3Com Corporation reserves the right to revise this docum en tation an d to make changes in content from time
to time without obligation on the part of 3Com Corporation to provide notification of such r evision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either
implied or expressed, including, but not limited to, the implied warranties, terms or conditions of
merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or
changes in the product(s) and/or the program(s) described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license
agreement included with the product as a separate document, in the hard copy documentation, or on the
removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy,
please contact 3Com and a copy will be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein
are provided to you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense.
Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995)
or
as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are
provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited
rights only as provided in DFAR 252.227-7015 (Nov
applicable. You agree not to remove or deface any portion of any legend provided on any licensed program
or documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com regist er ed tr ademarks are registered in the United States and may or may
not be registered in other countries.
3Com, the 3Com logo, are registered trademarks of 3Com Corporation.
Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and
Windows NT are registered trademarks of Microsoft
States and other countries, licensed exclusively through X/Open Company, Ltd.
All other company and product names may be trademarks of the respective companies with which they are
associated.
1995) or FAR 52.227-14 (June 1987), whichever is
Corporation. UNIX is a registered trademark in the United
GETTING STARTED 1
SYSTEM MANAGEMENT 33
INTERFACE 121
LINK LAYER PROTOCOL 183
NETWORK PROTOCOL 335
ROUTING 423
MULTICAST 517
SECURITY 543
VPN 615
RELIABILITY 665
QOS 681
DIAL-UP 721
ABOUT THIS GUIDE
This guide describes 3Com routers and how to configure them.
ConventionsTable 1 and Table 2 list conventions that are used throughout this guide.
Table 1 Notice Icons
IconNotice TypeDescription
Information noteInformation that describes important features or
CautionInformation that alerts you to potential loss of data
WarningInformation that alerts you to potential personal
instructions.
or potential damage to an application, system, or
device.
injury.
Table 2 Text Conventions
ConventionDescription
Screen displays This typeface represents information as it appears on the screen.
Keyboard key names If you must press two or more keys simultaneously, the key names are
The words “enter”
and type”
Words in italicsItalics are used to:
Words in boldBoldface type is used to highlight command names. For example, “Use
linked with a plus sign (+), for example:
Press Ctrl+Alt+Del
When you see the word “enter” in this guide, you must type
something, and then press Return or Enter. Do not press Return or
Enter when an instruction simply says “type.”
Emphasize a point.
Denote a new term at the place where it is defined in the text.
Identify command variables.
Identify menu names, menu commands, and software button names.
Examples:
From the Help menu, select Contents.
Click OK.
the display user-interface command to...”
2ABOUT THIS GUIDE
I
GETTING STARTED
Chapter 13Com Router Introduction
Chapter 23Com Router User Interface
4
1
3COM ROUTER INTRODUCTION
This chapter includes information on the following topics:
■ Overview of the 3Com Router System
■ Architecture of the 3Com Router
■ Features of the 3Com Router Version 1.10
■ New Features of the 3Com Router 1.x
Overview of the 3Com
Router System
Architecture of the
3Com Router
The 3Com Router OS is the network operating system platform. With TCP/IP
protocol stack as the core, the 3Com Router integrates data communication
essentials such as routing technology, multicast technology, QoS technology, VPN
technology, security technology in the operating system and provides excellent
data transmission capability.
The 3Com Router can run on multiple hardware platforms with consistent
network interface, user interface and management interface, providing flexible
and multiple application solutions for users.
This manual describes features and functions of the 3Com Router 1.x system
software platform series of low end and middle range routers. In this manual the
3Com Router is also referred to as the 3Com Router 1.x software version. You
should make sure that the 3Com Router you use is operating with the software
version documented in this manual.
The software specification is different between various types of products. Product
specification related matters should be confirmed with the 3Com Technical
Support Department.
With TCP/IP model as its reference, the 3Com Router implements data link layer,
network layer, and application layer pr otocols, as per the architecture shown in the
following diagram:
6CHAPTER 1: 3COM ROUTER INTRODUCTION
Figure 1 Schematic diagram of the 3Com Router architecture
Features of the 3Com
Router Version 1.10
AttributeDescription
Interconnection protocol LAN■ Supports Ethernet_II and Ethernet_SNAP frame structure
HTTP
RIP OSPF BGP
Route policy
management
System
service
Fast
forwarding
PPP/SLIP
FTP
TELNET
Voice Service
IP forwarding engine
IP security
and firewall
HDLCEthernetX.25Frame Relay
......
TCP/UDP
management
QoS
assurance
The following table lists the basic features of the 3Com Router 1.x:
Table 3 List of the 3Com Router 1.x features
■ Follows IEEE 802.2 and IEEE 802.3 regulations
WAN■ Supports Frame Relay and Frame Relay switching
■ Supports dial demand Routing (dialer profiles and legacy
BDR)
■ Supports Callback (PPP callback and ISDN Calling Line
Identification callback)
■ Provides ISDN leased line, automatic dialing, and cyclic dial
queue backup
■ Provides Dial interface backup
domain name user, and full name user)
■ Supports L3 channel protocol GRE
VPN
Configuration
Command
line
SNMP
Web
management
Features of the 3Com Router Version 1.107
AttributeDescription
Network protocolIP service■ Supports ARP
■ Supports Static domain name resolution
■ Supports IP Address Unnumbered
■ Supports DHCP Server and DHCP relay
■ Supports VLAN
■ Supports IP Accounting
Non-IP service■ Supports Novell IPX protocol, provide RIP and SAP to
maintain the database of Internetwork routes and service
information
■ Supports DLSw of SNA system, implementing SNA through
WAN transmission
IP performance■ Supports IP fast forwarding
■ Supports Van Jacobson TCP message header compression
IP routing ■ Supports Static route management
■ Supports Dynamic route protocol
■ RIP-1/RIP-2
■ OSPF
■ BGP
■ Supports IP routing policy
■ Supports IP policy-based routing
Multicast routing■ Supports Internet Group Management Protocol (IGMP)
■ Supports Multicast routing protocol
■ PIM-DM
■ PIM-SM
8CHAPTER 1: 3COM ROUTER INTRODUCTION
AttributeDescription
Network securityAuthentication,
Network reliabilityBackup center■ Can back up any physical interface or sub-interface on the
■ Provides PPP and login user authentication
Authorization and
Accounting (AAA)
service
■ Supports RADIUS, provides RADIUS
authentication/accounting
■ Provides local authentication
■ Supports CHAP and PAP authentication
Firewall■ Supports standard access control list
■ Supports extended access control list
■ Supports interface-based access control list
■ Supports time segment based access control list
NAT■ Supports the users in LAN to access external networks by
using the IP address in a configured address pool.
■ Supports to configure relationship between access control
list and address pool.
■ Supports to configure relationship between access control
list and interface.
■ Supports the host of external network to access the internal
server
■ Supports to configure valid period for address translation
Data security■ Supports terminal access security (user classification
protection, user login authentication)
■ Supports IPSec, provides tunnel and transmission
encapsulation modes and supports AH and ESP security
authentication
■ Supports network data encryption card and provide IPSec
encryption/decryption
■ Supports IKE, automatically negotiates on security key and
create the security federation
router and an X.25 or frame relay virtual circuit on the
interface as well.
■ Barring the Ethernet interface, any physical interfaces or
virtual interface templates on the router can be used as
backup interfaces. An X.25 or frame relay virtual circuit on
the interface or a dialer route on the dial interface can be
used as backup interface as well.
■ Provides multiple backup interfaces for one main interface.
These backup interfaces will be used according to their
priorities.
■ Backs up multiple main interfaces of the interfaces with
multiple physical channels
■ Supports to configure the conditions to switch the
main/standby interfaces
Hot backup■ Supports VRRP
AttributeDescription
Quality of service
(QoS)
Traffic classification
and flow control
Traffic shaping■ Uses buffer and token bucket to support general traffic
Congestion
management
Congestion
Avoidance
Configuration
management
Command line
interface
Terminal server
Terminal service■ Performs local or remote configuration via the console port,
System
Management
Network
management
Features of the 3Com Router Version 1.109
■ Supports CAR (Committed Access Speed) and packet
priority, monitoring the network traffic entering ISP
■ Supports LR (Line Rate of physical interface) to limit the total
speed of packet transmission on physical interface
shaping (GTS).
■ Supports FIFO (first-in-first-out queue)
■ Supports PQ (priority queue)
■ Supports CQ (customization queue)
■ Supports WFQ (Weighted Fair queue)
■ Supports WRED (Weighted Random Early Detection),
implementing flow-based congestion avoidance
■ Prompts provide information in English
■ Prompt command line hierarchical protection, to ensure that
the unauthorized users cannot access the router.
■ Prompt Detailed debugging information, helpful for
diagnosis of network faults
■ Provides network test tools such as tracert and ping
commands, to quickly diagnose whether the network is
normal.
■ Info-center loghost configuration
asynchronous serial port, X.25 PAD, Telnet and Reverse
Telnet etc.
■ Logs on the UNIX host via Rlogin
■ Configures router via the dumb terminal service
■ Provides dumb terminal service via PRI port
■ Supports the send function and provide the information
interaction between terminal subscribers
■ Terminal access via asynchronous serial port
■ Supports dial-up POS and network POS accessing based on
the shared POS access technology, which improves card
account processing
■ Supports to upload and download programs/configuration
files via FTP
■ Supports to upload and download programs/configuration
New features have been added to the 3Com Router1.10.
3Com Router 1.x
Support New InterfacesE3 and CE3 Interfaces
Both E3 and E1 are part of the ITU-T digital carrier architecture and are used in
most regions beyond North America. The data transmission speed of E3 is
34.368
protocols including PPP, HDLC, Frame Relay, LAPB, and X.25, as well as the
network protocol such as IP. Similar to E1/CE1, E3/CE3 interfaces can work in two
operating modes, namely, E3 mode and CE3 mode.
■ When working in E3 mode, an E3/CE3 interface is a timeslot-less interface of
■ When working in CE3 mode, it can multiplex/demultiplex 16 channels of E1
E1-F/T1-F Interface
E1-F and T1-F interfaces refer to the fractional E1 and T1 interfaces, which are
equivalent to the simplified CE1/PRI and CT1/PRI interfaces. In essence, they are a
low-cost approach to E1/T1 access. In a simple E1 or T1 access application
requiring neither division of multiple channel groups nor ISDN PRI, either the E1-F
or T1/F interface will be a good choice.
Mbps and the line code is HDB3. E3/CE3 interfaces support the link layer
the bandwidth of 34.368 Mbps.
signals. The E3-to-E1 multiplexing is compliant with the G.751 and G.742
provisions of ITU-T. In addition, each E1 interface can be divided into 32
timeslots.
Null Interface
The functions of the Null interface are similar to those of null devices supported by
many operating systems. It is always in UP status, but cannot forward data packets
or configure IP addresses or encapsulate other protocols. Null interface is a virtual
interface with software characteristics. Any network data packet sent to this
interface will be dropped.
FRoIP and FRoISDNFrame Relay over IP
As IP networks have gained wider acceptance, Frame Relay (FR) applications have
relied on IP networks for data communication and interconnection between
networks. FRoIP technology enables IP networks to carry FR data by establishing a
GRE tunnel across the IP network to connect the two FR networks at both ends of
the IP network.
Frame Relay over ISDN
Frame Relay over ISDN provides a method for accessing the Frame Relay network
based on ISDNs and the related devices. This shortens the time for users to access
and lowers the cost of leased lines.
The Frame Relay over ISDN is mainly used in the following two aspects:
■ The simplest application is to take Frame Relay over ISDN as the main
communications method. That is, all the routers support Frame Relay over
ISDN, and the individual routers can directly access the Frame Relay networks
(without TA adapters) to communicate.
New Features of the 3Com Router 1.x11
■ Combined with BDR, Frame Relay over ISDN can be taken as the backup
communication method for Frame Relay.
Multilink Frame RelayThe Multilink Frame Relay (MFR) feature introduces functionality based on the
Frame Relay Forum Multilink Frame Relay UNI/NNI Implementation Agreement
(FRF.16). This feature provides a cost-effective way to increase bandwidth for
particular applications by enabling multiple serial links to be aggregated into a
single bundle of bandwidth. MFR is supported on User-to-Network Interfaces (UNI)
and Network-to-Network Interfaces (NNI) in Frame Relay networks.
FR CompressionFR compression technology is used to compress the FR packets for the purpose of
effectively saving the network bandwidth and decreasing the network load, and
hence to implement data transmission over FR networks with high efficienc y.
3Com Routers follow the FRF.9 standard for FR compression. FR compression can
achieve a significant effect on a FR line with low bandwidth. FR interfaces fall into
two categories, namely, point-to-point interface and multipoint interface.
