Enterasys Networks XSR CLI, X-Pedition XSR CLI User manual

  • Hello! I am an AI chatbot trained to assist you with the Enterasys Networks XSR CLI User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
X-Pedition
Security Router
XSR CLI Reference Guide
Version 7.6
P/N 9033842-07
-i
Notice
Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and
its Web site without prior notice. The reader should in all cases consult Enterasys Networks to determine whether any such
changes have been made.
The hardware, firmware, or software described in this document is subject to change without notice.
IN NO EVENT SHALL ENTERASYS NETWORKS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR
CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF
OR RELATED TO THIS DOCUMENT, WEB SITE, OR THE INFORMATION CONTAINED IN THEM, EVEN IF ENTERASYS
NETWORKS HAS BEEN ADVISED OF, KNEW OF, OR SHOULD HAVE KNOWN OF, THE POSSIBILITY OF SUCH
DAMAGES.
Enterasys Networks, Inc.
50 Minuteman Road
Andover, MA 01810
© 2004 Enterasys Networks, Inc. All Rights Reserved
Part Number: 9033842-07 September 2005
ENTERASYS NETWORKS, ENTERASYS XSR and any logos associated therewith, are trademarks or registered trademarks of
Enterasys Networks, Inc. in the United States and other countries. All other product names mentioned in this manual may be
trademarks or registered trademarks of their respective owners.
Documentation URL: http://www.enterasys.com/support/manuals
Documentacion URL: http://www.enterasys.com/support/manuals
Dokumentation http://www.enterasys.com/support/manuals
0
Enterasys Networks, Inc.
FIRMWARE LICENSE AGREEMENT
BEFOREOPENINGORUTILIZINGTHEENCLOSEDPRODUCT,
CAREFULLYREADTHISLICENSEAGREEMENT.
Thisdocumentisanagreement(“Agreement”)betweentheenduser(“You”)andEnterasysNetworks,Inc.onbehalfofitself
anditsAffiliates(ashereinafterdefined)(“Enterasys”)thatsetsforthYourrightsandobligationswithrespecttotheEnterasys
softwareprogram/firmware
installedontheEnterasysproduct(includinganyaccompanyingdocumentation,hardwareor
media)(“Program”)inthepackageandprevailsoveranyadditional,conflictingorinconsistenttermsandconditions
appearingonanypurchaseorderorotherdocumentsubmittedbyYou.Affiliate”meansanyperson,partnership,corporation,
limitedliabilitycompany,orotherform
ofenterprisethatdirectlyorindirectlythroughoneormoreintermediaries,controls,or
iscontrolledby,orisundercommoncontrolwiththepartyspecified.ThisAgreementconstitutestheentireunderstanding
betweentheparties,andsupersedesallpriordiscussions,representations,understandingsoragreements,whetheroralorin
writing,betweentheparties
withrespecttothesubjectmatterofthisAgreement.TheProgrammaybecontainedinfirmware,
chipsorothermedia.
BYINSTALLINGOROTHERWISEUSINGTHEPROGRAM,YOUREPRESENTTHATYOUAREAUTHORIZEDTO
ACCEPTTHESETERMSONBEHALFOFTHEENDUSER(IFTHEENDUSERISANENTITYON
WHOSEBEHALFYOU
AREAUTHORIZEDTOACT,“YOU”AND“YOUR”SHALLBEDEEMEDTOREFERTOSUCHENTITY)ANDTHATYOU
AGREETHATYOUAREBOUNDBYTHETERMSOFTHISAGREEMENT,WHICHINCLUDES,AMONGOTHER
PROVISIONS,THELICENSE,THEDISCLAIMEROFWARRANTYANDTHELIMITATIONOFLIABILITY.IFYOU
DO
NOTAGREETOTHETERMSOFTHISAGREEMENTORARENOTAUTHORIZEDTOENTERINTOTHISAGREEMENT,
ENTERASYSISUNWILLINGTOLICENSETHEPROGRAMTOYOUANDYOUAGREETORETURNTHEUNOPENED
PRODUCTTOENTERASYSORYOURDEALER,IFANY,WITHINTEN(10)DAYSFOLLOWINGTHEDATEOFRECEIPT
FORAFULLREFUND.
IFYOUHAVEANYQUESTIONSABOUTTHISAGREEMENT,CONTACTENTERASYSNETWORKS,LEGAL
DEPARTMENTAT(978)6841000.
YouandEnterasysagreeasfollows:
1) LICENSE. Youhavethenonexclusiveandnontransferablerighttouseonlytheone(1)copyoftheProgram
providedinthispackagesubject
tothetermsandconditionsofthisAgreement.
