural
areas.Caution:Usersshouldnotattempttomakesuchconnectionsthemselves,butshouldcontacttheappropriateelectric
inspectionauthority,orelectrician,asappropriate.”
“NOTICE:TheRingerEquivalenceNumber(REN)assignedtoeachterminaldeviceprovidesanindicationofthemaximum
numberofterminalsallowedtobeconnectedtoatelephoneinterface.Theterminationonaninterfacemayconsistofany
combinationofdevicessubjectonlytotherequirementthatthesumoftheringerequivalenceNumbersofallthedevicesdoes
notexceed5.ʺ
R & TTE Directive Declaration
Hereby,EnterasysNetworks,Inc.declaresthatthisXSR1850XPeditionSecurityRouteriscompliantwithessential
requirementsandotherrelevantprovisionsofDirective1999/5/EC.
Class A ITE Notice
WARNING: ThisisaClassAproduct.Inadomesticenvironmentthisproductmaycauseradiointerferenceinwhichcasethe
usermayberequiredtotakeadequatemeasures.
Clase A. Aviso de ITE
ADVERTENCIA:EsteesunproductodeClaseA.Enunambientedomésticoesteproductopuedecausarinterferenciaderadio
encuyocasopuedeserrequeridotomarmedidasadecuadas.
Klasse A ITE Anmerkung
WARNHINWEIS:DiesesProduktzähltzurKlasseA(Industriebereich).InWohnbereichenkanneshierdurchzu
Funkstörungenkommen,dahersolltenangemesseneVorkehrungenzumSchutzgetroffenwerden.
Product Safety
Thisproductcomplieswiththefollowing:UL60950,CSAC22.2No.60950,73/23/EEC,EN60950,EN60825,IEC60950.
UsetheXSRwiththeAdvancedPowerSolutions(APS61ES30)powersupplyincludedwiththebranchrouter.Enterasys
NetworksstronglyrecommendsthatyouuseonlythepropertypeofpowersupplycordsetfortheXSR.Itshouldbea
detachabletype,ULlisted/CSAcertified,typeSJorSJT,rated250Vminimum,7ampwithgroundingtypeattachmentplug.
Maximumlengthis15feet(4.5meters).Thecordsetshouldhavetheappropriatesafetyapprovalforthecountryinwhichthe
equipmentwillbeinstalled.
Seguridad del Producto
ElproductodeEnterasyscumpleconlosiguiente:UL60950,CSAC22.2No.60950,73/23/EEC,EN 60950,EN60825,IEC60950.
Produktsicherheit
DiesesProduktentsprichtdenfolgendenRichtlinien:UL60950,CSAC22.2No.60950,73/23/EEC,EN60950,EN60825,
IEC 60950.
iv
Electromagnetic Compatibility (EMC)
Thisproductcomplieswiththefollowing:47 CFRParts2and15,CSA C108.8,89/336/EEC,EN 55022,EN55024,EN 6100032,
EN 6100033,AS/NZSCISPR22,andVCCIV3.
Compatibilidad Electromágnetica (EMC)
EsteproductodeEnterasyscumpleconlosiguiente:47CFRPartes2y15,CSAC108.8,89/336/EEC,EN 55022,EN 55024,
EN 6100032,EN 6100033,AS/NZSCISPR22,VCCI V3.
Elektro- magnetische Kompatibilität ( EMC )
DiesesProduktentsprichtdenfolgendenRichtlinien:47CFRParts2and15,CSAC108.8,89/336/EEC,EN55022,EN 55024,
EN 6100032,EN6100033,AS/NZSCISPR22,VCCIV3.
European Waste Electrical and Electronic Equipment (WEEE) Notice
InaccordancewithDirective2002/96/ECoftheEuropeanParliamentonwasteelectricalandelectronicequipment(WEEE):
1. Thesymbolaboveindicatesthatseparatecollectionofelectricalandelectronicequipmentisrequiredandthatthisproduct
wasplacedontheEuropeanmarketafterAugust13,2005,thedateofenforcementforDirective2002/96/EC.
2. Whenthisproducthasreachedtheendofitsserviceablelife,itcannotbedisposedofasunsortedmunicipalwaste.Itmust
becollectedandtreatedseparately.
3. IthasbeendeterminedbytheEuropeanParliamentthattherearepotentialnegativeeffectsontheenvironmentandhuman
healthasaresultofthepresenceofhazardoussubstancesinelectricalandelectronicequipment.
4. Itistheusers’responsibilitytoutilizetheavailablecollectionsystemtoensureWEEEisproperlytreated.
Forinformationabouttheavailablecollectionsystem,pleasegotohttp://www.enterasys.com/support/orcontactEnterasys
CustomerSupportat35361705586(Ireland).
VCCI Notice
ThisisaclassAproductbasedonthestandardoftheVoluntaryControlCouncilforInterferencebyInformationTechnology
Equipment(VCCI)V3.Ifthisequipmentisusedinadomesticenvironment,radiodisturbancemayarise.Whensuchtrouble
occurs,theusermayberequiredtotakecorrectiveactions.
BSMI EMC Statement — Taiwan
ThisisaclassAproduct.Inadomesticenvironmentthisproductmaycauseradiointerferenceinwhichcasetheusermaybe
requiredtotakeadequatemeasures.
v
Declaration of Conformity
ApplicationofCouncilDirective(s): 89/336/EEC
73/23/EEC
Manufacturer’sName: Enterasys Networks, Inc.
ManufacturersAddress: 50MinutemanRoad
Andover,MA01810
USA
EuropeanRepresentativeAddress: Enterasys Networks,Ltd.
NexusHouse,NewburyBusinessPark
LondonRoad,Newbury
BerkshireRG142PZ,England
ConformancetoDirective(s)/ProductStandards: ECDirective89/336/EEC
EN55022
EN6100032
EN6100033
EN55024
ECDirective73/23/EEC
EN60950
EN60825
EquipmentType/Environment: NetworkingEquipment,foruseinaCommercial
orLightIndustrialEnvironment.