BridgeBridges are a type of network devices that connect LANs at the data link layer for
data transmission among them. For some small or remote networks, a bridge can
reduce the network maintenance cost and free the network terminal subscribers
from making special settings for the devices. In addition, its network connection is
no difference f rom a HUB.
IP CountIP count implements accounting on the incoming and outgoing packets as well as
Virtual Router
Redundancy Protocol
(VRRP)
3Com Routers support transparent bridging and are compatible with IEEE 802.1d.
The routers support the STP and bridging functions defined in IEEE 802.1d and
support bridging on the links encapsulated with PPP, HDLC, X.25, or Frame Relay,
as well as bridging on VLAN sub-interfaces and BDR. Furthermore, the routers can
implement multi-port binding and load sharing.
the packets denied by the firewall on the routers. When implementing IP count,
whether the packets match the count list rules and whet her the packets are
denied by the firewall, are two standards by which the router sorts the
bidirectional packet s for count. When making data statistics, both the number of
packets and the total bytes are recorded.
Virtual Router Redundancy Protocol (VRRP) is a fault tolerant protocol. Normally,
the default route set for a host in a network takes the GW route of the network as
the next hop. Through the default route, the host can carry out the
communications with the external networks. If the GW route fails to work, all the
hosts that take it as the next hop on the segment will be unable to communicate
with the outside. VRRP can fulfill the router redundancy by assigning multiple
routers into a router group. Thus, whenever a member fails to work, a backup
router will take up the work of the failed router and thus can ensure the normal
communications between the hosts on the network and the outside.
12CHAPTER 1: 3COM ROUTER INTRODUCTION
2
3COM ROUTER USER INTERFACE
This chapter includes information on the following topics:
■ Establish Configuration Environment
■ Command Line Interface (CLI)
■ User Identity Management
■ Basic Configuration and Management of the System
Establish
Configuration
Environment
Local Configuration
Environment via Console
Port
The 3Com Router 1.x supports local and remote configuration, and the
configuration environment can be established in the following ways:
The local configuration environment can be established via the console port
(configuration interface).
1 As shown in Figure 2, the local configuration environment can be established via
the console port just by connecting the serial port of the computer with the
console port of the router via a standard RS-232 cable.
Figure 2 Establish a local configuration environment via configuration interface
Configuration interface (Console)
Configuration interface (Console)
Configuration interface (Console)
Configuration interface (Console)
Cable
RS-232 serial
RS-232 serial
RS-232 serial
RS-232 serial
port
port
Workstation
Workstation
Workstation
Workstation
Cable
Router
Console interface
Console interface
Configuration
Configuration
(
(
interface)
interface)
interface)
interface)
On 3Com modular routers the CONSOLE port and AUX port are on the front of
the unit, while other ports are on the rear of the unit. The above diagram shows
the rear of the unit. For details, please refer to the 3Com Installation Guide.
2 Run a terminal emulator application such as HyperTerminal of Win9X on the
computer to establish a new connection. Select an RS-232 serial port on the
computer, set the terminal communication baudrate parameters as 9600 bps, 8
data bits, 1 stop bit, no parity and no flow control, and select the terminal
emulation type as VT100, as shown in the following diagram (“HyperTerminal”
setting interface in Windows 9X).
14CHAPTER 2: 3COM ROUTER USER INTERFACE
Figure 3 Establish a new connection
Figure 4 Select the computer serial port for actual connection
Figure 5 Set port communication parameters
Establish Configuration Environment15
Figure 6 Select terminal emulation type
3 Power on the router to display the self-test information of the router. Press Enter
after the self-test to display the prompt “Username:” and “password:”. Type in
the correct username and the password, then enter the system view of Router.
16CHAPTER 2: 3COM ROUTER USER INTERFACE
4 Enter the command to configure the router or view the running status of the
router. Enter “?” to get help when necessary . For details of specific commands,
please refer to the following chapters.
Remote Configuration
Environment via Async
Serial Port
The router powers on, then creates a remote configuration environment by
connecting to the asynchronous serial ports of the router (including
synchronous/asynchronous serial port, AUX interface, i.e., auxiliary interface, etc.)
via modem dial-up. Detailed below is the description on how to establish a remote
configuration environment via asynchronous serial port, with AUX interface as an
example.
T o establish a remote configuration environment via an asynchronous serial port of
the router , pre-configure it to flow mode. For specific setting method, please refer
to the Terminal Service chapter in this manual.
The modem connected to the asynchronous serial interface should be set to
auto-answer mode.
1 As shown in Figure 7, connect a modem to computer serial port and another
modem to the routers asynchronous serial port (AUX interface in the diagram).
Figure 7 Establish a remote configuration environment
RS-232
Serial port
Workstation
Modem
PSTN
Tel No.660000
Modem
AUX interface
Router
2 Run a terminal emulator application, such as HyperTerminal of Win9X, on the
computer to establish a new connection. Select the RS-232 serial port on the
computer for actual connection; set the terminal communication parameters to
9600 baud rate, 8 data bits, 1 stop bit, no parity, no flow control or hardware flow
control, and select the terminal emulation type as VT100, the same as the
connection established via the console port.
3 Before powering on the router, power on its external modem. Initialize the router
via A T command, and then dial on the r emote computer to establish a connection
with the router, as shown in the following figure.
Establish Configuration Environment17
Figure 8 Establish a dial-up connection via “HyperTerminal”
Figure 9 Dial on remote computer
Local/Remote Telnet
Connection
Configuration
Environment
4 If a dial-up connection is established, then press Enter after the self-test to display
the prompt “Username:” and “password:”. Enter the correct username and the
password, then enter the system view of Router.
5 Enter command to configure the router or view running status of the router. Enter
? to get help when necessary . For details of specific commands, please refer to the
following chapters.
After the router powers on, and IP addresses of the interfaces have been properly
configured on the router, you can use the Telnet client program to establish a
connection with the router and log in the router via LAN or WAN. Then configure
the router.
1 As shown in the following two figures, connect the Ethernet port adapter on the
computer with the Ethernet interface of the router. To establish a remote
18CHAPTER 2: 3COM ROUTER USER INTERFACE
configuration environment, connect the computer with the router via the WAN
interface.
Figure 10 .Establish configuration environment of local telnet connection
Workstation
Ethernet
LAN
Server
Work station runni ng
Telnet C l i ent
Figure 11 Establish a configuration environment of a remote telnet connection
Workstation
LAN
Ethernet
Local workstation running
Telnet client
Remote router to be
Router
WAN
configured
Remote LAN
Workstat io n
Ethernet
Workstation
2 As shown in the following two figures (T elnet client pr ogram interface in Windows
9X), run the Telnet client program on the computer and set its terminal emulation
type as VT100.
Figure 12 Run a telnet program
Figure 13 Establish a telnet connection with router
Command Line Interface (CLI)19
Command Line
Interface (CLI)
The host name in the above figure is the name or IP address of a router interface
of the remote connection.
3 If connection is established, press Enter after the self-test to display the prompt
“Username:” and “password:”. Enter the correct username and the password,
then enter the system view of the router. If the prompt of
Too many users!
appears, try to connect later. Usually, there should be no more than five Telnet
users at any one time.
4 Enter the command to configure the router or view running status of the router.
Enter ? to get help if necessary. For det ails of specific commands, please refer to
the following chapters.
In router configuration via Telnet connection, the Telnet connection will be
disabled if you change the IP address of the router interface. So please enter the
new IP address of the router interface at the Telnet client prompt after any
changes in address, so as to re-establish the connection.
The 3Com Router 1.x provides a series of configuration commands for the user to
configure and manage network equipment via command line interface. The
command line interface can accomplish the following:
■ Perform local or remote configuration via the console port.
■ Log in the router through modem dial-up with asynchronous serial port and
perform remote configuration.
■ Perform local or remote configuration via Telnet connection
■ Provide terminal access service.
■ Configure command hierarchical protection to reject the illegal users.
20CHAPTER 2: 3COM ROUTER USER INTERFACE
■ Provide online help any time the user keys in “?”.
■ Provide network test commands, such astracert and ping, etc. to quickly
diagnose whether the network is normal.
■ Provide rich and detailed debugging information for diagnosis of network
faults.
■ Use telnet command to directly log in and manage other routers
■ Support TFTP service, convenient for users to upload or download the 3Com
Router main program files and configuration files.
■ Provide FTP service, convenient for users to upload or download the 3Com
Router main program files and configuration files.
■ Provide function similar to DosKey to execute a history command.
■ Searches the key word via command line interpreter with an incomplete match
method. Interpre tation will be avail able just by entering non-conflict key words.
For example, enter abbreviated “
ViewView is the interface of the 3Com Router command. Different commands are
implemented in different views, and different views are realized according to
different function requirements. For example, the RIP view can configure
corresponding commands.
dis” for display command.
The views in the 3Com Router are in a hierarchical structure. You can enter the
function views in system view and the sub-function views in the function views.
The following figure shows the view stru ct u re of the 3Com Router.
Command Line Interface (CLI)21
Figure 14 Hierarchical view structure of the 3Com Router
RIP view
OSPF view
BGP view
Sync serial interface view
Ethernet interface view
Async serial interface view
CE1 interface view
……
Routing policy view
DLCI view
R2 CAS view
System view
X.25 hunt group view
Frame Relay switch view
Frame Relay class view
DHCP address pool view
Voice view
MFR interface view
PIM view
L2TP group view
IPSec proposal view
IPSec p olicy view
IKE proposal view
ACL view
The following table gives some details of the functionality features of the
command views as well as the commands for entering these views.
System viewTable 4 Views and their prompts
View nameFunctionPromptEnter commandExit command
system viewConfigures the system
parameters
RIP viewConfigures the RIP
parameters
OSPF viewConfigures the OSPF
parameters
BGP viewConfigures the BGP
parameters
routing policy
view
Configures the routing
policy parameters
PIM viewConfigures the
multicast routing
parameters
sync serial
interface view
Configures the
synchronous serial
interface parameters
[Router]Directly enter the view
upon the login of
subscribers
[Router-rip]Enter rip in system
view
[Router-ospf]Enter ospf in system
view
[Router-bgp]Enter bgp in system
view
[Router-route-policy]Enter
route-policy
abc permit 1 or
route-policy
abc deny 1 in
system view
[Router-pim]Enter pim in system
view
[Router-Serial0]Enter interface
serial 0 in any
views
Enter logout to
disconnect the
connection with the
Router
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
22CHAPTER 2: 3COM ROUTER USER INTERFACE
View nameFunctionPromptEnter commandExit command
async serial
interface view
AUX interface
view
AM interface
view
Ethernet
interface view
loopback
interface view
ISDN BRI
interface view
CE1 interface
view
CT1 interface
view
CE3 interface
view
CT3 interface
view
E1-F interface
view
T1-F interface
view
dialer interface
view
virtual
template
interface view
tunnel
interface view
NULL interface
view
logical channel
view
bridge
template
interface view
Configures the
asynchronous serial
interface parameters
Configures the AUX
interface parameters
Configures the AM
interface parameters
Configures the Ethernet
interface parameters
Configures the
loopback interface
parameters
Configures the ISDN BRI
interface parameters
Configures a time slot
binding method on the
CE1 interface and the
physical layer
parameters
Configures a time slot
binding method on the
CT1 interface and the
physical layer
parameters
Configures a time slot
binding method on the
CE3 interface and the
physical layer
parameters
Configures a time slot
binding method on the
CT3 interface and the
physical layer
parameters
Configures the physical
layer parameters for the
E1-F interface
Configures the physical
layer parameters for the
T1-F interface
Configures the dialer
interface parameters
Configures the virtual
template parameters
Configures the tunnel
interface parameters
Configures the null
interface parameters
Configures the AUX
interface parameters
Configures the virtual
Ethernet interface
parameters
[Router-Async0]Enter interface
async 0 in any
views
[Router-Aux0]Enter interface
aux 0 in any views
[Router-AM0]Enter interface
am 0 in any views
[Router-Ethernet0]Enter interface
ethernet 0 in any
views
[Router-LoopBack1]Enter interface
loopback 0 in any
views
[Router-Bri0]Enter interface
bri 0 in any views
[Router-E1-0]Enter controller
e1 0 in any views
[Router-T1-0]Enter controller
t1 0 in any views
[Router-E3-0]Enter controller
e3 0 in any views
[Router-T3-0]Enter controller
t3 0 in any views
[Router-Serial0]Enter interface
serial 0 in any
views
[Router-Serial0]Enter interface
serial 0 in any
views
[Router-Dialer0]Enter interface
dialer 0 in any
views
[Router-Virtual-Template1]Enter interface
Virtual-Templat
e 1 in any views
[Router-Tunnel0]Enter interface
tunnel 0 in any
views
[Router-Null0] Enter interface
null 0 in any views
[Router-logic-channel1]Enter
logic-channel 1
in any views
[Router-Bridge-Template1]Enter interface
Bridge-Template
0 in any views
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Command Line Interface (CLI)23
View nameFunctionPromptEnter commandExit command
X.25 hunt
group view
Frame Relay
class view
DLCI viewConfigures the DLCI
Frame Relay
switch view
MFR interface
view
L2TP group
view
IPSec proposal
view
IPSec policy
view
IKE proposal
view
ACL viewConfigures ACL rules[Router-acl-1]Enter acl 1 in
DHCP address
pool view
Configures the X.25
hunt group parameters
Configures the FR class
parameters
parameters
Configures the FR
switch parameters
Configures the MFR
interface parameters
Configures L2TP group [Router-l2tp1]Enter l2tp-group
Configures a security
proposal
Configures a security
policy
Configures an IKE
proposal
Configures a DHCP
address pool
[Router-X25-huntgroup-abc]Enter x25
hunt-group abc
round-robin in
system view
[Router-fr-class-abc]Enter fr class
abc in system view
[Router-fr-dlci-100]Enter fr dlci 100
in synchronous serial
interface view. (The
link layer protocol
encapsulated on the
interface should be
FR.