2) RESTRICTIONS. ExceptasotherwiseauthorizedinwritingbyEnterasys,Youmaynot,normayYoupermitany
thirdpartyto:
(i) Reverseengineer,decompile,disassembleormodifytheProgram,inwholeorinpart,includingforreasonsof
errorcorrectionorinteroperability,exceptto
theextentexpresslypermittedbyapplicablelawandtotheextentthepartiesshall
notbepermittedbythatapplicablelaw,suchrightsareexpresslyexcluded.Informationnecessarytoachieveinteroperability
orcorrecterrorsisavailablefromEnterasysuponrequestanduponpaymentofEnterasys’applicablefee.
(ii) IncorporatetheProgram,inwholeorinpart,inanyotherproductorcreatederivativeworksbasedonthe
Program,inwholeorinpart.
(iii) Publish,disclose,copy,reproduceortransmittheProgram,inwholeorinpart.
(iv) Assign,sell,license,sublicense,rent,lease,encumberbywayofsecurityinterest,pledgeorotherwisetransferthe
Program,
inwholeorinpart.
(v) Removeanycopyright,trademark,proprietaryrights,disclaimerorwarningnoticeincludedonorembeddedin
anypartoftheProgram.
3) APPLICABLELAW.ThisAgreementshallbeinterpretedandgovernedunderthelawsandinthestateandfederal
courtsoftheCommonwealthofMassachusettswithout
regardtoitsconflictsoflawsprovisions.Youacceptthepersonal
jurisdictionandvenueoftheCommonwealthofMassachusettscourts.Noneofthe1980UnitedNationsConventionon
ContractsfortheInternationalSaleofGoods,theUnitedNationsConventionontheLimitationPeriodintheInternationalSale
ofGoods,andthe
UniformComputerInformationTransactionsActshallapplytothisAgreement.
i
4) EXPORTRESTRICTIONS. YouunderstandthatEnterasysanditsAffiliatesaresubjecttoregulationbyagenciesof
theU.S.Government,includingtheU.S.DepartmentofCommerce,whichprohibitexportordiversionofcertaintechnical
productstocertaincountries,unlessalicensetoexporttheProgramisobtainedfromtheU.S.Governmentor
anexceptionfrom
obtainingsuchlicensemayberelieduponbytheexportingparty.
IftheProgramisexportedfromtheUnitedStatespursuanttotheLicenseExceptionCIVundertheU.S.ExportAdministration
Regulations,YouagreethatYouareacivilenduseroftheProgramandagreethatYou
willusetheProgramforcivilenduses
onlyandnotformilitarypurposes.
IftheProgramisexportedfromtheUnitedStatespursuanttotheLicenseExceptionTSRundertheU.S.ExportAdministration
Regulations,inadditiontotherestrictionontransfersetforthinSections1or2ofthis
Agreement,Youagreenotto(i)reexport
orreleasetheProgram,thesourcecodefortheProgramortechnologytoanationalofacountryinCountryGroupsD:1orE:2
(Albania,Armenia,Azerbaijan,Belarus,Bulgaria,Cambodia,Cuba,Estonia,Georgia,Iraq,Kazakhstan,Kyrgyzstan,Laos,
Latvia,Libya,Lithuania,Moldova,NorthKorea,
thePeoplesRepublicofChina,Romania,Russia,Rwanda,Tajikistan,
Turkmenistan,Ukraine,Uzbekistan,Vietnam,orsuchothercountriesasmaybedesignatedbytheUnitedStatesGovernment),
(ii)exporttoCountryGroupsD:1orE:2(asdefinedherein)thedirectproductoftheProgramorthetechnology,ifsuchforeign
produceddirect
productissubjecttonationalsecuritycontrolsasidentifiedontheU.S.CommerceControlList,or(iii)ifthe
directproductofthetechnologyisacompleteplantoranymajorcomponentofaplant,exporttoCountryGroupsD:1orE:2
thedirectproductoftheplantoramajorcomponentthereof,ifsuchforeignproduceddirectproductissubjecttonational
securitycontrolsasidentifiedontheU.S.CommerceControlListorissubjecttoStateDepartmentcontrolsundertheU.S.
MunitionsList.