Enterasys Networks, Inc.declaresthattheequipmentpackagedwiththisnoticeconformstotheabovedirectives.
Australian Telecom
WARNING:Donotinstallphonelineconnectionsduringanelectricalstorm.
WARNING:Donotconnectphonelineuntiltheinterfacehasbeenconfiguredthroughlocalmanagement.Theservice
providermayshutoffserviceifanunconfiguredinterfaceisconnectedtothephonelines.
WARNING:TheNIMBRISTcannotbeconnecteddirectlytooutsidelines.Anapprovedchannelserviceunit(CSU)mustbe
usedforconnectiontotheISDNnetwork.InsomeareasthisCSUissuppliedbythenetworkproviderandinothersitmustbe
suppliedbytheuser.Contactyourserviceproviderfordetails.
Federal Information Processing Standard (FIPS) Certification
TheXSRhasbeensubmittedtotheNationalInstituteofStandardsandTechnology(NIST)forFIPS1402certificationandis
nowofficiallylistedontheNISTprevalidationlist.FormoreinformationabouttheFIPSvalidationprogram,gotohttp://
csrc.nist.gov/cryptval/preval.htm.FortheFIPS1401and1402PreValidationList,clickonthe[PDF]linkatthetopofthe
page.
N826
vi
Independent Communications Authority of South Africa
Thisproductcomplieswiththetermsoftheprovisionsofsection54(1)oftheTelecommunicationsAct(Act103of1996)andthe
TelecommunicationsRegulationprescribedunderthePostOfficeAct(Act44of1958).
VPN Consortium Interoperability
TheVPNConsortium’s(VPNC)testingprogramisanimportantsourceforcertificationofconformancetoIPSecstandards.
Withrigorousinteroperabilitytesting,theVPNClogoprogramprovidesIPSecusersevenmoreassurancethattheXSRwill
interoperateintypicalbusinessenvironments.VPNCistheonlymajorIPSectestingorganizationthatshowsbothproofof
interoperabilityaswellasthestepstakensothatyoucanreproducethetests.
APPROVED
TE-2002/190
APPROVED
TE-2002/195
APPROVED
TE-2003/112
APPROVED
TE-2003/113
APPROVED
SS/366.01
vii
Enterasys Networks, Inc.
Firmware License Agreement
BEFOREOPENINGORUTILIZINGTHEENCLOSEDPRODUCT,
CAREFULLYREADTHISLICENSEAGREEMENT.
Thisdocumentisanagreement(“Agreement”)betweentheenduser(“You”)andEnterasys Networks, Inc.onbehalfofitself
anditsAffiliates(ashereinafterdefined)(“Enterasys”)thatsetsforthYourrightsandobligationswithrespecttotheEnterasys
softwareprogram/firmwareinstalledontheEnterasysproduct(includinganyaccompanyingdocumentation,hardwareor
media)(“Program”)inthepackageandprevailsoveranyadditional,conflictingorinconsistenttermsandconditions
appearingonanypurchaseorderorotherdocumentsubmittedbyYou.Affiliate”meansanyperson,partnership,corporation,
limitedliabilitycompany,orotherformofenterprisethatdirectlyorindirectlythroughoneormoreintermediaries,controls,or
iscontrolledby,orisundercommoncontrolwiththepartyspecified.ThisAgreementconstitutestheentireunderstanding
betweentheparties,andsupersedesallpriordiscussions,representations,understandingsoragreements,whetheroralorin
writing,betweenthepartieswithrespecttothesubjectmatterofthisAgreement.TheProgrammaybecontainedinfirmware,
chipsorothermedia.
BYINSTALLINGOROTHERWISEUSINGTHEPROGRAM,YOUREPRESENTTHATYOUAREAUTHORIZEDTO
ACCEPTTHESETERMSONBEHALFOFTHEENDUSER(IFTHEENDUSERISANENTITYONWHOSEBEHALFYOU
AREAUTHORIZEDTOACT,“YOU”AND“YOUR”SHALLBEDEEMEDTOREFERTOSUCHENTITY)ANDTHATYOU
AGREETHATYOUAREBOUNDBYTHETERMSOFTHISAGREEMENT,WHICHINCLUDES,AMONGOTHER
PROVISIONS,THELICENSE,THEDISCLAIMEROFWARRANTYANDTHELIMITATIONOFLIABILITY.IFYOUDO
NOTAGREETOTHETERMSOFTHISAGREEMENTORARENOTAUTHORIZEDTOENTERINTOTHISAGREEMENT,
ENTERASYSISUNWILLINGTOLICENSETHEPROGRAMTOYOUANDYOUAGREETORETURNTHEUNOPENED
PRODUCTTOENTERASYSORYOURDEALER,IFANY,WITHINTEN(10)DAYSFOLLOWINGTHEDATEOFRECEIPT
FORAFULLREFUND.
IFYOUHAVEANYQUESTIONSABOUTTHISAGREEMENT,CONTACTENTERASYS NETWORKS,LEGAL
DEPARTMENTAT(978)6841000.
YouandEnterasysagreeasfollows:
1. LICENSE. Youhavethenonexclusiveandnontransferablerighttouseonlytheone(1)copyoftheProgramprovidedin
thispackagesubjecttothetermsandconditionsofthisAgreement.
2. RESTRICTIONS. ExceptasotherwiseauthorizedinwritingbyEnterasys,Youmaynot,normayYoupermitanythird
partyto:
(i) Reverseengineer,decompile,disassembleormodifytheProgram,inwholeorinpart,includingforreasonsoferror
correctionorinteroperability,excepttotheextentexpresslypermittedbyapplicablelawandtotheextenttheparties
shallnotbepermittedbythatapplicablelaw,suchrightsareexpresslyexcluded.Informationnecessarytoachieve
interoperabilityorcorrecterrorsisavailablefromEnterasysuponrequestanduponpaymentofEnterasys’applicable
fee.
(ii) IncorporatetheProgram,inwholeorinpart,inanyotherproductorcreatederivativeworksbasedontheProgram,in
wholeorinpart.