[Router-fr-switch-abc]Enter fr switch
abc in system view
[Router-MFR0]Enter interface
mfr 0 in any views
1 in system view
[Router-ipsec-proposal-abc] Enter ipsec
proposal abc in
system view
[Router-ipsec-policy-abc-0] Enter ipsec
policy abc 0 in
system view
[Router-ike-proposal-0]Enter ike
proposal 0 in
system view
system view
[Router-dhcpabc]Enter dhcp server
ip-pool abc in
system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the synchronous
serial interface view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Enter quit to return
to the system view
Command Line
Online Help
The command line prompt character consists of the network device name (Router
by default) and the command view name, such as [Router-rip].
The commands are divided according to view. In general, in a certain view, only
the commands defined by the view can be executed, but some widely used
commands (including
logic-channel, and controller) can be executed in all views
ping, display, debugging, reset, save, interface,
For some views listed in the above table, you must enable the corresponding
functions before you can enter the views. To enter some other views, however,
you should configure the related restriction conditions. For more information, see
the related chapters in this manual.
In all views, you can use the quit command to return to the superior-level views,
and the return command to the system view directly.
The command line interface of the 3Com Router provides the following online
helps:
■ Full help
■ Partial help
24CHAPTER 2: 3COM ROUTER USER INTERFACE
■ The help information obtained via the above-mentioned online help is
described as follows:
1 Full help: Enter “?” in any view, all the commands in this view and their brief
descriptions can be obtained.
[Router]?
aaa-enable Enable AAA(Authentication, Authorization and Accounting)
acl Specifystructure of access-list configure information
arpAdd a ARP entry
bgpEnable/disable BGP protocol
bridgeBridge Set
clockSet system clock
copyCopy config or system file to remote tftp server
configfile Select config file stored in flash or NVRAM
controller Set a E1/T1 entry
......
2 Partial help: Enter a command followed by “?” separated with the space key , and
if parameters are available, descriptions of related parameters will be listed.
[Router]display ?
aaa AAA information
aaa-client Display the buffered voice information
acl Display access-list information
arp ARP table information
bgp BGP protocol information
bridge Remote bridge information
......
Command Line Error
Message
3 Partial help: Enter a character string followe d by “?”, and descriptions of all the
commands beginning with this character string will be listed.
[Router]di?
dialer dialer-rule display
4 Partial help: Enter a command and a character string, followed by “?”, and all the
key words beginning with this character string will be listed.
For example:
[Router]display a?
aaa aaa-client acl arp
In the 3Com Router, all the commands entered by users will be accurately
executed if they pass the syntax check. Otherwise, users will be informed by an
error message. The following table shows common error messages.
Table 5 List of common command line error messages
Common error
message
Incorrect commandNo command has been found.
Incomplete commandThe command input is incomplete.
Invalid parametersParameter value beyond limit
Too many parametersToo many parameters are input.
Causes
No key word has been found.
Wrong parameter type
Command Line Interface (CLI)25
History CommandThe command line interface of the 3Com Router 1.x provides a function similar to
DOSKey by automatically saving the history of commands inputted users. Users
can check the history of commands saved in the command line to repeat
execution. 10 history commands can be saved at the most for each user. The
configuration steps are shown in the following two tables.
1 Display history command
The following command can be used in all views to display the command recently
input:
Table 6 Display history command
OperationCommand
Display history commanddisplay history-command
2 Check history command
The following keys can be used in all views to check recent commands:
Table 7 Check history command
OperationKeysResult
Go to the previous
history command
Go to the next
history command
Ctrl+E (in Windows
9x)
Ctrl+R (in Windows
9x)
If there are earlier inputted commands, fetch the
previous one. Otherwise, the alarms rings.
If there are later inputted commands, fetch the
next one. Otherwise, clear the commands and the
alarms rings.
Edit Features of
Command Line
Display Features of
Command Line
The command line of the 3Com Router 1.x provides basic command edit functions
and supports multi-line editing. The maximum length of each command is 256
characters, as shown in the following table:
The following keys can be used in all views to edit commands:
Table 8 Edit function table
KeyFunction
Any key on boardIf the edit buffer is not full, insert the character at the cursor and
move the cursor to the right.
Backspace key:
BackSpace
Delete key: DeleteDelete the character at the cursor and the alarm rings when the
Left cursor key The cursor moves one character to the left, and the alarm rings when
Right cursor key The cursor moves one character to the right, and the alarm rings
Delete the character to the left of the cursor and move the cursor
back one character. If the cursor gets to the beginning of the
command line, the alarm rings.
cursor gets to the end of the command line.
the cursor gets to the beginning of the command line.
when the cursor gets to end of the command line.
The command line interface of the 3Com Router 1.x provides the following display
features:
Provide pause function when the information displayed exceeds one screen page,
and three options are available for users.
26CHAPTER 2: 3COM ROUTER USER INTERFACE
Table 9 Display function table
OperationCommands or keys
Stop display information on terminalPress Ctrl+C when display information pauses.
Continue to display information of next
screen page
Continue to display information of next
line
Press Space when display information pauses.
Press Enter when display information pauses.
User Identity
Management
The 3Com Router sets three kinds of router management users: administrator
user, operator user and guest user . Dif fer ent kinds of users have differ ent rights to
execute commands.
1 An administrator user has the right to execute all the commands of the router.
Only the administrator user can configure all the functions and parameters and
can enter all views.
2 An operator user can monitor and maintain the router, they can also obtain the
debugging information of the router. The operator user can only execute the
following commands.
debugging Enable system debugging functions
displayDisplay system running information
language Switch language mode (English)
logoutlogout
padTry to open a PAD connection
pingSend ICMP ECHO_REQUEST packets to network hosts
rebootReboot the router under certain condition
resetReset operation
rloginLog in remote UNIX host
sendSend a message to other terminals
telnet Telnet to a remote host
tracertTrace the route taken by packets to reach a network host
undo Cancel current setting
3 A guest user has no right to manage the router, but only has the right to perform
a remote test on the router. The guest user can only execute the following
commands.
languageSwitch language mode (English, Chinese)
logoutlogout
pad Try to open a PAD connection
ping Send ICMP ECHO_REQUEST packets to network hosts
rlogin log in remote UNIX host.
telnetTelnet to a remote host
tracertTrace the route taken by packets to reach a network host
Please perform the following commands in system view.
Table 10 Configure the user
OperationCommand
Configure a userlocal-user user-name service-type type [ password {
simple | cipher } password ]
Delete a userundo local-user user-name
User Identity Management27
By default, no user is set on the router. In this case, the user can log onto the
router without username and password, operating as the administrator user and
have the right to execute all commands.
The router should be configured with at least one administrator user. This is
because any user can log onto the router as the administrator user if no user is set
on the router which could lead to a breach in network security.
If a user is configured on the router, no matter what type of user they are, when
that user logs onto the router, it will prompt them to input the username and
password. Only after the username and password are input correctly can the user
log onto the router, and the system will give the user the corresponding access
rights.
The router can only be configured with the operator user and guest user after an
administrator user has been configured.
If an operator user forgets their password, the administrator user can help them to
modify the password. Also, they can enter into the boot menu (only on the
HyperTerminal co nnected to the Console port) to clear the application password,
and then reboot the router . At this time, the operator user can log onto the router
without username and password.
Basic Configuration and
Management of the
System
If an administrator user forgets their password, they can modify the password
through another administrator user identity. If there is no other administrator user,
they can only enter into the boot menu (only on the HyperTerminal connected to
the Console port) to clear the application password, and then reboot the router. In
this case, the router will restore the default configuration, that is, no user is set on
the router. Because the operation clears the configuration, the administrator must
reconfigure all the functions and parameters.
Basic configuration and management of the system includes:
■ Configure the router name
■ Set the system clock
■ Reboot the system
1 Configure the router name
Please perform the following command in all views.
Table 11 Configure the router name
OperationCommand
Configure the router namesysname sysname
By default, the router name is “Router”.
2 Set the system clock
Please perform the following command in all views.
Table 12 Set the system clock
OperationCommand
Set the system clockclock hour:minute:second day month
year
28CHAPTER 2: 3COM ROUTER USER INTERFACE
By default, the system clock is 08:00:00 1 1 1997.
The system clock will reset to the initial number when the configuration is deleted
by using the delete command or is deleted at the boot menu.
3 Reboot the system
Please perform the following commands in all views.
Table 13 Reboot the system
OperationCommand
Reboot the system right nowreboot [ reason reason-string ]
Reboot the system after a specified time reboot mode interval { hh:mm | time }
Reboot the system at the specified timereboot mode time hh:mm [ dd/mm/yy ]
Cancel the reboot taskreboot cancel
Before rebooting the system, make sure to save the current configuration by using
the save command, or some configuration may lost.
[string ]
[string ]
Display the System
Information of the
Router
Execute the following commands in all views.
Table 14 Display the information of the Router
OperationCommand
Displays the current date and clock of the
router
Displays the duration between the startup of
the Router and the execution of the command
Displays the router namedisplay systname
Displays the use information of the CPUdisplay processes cpu
Displays the use information of the router
memory
Displays the basic information of the Routerdisplay base-information [ page ]
Displays the software version information of
This chapter includes information on the following topics:
■ Storage Media and File Types Supported by the System
■ Upgrade Boot ROM Software
■ Upgrade the 3Com Router Main Program Software
■ Configure On-Line Upgrading of the Card
■ Configuration File Management
■ Configure FTP
Storage Media and
File Types Supported
by the System
Upgrade Boot ROM
Software
The 3Com Router series has three types of storage media:
■ DRAM (Dynamic Random Access Memory), where the 3Com Router main
program executes.
■ Flash memory, to save the 3Com Router main program/configuration file, etc.
■ NVRAM (Non-Volatile Random Access Memory) can be used to save
configuration file but not program file.
The 3Com Router series manage three types of software:
■ Boot ROM file
■ Program file
■ Configuration file
This section contains information to assist you with upgrading the Boot ROM
software.
Upgrade router software carefully and under the guidance of technical support
personnel. In addition, please refer to the release notes (in the software upgrade
file packet) to make sure that the Boot ROM software version matches the 3Com
Router main software version.
Router software includes Boot ROM software and the 3Com Router main program
software, both of which can be upgraded by XModem only when the router is
powered on for self-test. In Boot ROM software upgrade, first connect a computer
external to the Console port of the router and run the terminal emulator on the
computer. The specific upgrading procedure is:
1 Power on the router for self-test, and the following information displays:
3Com Router start booting
32CHAPTER 3: SYSTEM MANAGEMENT
Quickly input Ctrl+D to enter the Boot ROM menu. If Ctrl+D is not input within
three seconds, the system will restart the router and the following prompt
information displays:
3Com Corporation Copyright(C) Reserved.
Compiled at 09:06:32 , Jun 13 2003.
Now testing memory...OK!
8192k bytes flash memory
Press ENTER key to get start when you see ATS0=1.
System now is starting... ATS0=1
2 Input Ctrl+D, and the following prompt information displays:
Please input Bootrom password:
Input the Boot ROM password (directly key in Enter since there is no factory-set
password for the routers). If the Boot ROM password has already been modified,
input the correct one. If your attempts to input the correct password fail three
times, the system will halt, and you must power off and then power on the router.
256M bytes DRAM
3 If the input Boot ROM password is correct, the system will prompt:
Boot Menu:
1: Download Bootrom program
2: Modify Bootrom password
3: Reboot
Enter your choice (1-3):
In the above prompt:
■ Select 1 to use XModem protocol to load router Boot ROM software.
■ Select 2 to modify the Boot ROM password, and the system displays the
following prompt:
Please input new password:*****
Retype the new password: *****
Saving the password... #
The system returns to the prompt displayed at step 3.