5) UNITEDSTATESGOVERNMENTRESTRICTEDRIGHTS. TheenclosedProgram(i)wasdevelopedsolelyat
privateexpense;
(ii)contains“restrictedcomputersoftware”submittedwithrestrictedrightsinaccordancewithsection52.227
19(a)through(d)oftheCommercialComputerSoftwareRestrictedRightsClauseanditssuccessors,and(iii)inallrespectsis
proprietarydatabelongingtoEnterasysand/oritssuppliers.ForDepartmentofDefenseunits,theProgramis
considered
commercialcomputersoftwareinaccordancewithDFARSsection227.72023anditssuccessors,anduse,duplication,or
disclosurebytheGovernmentissubjecttorestrictionssetforthherein.
6) DISCLAIMEROFWARRANTY. EXCEPTFORTHOSEWARRANTIESEXPRESSLYPROVIDEDTOYOUIN
WRITINGBYENTERASYS,ENTERASYSDISCLAIMSALLWARRANTIES,EITHEREXPRESSOR
IMPLIED,INCLUDING
BUTNOTLIMITEDTOIMPLIEDWARRANTIESOFMERCHANTABILITY,SATISFACTORYQUALITY,FITNESSFORA
PARTICULARPURPOSE,TITLEANDNONINFRINGEMENTWITHRESPECTTOTHEPROGRAM.IFIMPLIED
WARRANTIESMAYNOTBEDISCLAIMEDBYAPPLICABLELAW,THENANYIMPLIEDWARRANTIESARELIMITED
INDURATIONTOTHIRTY(30)DAYSAFTERDELIVERY
OFTHEPROGRAMTOYOU.
7) LIMITATIONOFLIABILITY. INNOEVENTSHALLENTERASYSORITSSUPPLIERSBELIABLEFORANY
DAMAGESWHATSOEVER(INCLUDING,WITHOUTLIMITATION,DAMAGESFORLOSSOFBUSINESS,PROFITS,
BUSINESSINTERRUPTION,LOSSOFBUSINESSINFORMATION,SPECIAL,INCIDENTAL,CONSEQUENTIAL,OR
RELIANCEDAMAGES,OROTHERLOSS)ARISINGOUTOFTHEUSE
ORINABILITYTOUSETHEPROGRAM,EVENIF
ENTERASYSHASBEENADVISEDOFTHEPOSSIBILITYOFSUCHDAMAGES.THISFOREGOINGLIMITATIONSHALL
APPLYREGARDLESSOFTHECAUSEOFACTIONUNDERWHICHDAMAGESARESOUGHT.
THECUMULATIVELIABILITYOFENTERASYSTOYOUFORALLCLAIMSRELATINGTOTHEPROGRAM,IN
CONTRACT,TORT
OROTHERWISE,SHALLNOTEXCEEDTHETOTALAMOUNTOFFEESPAIDTOENTERASYSBY
YOUFORTHERIGHTSGRANTEDHEREIN.
8) AUDITRIGHTS. You herebyacknowledgethattheintellectualpropertyrightsassociatedwiththeProgramareof
criticalvaluetoEnterasysand,accordingly,Youherebyagreetomaintaincompletebooks,recordsandaccounts
showing(i)
licensefeesdueandpaid,and(ii)theuse,copyinganddeploymentoftheProgram.YoualsogranttoEnterasysandits
authorizedrepresentatives,uponreasonablenotice,therighttoauditandexamineduringYournormalbusinesshours,Your
books,records,accountsandhardwaredevicesuponwhichtheProgram
maybedeployedtoverifycompliancewiththis
Agreement,includingtheverificationofthelicensefeesdueandpaidEnterasysandtheuse,copyinganddeploymentofthe
Program.Enterasysʹrightofexaminationshallbeexercisedreasonably,ingoodfaithandinamannercalculatedtonot
unreasonablyinterferewith
Yourbusiness.IntheeventsuchauditdiscoversnoncompliancewiththisAgreement,including
copiesoftheProgrammade,usedordeploy edinbreachofthisAgreement,YoushallpromptlypaytoEnterasysthe
appropriatelicensefees.Enterasys reservestheright,tobeexercisedinitssolediscretionandwithoutpriornotice,
toterminate
thislicense,effectiveimmediately,forfailuretocomplywiththisAgreement.Uponanysuchtermination,Youshall
immediatelyceasealluseoftheProgramandshallreturntoEnterasystheProgramandallcopiesoftheProgram.
ii
9) OWNERSHIP. Thisisalicenseagreementandnotanagreementforsale.Youacknowledgeandagreethatthe
Programconstitutestradesecretsand/orcopyrightedmaterialofEnterasysand/oritssuppliers.Youagreetoimplement
reasonablesecuritymeasurestoprotectsuchtradesecretsandcopyrightedmaterial.Allright,titleandinterestin
andtothe
ProgramshallremainwithEnterasysand/oritssuppliers.AllrightsnotspecificallygrantedtoYoushallbereservedto
Enterasys.