(iii) Publish,disclose,copy,reproduceortransmittheProgram,inwholeorinpart.
(iv) Assign,sell,license,sublicense,rent,lease,encumberbywayofsecurityinterest,pledgeorotherwisetransferthe
Program,inwholeorinpart.
(v) Removeanycopyright,trademark,proprietaryrights,disclaimerorwarningnoticeincludedonorembeddedinany
partoftheProgram.
3. APPLICABLELAW. ThisAgreementshallbeinterpretedandgovernedunderthelawsandinthestateandfederalcourts
oftheCommonwealthofMassachusettswithoutregardtoitsconflictsoflawsprovisions.Youacceptthepersonal
jurisdictionandvenueoftheCommonwealthofMassachusettscourts.Noneofthe1980UnitedNationsConventionon
ContractsfortheInternationalSaleofGoods,theUnitedNationsConventionontheLimitationPeriodintheInternational
SaleofGoods,andtheUniformComputerInformationTransactionsActshallapplytothisAgreement.
viii
4. EXPORTRESTRICTIONS. YouunderstandthatEnterasysanditsAffiliatesaresubjecttoregulationbyagenciesofthe
U.S.Government,includingtheU.S.DepartmentofCommerce,whichprohibitexportordiversionofcertaintechnical
productstocertaincountries,unlessalicensetoexporttheProgramisobtainedfromtheU.S.Governmentoranexception
fromobtainingsuchlicensemayberelieduponbytheexportingparty.
IftheProgramisexportedfromtheUnitedStatespursuanttotheLicenseExceptionCIVundertheU.S.Export
AdministrationRegulations,YouagreethatYouareacivilenduseroftheProgramandagreethatYouwillusetheProgram
forcivilendusesonlyandnotformilitarypurposes.
IftheProgramisexportedfromtheUnitedStatespursuanttotheLicenseExceptionTSRundertheU.S.Export
AdministrationRegulations,inadditiontotherestrictionontransfersetforthinSections1or2ofthisAgreement,You
agreenotto(i)reexportorreleasetheProgram,thesourcecodefortheProgramortechnologytoanationalofacountryin
CountryGroupsD:1orE:2(Albania,Armenia,Azerbaijan,Belarus,Bulgaria,Cambodia,Cuba,Estonia,Georgia,Iraq,
Kazakhstan,Kyrgyzstan,Laos,Latvia,Libya,Lithuania,Moldova,NorthKorea,thePeoplesRepublicofChina,Romania,
Russia,Rwanda,Tajikistan,Turkmenistan,Ukraine,Uzbekistan,Vietnam,orsuchothercountriesasmaybedesignatedby
theUnitedStatesGovernment),(ii)exporttoCountryGroupsD:1orE:2(asdefinedherein)thedirectproductofthe
Programorthetechnology,ifsuchforeignproduceddirectproductissubjecttonationalsecuritycontrolsasidentifiedon
theU.S.CommerceControlList,or(iii)ifthedirectproductofthetechnologyisacompleteplantoranymajorcomponent
ofaplant,exporttoCountryGroupsD:1orE:2thedirectproductoftheplantoramajorcomponentthereof,ifsuchforeign
produceddirectproductissubjecttonationalsecuritycontrolsasidentifiedontheU.S.CommerceControlListorissubject
toStateDepartmentcontrolsundertheU.S.MunitionsList.
5. UNITEDSTATESGOVERNMENTRESTRICTEDRIGHTS. TheenclosedProgram(i)wasdevelopedsolelyatprivate
expense;(ii)contains“restrictedcomputersoftware”submittedwithrestrictedrightsinaccordancewithsection52.22719
(a)through(d)oftheCommercialComputerSoftwareRestrictedRightsClauseanditssuccessors,and(iii)inallrespectsis
proprietarydatabelongingtoEnterasysand/oritssuppliers.ForDepartmentofDefenseunits,theProgramisconsidered
commercialcomputersoftwareinaccordancewithDFARSsection227.72023anditssuccessors,anduse,duplication,or
disclosurebytheGovernmentissubjecttorestrictionssetforthherein.
6. DISCLAIMEROFWARRANTY. EXCEPTFORTHOSEWARRANTIESEXPRESSLYPROVIDEDTOYOUINWRITING
BYEnterasys,EnterasysDISCLAIMSALLWARRANTIES,EITHEREXPRESSORIMPLIED,INCLUDINGBUTNOT
LIMITEDTOIMPLIEDWARRANTIESOFMERCHANTABILITY,SATISFACTORYQUALITY,FITNESSFORA
PARTICULARPURPOSE,TITLEANDNON‐INFRINGEMENTWITHRESPECTTOTHEPROGRAM.IFIMPLIED
WARRANTIESMAYNOTBEDISCLAIMEDBYAPPLICABLELAW,THENANYIMPLIEDWARRANTIESARE
LIMITEDINDURATIONTOTHIRTY(30)DAYSAFTERDELIVERYOFTHEPROGRAMTOYOU.
7. LIMITATIONOFLIABILITY. INNOEVENTSHALLENTERASYSORITSSUPPLIERSBELIABLEFORANY
DAMAGESWHATSOEVER(INCLUDING,WITHOUTLIMITATION,DAMAGESFORLOSSOFBUSINESS,PROFITS,
BUSINESSINTERRUPTION,LOSSOFBUSINESSINFORMATION,SPECIAL,INCIDENTAL,CONSEQUENTIAL,OR
RELIANCEDAMAGES,OROTHERLOSS)ARISINGOUTOFTHEUSEORINABILITYTOUSETHEPROGRAM,EVEN
IFENTERASYSHASBEENADVISEDOFTHEPOSSIBILITYOFSUCHDAMAGES.THISFOREGOINGLIMITATION
SHALLAPPLYREGARDLESSOFTHECAUSEOFACTIONUNDERWHICHDAMAGESARESOUGHT.