■ Select 3 to restart the router .
4 If 1 is selected, the system prompts you to select a baud rate for software loading.
Please choose your download speed:
1: 9600 bps
2: 19200 bps
3: 38400 bps
4: 57600 bps
5: 115200 bps
6: Exit and Reboot
Enter your choice (1-6):
Upgrade Boot ROM Software33
5 Example: if you select baud rate 115200 bps, th e system will prompt you to
modify the baud rate and select XMODEM transfer protocol:
Download speed is 115200 bps. Change the terminal's speed to 115200
bps, and select XMODEM protocol. Press ENTER key when ready.
According to the above prompt, change the baud rate setting at the terminal to
the number equal to the baud rate of the software selected to download. After
having set the baud rate of the terminal, disconnect and then reconnect the
terminal, then press Enter to begin downloading.
After having set the terminal baud rate, make sure to disconnect and then
reconnect the terminal emulator. Otherwise, the new baud rate will not be
effective.
6 The router outputs the following information to indicate waiting for download:
Now Downloading Program File.
Please Start Transfer Program File Use Xmodem Protocol.
If You Want To Exit Press <Ctrl+X>.
Downloading...CCCCCCCCCC
Select Transfer/Send File from the termin al emulator menu to select the file to be
downloaded, the following dialog box displays:
Figure 15 “Send file” dialog box
7 Click Browse and select software to be downloaded. Change the downloading
protocol to XMODEM, then click Send. The following message window displays:
34CHAPTER 3: SYSTEM MANAGEMENT
Figure 16 “Send file” message window
8 After downloading, the router will save the file into Flash or NVRAM, display the
following information, and prompt restoring of the baud-rate setting of the
terminal emulator.
Download completed.
Writing to flash memory...
Please waiting, it needs a long time ##############
Write Bootrom Success.
Upgrade the 3Com
Router Main Program
Software
Please return to 9600 bps. Press ENTER key to reboot the system.
The above information indicates that the information is downloaded. Boldface
characters prompt the user to restore the baud rate setting of the terminal
emulator . Click [Disconnect] in the terminal menu, and then click [Connect] once
again. If the download fails, the system displays the following information, and
reboot the router:
Download failed.
3Com Router start booting
……
If this message is displayed, you should find out the cause prior to upgrading.
9 Restore baud rate of the terminal emulator. Press Enter and the Boot ROM
software of the router will be directly decompressed and loaded into the memory
for execution.
This section contains information to assist you with upgrading the 3Com Router
Main Program software.
CAUTION: You are recommended to upgrade the software only when necessary
and under the guidance of technical support personnel. The router software
package includes the Boot ROM software and the 3Com Router main program
software. When upgrading the software, remember to match the version of the
Boot ROM software with that of the main software.
XModem Approach
Upgrade the 3Com Router Main Program Software35
You can load the 3Com Router main software with XModem or TFTP (Trivial File
Transfer Protocol) approach when powering on the router. Alternatively, you can
load the software with the FTP (File Transfer Protocol) approach after the router is
booted.
1 Power on the router. The router performs a Power-On Self-Test (POST), and the
3Com Corporation Copyright(C) Reserved.
Compiled at 17:47:11 , Mar 21 2003.
Now testing memory...OK!
256M bytes SDRAM
8192k bytes flash memory
Press Ctrl-B to enter Boot Menu
Press Ctrl+B, and the system enters the menu for upgrading the 3Com Router
main software.
The system will enter the menu for upgrading the 3Com Router main software
unless you press Ctrl+B within three seconds of displaying “Press Ctrl-B to
enter Boot Menu...
” on the screen. Otherwise, the system will start
decompressing the program. Reboot the router if you want to enter the 3Com
Router main software upgrade menu after program decompression is started.
2 The system prompts the following information after you press Ctrl+B:
Please input Bootrom password:
Enter the Boot ROM password behind the prompt. If no default ex-factory Boot
ROM password was set on the router, directly press Enter. If the user has modified
the password, make sure to enter the correct one. If attempts for password
authentication failed three times, the system will terminate the upgrading process.
3 After the correct Boot ROM password is entered, the following information
displays:
Boot Menu:
1: Download application program with XMODEM
2: Download application program with TFTP
3: Clear application password
4: Clear configuration
5: Exit and reboot
Enter your choice(1-5):
Choose an option as required. Notice that option 3 is used for entering the system
view from the user password.
4 Select 1, and the system prompts you to choose a baud rate for software loading:
5 After a baud rate (115200 bps for example) is selected, the system displays the
following information to prompt you to modify the baud rate and select the
XModem protocol:
115200 bps, and select XMODEM protocol. Press ENTER key when ready.
Perform the operation as prompted to change the baud rate set on the terminal
into the baud rate selected for software downloading.
Figure 17 Modify the terminal baud rate
3: 38400 bps
4: 57600 bps
5: 115200 bps
6: Exit and Reboot
Enter your choice(1-6):
Make your selection as needed.
Download speed is 115200 bps. Change the terminal's speed to
Click OK after setting the new terminal baud rate. Click Disconnect and then
Connect in the terminal interface to proceed to the next step.
Y ou must disconnect and connect the terminal emulation program after modifying
the baud rate of the terminal. Otherwise, the new baud rate cannot take effect.
6 The router displays the following, indicating that the system is waiting for loading:
Now Downloading Program File.
Please Start Transfer Program File Use Xmodem Protocol.
If You Want To Exit Press <Ctrl+X>.
Downloading...CCCCCCCCCC
Select [Transfer File] in the terminal emulation program menu and the following
dialog box displays:
Upgrade the 3Com Router Main Program Software37
Figure 18 Transfer File dialog box
7 Click Browse to open the folder containing the Boot ROM software, select the file,
change the download protocol to XModem, click Send, and the system will start
downloading and the following dialog box displays:
Figure 19 The Downloading dialog box
8 Upon the completion of the loading operation, the router writes the Boot ROM
into the Flash or NVRAM, and the following prompts display:
Download completed.
Writing into flash memory...
Please wait,it needs a long time (about 1 min)
Writing into Flash Succeeds.
Please use 9600 bps.Press <Enter> key to reboot the system.
Perform the operation as prompted, click Disconnect and then Connect in the
terminal interface.
If the downloading operation fails, the system displays the following and the
router will be rebooted:
Download failed.
3Com Router start booting
……
In this case, you should find out the failure causes and upgrade Boot ROM once
again.
38CHAPTER 3: SYSTEM MANAGEMENT
9 Restore the baud rate of the terminal emulation program to 9600 bps and press
Enter for rebooting the router so that the new 3Com Router main program
software can be run.
TFTP ApproachTFTP is a protocol used for transferring trivial files between clients and servers in
the TCP/IP suite. It provides low-cost and simple file transfer service. Carried in
UDP, TFTP provides only the unreliable traffic transmission service without any
access authorization and authentication mechanism. It ensures data will reach
destinations with the approach of timeout retransmission. Compared with F TP, the
TFTP software is much smaller. At present, TFTP Version 2 (RFC 1350) is the most
popular version.
The 3Com Router can provide you with TFTP client service. That is, the router
works as a TFTP client, and the file server as the TFTP server. You can enter the
corresponding commands on the router to upload its configuration files to the file
server or download the configuration files from the file server into the Flash or
NVRAM of the local route r.
Before using TFTP, you should purchase and install a TF TP server application as the
3Com Router does not come with a TFTP server application.
The TFTP server application can run on Windows 95/98/NT.
Preparation for using the TFTP server
1 Enable the TFTP server program
a Enable the TFTP server program. Select a PC installed with the Windows
95/98/NT operating system and an Ethernet card and start the TFTP server
program on the PC. (Alternatively, a PC running HyperTerminal can also be
used.) TFTPD32 in a Windows 98 environment will be taken as an example for
describing the procedure. The following figure shows a TFTPD32 interface.
Figure 20 TFTPD32 interface
b Set the directory for the TFTP server files. After enabling the TFTP server,
redefine a TFTP file directory and copy the desired 3Com Router main program
software into this directory. Alternatively, you can set the directory containing
the 3Com Router main program files as the directory for TFTP server files.
Specifically, click Settings in the TFTPD32 interface, and the Tftpd32: Settings
for the interface as shown in
Figure 21 are displayed.
Upgrade the 3Com Router Main Program Software39
Figure 21 Tftpd32: Set interface
Enter the file directory in the field of Base Directory, and click OK for
confirmation.
The setting interface may vary with different TFTP server program software.
2 Connect the router
a Select an Ethernet interface for downloading on the router.
3Com Router series support application loading on a particular Ethernet
interface.
■Select Ethernet0 for 5231Routers.
■On an Router 5640, check the slots for a 1-port 10/100Base-TX Fast
Ethernet interface module (1FE) card in the order of 0, 2, 1, and 3. The
Ethernet interface thus found will be used as the downloading network
interface. If the router is not available with a 1FE card, check the slots for
the available 2FE card in the same order, and the Ethernet interface 0 of the
2FE module found first will be used as the downloading network interface.
■On an Router 5680, check the slots for a 1FE card in the order of 0, 2, 4, 6,
1, 3, 5 and 7. The Ethernet interface thus found will be used as the
downloading network interface. If the router is not available with a 1FE
card, check the slots for the available 2FE cards in the same order, and the
Ethernet interface 0 of the 2FE card found first will be used as the
downloading network interface.
b After the Ethernet port for downloading is determined, connect the port to the
PC running the TFTP server program through an Ethernet cable. Assume that
the IP address of the PC is 10.110.10.13.
Upgrade the 3Com Router Main Software with TFTP when Powering on
the Router
1 Run the terminal emulation program on the PC connected to the console port,
start the router, quickly press N upon the display of
3Com Router start booting
on the screen and the following prompt will be displayed:
(M)odify any of the 3Com router configuration or (C)ontinue? [M]
Press Enter and the following prompts will be displayed:
For each of the following questions, you can press <Return> to select
the value shown in braces, or you can enter a new value.
40CHAPTER 3: SYSTEM MANAGEMENT
NETWORK INTERFACE PARAMETERS:
Do you want a LAN interface? [N] y
This board's LAN IP address? [169.254.1.1] 10.110.10.1
Subnet mask for LAN (0 for none)? [255.255.0.0]
TFTP SERVER PARAMETERS:
IP address of the TFTP server? [169.254.75.166] 10.110.10.13
What is the name of the file to be loaded and started? [m8240ram.arj]
How long (in seconds) should CPU delay before starting up? [5]
The IP address of the TFTP server? [169.254.75.166] must be set to the IP
address of the PC connected to the Ethernet port of the router. After the last
parameter is set the following prompts will appear to ask for confirmation:
------------------------------------------------------------------NETWORK INTERFACE PARAMETERS:
IP address on LAN is 10.110.10.1
LAN interface's subnet mask is 0xffff0000
HARDWARE PARAMETERS:
Processor type is MPC8240
Internal Clock Rate 250 Mhz
External Clock Rate 100 Mhz
LAN Controller is DEC 21143
Serial channels will use a baud rate of 9600
TFTP SERVER PARAMETERS:
IP address of the TFTP host is 10.110.10.13
The file to download and start is m8240ram.arj
After board is reset, start-up code will wait 5 seconds
------------------------------------------------------------------(M)odify any of the 3Com router configuration or (C)ontinue? [M]
2 Enter C to confirm the selection and the router performs POST again, and the Boot
ROM starts normally.
3 The router performs POST, and the following displays:
3Com Router start booting
******************************************
* *
* 3Com Router Series Boot rom, V4.32 *
* *
******************************************
3Com Corporation Copyright(C) Reserved.
Compiled at 17:47:11 , Mar 21 2002.
Now testing memory...OK!
256M bytes SDRAM
8192k bytes flash memory
Press Ctrl-B to enter Boot Menu
Press Ctrl+B as prompted and the system enters the 3Com Router main software
upgrade menu.
The system enters the 3Com Router main software upgrade menu unless you
press Ctrl+B within three seconds of displaying “Press Ctrl-B to enter Boot
Menu...” on the screen. Otherwise, the system will start decompressing the
program. Reboot the router if you want to enter the 3Com Router main software
upgrade menu after program decompression is started.
4 Enter Ctrl+B and the system prompts:
Please input Bootrom password:
Upgrade the 3Com Router Main Program Software41
Input the Boot ROM password at the prompt. (By default, no ex-factory Boot ROM
password is set on the router. Simply press Enter in this case.) If the Boot ROM
password has been modified, enter the correct password. The system terminates
the process if the password authentication attempts fails three times.
5 The system displays the following prompts upon input of the correct Boot ROM
password:
Boot Menu:
1: Download application program with XMODEM
2: Download application program with TFTP
3: Clear application password
4: Clear configuration
5: Exit and reboot
Enter your choice(1-5):
Make the selection as desired. Notice that option 3 is used for entering the system
view from the user password.