10) ENFORCEMENT. YouacknowledgeandagreethatanybreachofSections2,4,or9ofthisAgreementbyYoumay
causeEnterasysirreparabledamageforwhichrecoveryof
moneydamageswouldbeinadequate,andthatEnterasysmaybe
entitledtoseektimelyinjunctiverelieftoprotectEnterasys’rightsunderthisAgreementinadditiontoanyandallremedies
availableatlaw.
11) ASSIGNMENT.Youmaynotassign,transferorsublicensethisAgreementoranyofYourrightsorobligations
under
thisAgreement,exceptthatYoumayassignthisAgreementtoanypersonorentitywhichacquiressubstantiallyallofYour
stockorassets.EnterasysmayassignthisAgreementinitssolediscretion.ThisAgreementshallbebindinguponandinureto
thebenefitoftheparties,theirlegalrepresentatives,
permittedtransferees,successorsandassignsaspermittedbythis
Agreement.Anyattemptedassignment,transferorsublicenseinviolationofthetermsofthisAgreementshallbevoidanda
breachofthisAgreement.
12) WAIVER. AwaiverbyEnterasysofabreachofanyofthetermsandconditionsofthisAgreement
mustbeinwriting
andwillnotbeconstruedasawaiverofanysubsequentbreachofsuchtermorcondition.Enterasys’failuretoenforceaterm
uponYourbreachofsuchtermshallnotbeconstruedasawaiverofYourbreachorpreventenforcementonanyotheroccasion.
13) SEVERABILITY.
IntheeventanyprovisionofthisAgreementisfoundtobeinvalid,illegalorunenforceable,the
validity,legalityandenforceabilityofanyoftheremainingprovisionsshallnotinanywaybeaffectedorimpairedthereby,
andthatprovisionshallbereformed,construedandenforcedtothemaximumextentpermissible.
Anysuchinvalidity,
illegalityorunenforceabilityinanyjurisdictionshallnotinvalidateorrenderillegalorunenforceablesuchprovisioninany
otherjurisdiction.
14) TERMINATION. EnterasysmayterminatethisAgreementimmediatelyuponYourbreachofanyofthetermsand
conditionsofthisAgreement.Uponanysuchtermination,Youshallimmediatelycease
alluseoftheProgramandshallreturn
toEnterasystheProgramandallcopiesoftheProgram.
v
Contents
Preface
Chapter 1: Network Management
Observing Syntax and Conventions ...............................................................................................................1-1
Network Management Commands .................................................................................................................1-1
General Network Management Commands ...................................................................................................1-2
General Show Commands ...........................................................................................................................1-14
snmp-server Commands ..............................................................................................................................1-16
SNMP Show Commands .............................................................................................................................. 1-34
SLA Agent Commands .................................................................................................................................1-37
RTR-mode Commands .................................................................................................................................1-43
RTR Show Commands ................................................................................................................................. 1-45
Chapter 2: Configuring T1/E1 and T3/E3 Subsystems
Observing Syntax and Conventions .............................................................................................................2-55
T1/E1 & T3/E3 Commands ...........................................................................................................................2-55
T1/E1 and T3/E3 Clear and Show Commands ............................................................................................2-74
Drop and Insert Commands .........................................................................................................................2-80
Chapter 3: Configuring the XSR Platform
Observing Syntax and Conventions .............................................................................................................3-83
Platform Commands .....................................................................................................................................3-83
Clock Commands ......................................................................................................................................... 3-84
Crypto Key Commands ................................................................................................................................3-85
Other Platform Commands ...........................................................................................................................3-86
SNTP Commands .........................................................................................................................................3-91
Platform Clear and Show Commands ..........................................................................................................3-94
File System Commands ............................................................................................................................. 3-107
Bootrom Monitor Mode Commands ............................................................................................................3-121
Chapter 4: Configuring Hardware Controllers
Observing Syntax and Conventions .............................................................................................................4-83
Hardware Controller Commands ..................................................................................................................4-83
Hardware Controller Clear and Show Commands .......................................................................................4-92
Chapter 5: Configuring the Internet Protocol
Observing Syntax and Conventions .............................................................................................................5-83
IP Commands ...............................................................................................................................................5-83
OSPF Commands ........................................................................................................................................5-84
OSPF Debug and Show Commands ..........................................................................................................5-104
RIP Commands .......................................................................................................................................... 5-123
RIP Show Commands ................................................................................................................................5-136
RTP Header Compression Commands ......................................................................................................5-137
Triggered on Demand RIP Commands ......................................................................................................5-142
Policy-Based Routing Commands ..............................................................................................................5-145
PBR Clear and Show Commands ..............................................................................................................5-148
vi
ARP Commands .........................................................................................................................................5-149
Other IP Commands ...................................................................................................................................5-151
IP Clear and Show Commands ..................................................................................................................5-168
Network Address Translation Commands ..................................................................................................5-182
Virtual Router Redundancy Protocol Commands .......................................................................................5-191
VRRP Clear and Show Commands ............................................................................................................5-197
Chapter 6: Configuring the Border Gateway Protocol
Observing Syntax and Conventions .............................................................................................................6-83
BGP Configuration Commands .................................................................................................................... 6-83
Route Map Commands ...............................................................................................................................6-110
BGP Set Commands ..................................................................................................................................6-114
BGP Clear and Show Commands ..............................................................................................................6-122
BGP Debug Commands ............................................................................................................................. 6-132
Chapter 7: Configuring IP Multicast
Observing Syntax and Conventions .............................................................................................................7-83
PIM Commands ............................................................................................................................................7-89
IGMP Clear and Show Commands ..............................................................................................................7-95
Chapter 8: Configuring the Point-to-Point Protocol
Observing Syntax and Conventions .............................................................................................................8-83