THECUMULATIVELIABILITYOFENTERASYSTOYOUFORALLCLAIMSRELATINGTOTHEPROGRAM,IN
CONTRACT,TORTOROTHERWISE,SHALLNOTEXCEEDTHETOTALAMOUNTOFFEESPAIDTOENTERASYSBY
YOUFORTHERIGHTSGRANTEDHEREIN.
8. AUDITRIGHTS. YouherebyacknowledgethattheintellectualpropertyrightsassociatedwiththeProgramareofcritical
valuetoEnterasysand,accordingly,Youherebyagreeto maintaincompletebooks,recordsandaccountsshowing(i)license
feesdueandpaid,and(ii)theuse,copyinganddeploymentoftheProgram.YoualsogranttoEnterasysanditsauthorized
representatives,uponreasonablenotice,therightto auditandexamineduringYournormalbusinesshours,Yourbooks,
records,accountsandhardwaredevicesuponwhichtheProgrammaybedeployedtoverifycompliancewiththis
Agreement,includingtheverificationofthelicensefeesdueandpaidEnterasysandtheuse,copyinganddeploymentof
theProgram.Enterasys’rightofexamination shallbeexercisedreasonably,ingoodfaithandinamannercalculatedtonot
unreasonablyinterferewithYourbusiness.IntheeventsuchauditdiscoversnoncompliancewiththisAgreement,
includingcopiesoftheProgrammade,usedordeployedinbreachofthisAgreement,YoushallpromptlypaytoEnterasys
theappropriatelicensefees.Enterasys reservestheright,tobeexercisedinitssolediscretionandwithoutpriornotice,to
terminatethislicense,effectiveimmediately,forfailuretocomplywiththisAgreement.Uponanysuchtermination,You
shallimmediatelyceasealluseoftheProgramandshallreturntoEnterasystheProgramandallcopiesoftheProgram.
9. OWNERSHIP. Thisisalicenseagreementandnotanagreementforsale.YouacknowledgeandagreethattheProgram
constitutestradesecretsand/orcopyrightedmaterialofEnterasysand/oritssuppliers.Youagreetoimplementreasonable
securitymeasurestoprotectsuchtradesecretsandcopyrightedmaterial.Allright,titleandinterestinandtotheProgram
shallremainwithEnterasysand/oritssuppliers.AllrightsnotspecificallygrantedtoYoushallbereservedtoEnterasys.
ix
10. ENFORCEMENT. YouacknowledgeandagreethatanybreachofSections2,4,or9ofthisAgreementbyYoumaycause
Enterasysirreparabledamageforwhichrecoveryofmoneydamageswouldbeinadequate,andthatEnterasysmaybe
entitledtoseektimelyinjunctiverelieftoprotectEnterasys’rightsunderthisAgreementinadditiontoanyandallremedies
availableatlaw.
11. ASSIGNMENT. Youmaynotassign,transferorsublicensethisAgreementoranyofYourrightsorobligationsunderthis
Agreement,exceptthatYoumayassignthisAgreementtoanypersonorentitywhichacquiressubstantiallyallofYour
stockorassets.EnterasysmayassignthisAgreementinitssolediscretion.ThisAgreementshallbebindinguponandinure
tothebenefitoftheparties,theirlegalrepresentatives,permittedtransferees,successorsandassignsaspermittedbythis
Agreement.Anyattemptedassignment,transferorsublicenseinviolationofthetermsofthisAgreementshallbevoidand
abreachofthisAgreement.
12. WAIVER. AwaiverbyEnterasysofabreachofanyofthetermsandconditionsofthisAgreementmustbeinwritingand
willnotbeconstruedasawaiverofanysubsequentbreachofsuchtermorcondition.Enterasys’failuretoenforceaterm
uponYourbreachofsuchtermshallnotbeconstruedasawaiverofYourbreachorpreventenforcementonanyother
occasion.
13. SEVERABILITY. IntheeventanyprovisionofthisAgreementisfoundtobeinvalid,illegalorunenforceable,thevalidity,
legalityandenforceabilityofanyoftheremainingprovisionsshallnotinanywaybeaffectedorimpairedthereby,andthat
provisionshallbereformed,construedandenforcedtothemaximumextentpermissible.Anysuchinvalidity,illegalityor
unenforceabilityinanyjurisdictionshallnotinvalidateorrenderillegalorunenforceablesuchprovisioninanyother
jurisdiction.
14. TERMINATION. EnterasysmayterminatethisAgreementimmediatelyuponYourbreachofanyofthetermsand
conditionsofthisAgreement.Uponanysuchtermination,YoushallimmediatelyceasealluseoftheProgramandshall
returntoEnterasystheProgramandallcopiesoftheProgram.