6 Select 2 for loading the 3Com Router main program with TFTP, and the following
prompt displays:
Please start TFTP server then press ENTER key to get start
TFTP download completed...
read len=[03713478]
Writing program code to FLASH...
Please waiting,it needs a long time (about 1 min)
WriteFlash Success.
Press ENTER key to reboot the system.
8 Press Enter upon the completion of the loading and the router reboots and the
3Com Router main program directly decompresses and loads into the memory for
execution.
Upgrade the 3Com Router Main Software with TFTP after Booting the
Router
This approach implements upgrading by executing the get command to load the
3Com Router main software from the TFTP server after the router is booted.
Start the TFTP server and connect it with the router before using this method to
upgrade the 3Com Router main software. Then, execute the following command
in system view.
Table 15 Download configuration files from a TFTP server
OperationCommand
Downloads the 3Com Router main
software from a TFTP server
get ip-addr file-name system
FTP ApproachAn application layer protocol in the TCP/IP suite, File Transfer Protocol (FTP), is
mainly used for file transfer between remote hosts. Carried on TCP, FTP can
provide reliable and connection-oriented data traffic transmission without access
authorization and authentication mechanisms.
42CHAPTER 3: SYSTEM MANAGEMENT
After a client originates a control connection to a server by using the port
command and uses a randomly assigned F TP port to establish the control link with
port 21 on the server, the link will be in place until there is no data waiting for
transmission. The server uses port 20 to establish data link with the client for data
transmission.
The 3Com Router can provide you with the FTP server service. That is, the router
works as a TFTP server, and a subscriber can run the F TP client application to log in
the router for accessing the files on the router.
Before using FTP, you should purchase and install a FTP client application, as the
3Com Router is not supplied with this software.
Prepare for using the FTP server
1 Set an authentication method on the FTP server
This step can be omitted. AAA defaults to local authentication without
accounting.
The authorization of the FTP server is provided for the top level working directory
of FTP subscribers. Only the subscribers that have passed authentication and
authorization can obtain the service provided by the FTP server. The 3Com Router
authenticates and authorizes FTP subscribers through an AAA server. If no AAA is
configured, the local user authentication is adopted by default.
When using AAA, the router cannot perform local accounting. Therefore, when
using local authentication, you need to open the accounting option switch to
disable the accounting function.
Perform the following configuration in system view.
Table 16 Set an authentication mode for an FTP server
OperationCommand
Enable AAA aaa-enable
Enable accounting switchaaa accounting-scheme optional
Adopt local authentication on PPP
connections
aaa authentication-scheme login
default local
2 Add an FTP-authorized user name and the password
Perform the following configuration in system view.
Table 17 Add an FTP-authorized user name and the password
OperationCommand
Add an FTP-authorized user name
and the authentication password
For the details of the command, refer to the AAA and RADIUS Configuration
contained in the Security section of this manual.
3 Enable the FTP service
The FTP service can be enabled after configuring the authentication and
authorization on the FTP server. The FTP server supports multi-user access. A
Upgrade the 3Com Router Main Program Software43
remote FTP user sends a request to the FTP server, and the server will perform
actions accordingly and return the execution result to the subscriber.
Perform the following configuration in system view.
Table 18 Enable FTP server
OperationCommand
Enables the FTP serverftp-server enable
Disables the FTP serverundo ftp-server enable
Upgrade the 3Com Router Main Software with FTP
1 Assign an IP address to the interface on the router for connecting the router to the
host running the FTP client program.
2 Using the Windows98 FTP client program as an example — place the file to be
uploaded on a specified directory, C:\temp for ex ample, on the FTP client.
3 Open the DOS window, enter FTP X.X.X.X (where X.X.X.X represents the IP
address of the router), and enter the user name and password as prompted:
C:\WINDOWS>ftp 10.110.27.1
Connected to 10.110.27.1.
220 FTP service ready on the 3Com Router at
User (10.110.27.1:(none)): cjj
331 Password required for cjj.
Password:
230 User cjj logged in .
ftp>
4 After the authentication is passed, the FTP client displays the prompt ftp> enter
binary after the prompt, and set the upload directory on the FTP client.
ftp> binary
200 Type set to I.
ftp> lcd c:\temp
Local directory now C:\temp.
5 At the prompt ftp>, set a directory for the FT P server (the router). By default, the
file name of the 3Com Router main program is “system”, which is case sensitive.
You can modify the file name using the
the router. For details, refer to
ftp> dir
200 Port command okay.
150 okay.
config 1007 Bytes
system 5802368 Bytes
226 Data transmit over.
ftp: 76 bytes received in 0.00Seconds 76000.00Kbytes/sec.
Configure FTP.
ftp-server system-name command on
6 At the prompt ftp>, enter the put LocalFile [ RemoteFile ] command to
upload the specified file to the router.
RemoteFile must be the name of the
system file on the router.
ftp> put 3Com Router 1.71 system
200 Port command okay.
150 Server okay , now receive file.
226 file transmit success.
ftp: 5802263 bytes sent in 80.74Seconds 71.86Kbytes/sec.
44CHAPTER 3: SYSTEM MANAGEMENT
7 At the prompt ftp>, appearing after the file uploading is completed, enter the dir
command to display the file name and size on the router. If the uploading
operation is successful, the program or configuration file on the router and the
uploaded file on the host should have the same size.
8 At the prompt ftp>, enter the quit command to exit the FTP client program.
9 The router writes the files into the Flash after receiving all of them, and the
following information displays on the terminal:
Now saving the program file.
Please wait for a while
Receive 5802263 Bytes from client
Writing program code to FLASH...
Please waiting, it may take a long time (about 10 min)
####################################################################
############
####################################################
Write success, please reboot router!
Back up the 3Com
Router Main Program
Software
The upgraded software can only take effect after rebooting the router.
TFTP Approach
With this approach, you can use the copy command to copy the 3Com Router
main software to the TFTP server for redundancy, after booting the router.
Start the TFTP server and c onnect it with the router before using this method to
back up the 3Com Router main software. Then, execute the following command
in system view.
Table 19 Download configuration files from a TFTP server
OperationCommand
Copies the 3Com Router main software to a
TFTP server for redundancy
copy ip-addrfile-name system
FTP Approach
The procedure of backing up the 3Com Router main program softwar e with FTP is
the same as loading the software with FTP, except for
step 6. See “FTP Approach”
on page 41 for reference. When backing up the software with FTP, however, the
step 6 described in “FTP Approach” on page 41 should be modified as follows:
At the prompt ftp>, use the get RemoteFile [LocalFile] command to upload
the specified file to the router. RemoteFile should use the name of the system file
on the router, and the name is case sensitive. Yo u can use the
config-name
command to modify the file name on the router. For details, refer to
ftp-server
“FTP Approach” on page 44.
ftp> get config config.bak
200 Port command okay.
150 Server okay , now transmit file .
226 file transmit success.
ftp: 5802263 bytes received in 80.74Seconds 71.86Kbytes/sec.
Configure On-Line Upgrading of the Card45
Configure On-Line
Upgrading of the Card
The 3Com Router 1.x supports on-line upgrading of such cards as 2SA/4SA, E1VI
and 6AM/12AM. While upgrading, the host acts as FTP Server and the router to be
upgraded as the FTP Client. The host and the router coordinate to download the
card upgrading files.
When you complete the installation of the FTP application, you can execute
Serv-u.exe and configure the serv-u FTP according to the following steps:
1 Click Setup/Users and the Setup Users dialog box displays as shown below:
Figure 22 Setup Users Dialog Box
2 Click Edit to pop up the Edit Users/Group dialog box. Enter user name and
password in the first two boxes respectively, and the path of the serv-u FTP in the
Home Directory box.
Figure 23 Edit Users/Group dialog box
3 Click Add to pop up the Path Name dialog box. Enter the path of the serv-u FTP
and click OK to return.
46CHAPTER 3: SYSTEM MANAGEMENT
Figure 24 Path Name dialog box
Select the check boxes Read, Write and Delete in FILES and click OK to re t urn.
Figure 25 Edit Users/Group check box
4 The cards can be upgraded on-line after the on-line upgrading files are copied to
the path of the serv-u F TP.
Perform the following configuration in the system view.
5 The system will display the following information according to different situations:
If the on-line upgrading succeeds, the Console displays the following prompt
information:
End of programming successful! Total 131072 bytes written.
If the on-line upgrading fails, the Console periodically displays the following
prompt information:
Please enter the update request command for slot number
Configuration File Management47
After the display version command is used, the information on the slot
displays:
card name Driver need to be updated
On-line upgrading uses the upgrading program of other cards and this card will
not be upgraded on-line. The Console displays the following prompt information:
%Error: File ID error!
If the on-line upgrading file is damaged, the card cannot be upgraded on-line. The
Console displays the following prompt information:
%Error: File CRC error!
If another user on the same card is using the on-line upgrading command input,
this user cannot execute the command. The Console displays the following
prompt information:
The indicated board is at updating status
Configuration File
Management
Content and Format of
the Configuration File
Download
Configuration File
This section contains information on configuration file management.
The configuration file is a text file, with the following format:
■ Saved in command format.
■ To save space, only the parameters are saved but the defaults are not saved
(Please refer to the following chapters for the default values of configuration
parameters.).
■ Commands are organized by views. Commands in the same view are organized
together, forming a section, and sections are separated with a blank line or a
comment line (beginning with “!”).
■ Sections are usually arranged in the following order: global configuration,
physical interface configuration, logical interface configuration, route protocol
configuration, etc.
■ Ended with “return”.
Y ou can edit the configuration files offline following the specified format and then
load them onto the router. Three methods are available for loading configuration
files, which are:
■ XModem approach
■ TFTP approach
■ FTP approach
XModem Approach
With this approach, configuration files can be loaded using the download config
command in the terminal emulation program after booting the router. This
command can only be executed in the terminal emulation program. If executing
the command in Telnet, the following prompt will be displayed:
Download can only be executed by the serial terminal client.
Perform the following command in system view.
48CHAPTER 3: SYSTEM MANAGEMENT
Table 21 Load configuration files
OperationCommand
Loads configuration filesdownload config
Follow these steps in the terminal emulation program:
1 Enter the command and make the confirmation.
[Router] download config
Do you want really download the config.ini?(Y/N)y
2 Set the binary transmission protocol to XModem/CRC.
Change Protocol to Xmodem,then Send the Selected File...
3 Transmit the configuration files to the router in the binary format.
Downloading...CCC
4 Save the loaded files into the Flash, if the loading operation is successful.
Download completed.
Writing to flash memory...
5 Reboot the router as prompted to validate the configuration files.
Write completed, please reboot the router.
When performing offline editing and loading of configuration files, you are
recommended to do it under the guidance of technical support personnel. If a
wrong configuration file is loaded, restore the default configuration by erasing the
configuration file in the Flash or NVRAM (depending on the equipment).
TFTP Approach
With this approach, you can use the get command to download the configuration
files from the TFTP server after booting the router.
Like the preparation done before loading the 3Com Router main program with
TF TP, the TFTP server application should be enabled on the PC, and the transferring
path for downloading the configuration files, IP address of the server host, and the
number of the port to be used should be set. After all these preparation tasks have
been completed, you can perform the following configuration on the router. For
the procedure, refer to Upgrading with TFTP.
Perform the following command in system view.
Table 22 Download configuration files from a TFTP server
OperationCommand
Loads configuration files from a TFTP serverget tftp-server-ip-addr file-name
config
FTP Approach
The procedure of loading configuration files with FTP is the same as loading the
main 3Com Router program software with FTP, except for the files to be loaded.
When loading configuration files with FTP, however, the
step 6 described in “FTP
Approach”on page 41 should be modified as follows:
Configuration File Management49
At the prompt of “ftp>”, use the put LocalFile [ RemoteFile ] command to
upload the specified file to the router. RemoteFile should use the name of the
config file on the router, and the name is case sensitive. You can use the
ftp-server config-name command to modify the file name on the router. For
details, refer to
Configure FTP.
Back up Configuration
Files
You can back up configuration files in the following ways:
■ The display current-configuration command output backup approach
■ The TFTP approach
■ The FTP approach
The display current-configuration command output backup approach
Executing the display current-configuration command displays all the
configurations (except for the default configuration) of the router. In Hyper
terminal, simply copying all the displayed configuration information to a text file
will fulfill the purpose of backup.
You can back up the configuration file by copying and saving the contents
displayed below “Current configuration” into a text file.
TFTP approach
First of all, start the TFTP server application program on a PC (the router should be
connected to the PC directly or indirectly, and ping operation can be performed
between them), then set a path and use the
copy command in the system view,
thus, you can upload the configuration files to the TFTP server fr om the router. The
method is often used in remote maintenance.