PPP Commands ...........................................................................................................................................8-83
PPP Debug, Clear and Show Commands ....................................................................................................8-97
Multilink PPP Commands ...........................................................................................................................8-108
Multilink Show Commands .........................................................................................................................8-122
Chapter 9: Configuring Frame Relay
Observing Syntax and Conventions .............................................................................................................9-83
Frame Relay Commands ..............................................................................................................................9-83
Frame Relay Map Class Commands ............................................................................................................ 9-95
Frame Relay Clear and Show Commands .................................................................................................9-102
Chapter 10: Configuring the Dialer Interface
Observing Syntax and Conventions ...........................................................................................................10-83
Dialer Interface Commands ........................................................................................................................ 10-83
Dialer Interface Clear and Show Commands .............................................................................................10-90
Dial Backup Commands ............................................................................................................................. 10-93
DOD/BOD Commands ...............................................................................................................................10-96
Dialer Watch Commands ..........................................................................................................................10-103
Chapter 11: ISDN BRI and PRI Commands
Observing Syntax and Conventions ...........................................................................................................11-83
ISDN Commands ........................................................................................................................................11-83
ISDN Debug and Show Commands ........................................................................................................... 11-92
Chapter 12: Configuring Quality of Service
Observing Syntax and Conventions ...........................................................................................................12-83
QoS Commands ......................................................................................................................................... 12-83
Policy-Map Commands .............................................................................................................................. 12-84
Class-map Commands .............................................................................................................................12-101
vii
QoS Show Commands ............................................................................................................................. 12-105
Chapter 13: Configuring ADSL
Observing Syntax and Conventions ...........................................................................................................13-83
ADSL Configuration Commands ................................................................................................................ 13-83
CMV Commands ........................................................................................................................................13-83
Other ADSL Commands .............................................................................................................................13-87
PPP Configuration Commands ................................................................................................................... 13-99
ATM Clear and Show Commands ............................................................................................................13-103
Chapter 14: Configuring the VPN
Observing Syntax and Conventions ...........................................................................................................14-83
VPN Commands .........................................................................................................................................14-83
PKI commands ........................................................................................................................................... 14-84
CA Identity Mode Commands ..................................................................................................................... 14-84
Other Certificate Commands ......................................................................................................................14-90
IKE Security Protocol Commands ..............................................................................................................14-94
ISAKMP Protocol Policy Mode Commands ................................................................................................ 14-95
Remote Peer ISAKMP Protocol Policy Mode Commands ..........................................................................14-99
Remote Peer Show Commands ...............................................................................................................14-104
IPSec Commands .....................................................................................................................................14-106
IPSec Clear and Show Commands ..........................................................................................................14-108
Crypto Map Mode Commands .................................................................................................................. 14-110
Crypto Transform Mode Commands ........................................................................................................14-115
Crypto Show Commands .......................................................................................................................... 14-118
Interface CLI Commands ..........................................................................................................................14-121
Interface VPN Commands ........................................................................................................................14-122
Tunnel Commands ...................................................................................................................................14-127
Tunnel Clear and Show Commands .........................................................................................................14-132
Additional Tunnel Termination Commands ..............................................................................................14-134
DF Bit Commands .................................................................................................................................... 14-137
Chapter 15: Configuring DHCP
Observing Syntax and Conventions ...........................................................................................................15-83
DHCP Commands ...................................................................................................................................... 15-83
ip address dhcp ....................................................................................................................................15-92
DHCP Clear and Show Commands .........................................................................................................15-111
Chapter 16: Configuring Security
Observing Syntax and Conventions ...........................................................................................................16-83
General Security Commands ..................................................................................................................... 16-84
Security Clear and Show Commands .........................................................................................................16-91
AAA Commands .........................................................................................................................................16-93
AAA Usergroup Commands ....................................................................................................................... 16-94
AAA User Commands ................................................................................................................................16-97
AAA Method Commands ..........................................................................................................................16-101
AAA Per-Interface Commands .................................................................................................................16-111
AAA Debug and Show Commands ..........................................................................................................16-112
Firewall Feature Set Commands ..............................................................................................................16-115
Firewall Interface Commands ...................................................................................................................16-129
Firewall Show Commands ........................................................................................................................ 16-133
viii
XSR User’s Guide ix
Preface
ThisguidedescribestheCommandLineInterface(CLI)commandsneededtomount,connect,
powerup,andmaintainanXSRfromEnterasysNetworks.