x
xi
Contents
Preface
Contents of the Guide ................................................................................................................................... xxvii
Conventions Used in This Guide ..................................................................................................................xxviii
Getting Help .................................................................................................................................................... xxx
Chapter 1: Overview
Chapter 2: Managing the XSR
Utilizing the Command Line Interface ............................................................................................................. 2-1
Connecting via the Console Port on XSR Series ..................................................................................... 2-1
Using the Console Port for Dial Backup on the XSR 1800 Series...................................................... 2-1
Using the Console Port to Remotely Control the XSR ....................................................................... 2-2
Connecting a Serial Interface to a Modem ......................................................................................... 2-2
Terminal Commands .......................................................................................................................... 2-3
Connecting via Telnet .............................................................................................................................. 2-3
Connecting via SSH ................................................................................................................................. 2-3
Accessing the Initial Prompt ..................................................................................................................... 2-4
Synchronizing the Clock ........................................................................................................................... 2-4
Managing the Session .............................................................................................................................. 2-5
Remote Auto Install .................................................................................................................................. 2-5
RAI Features and Requirements ........................................................................................................ 2-5
RAI Requirements on the XSR ........................................................................................................... 2-7
How RAI Components Work............................................................................................................... 2-7
CLI Editing Rules ................................................................................................................................... 2-11
Setting CLI Configuration Modes ........................................................................................................... 2-12
User EXEC Mode ............................................................................................................................. 2-14
Privileged EXEC Mode ..................................................................................................................... 2-14
Global Configuration Mode .................................................................................................................... 2-14
Exiting From the Current Mode .............................................................................................................. 2-14
Mode Examples ..................................................................................................................................... 2-15
Observing Command Syntax and Conventions ..................................................................................... 2-15
CLI Command Limits ........................................................................................................................ 2-16
Describing Ports and Interfaces ............................................................................................................. 2-16
Supported Physical Interfaces.......................................................................................................... 2-16
Supported Virtual Interfaces ............................................................................................................. 2-16
Supported Ports................................................................................................................................ 2-17
Numbering XSR Slots, Cards, and Ports ............................................................................................... 2-17
Setting Port Configuration Mode ...................................................................................................... 2-17
Setting Interface Type and Numbering .................................................................................................. 2-17
Configuration Examples ................................................................................................................... 2-18
Entering Commands that Control Tables ............................................................................................... 2-20
Adding Table Entries ........................................................................................................................ 2-20
Deleting Table Entries ...................................................................................................................... 2-21
Modifying Table Entries .................................................................................................................... 2-21
Displaying Table Entries................................................................................................................... 2-21
Managing XSR Interfaces ...................................................................................................................... 2-21
Enabling an Interface........................................................................................................................ 2-22
Disabling an Interface....................................................................................................................... 2-22
xii
Configuring an Interface ................................................................................................................... 2-22
Displaying Interface Attributes .......................................................................................................... 2-22
Managing Message Logs ....................................................................................................................... 2-23
Logging Commands ......................................................................................................................... 2-23
Performing Fault Management ............................................................................................................... 2-23
Fault Report Commands .................................................................................................................. 2-24
Capturing Fault Report Data............................................................................................................. 2-24
Using the Real-Time Clock .................................................................................................................... 2-25
RTC/Network Clock Options............................................................................................................. 2-25
RTC Commands............................................................................................................................... 2-25
Managing the System Configuration ...................................................................................................... 2-25
Resetting the Configuration to Factory Default ...................................................................................... 2-26
Using the Default Button (XSR 1800/1200 Series Only) .................................................................. 2-26
Configuration Save Options ................................................................................................................... 2-27
Using File System Commands ......................................................................................................... 2-27
Bulk Configuration Management ............................................................................................................ 2-27
Downloading the Configuration ........................................................................................................ 2-27
Uploading the Configuration/Crash Report....................................................................................... 2-28
Creating Alternate Configuration Files.............................................................................................. 2-28
Managing the Software Image ............................................................................................................... 2-29
Creating Alternate Software Image Files.......................................................................................... 2-29
BootRom Upgrade Choices .............................................................................................................. 2-29
Loading Software Images................................................................................................................. 2-34
Using EOS Fallback to Upgrade the Image...................................................................................... 2-34
Downloading with FIPS Security ...................................................................................................... 2-36
Software Image Commands ............................................................................................................. 2-36
Configuration Change Hashing ........................................................................................................ 2-36
Displaying System Status and Statistics ................................................................................................ 2-37
Memory Management ................................................................................................................................... 2-37
Creating Resources ............................................................................................................................... 2-37
Network Management through SNMP .......................................................................................................... 2-38
SNMP Informs ........................................................................................................................................ 2-39
Shaping Trap Traffic ............................................................................................................................... 2-39
Statistics ................................................................................................................................................. 2-39
Alarm Management (Traps) ................................................................................................................... 2-40
Network Monitoring via Service Level Agreement Agent ....................................................................... 2-40
Measuring Performance Metrics....................................................................................................... 2-40
Configuration Examples ................................................................................................................... 2-41
Using the SLA Agent in SNMP ......................................................................................................... 2-43
Full Configuration Backup/Restore ........................................................................................................ 2-43
Cabletron CTdownload MIB ............................................................................................................. 2-43
Enterasys Configuration Management MIB...................................................................................... 2-43
Software Image Download using NetSight ............................................................................................. 2-44
CLI Translator................................................................................................................................... 2-44
Appending CLI Commands to Configuration Files via SNMP ................................................................ 2-44
Accessing the XSR Through the Web .......................................................................................................... 2-45
Network Management Tools ......................................................................................................................... 2-45
NetSight Atlas Router Services Manager v2.0 ....................................................................................... 2-45
Firmware Upgrade Procedures .............................................................................................................. 2-45
Using the CLI for Downloads............................................................................................................ 2-46
Using SNMP for Downloads ............................................................................................................. 2-46
Fault Reporting ....................................................................................................................................... 2-46
Auto-discovery ....................................................................................................................................... 2-46
xiii
Chapter 3: Managing LAN/WAN Interfaces
Overview of LAN Interfaces ............................................................................................................................ 3-1
LAN Features ................................................................................................................................................. 3-1
Configuring the LAN ....................................................................................................................................... 3-2
MIB Statistics .................................................................................................................................................. 3-2