Perform the following command in system view.
Table 23 Upload configuration files to a TFTP server
OperationCommand
Upload configuration files to the TFTP server
with a specified address and specify the
name for the uploaded file
copy tftp-server-ip-addr
file-name config
FTP approach
The procedure of loading configuration files with FTP is the same as loading the
main 3Com Router program software with FTP, except for the files to be loaded.
“FTP Approach” on page 41 for reference. When loading configuration files
See
with FTP, however, the Step 6 described in “FTP Approach” on page 41 should be
modified as follows:
At the prompt of ftp>, use the get RemoteFile [LocalFile] command to
upload the specified file to the router. RemoteFile should use the same name of
the config file on the router, and the name is case sensitive. You can use the
ftp-server config-name command to modify the file name on the router. For
details, refer to
ftp> get config config.bak
200 Port command okay.
150 Server okay , now transmit file .
Configure FTPConfigure FTP.
50CHAPTER 3: SYSTEM MANAGEMENT
226 file transmit success.
ftp: 735 bytes received in 0.06Seconds 12.25Kbytes/sec.
View Current and Saved
Configuration of the
Router
During the power-on of the router, read the configuration files from Flash (or
NVRAM) to initialize the router. Therefore, the configuration file in Flash (or
NVRAM) is called initial configuration. If there is no configuration file in Flash (or
NVRAM), the router will use default parameters for initialization. Corresponding to
initial configuration, the configuration immediately effective during the running
process of the router is called current configuration.
In general, the initial configuration and current configuration should be the same.
In the case of upgrading (such as upgrading the host software version or board),
the initial configuration might be different from the current configuration. Then
you should save the initial configuration in time to avoid the loss of some
configuration commands.
The following commands can be used in all views.
Table 24 View router configuration
OperationCommand
View the initial configuration of the routerdisplay saved-configuration
View the current configuration of the routerdisplay current-configuration
View the current system configuration of the
router
View all the current interface configuration of
the router
View the current IP routing and routing policy
configuration of the router
View all the routing protocol configuration of
the router
View the current IKE proposal configuration of
the router
View the current IPSec policy configuration of
the router
View the current IPSec proposal configuration of
the router
View the current fr-class configuration of the
router
View the current voice configuration of the
router
display current-configuration
global
display current-configuration
interface type [ number ]
display current-configuration ip
{ route | route-policy }
The the 3Com Router series has two kinds of media, i.e. Flash and NVRAM, to
store configuration files. Either can be selected with the
configfile command to
serve as the storage media of configuration file. The current media can be viewed
by the
display current-configuration command.
Please use the following commands in corresponding views.
Configuration File Management51
Table 25 Select and view the storage media of configuration file
OperationCommand
Select the storage media of configuration file (in system
view)
View the storage media type of current configuration file
(in all view)
configfile { flash |
nvram }
display configfile
If there is only one type of storage media available, the configfile command will
not be effective.
Modify and Save
Current Configuration
Erase Configuration File
in Storage Media
Users can modify the current configuration of the router via the command line
interface. To save the current configuratio n as initial configuration for the next
power - on , u se the
NVRAM, which will be decided by the
save command to save the current configuration in Flash or
configfile command.
Please use the following command in system view.
Table 26 Save current configuration
OperationCommand
Save current configurationsave
The delete command can be used to delete the configuration file in Flash or
NVRAM of the router. After deleting the configuration files, the router will use the
default configuration parameters for initialization during the next power-on. The
configuration file in Flash or NVRAM can be deleted in the following cases:
■ After upgrading, if the router software does not match with the configuration
file.
■ If the configuration file in Flash or NVRAM is damaged, for example, the wrong
configuration file is loaded.
Please use the following command in system view.
Set the Flag Bit to Enter
the Initial Setup Mode
Table 27 Erase the configuration file in storage media.
OperationCommand
Erase the configuration file in storage mediadelete
first-config set is used to set the flag bit of the initial setup. After the flag bit
is set, the router will delete the config files in Flash or NVRAM before the system
enters setup mode, in case of powering off, and reset. The operation is similar to
delete command.
the
first-config reset is used to cancel the setting of the flag bit.
Do not use this command before the save command, which also cancels the
setting of the flag bit.
Use these commands in system view.
52CHAPTER 3: SYSTEM MANAGEMENT
Table 28 Set/clear the flag bit to enter the initial setup
OperationCommand
Set the flag bit to enter initial setup modefirst-config set
Clear the flag bit of initial setup modefirst-config reset
By default, no flag bit for entering the initial setup mode is set.
Configure FTP FTP (File Transfer Protocol), which belongs to the application layer protocol in the
TCP/IP protocol suite, mainly provides file transfer between remote hosts. Borne
on TCP, FTP provides reliable and connection-oriented data transfer service but
does not provide access authorization and authentication mechanism.
When the client originates control connection to a server (with port command)
and establishes control connection with the server port numbered 21 via an
arbitrarily allocated local protocol port number, this connection will be reserved
until data transfer is complete. The server establishes data connection with the
client via port 20 and transfer data.
The 3Com Router 1.x provides FTP service, that is, the router serves as the FTP
server. Users can run the FTP client application and logon to the router to access
files on the router.
Before using FTP, users need to install the FTP Client application. You need to
purchase the FTP Client application as this is not supplied as part of the 3Com
Router series.
Configure FTP ServerFTP server configuration includes:
■ Configure authentication and authorization of the FTP server
■ Start FTP server
■ Upload the configuration file/program file
■ Download the configuration file/program file
■ Configure the running parameters of FTP server
Configure authentication and authorization of FTP server
1 Set the authentication mode of the FTP server
The authorization information of the FTP server is the top-level working directory
of FTP users. Only authenticated and authorized users can enjoy the service of the
FTP server. The 3Com Router 1.x configures authentication and authorization of
the FTP user using AAA. If no AAA is configured, the local user authentication is
adopted by default.
When using AAA, the router cannot perform local accounting. Therefore, when
using local authentication, you need to open the accounting option switch to
disable the accounting function.
Please configure with the following commands in system view.
Configure FTP53
Table 29 Set the authentication mode of FTP server
OperationCommand
Start AAA serveraaa-enable
Disable AAA serverundo aaa-enable
Turn on the accounting selection switchaaa accounting-scheme optional
Turn off the accounting selection switchundo aaa accounting-scheme
optional
Set local authentication for PPP connection aaa authentication-scheme login
default local
2 Add FTP aut ho r ized user name and password
Input the following command in system view.
Table 30 Add FTP authorized user name and password
For a detailed introduction to the above command, please refer to the chapter
“AAA and RADIUS Configuration” in the Security section of this manual.
Start FTP Server
The FTP server can be started after configuring the authentication and
authorization of the FTP server. The FTP server supports multi-user access
simultaneously. The remote FTP user sends a request to the FTP server, which will
execute a corresponding action and return the execution result to the user.
Configure FTP service parameters according to system running status, so as to
make proper use of system resources.
1 Set the file name on FTP server
Before the file is uploaded or downloaded, the name of the
program/configuration file should be set on the router.
Please enter the following commands in system view.
Table 32 Set the file name on FTP server
OperationCommand
Set the program file name on FTP serverftp-server system-name file-name
Set the configuration file name on FTP serverftp-server config-name file-name
54CHAPTER 3: SYSTEM MANAGEMENT
The names of the program/configuration file are “system” and “config”
respectively by default. In the command, file-name is a character string with the
length of 1 to 30.
2 Set FTP update mode
When logging onto the FTP Server from a PC, you can use the put command to
upload the file. The FTP Server adopts two update modes: fast update mode and
normal update mode.
■ Fast update mode: In this mode, after the FTP Server has received the files
■ Normal update mode: In this mode, the FTP Server writes the files uploaded by
Please perform the following configuration in system view.
Table 33 Set FTP update mode
uploaded by the user, it will write the files into Flash. Even when the power is
disconnected during the period of transmitting the files, the existing files in the
router will not be destroyed.
the user into Flash as it receives the files. The existing files in the router may be
destroyed due to power disconnection. Compared with fast update mode, the
system demands less empty memory in the router when working in normal
update mode.
OperationCommand
Set FTP update modeftp-server update { fast | normal }
By default, the FTP server adopts fast update mode.
3 Set the connection time limit of FTP service.
To prevent illegal access by unauthorized users, if no service request from the FTP
client is received within a certain period, connection with this FTP client will be
disconnected.
Please enter the following command in system view.
Table 34 Set the connection time limit of FTP service
OperationCommand
Set the connection time limit of FTP serviceftp-server timeout seconds
The connection time limit of FTP server is 600 seconds by default.
Force to shut down FTP process
In some cases (such as use of FTP by a malicious user), the administrator user
logging from the Console port can use
kill ftp command to disconnect the link
from the FTP user to the router. Use caution when executing this command.
Please perform the following configuration in system view.
Table 35 Force to shut down FTP process
OperationCommand
Force a shut down of the FTP processkill ftp
Display FTP ServerTable 36 Display FTP server
OperationCommand
Display the configuration status of current FTP
server
Display detailed information of the FTP userdisplay local-user
Configure FTP55
display ftp-server
56CHAPTER 3: SYSTEM MANAGEMENT
4
TERMINAL SERVICE
This chapter includes information on the following topics:
■ Terminal Service Overview
■ Terminal Message Service
■ Dumb Terminal Service
■ Terminal Service of Telnet Connection
■ Rlogin Terminal Service
■ X.25 PAD Remote Access Service
Terminal Service
Overview
Features of Terminal
Service at Console Port
The terminal services provided by the 3Com Router to access the command line
interface are as follows:
■ Perform terminal configuration via Console port
■ Perform terminal configuration via asynchronous serial port
■ Perform terminal configuration via Telnet connection
■ Perform terminal configuration via RLogin connection
■ Perform remote login via X.25 PAD
■ Perform terminal message service
The Local configuration environment can be established via the console port.
Please refer to
Chapter 2 “3Com Router User Interface”for specific method.
The features of the terminal service at the console port are shown in the following
table. Parameters of the terminal program running on the computer should be set
according to this table.
Table 37 Features of terminal service at console port
Service typeFeatures
Echo modeNo local echo
Terminal emulation typeVT100
Baud rate9600 bps
Data bit8 bits
Parity checkNone
Stop bit1 bit
Flow controlNone
Binary transmission protocolXmodem
58CHAPTER 4: TERMINAL SERVICE
Features of Terminal
Service at Async Serial
Port
The 3Com Router supports remote configuration on the router via asynchronous
serial port (including synchronous/asynchronous serial port, 8/16 asynchronous
serial port, and AUX port). Please refer to
Chapter 2 “3Com Router User
Interface”of this manual for the specific method to establish the configuration
environment.
The remote terminal service features of the asynchronous serial port are shown in
the following table. Parameters of the terminal program running on the computer
should be set according to this table, and parameters such as baud rate, data bit,
parity check and flow control should be consistent with those of corresponding
router interfaces.
Table 38 Remote terminal service features of the asynchronous serial port
ServiceFeatures
Echo modeNo local echo
Terminal emulation typeVT100
Baud rateConsistent with interface configuration, 9600 bps by default
Data bitConsistent with interface configuration, 8 bits by default
Parity checkConsistent with interface configuration, no parity by default
Stop bitConsistent with interface configuration, 1 bit by default
Flow controlConsistent with interface configuration, no flow control by
default
Set the Attributes of
Terminal Service
Terminal Message
Service
Usually, the terminal user connected via the console port can last for 3 min utes.
The time for the dumb terminal user can last for 10 minutes. For the user who
uses the dummy terminal in dial-up mode, the disconnection timeout is 6 minutes
but the user can disable this function by using the
undo idle-timeout command
so that all the terminal users will never be disconnected.
Perform the following configuration in system view.
Table 39 Set the attributes of terminal service
Service Attribute
Enable the function of timeout disconnection from the
terminal user
Disable the function of timeout disconnection from the
terminal user
idle-timeout
undo idle-timeout
By default, the system will enable the timeout disconnection of the terminal user.
Whenever the terminal users that log into the same router want to communicate
with each other, they can use the terminal message service to send messages. The
remote users can telnet onto the local router to transmit information such as
simple configuration files and description characters that are not easily expressed
through telephones among terminal users, using the
send command. It is much
more convenient than email. Ensuring information security and reliability, the
terminal message service fulfills information interaction among multiple terminals
on one router.
For example, user A and user B respectively log into Router A and Router B. If user
A wants to communicate some information (such as configuration information)
Terminal Message Service59
with user B, user A should telnet onto Router B and execute the send command to
send the related information in all views. Then user B can receive the “message”
sent from user A. If user B does not want to receive additional similar messages,
they can use the
send switch command to disable the function of receiving
messages.