ThisguideiswrittenforadministratorswhowanttoconfiguretheXSRorexperienceduserswho
areknowledgeableinbasicnetworkingprinciples.
Contents of the Guide
Informationinthisguideisarrangedasfollows:
Chapter1,NetworkManagement,describesfundamentalnetworkcontrolcommands.
Chapter2,ConfiguringtheT1/E1&T3/E3Subsystems,detailscommands forT1/E1andT3/E3
NIMcards.
Chapter3,ConfiguringtheXSRPlatform,describesplatformsubsystemcommands.
Chapter4,ConfiguringHardwareControllers,describes
commandstoconfigurethehardware
controllersoverseriallines.
Chapter5,ConfiguringtheInternetProtocol,describesIPcommands.
Chapter6,ConfiguringtheBorderGatewayProtocol,detailsBGPcommands.
Chapter7ConfiguringIPMulticast,definesXSRcommandsforProtocolIndependentMulticast
‐SparseMode(PIMSM)andtheInternetGroupManagement
Protocol(IGMP).
Chapter8,ConfiguringthePointtoPointProtocol,describesPPPsetup.
Chapter9,ConfiguringFrameRelay,detailscommandstoconfigureFrameRelay.
Chapter10,ConfiguringtheDialerInterface,describescommandstosetupnetworkconnections
overthePublicSwitchTelephoneNetwork,provideabackuplinkov era
dialline,and
configureBoD/DoD.
Chapter11,ISDNBRIandPRICommands,detailscommandstosetupISDN.
Chapter12,ConfiguringQualityofService,outlinesQoSsetupcommands.
Chapter13,ConfiguringADSL,describesconfigurationcommandsforADSLincludingCMV,
ATMandassociatedPPPcommands.
Chapter14,ConfiguringtheVPN,details
VirtualPrivateNetworksetup.
Chapter15,ConfiguringDHCP,describeshowtosetupDynamicHostConfigurationProtocol.
Chapter16,ConfiguringSecurity,describesconfiguringaccess lists,andothercommandsto
protectagainstvariousnetworkattacks.
x
Conventions Used in This Guide
Thefollowingconventionsareusedinthisguide:
Getting Help
ForadditionalsupportrelatedtotheXSR,contactEnterasysNetworksusingoneofthefollowing
methods:
Caution: Contains information essential to avoid damage to the equipment.
Cautela: Contiene información esencial para prevenir dañar el equipo.
Achtung: Verweißt auf wichtige Informationen zum Schutz gegen Beschädigungen.
Note: Calls the reader’s attention to any item of information that may be of special importance.
Bold/En negrilla Text in boldface indicates values you type using the keyboard or select using the
mouse (for example, a:\setup). Default settings may also appear in bold.
El texto en negrilla indica valores que usted introduce con el teclado o que
selecciona con el mouse (por ejemplo, a:\setup). Las configuraciones default
pueden también aparecer en en negrilla.
Italics/It áli ca Text in italics indicates a variable, important new term, or the title of a manual.
El texto en itálica indica un valor variable, un importante nuevo término, o el título
de un manual.
SMALL CAPS/ Small caps specify the keys to press on the keyboard; a plus sign (+) between
keys indicates that you must press the keys simultaneously (for example,
CTRL+ALT+DEL).
Las mayusculas indican las teclas a oprimir en el teclado; un signo de más (+)
entre las teclas indica que usted debe presionar las teclas simultáneamente (por
ejemplo, CTRL+ALT+DEL).