Overview of WAN Interfaces .......................................................................................................................... 3-3
WAN Features ................................................................................................................................................ 3-3
Configuring the WAN ...................................................................................................................................... 3-4
Chapter 4: Configuring T1/E1 & T3/E3 Interfaces
Overview ......................................................................................................................................................... 4-1
T1/E1 Functionality .................................................................................................................................. 4-1
T3/E3 Functionality .................................................................................................................................. 4-1
Features ......................................................................................................................................................... 4-1
T1/E1 Mode .............................................................................................................................................. 4-1
T3 Mode ................................................................................................................................................... 4-2
E3 Mode ................................................................................................................................................... 4-2
T1/E1 Subsystem Configuration .............................................................................................................. 4-3
T3/E3 Subsystem Configuration .............................................................................................................. 4-3
T1 Drop & Insert One-to-One DS0 Bypassing ......................................................................................... 4-4
Drop and Insert Features.................................................................................................................... 4-4
Configuring Channelized T1/E1 Interfaces ..................................................................................................... 4-5
Configuring Un-channelized T3/E3 Interfaces ................................................................................................ 4-6
Troubleshooting T1/E1 & T3/E3 Links ............................................................................................................ 4-7
T1/E1 & T3/E3 Physical Layer Troubleshooting ...................................................................................... 4-7
T1/E1 & T3/E3 Alarm Analysis ................................................................................................................. 4-9
Receive Alarm Indication Signal (AIS - Blue Alarm) ........................................................................... 4-9
Receive Remote Alarm Indication (RAI - Yellow Alarm)................................................................... 4-10
Transmit Remote Alarm Indication (RAI - Yellow Alarm).................................................................. 4-10
Transmit Sending Remote Alarm (Red Alarm) ................................................................................. 4-10
Transmit Alarm Indication Signal (AIS - Blue Alarm) ........................................................................ 4-10
T1/E1 & T3/E3 Error Events Analysis .................................................................................................... 4-11
Slip Seconds Counter Increasing ..................................................................................................... 4-12
Framing Loss Seconds Increasing ................................................................................................... 4-13
Line Code Violations Increasing ....................................................................................................... 4-13
Configuring the D&I NIM ........................................................................................................................ 4-13
Chapter 5: Configuring IP
Overview ......................................................................................................................................................... 5-1
General IP Features ....................................................................................................................................... 5-1
ARP and Proxy ARP ................................................................................................................................ 5-4
Proxy DNS ............................................................................................................................................... 5-4
BOOTP/DHCP Relay ............................................................................................................................... 5-4
Broadcast ................................................................................................................................................. 5-5
Directed Broadcast ............................................................................................................................. 5-5
Local Broadcast.................................................................................................................................. 5-5
ICMP ........................................................................................................................................................ 5-5
TCP .......................................................................................................................................................... 5-6
UDP .......................................................................................................................................................... 5-6
Telnet ....................................................................................................................................................... 5-6
SSH .......................................................................................................................................................... 5-6
Trivial File Transfer Protocol (TFTP) ........................................................................................................ 5-7
IP Interface ............................................................................................................................................... 5-7
xiv
Secondary IP ............................................................................................................................................ 5-7
Interface & Secondary IP.................................................................................................................... 5-7
ARP & Secondary IP .......................................................................................................................... 5-8
ICMP & Secondary IP......................................................................................................................... 5-8
Routing Table Manager & Secondary IP ............................................................................................5-9
OSPF & Secondary IP........................................................................................................................ 5-9
RIP & Secondary IP............................................................................................................................ 5-9
Unnumbered Interface & Secondary IP.............................................................................................. 5-9
NAT & Secondary IP .......................................................................................................................... 5-9
DHCP & Secondary IP ....................................................................................................................... 5-9
VPN & Secondary IP .......................................................................................................................... 5-9
VRRP & Secondary IP...................................................................................................................... 5-10
PPPoE & Secondary IP .................................................................................................................... 5-10
Maximum Transmission Unit (MTU) ....................................................................................................... 5-10
Ping ........................................................................................................................................................ 5-10
Traceroute .............................................................................................................................................. 5-10
IP Routing Protocols ..................................................................................................................................... 5-10
RIPv1 and v2 .......................................................................................................................................... 5-11
Triggered-on-Demand RIP ..................................................................................................................... 5-12
How Triggered-on-Demand RIP Works ............................................................................................ 5-12
OSPF ..................................................................................................................................................... 5-14
LSA Type 3 and 5 Summarization.................................................................................................... 5-15
OSPF Database Overflow ................................................................................................................ 5-15
OSPF Passive Interfaces ................................................................................................................. 5-16
OSPF Troubleshooting ........................................................................................................................... 5-17
Null Interface .......................................................................................................................................... 5-17
Route Preference ................................................................................................................................... 5-17
Static Routes .......................................................................................................................................... 5-18
VLAN Routing ........................................................................................................................................ 5-18
Forwarding VLAN, PPPoE over VLAN ............................................................................................. 5-19
VLAN Processing Over the XSR’s Ethernet Interfaces .................................................................... 5-20
VLAN Processing: VLAN-enabled Ethernet to Standard LAN Interfaces ......................................... 5-20
VLAN Processing: VLAN-enabled Ethernet to WAN Interfaces ....................................................... 5-21
VLAN Processing: WAN Interface to a VLAN-enabled Ethernet Interface ....................................... 5-21
QoS with VLAN................................................................................................................................. 5-22
Policy Based Routing ............................................................................................................................. 5-22
Accessing the Global Routing Policy Table...................................................................................... 5-22
Match Clauses.................................................................................................................................. 5-23
Set Clauses ...................................................................................................................................... 5-23
PBR Cache....................................................................................................................................... 5-23
Default Network ...................................................................................................................................... 5-24
Classless Inter-Domain Routing (CIDR) ................................................................................................ 5-24
Router ID ................................................................................................................................................ 5-24
Real Time Protocol (RTP) Header Compression ................................................................................... 5-25
Network Address Translation ................................................................................................................. 5-26
Features ........................................................................................................................................... 5-26
Virtual Router Redundancy Protocol ...................................................................................................... 5-27
VRRP Definitions.............................................................................................................................. 5-28
How the VRRP Works ...................................................................................................................... 5-29
Different States of a VRRP Router ................................................................................................... 5-29
VRRP Features ...................................................................................................................................... 5-30
Multiple Virtual IP Addresses per VR ............................................................................................... 5-30
Multiple VRs Per Router ................................................................................................................... 5-30
Authentication................................................................................................................................... 5-30