Configure Terminal
Message Service
Terminal message service configuration includes:
■ Send message to terminals
■ Enable/disable receiving messages from other terminals
1 Configure to send a message to terminals
Perform the following configuration in all view.
Table 40 Send a message to terminals
OperationCommand
Send a message to all the terminalssend
Press Ctrl+W to terminate inputting the message, and the system will ask the user
whether to send the message to all the terminal users:
Send message? [confirm]
Press Enter, Ctrl+W, y, or Y to confirm the sending. Press Ctrl+C or other characters
to give up the sending.
The terminal message service supports the following features:
■ Supports the users that login through Telnet or console port to use the
message services.
■ Supports the input of multiple lines of messages.
■ Supports the screen paste on HyperTerminal.
Display Terminal
Message Service
■ Supports using the backspace button to modify the message input in a line.
■ Does not support the control keys such as Insert, Delete, ↑ , ↓, ←, →, Home,
End, and Tab.
■ Displays the prompt information when users input ?, h or H.
2 Enable/disable receiving messages from other terminals
In the terminal message service, receipt of messages from other terminals is
determined by the
send switch command. If the terminal message service is
currently enabled, it will be disabled after a second input of this command.
Perform the following configuration in all views.
Table 41 Enable/disable receiving messages from other terminals
OperationCommand
Enable/disable receiving messages from other terminalssend switch
By default, the terminal message service is enabled to receive message s from o ther
terminals
Perform the following configuration in all views.
Table 42 Display the terminal message service
OperationCommand
60CHAPTER 4: TERMINAL SERVICE
Display the current status of terminal message servicesend status
Typical Example of
Terminal Message
Service Configuration
Dumb Terminal
Service
# Input the send command in system view.
[Router] send
Enter message, end with CTRL/Z; abort with CTRL/C:
# Input the contents of the message that the terminal will send.
hello world # (Enter <Ctrl+W> to terminate the message input )
end message? [confirm]
Press Enter, Ctrl+W, y, or Y to confirm the sending. Press Ctrl+C or other characters
to give up the sending.
When the asynchronous serial port (such as synchronous/synchronous serial port,
AUX port) of the router operates in flow mode, the command line interface (CLI)
of the router can be used to carry out configuration of the router. This is achieved
by directly connecting the RS-232 serial port with the asynchronous serial port of
the router. This is called the dumb terminal operation mode.
As shown in the diagram below, the user can connect with any asynchronous
serial port and log in to the router by running the hyper terminal on PC to carry
out the configuration management of the router.
Figure 26 Configuration management through dumb terminal
RS232 Serial Port
Quidway Series Router
Configure Dumb
Terminal Service
PC
Asynchronous Port
The typical method of terminal access is:
■ The asynchronous port working under the flow mode is connected to the
RS-232 serial port via dedicated line to enter the router command line interface
thereby providing another mode of configuring routers besides the mode of
console port and Telnet mode.
■ Based on the dumb terminal, other applications can be built, for instance,
logging on to other equipment by executing the Telnet command.
Follow these steps to configure a dumb terminal service.
1 Configure dumb terminal service
For the synchronous/asynchronous serial port, physical-mode async, async mode
flow
, and undo modem should be set first.
Perform the following configuration in the interface view.
Table 43 Configure dumb terminal service
OperationCommand
Dumb Terminal Service61
Configure the synchronous/asynchronous serial work in
asynchronous mode
Configure the serial interface of the router to be in flow
mode
Forbid modem to dial in or dial outundo modem
physical-mode async
async mode flow
By default, no dumb terminal service is configured.
2 Configure auto-execute command command
If the auto-execute command command is configured on the asynchronous serial
interface, when you press Enter twice on the external terminal connected to the
interface or log onto the router in modem dial-up mode and press Enter twice, the
router will automatically execute the operation preset by the
command
command.
auto-execute
If the router is configured with the auto-execute command command, you will
not be allowed to log into the configuration interface of the router. If the
command cannot be executed, you will return to the interface with the prompt
Press ENTER to get started, and after you press Enter, the command will be
executed.
Please perform the following configurations in asynchronous serial interface view.
Table 44 Configure auto-execute command command
OperationCommand
Configure the auto-execute command
command on the asynchronous serial interface
Remove this commandundo auto-execute command
auto-execute command command
command
Configuration Examples
of Dumb Terminal
Service
By default, the auto-execute command command is not configured.
Configure Dumb Terminal
■ The configuration procedure of the dumb terminal on sync/async serial 0 ports
■ The configuration procedure of the dumb terminal on AUX port is as follows:
[Router-Aux0] undo modem
After the above operation, Press ENTER to get started displays on the terminal
connected to this async interface, press Enter twice to enter the router
configuration interface. During the configuration, you can click logout to exit the
command line interface and can also click Enter twice to return.
Configure Auto-execute command
The user can use the Telnet command specified by the auto-execute command to
log on the remote SCO UNIX worksta t ion af ter establishing the connection with
the Router via the dumb terminal.
Telnet OverviewTelnet protocol, which belongs to the application layer protocol in the TCP/IP
After the configuration, press Enter twice on the terminal connected to this async
interface to log on the SCO UNIX host 1.110.164.45. During the configuration,
you can click exit to exit the command line interface and can also click Enter twice
to return.
protocol suite, describes how to provide telnet and virtual terminal functions via
the network. Telnet connection services provided by the 3Com Router 1.x include:
■ Telnet Server service: provides services for local and remote users to logon to
the router, maintains the router and accesses network resources. As shown in
the following figure, users can logon to the router by running the Telnet client
program on the computer and perform the configuration management for the
router.
Figure 28 Telnet server service
Router
Workstation
(Telnet Client)
(Telnet Server)
■ T e lnet Client service: provides service for local or remote users who have logged
on to the local router to access other remote system resources by using the
Telnet Client program of the local router. As shown in the fo llowing figure,
users can re-logon to router B using the Telnet command and perform
configuration management after establishing a connection with router A via
the terminal emulator or Telnet program on the computer.
Figure 29 Telnet client service
Terminal Service of Telnet Connection63
Workstation
Router A
(
Telnet Client)
Router B
(Telnet Server)
Reverse Telnet OverviewReverse Te lnet service: the user logs on the r outer with a specified port number by
running the Telnet client program on the PC. Then the connection to the serial
port device connected with the async port of the router is established. One
example: the 3Com Router performs remote configuration and maintenance of
the external devices connected with its 8/16 asynchronous port with Reverse
Telnet service.
Figure 30 Reverse Telnet service
Telnet Client
QuidwayRouter
Connection
Configuration of Telnet
and Reverse Telnet
NAS
Router
LAN Switch
Modem
Other comm uni cation
devices
Terminal Service Features of Telnet Connection
The terminal service features of Telnet connection are shown in the following
table, and the parameters of the Telnet Client program running on the computer
should be set according to the table.
Table 45 Terminal service features of telnet connection
ServiceValue
Input modeCharacter mode
Echo modeNo local echo
Terminal typeVT100
Establish Telnet Connection
Please use the following commands on the Telnet Client program of the host and
in r system view.
64CHAPTER 4: TERMINAL SERVICE
Table 46 Establish Telnet Server or Telnet Client connection
OperationCommand
Enable the Telnet Client connection servicetelnet host-ip-address [
service-port ]
By default, Telnet Server starts automatically. The default value of service-port is
23.
To terminate Telnet service, enter Ctrl+] at Telnet Client side.
Setup Reverse Telnet Connection
Please use async mode flow and undo modem commands in asynchronous
interface view, use
commands in system view, use
timeout
, reverse-telnet listenport and reverse-telnet return-deal
telnet and terminal telnet refuse-negotiation
reverse-telnet disconnect, reverse-telnet
commands in interface view.
Table 47 Enable Reverse Telnet connection
OperationCommand
Forbid the modem to dial in or dial outundo modem
Set the router to flow mode async mode flow
Log onto the router at specified port and
connect to corresponding async port
Disable/Enable the option negotiation towards
the Telnet client
Configure the timeout of Reverse Telnetterminal telnet timeout
Configure the Reverse Telnet timeout of the
interface
Disconnect the Reverse Telnet of the interface reverse-telnet disconnect
Do not send the carriage return received from
the telnet end to the terminal
Do not send the carriage return received from
the terminal to the telnet end
telnet host-ip-address
service-port
terminal telnet
refuse-negotiation
reverse-telnet timeout time
reverse-telnet return-deal
from-telnet
reverse-telnet return-deal
from-dumb
By default, the option for negotiation towards the Telnet client is enabled, and
Reverse Telnet will expire in 600 seconds. Reverse Telnet transparently transmits all
data. The interface use the default listen port number.
Reverse Telnet timeout ensures that if no data is transmitted during a specified
time, the established Reverse Telnet will disconnect automatically. By default, no
timeout is configured for the Reverse T elnet, that is, as long as the Reverse Telnet is
connected, even if there is no data being transmitted, the Reverse Telnet will not
be disconnected.
The Reverse Telnet can be disconnected in interface view.
The undo modem command must be used to disable modem calling-in and
calling-out before the Reverse Telnet timeout of the configuration interface is
configured.
On the 3Com Router series, the maximum number of Reverse Telnet connections
is related to the interface card and the maximum number of tasks supported by
the router.
Terminal Service of Telnet Connection65
The interface listen port number is within the range of 1025 to 65535. Please note
that the listen port number cannot be the same as that of the widely used ports.
By default, the port number and asynchronous interface have the following
relations:
■ The async serial interface number starts from 2001. For instance, the first async
serial interface number is 2001, the second is 2002, and so on.
■ The AUX interface number is 3000.
■ The sync serial interface number starts from 3001. For instance, the first sync
serial interface number is 3001, the second is 3002, and so on.
Force shut down Telnet Process
In some cases (such as usage of Telnet by a malicious user), the administrator user
logging from the Console port can use the
kill telnet command to disconnect
the link from the Telnet user to the router or disconnect the link according to the
process number found through the
display client command. Use caution
when executing this command.
Please perform the following configuration in system view.
Display and Debug
Reverse Telnet
Connection
Typical Configuration
Example of Telnet and
Reverse Telne
Table 48 Force to shut down Telnet process
OperationCommand
Force to shut down Telnet processkill telnet { all | userID userid }
Perform the following configuration in all views.
Table 49 Establish Telnet Server or Telnet Client connection
OperationCommand
Display information of Telnet clients display client
Display information of Telnet connectiondisplay tcp status
display client can only be used to display the interface through which the
Telnet client connected to the router passes. If you want to view the IP address of
the Telnet server connected to the router, you should execute the
status
command. The TCP connection whose local port number is 23 is the Telnet
display tcp
connection, including the Telnet client connection and Telnet server connection.
Example of Telnet
In the networking diagram shown in Figure 28 “Telnet server service”, the host
t
establishes connection with router A (IP address 10.110.0.1), then logs on and
configures router B (IP address 129.102.0.1).
1 Execute the following commands on the user host and Telnet to Router A.
C:\WINDOWS>Telnet 10.110.0.1
2 Execute the following commands in the popup Telnet window, and log onto
Router B.
[RouterA]telnet 129.102.0.1
Trying 129.102.0.1 ...(use CTRL + C to break)
Connected to 129.102.0.1
Service port is 23 .
Username:guest
66CHAPTER 4: TERMINAL SERVICE
3 The message showing successful Telnet to Router B should pop up and display the
Password:
User guest logged in .
host name of RouterB.
[RouterB]
Example of Reverse Telnet
The host is connected to the router, then communicates with the device
connected to the seventh asynchronous serial interface of the router. The IP
address of the router is 10.110.164.44.
[Router] telnet 10.110.164.44 2007
Trying 10.110.164.44...
Service port is 2007 (tty)
Connected to 10.110.164.44
After successful Reverse Telnet, host name of RouterB will be displayed.
[RouterB]
The host can send commands to communicate with the device connected to the
asynchronous serial interface. If a modem is connected to the interface, you can
detect the modem status or configure the modem by using the AT command.
Rlogin Terminal
Service
Rlogin (Remote Login) is one of the most common Internet applications developed
by the BSD UNIX system, in which a client is connected with the server by TCP
connection. It provides the function of several remote terminals accessing the
UNIX host. Rlogin originated from Berkeley UNIX and id used for telnet service
between UNIX systems. Compared with Telnet protocol, it is easier to implement
and use Rlogin protocol.
The 3Com Router implemented by Rlogin is Client-based. Rlogin Client enables
3Com Router series to have functions similar to that of a multi-serial port card, i.e.,
digital or analog terminals that log onto routers through the terminal access
functionality and can use Rlogin protocol to log onto a remote UNI X host.
Figure 31 Connect Unix Server and Terminal through the 3Com Router
Terminal
Terminal
Quidway Router
...