Courier font/Tipo de
letra Courier
Text in this font denotes a file name or directory.
El texto en este tipo de letra denota un nombre de archivo o de directorio.
+
Points to text describing CLI command.
Apunta al texto que describe un comando de CLI.
FastEthernet FastEthernet and GigabitEthernet references are generally interchangeable
throughout this guide.
Las referencias a los terminos FastEthernet y GigabitEthernet son generalmente
intercambiables en el contenido de esta guia.
World Wide Web http://www.enterasys.com
Phone (603) 332-9400
1-800-872-8440 (toll-free in U.S. and Canada)
For the Enterasys Networks Support toll-free number in your country:
http://www.enterasys.com/support/gtac-all.html
Internet mail [email protected]
To expedite your message, please type [xsr] in the subject line.
XSR User’s Guide xi
BeforecontactingEnterasysNetworksfortechnicalsupport,havethefollowinginformation
ready:
•YourEnterasysNetworksservicecontractnumber
•Adescriptionofthefailure
•Adescriptionofanyaction(s)alreadytakentoresolvetheproblem(e.g.,rebootingtheunit,
reconfiguringmodules,etc.)
•TheserialandrevisionnumbersofanyrelevantEnterasysNetworksproductsin
thenetwork
•Adescriptionofyournetworkenvironment(layout,cabletype,etc.)
•Networkloadandframesizeatthetimeoftheproblem
•TheXSR’shistory(i.e.,haveyoureturnedthedevicebefore,isthisarecurringproblem,etc.)
•AnypreviousReturnMaterialAuthorization(RMA)numbers.
FTP
Login
Password
ftp://ftp.enterasys.com
anonymous
your Email address
Acquire the latest image and
Release Notes
http://www.enterasys.com/download
Additional documentation http://www.enterasys.com/support/manuals
Forward comments or
suggestions
To expedite your message, type [techwriting] in the subject line, and
include the document Part Number in the Email.
xii
XSR CLI Reference Guide 1-1
1
Network Management
Observing Syntax and Conventions
TheCLISyntaxandconventionsusethenotationdescribedinthefollowingtable.
Network Management Commands
Thischapterincludesthefollowingsubsetsofnetworkmanagementcommands:
“GeneralNetworkManagementCommands”onpage 12
“GeneralShowCommands”onpage 1 14
“snmpserverCommands”onpage 116
“SNMPShowCommands”onpage 134
“SLAAgentCommands”onpage 137
“RTRmodeCommands”onpage 143
“RTRShowCommands”on
page 145
Convention Description
xyz Keywordormandatoryparameters(bold)
[x][]Squarebracketsindicateanoptionalparameter(italic)
[x|y|z][|]Squarebracketswithverticalbarindicateachoiceofvalues
{x|y|z}{|}Braceswithverticalbarindicate
achoiceofarequiredvalue
[x{y|z}][{|}]Combinationofsquarebracketswithbracesandverticalbars
indicatesarequiredchoiceofanoptionalparameter
(configif<xx>) xxsignifiesinterfacetypeandnumber,e.g.:
F1,S2/1.0, D1, M57,
G3. F
indicatesaFastEthernet,andGaGigabitEthernetinterface.
NextModeentriesdisplaytheCLIpromptafteracommandisentered.
Subcommandheadingsaredisplayedinredtext.
soho.enterasys.com Italicized, non-syntactic text indicates either a user-specified entry or text with
special emphasis
General Network Management Commands
1-2 Network Management
General Network Management Commands
banner
ThiscommandcreatesaloginbannerattheXSR’sCLIprompt.Textisenteredonelineatti me and
shouldnotexceed80charactersperline.Eachsuccessiveentryaddsalinetothe banner,asshown
intheexample.
Syntax
banner login bannerLine
Syntax of the “no” Form
Usethenoformofthiscommandtoremoveallbanners:
XSR(config)#no banner login
Mode
Globalconfiguration:XSR(config)#
Example
Thefollowingexampleconfiguresaloginbanner:
XSR(config)#banner login “Welcome Larry”
XSR(config)#banner login “You’re in the office now”
XSR(config)#banner login “Start working!”
configure terminal
ThiscommandentersconfigurationmodefromPrivilegedEXECmode.
Syntax
configure terminal
Mode
PrivilegedEXEC:XSR#
Example
XSR#configure terminal
bannerLine
Texttobedisplayedatlogin.Amaximumof50linescanbewrittenper
banner.Textmustbeenclosedinquotes.