xv
Load Balancing................................................................................................................................. 5-31
ARP Process on a VRRP Router ..................................................................................................... 5-31
Host ARP.......................................................................................................................................... 5-31
Proxy ARP ........................................................................................................................................ 5-31
Gratuitous ARP................................................................................................................................. 5-31
Traffic Process on a VRRP Router................................................................................................... 5-31
ICMP Ping ........................................................................................................................................ 5-32
Interface Monitoring.......................................................................................................................... 5-32
Watch Group Monitoring................................................................................................................... 5-33
Physical Interface and Physical IP Address Change on a VRRP Router......................................... 5-33
Equal-Cost Multi-Path (ECMP) .............................................................................................................. 5-34
Configuration Considerations ........................................................................................................... 5-34
Configuring RIP Examples ........................................................................................................................... 5-35
Configuring Unnumbered IP Serial Interface Example ................................................................................. 5-37
Configuring OSPF Example ......................................................................................................................... 5-37
Configuring NAT Examples .......................................................................................................................... 5-38
Basic One-to-One Static NAT ................................................................................................................ 5-38
Configuring Static Translation .......................................................................................................... 5-38
Dynamic Pool Configuration ................................................................................................................... 5-39
Configuring Dynamic Pool Translation ............................................................................................. 5-39
Network Address and Port Translation .................................................................................................. 5-40
Configuring NAPT............................................................................................................................. 5-40
Configuring NAPT............................................................................................................................. 5-41
Multiple NAT Pools within an Interface .................................................................................................. 5-41
Static NAT within an Interface ................................................................................................................ 5-42
NAT Port Forwarding ............................................................................................................................. 5-44
Configuring Policy Based Routing Example ................................................................................................. 5-44
Configuring VRRP Example ......................................................................................................................... 5-45
Router XSRa .................................................................................................................................... 5-45
Router XSRb .................................................................................................................................... 5-45
Configuring VLAN Examples ........................................................................................................................ 5-46
Chapter 6: Configuring the Border Gateway Protocol
Features ......................................................................................................................................................... 6-1
Overview ......................................................................................................................................................... 6-1
Describing BGP Messages ...................................................................................................................... 6-2
Open................................................................................................................................................... 6-2
Update ................................................................................................................................................ 6-3
Keepalive............................................................................................................................................ 6-3
Notification.......................................................................................................................................... 6-3
Defining BGP Path Attributes ................................................................................................................... 6-3
AS Path .............................................................................................................................................. 6-4
Origin .................................................................................................................................................. 6-4
Next Hop............................................................................................................................................. 6-5
Local Preference ................................................................................................................................ 6-5
Weight ................................................................................................................................................ 6-7
Atomic Aggregate ............................................................................................................................... 6-7
Aggregator.......................................................................................................................................... 6-8
Multi-Exit Discriminator ....................................................................................................................... 6-8
Community ......................................................................................................................................... 6-9
BGP Path Selection Process ................................................................................................................. 6-11
BGP Routing Policy ................................................................................................................................ 6-11
Access Control Lists ......................................................................................................................... 6-12
xvi
Filter Lists ......................................................................................................................................... 6-12
Community Lists ............................................................................................................................... 6-12
Route Maps ...................................................................................................................................... 6-12
Regular Expressions ........................................................................................................................ 6-13
Regular Expression Characters........................................................................................................ 6-13
Regular Expression Examples ......................................................................................................... 6-13
Peer Groups ..................................................................................................................................... 6-14
Initial BGP Configuration ........................................................................................................................ 6-15
Adding BGP Neighbors .......................................................................................................................... 6-15
Resetting BGP Connections .................................................................................................................. 6-15
Synchronization ...................................................................................................................................... 6-16
Address Aggregation .............................................................................................................................. 6-16
Route Flap Dampening .......................................................................................................................... 6-16
Recommendations for Route Flap Dampening ................................................................................ 6-17
Capability Advertisement ....................................................................................................................... 6-17
Route Refresh ........................................................................................................................................ 6-17
Scaling BGP ........................................................................................................................................... 6-18
Route Reflectors............................................................................................................................... 6-19
Confederations ................................................................................................................................. 6-20
Displaying System and Network Statistics ............................................................................................. 6-21
Configuring BGP Route Maps ...................................................................................................................... 6-22
Configuring BGP Neighbors ................................................................................................................... 6-23
BGP Path Filtering by Neighbor Example .............................................................................................. 6-23
BGP Aggregate Route Examples ........................................................................................................... 6-24
Configuring BGP Confederations ........................................................................................................... 6-24
TCP MD5 Authentication for BGP Example ........................................................................................... 6-25
Configuring BGP Peer Groups ..................................................................................................................... 6-25
IBGP Peer Group Example .................................................................................................................... 6-25
EBGP Peer Group Example ................................................................................................................... 6-26
BGP Community with Route Maps Examples ........................................................................................ 6-26
Chapter 7: Configuring PIM-SM and IGMP
Features ......................................................................................................................................................... 7-1
Differences with Industry-Standard Approach .......................................................................................... 7-1
IP Multicast Overview ..................................................................................................................................... 7-2
Defining Multicast Group Addressing ....................................................................................................... 7-2
Outlining IGMP Versions .......................................................................................................................... 7-3
Comparing Multicast Distribution Trees ................................................................................................... 7-3
Forwarding Multicast Traffic ..................................................................................................................... 7-4
Describing the XSR’s IP Multicast Features ................................................................................................... 7-4
Group Membership Actions ...................................................................................................................... 7-5
Sending and Receiving Queries and Reports .......................................................................................... 7-5
Sending a Query................................................................................................................................. 7-5
Receiving a Query .............................................................................................................................. 7-6
Receiving a Report ............................................................................................................................. 7-6
Source-Specific Forwarding Rules ..................................................................................................... 7-6
Interoperating with Older IGMP Versions ................................................................................................. 7-6
Query Version Distinctions ................................................................................................................. 7-6