General Network Management Commands
XSR CLI Reference Guide 1-3
crypto key dsa
ThiscommandgeneratestheDigitalSignatureAlgorithm(DSA)typehostkeypair(privateand
public)aswellasdisplaysthepublickey.AuniquesetofhostkeysarecreatedeachtimetheXSR
rebootsbutwerecommendyougenerateanewpairofhostkeyswhenyoubelievesecuritymay
becompromised.
Themasterencryptionkeyisusedtoencryptthekeysbeforebeingsavedinthehostkey.datfilein
Flash.Accesstothisfileisrestrictedanditcannotbereadorcopied.AllSSHconnectionrequests
usethehostkeysstoredinthehostkey.datfileunlessnonehavebeen
generatedorthecontentof
thefileiscorrupted.Inthosecircumstances,defaultkeysareusedtosecuretheconnection.
Additionalhostkeybehaviorisdescribedasfollows:
•IfyouhavenotgeneratedamasterencryptionkeybeforeusingSSH,theXSRwillpromptyou
withthe
crypto key master generatecommand.
•Onetothreeminuteswillelapsewhilehostkeysaregeneratedby
crypto key dsa,
dependingonthedeviceloadatthetime.
•SSHacceptsnonewconnectionsduringhostkeygeneration.
•Thecommandisignoredifstoredinthestartupconfigfile.
•Ifthemasterkeyischanged,youarenotrequiredtogenerateanewDSAkeypair.
•Ifyouremovethemasterkey,the
DSAkeypairisremovedaswell(hostkey.datisdeleted).
Syntax
crypto key dsa {generate | remove | show}
Mode
Globalconfiguration:XSR(config)#
Example
Thefollowingexamplegeneratesanewpairofkeys:
XSR(config)#crypto key dsa generate
disable
ThiscommandexitsfromPrivilegedEXECtoEXECmode.
Syntax
disable
Mode
PrivilegedEXEC:XSR#
generate
Producenewkeypairs.
remove
Deleteoldkeypair.
show
Displaypublicportionofhostkeypairs.
General Network Management Commands
1-4 Network Management
Example
XSR#disable
enable
ThiscommandjumpstoPrivilegedEXECmode.
Syntax
enable
Mode
EXEC:XSR>
Example
XSR>enable
end
Thiscommandterminatesconfigurationmode.
Syntax
end
Mode
Anyconfiguration
Example
XSR(config)#end
exit
Thiscommandquitsthecurrentmodetoahigherlevel.IfyouareinEXECmode,itterminates the
Telnet,SSH,orConsole session.
Syntax
exit
Mode
All
Example
XSR(config)#exit
General Network Management Commands
XSR CLI Reference Guide 1-5
help
ThiscommandretrieveshelpatanyMode.
Syntax
help
Mode
All
Example
XSR#help
ip http port
ThiscommandchangestheHTTP(HyperTextTransferProtocol)portwhereincomingHTTP
(Web)sessionsareconnectingto.
Syntax
ip http port {port_number | default}
Mode
Globalconfiguration:XSR(config)#
Default
Portnumber:80
Example
XSR(config)#ip http port 1234
ip http server
Thiscommandenables/disablesHTTP(Web)servicetotherouter.Iftheoptionalparameterisnot
supplied,theHTTPserverwillbeenabled.SincetheHTTPserverisdisabledatbootup,youmust
eithermanuallyenableitusingtheCLIorenableitinthe
startup-configfile.
port_number
IncomingHTTPserverportnumberfrom1024to65535.
default
SetstheHTTPporttodefault.
Note: If you try to set the port-number but it is already in use (Telnet, e.g.) , it will be reset to the
default value automatically.
General Network Management Commands
1-6 Network Management
Syntax
ip http server [enable | disable]
Syntax of the “no” Form
ThenoformofthiscommanddisablestheHTTPserver:
no ip http server
Mode
Globalconfiguration:XSR(config)#
Default
Disable
Examples
XSR(config)#ip http server enable
XSR(config)#no ip http server
ip ssh server
Thiscommandenables/disablesSecureShell(SSH)servicetotheclient.BecausetheSSHserveris
enabledatbootup,youcaneithermanuallydisabletheSSHserverusingCLI,ordisabletheSSH
serverinthestartupconfigfile.Iftheoptionalparameterisnotsupplied,theSSHserverwillbe
enabled.
Syntax
ip ssh server [enable | disable]
Syntax of the “no” Form
ThenoformofthiscommanddisablestheSSHserver:
no ip ssh server
Mode
Globalconfiguration:XSR(config)#
Defaults
•Enabled
enable
EnablesHTTPserver.
disable
DisablesHTTPserver.
enable
EnablesSSHserver.
disable
DisablesSSHserver.
/