Behavior of Group Members Among Older Version Queriers ............................................................ 7-6
Behavior of Group Members Among Older Version Group Members ................................................ 7-7
Behavior of Multicast Routers Among Older Version Queriers .......................................................... 7-7
Behavior of Multicast Routers Among Older Version Group Members .............................................. 7-7
xvii
Describing the XSR’s PIM-SM v2 Features .................................................................................................... 7-7
Phase 1: Building a Shared Tree ............................................................................................................. 7-8
Phase 2: Building Shortest Path Tree Between Sender & RP ................................................................. 7-8
Phase 3: Building Shortest Path Tree Between Sender & Receiver ........................................................ 7-9
Neighbor Discovery and DR Election ..................................................................................................... 7-10
PIM Register Message ........................................................................................................................... 7-11
PIM Join/Prune Message ....................................................................................................................... 7-11
Bootstrap & Rendezvous Point .............................................................................................................. 7-11
Assert Processing .................................................................................................................................. 7-11
Source-Specific Multicast ....................................................................................................................... 7-12
PIM SM over Frame Relay ..................................................................................................................... 7-12
PIM Configuration Examples ........................................................................................................................ 7-13
Chapter 8: Configuring PPP
Overview ......................................................................................................................................................... 8-1
PPP Features ................................................................................................................................................. 8-1
Link Control Protocol (LCP) ..................................................................................................................... 8-2
Network Control Protocol (NCP) .............................................................................................................. 8-2
Authentication .......................................................................................................................................... 8-3
Password Authentication Protocol (PAP) ........................................................................................... 8-3
Challenge Handshake Authentication Protocol (CHAP)..................................................................... 8-3
Microsoft Challenge Handshake Protocol (MS-CHAP) ...................................................................... 8-3
Link Quality Monitoring (LQM) ................................................................................................................. 8-4
Multilink PPP (MLPPP) ............................................................................................................................ 8-4
Multi-Class MLPPP .................................................................................................................................. 8-5
MLPPP Packet Fragmentation and Serialization Transmission Latency............................................ 8-6
Fragment Interleaving Over the Link .................................................................................................. 8-7
Multilink Head Format Negotiation ..................................................................................................... 8-7
Events and Alarms ............................................................................................................................. 8-8
IP Control Protocol (IPCP) ....................................................................................................................... 8-8
IP Address Assignment ...................................................................................................................... 8-9
PPP Bandwidth Allocation/Control Protocols (BAP/BAPC) ...................................................................... 8-9
Configuring PPP with a Dialed Backup Line ................................................................................................. 8-10
Configuring a Synchronous Serial Interface ................................................................................................. 8-10
Configuring a Dialed Backup Line ................................................................................................................ 8-11
Configuring the Dialer Interface ............................................................................................................. 8-11
Configuring the Physical Interface for the Dialer Interface ..................................................................... 8-11
Configuring the Interface as the Backup Dialer Interface .......................................................................8-12
Configuring MLPPP on a Multilink/Dialer interface ....................................................................................... 8-13
Multilink Example ................................................................................................................................... 8-13
Dialer Example ....................................................................................................................................... 8-13
Configuring BAP ........................................................................................................................................... 8-14
Dual XSRs: One Router Using DoD with Call Request .......................................................................... 8-14
XSR1 Configuration.......................................................................................................................... 8-14
XSR2 Configuration.......................................................................................................................... 8-15
Dual XSRs: BAP Using Call/Callback Request ...................................................................................... 8-16
XSR1 Configuration.......................................................................................................................... 8-16
XSR2 Configuration.......................................................................................................................... 8-16
xviii
Chapter 9: Configuring Frame Relay
Overview ......................................................................................................................................................... 9-1
Virtual Circuits .................................................................................................................................... 9-1
DLCIs.................................................................................................................................................. 9-1
DTEs................................................................................................................................................... 9-2
DCEs .................................................................................................................................................. 9-2
Frame Relay Features .................................................................................................................................... 9-3
Multi-Protocol Encapsulation .................................................................................................................... 9-3
Address Resolution .................................................................................................................................. 9-4
Dynamic Resolution Using Inverse ARP .................................................................................................. 9-4
Controlling Congestion in Frame Relay Networks .......................................................................................... 9-4
Rate Enforcement (CIR) - Generic Traffic Shaping .................................................................................. 9-4
Discard Eligibility (DE) Bit ........................................................................................................................ 9-5
Forward Explicit Congestion Notification (FECN) .................................................................................... 9-5
Backward Explicit Congestion Notification (BECN) .................................................................................. 9-5
Link Management Information (LMI) ............................................................................................................... 9-7
Sub-interfaces ................................................................................................................................................ 9-7
FRF.12 Fragmentation ................................................................................................................................... 9-8
End-to-End Fragmentation ....................................................................................................................... 9-8
User Configuration Commands ................................................................................................................ 9-8
Map-Class Configuration .................................................................................................................... 9-9
Show Running Configuration.............................................................................................................. 9-9
Displaying Statistics............................................................................................................................ 9-9
Reports and Alarms ................................................................................................................................. 9-9
Clear Statistics ......................................................................................................................................... 9-9
Interconnecting via Frame Relay Network .................................................................................................... 9-10
Configuring Frame Relay .............................................................................................................................. 9-11
Multi-point to Point-to-Point Example ..................................................................................................... 9-11
Chapter 10: Configuring Dialer Services
Overview of Dial Services ............................................................................................................................. 10-1
Dial Services Features ........................................................................................................................... 10-1
Asynchronous and Synchronous Support .................................................................................................... 10-2
AT Commands on Asynchronous Ports ................................................................................................. 10-2
V.25bis over Synchronous Interfaces .................................................................................................... 10-2
DTR Dialing for Synchronous Interfaces ................................................................................................ 10-3
Time of Day feature ................................................................................................................................ 10-3
Typical Use for Dial Services ................................................................................................................. 10-3
Ethernet Backup ..................................................................................................................................... 10-3
Implementing Dial Services .......................................................................................................................... 10-4
Dialer Profiles ......................................................................................................................................... 10-4
Dialer Interface ....................................................................................................................................... 10-5
Dialer Strings .......................................................................................................................................... 10-5
Dialer Pool .............................................................................................................................................. 10-5
Addressing Dialer Resources ................................................................................................................. 10-5
Configuring Encapsulation ..................................................................................................................... 10-6
ISDN Callback ........................................................................................................................................ 10-6
Configuring the Dialer Interface ........................................................................................................... 10-10
Creating and Configuring the Dialer Interface ................................................................................ 10-10
Configuring the Map Class ............................................................................................................. 10-11
Configuring the Physical Interface for the Dialer Interface ............................................................. 10-11
Sample Dialer Configuration ................................................................................................................ 10-11
/