Unix Server
Terminal
The Rlogin client provided by the 3Com Router series has the following features:
Rlogin Terminal Service67
■ Only supports IP address configuration. DNS is not supported.
■ The supported terminal type is VT100.
■ The supported baud rate is 9600 bps.
■ Supports remote access of user terminals connected with the asynchronous
serial port under the flow mode by asynchronous private line or modem dial-up
and supports the maintenance of terminals connected with Console port.
Remote access of the terminals connected with routers in other means (such as
through telnet) is not supported.
■ The function of activating multiple Rlogin sessions at the same user terminal is
not provided.
Configure RloginPlease implement the following configuration in system view.
Table 50 Establish a Rlogin connection
OperationCommand
Establish a Rlogin connectionrlogin ip-address [ username ]
Shut down a Rlogin connectionexit
Typical Rlogin
Configuration Examples
Use local user name abc to log on
[Router]rlogin 10.110.96.53 root
Trying 10.110.96.53 ...
Password:
Last successful login for root: Thu Jan 30 20:29:45 2003 on ttyp2
Last unsuccessful login for root: Sun Jan 26 11:21:53 2003
SCO OpenServer(TM) Release 5
(C) 1976-1998 The Santa Cruz Operation, Inc.
(C) 1980-1994 Microsoft Corporation
All rights reserved.
For complete copyright credits,
enter "copyrights" at the command prompt.
you have mail
TERM = (vt100)
Terminal type is vt100
# exit
rlogin: connection closed.
Use local user name abc and enter the wrong password for the first time
[Router] rlogin 1.1.254.78
Trying 1.1.254.78 ...
Password: ( enter Wrong password)
Login incorrect
Wait for login retry:
login: abc
Password: (enter correct password)
Last successful login for root: Thu Sep 06 15:14:15 2001 on ttyp0
Last unsuccessful login for root: Thu Sep 06 14:22:35 2001 on ttyp0
68CHAPTER 4: TERMINAL SERVICE
SCO OpenServer(TM) Release 5
(C) 1976-1998 The Santa Cruz Operation, Inc.
(C) 1980-1994 Microsoft Corporation.
All rights reserved.
For complete copyright credits,
enter "copyrights" at the command prompt.
you have mail
Terminal type is vt100
#
X.25 PAD Remote
Access Service
PAD (Packet Assembly/Disassembly facility ) is a defin it i on specific to X.25 pr otocol.
The traditional X.25 network requires that all its terminals are of X.25 type, and
relevant hardware and software are needed to support X.25 protocol, which are
the so-called packet terminals. Packet terminals must be intelligent ones, but
many terminals uses are either non-X.25 or not intelligent (such as keyboard,
monitor, printer, etc.) or intelligent but do not support X.25 procedures. In that
case it is impossible for non-X.25 terminals to interconnect with each other
through the X.25 network, or even access the X.25 network. X.25 PAD technology
was developed to address how these devices can be enabled to communicate via
X.25 network.
X.25 PAD bridges the X.25 network and non-X.25 terminals — it provides a
mechanism through which non-X.25 terminals can access the X.25 network. As
shown in the figure below, a PAD is positioned between the X.25 network and
terminals that do not support X.25 procedures to enable the latter to
communicate with other terminals through the X.25 network.
Figure 32 Access function of PAD
Non-X.25 terminal
X.25 Network
X.25
Procedures
P
A
D
Non-X.25
Procedures
The main functions of the X.25 PAD ar e to:
■ Provide support to X.25 procedures and accor dingly to connect and
communicate with the X.25 network.
■ Provide support to non-X.25 procedures and accordingly to connect non-X.25
terminals.
■ Provide non-X.25 terminals with functions of call establishment, data
transmission and call clearing through the X.25 network.
■ Provide non-X.25 terminals with functions of observing and changing interface
parameters so as to adjust to the requirements of varied terminals.
X.25 PAD Remote Access Service69
Therefore X.25 PAD devices actually serve as a procedure translator or network
server, providing services to different terminals and helping them to access the
X.25 network.
The 3Com Router implements X.29 and X.3 protocol in the X.25 PAD as well as in
the X.29 protocol-based Telnet application and the users can config ure routers
without geographical limitation, as shown in the figure below. When the user, for
the sake of security, is unable to use IP protocol-based Telnet to configure routers,
they can access a remote router through X.25 PAD for the configuration.
Figure 33 Access remote router through an X.25 PAD
Serial 0
Router A
X.25 Network
Configure X.25 PADThe X.25 PAD configuration includes:
■ Configure X.25 PAD remote users
■ Enable AAA authentication of X.25 PAD remote users
■ Place the X.25 PAD call and access the remote terminal
■ Set the response time for the Invite Clear message
Configure X.25 PAD remote user
Since remote PAD users can place an X.25 PAD call through the X.25 network,
access the local router, and configure the router, it may be necessary to
authenticate the validity of remote users. You can configure X.25 remote users
with access permission on the router for the purpose of authentication on
receiving the remote PAD request.
This command is not necessary, but if required, it must be used together with the
login pad command.
The called end (also called the configured end) is defined as the Server side, and
the calling end (also called the configuration end) is defined as the Client side.
Please implement the following configuration under the system view at the Server
side.
Router B
Table 51 Configure X.25 PAD remote user
OperationCommand
Configure X.25 PAD remote userlocal-user user-name
Cancel the completed configuration of X.25
PAD remote user
undo local-user user-name
70CHAPTER 4: TERMINAL SERVICE
By default, no X.25 PAD r emote user is configured at the Server side.
For details of the Command, refer to the relevant sections on Security
Configuration Commands in Command Reference (V1.6).
Start AAA authentication of X.25 remote users
After the configuration of X.25 PAD remote users, AAA authentication is started
at the Server side for the purpose of identity authentication on receipt of a remote
PAD request.
This command is not mandatory , but if requir ed, it must be used together with the
user command.
Please implement the following configuration under the system view at the Server
side.
Table 52 Enable AAA authentication for X.25 remote PAD users
OperationCommand
Enable AAA authentication of X.25 remote
user
Disable AAA authentication of X.25 remote
user
Enable AAA authenticationaaa-enable
Configure user name and passwordlocal-user username password
login pad
undo login pad
password
By default, there is no AAA authentication for X.25 remote PAD users.
Establish an X.25 PAD call
In the routers interconnected through X.25 network, the following commands are
used to place a PAD call to remote terminals. If both terminals support X.25 PAD,
the call will be authenticated at the Server side. (If user authentication is not set,
this step can be skipped.). If the authentication succeeds, the Client side can
access the Server side and configure the Server side. After successful access of the
remote terminals, users can log out and disconnect the X.25 PAD connection.
Please implement the following configuration under the system view at the Client
side.
Table 53 Establish a X.25 PAD call
OperationCommand
Establish a X.25 PAD call pad x.121-address
Exit X.25 PAD loginexit
If a call successfully logs on, the user can, at the Client side, access the Server.
Pad command can be nested with itself or with the telnet command, that is, the
user can place an X.25 PAD call on a r outer and access another router, from which
they do the same and access a third router. Or, the user first Telnets to a router
from which they can place X.25 calls and access a third router. Or, users can place
X.25 calls, access a router and then telnet to another router, and so on. It is
recommended to limit the nesting to three times to ensure normal transmission.
X.25 PAD Remote Access Service71
Exit command can also be nested with the Pad command. That is, users can
access a third or even more routers from a router by repeatedly using the
telnet/pad command or by repeatedly using the exit command to exit the
routers being accessed in turns until returning to the one from which the first call
is placed.
Please implement the following configuration under the system view at the Server
side.
Set the Response Time to the Invite Clear Message
If for some unknown reason (for example, the Client side gives an exit request or
needs to release link resour ces) after the Server side of the X.25 P AD sends the
link-clearing message Invite Clear to the Client side, the Server side will wait for a
response from the Client side. If the Client side fails to respond to the message
within the specified time, the Server side will clear the link positively.
Please implement the following configuration under the system view at the Server
side.
Table 54 Set the response time to the Invite Clear message
Display and Debug X.25
PAD
Typical X.25 PAD
Configuration Example
OperationCommand
Set the response time to the Invite Clear messagex29 inviteclear-time time
seconds
Perform the following configuration in all views.
Table 55 Display and debug X.25 PAD
OperationCommand
Display the relevant information of X.25 PADdisplay x25 pad [
pad-number ] [ tty ]
Enable the debugging of X.25 PAD on varied levelsdebugging pad { packet |
error | all }
I. Networking Requirement
As shown in the figure below, with Serial 0 as the interface to the X.25 network,
router A is connected with router B through the X.25 network. It is required that
router B can access and configure router A after it calls router A.
II. Networking Diagram
As shown in Figure 33 “Access remote router thr ough an X.25 PAD”.
III. Configuration Procedure
1 Configure RouterA:
a Configure X.25 PAD remote users.
[RouterA]local-user paduser service-type exec-guest password simple
pad
b Enable AAA aut hentication of X.25 PAD remote users.
[RouterA] login pad
72CHAPTER 4: TERMINAL SERVICE
2 Configure Router B:
c Enter the view of interface Serial 0 and set its link layer protocol as X.25 DTE
IETF.
[RouterA]interface serial 0
[RouterA-serial0]link-protocolx25 dte ietf
d Set its X.121 address as 123456.
[RouterA-serial0]x25 x121-address 123456
a Enter the view of interface Serial 0 and set its link layer protocol as X.25 DTE
IETF.
[RouterB]interface serial 0
[RouterB-serial0]link-protocol x25 dte ietf
b Set its X.121 address as 5678.
[RouterB-serial0]x25 x121-address 5678
c Return to the system view and place the X.25 PAD call to router A
[RouterB] pad 123456
Trying 123456...Open
Username:paduser
Password:
User paduser logged in.
[RouterA]
Fault Diagnosis and
Troubleshooting of X.25
PAD
Fault one: If after X.25 calls a remote terminal, logon fails. The screen
displays
Trying xxxxxxxxxx...Destination unreachable.
Troubleshooting: Follow the steps below.
■ X.25 protocol is encapsulated on the serial port that is used for connection and
both ends support X.25 PAD protocol.
■ After the above condition is met, make sure that the serial port at the Server
side used to receive X.25 calls has set the X.121 address and the address is
correctly called at the Client side.
■ After the above conditions are satisfied, then you should confirm that the serial
interface used to accept the X.25 PAD calls at the Server end has specified the
X.121 address, and the Client has correctly called this address.
■ If the above condition is also satisfied, please check if the Client side has set
switch attributes (i.e.,
x25 switching command is used under system view),
but does not set the route to the Server side. If so, the data cannot be
transmitted from the Client side to the Server side in the packet mode. It is not
mandatory for the Client side to configure the route to access the Server,
though. If the Client side does not configure switch attributes, X.25 will choose
the default route for the call. Therefore, please confirm that the Client side is
not configured with the switch attributes or the Client side is configured with
the switch attributes as well as the route to the Server side.
CONFIGURING NETWORK
5
MANAGEMENT
This chapter includes information on the following topics:
■ SNMP Overview
■ RMON Overview
SNMP OverviewSimple Network Management Protocol (SNMP), a widely accepted industry
standard, is the most dominant network management protocol in computer
networks by far. It is developed to ensure transmission of management
information between any two nodes, which will facilitate network administrators
to search for information at any node on the networks for the purpose of
modifying, locating faults, troubleshooting, planning capacity and generating
reports. Adopting the polling mechanism, SNMP provides essential functionality,
and is suitable for a networking environment requiring small size, high speed and
low cost. Since it uses the transport layer protocol UDP (User Datagram Protocol)
which requires no acknowledgement, it gains wide support in many products.
SNMP system comprises an NMS (Network Management Station) and an agent.
NMS is the workstation running the client application. It sends various request
packets to the managed network devices, receives the response and trap packets
from the managed devices, and displays status information of the managed
devices. The agent is a process running on the managed equipment. It receives
and processes the request packets from the NMS, and responds to the NMS by
returning the corresponding management variables obtained from the protocol
module of the managed equipment. Whenever the agent detects the occurrence
of emergency events on the managed device, such as a change in the interface
status or a failed call, it will send traps to notify the NMS. The relationship
between NMS and agent is shown in the following figure :
Figure 34 Relationship between NMS and agent
Trap
Response
Router
SNMP is the most widely applied communication protocol between NMS and
Agent in the computer network.
Development of SNMP
There are three versions of SNMP: SNMPv1, SNMPv2c and SNMPv3. SNMPv3
defines a series of access control management functions for network security, in
Request
Ethernet
NMS
74CHAPTER 5: CONFIGURING NETWORK MANAGEMENT
addition to the functions defined in SNMPv2c and SNMPv1. In other words,
SNMPv3 develops SNMPv2c by adding security and management functions.
SNMPv1 and SNMPv2c lack security functions, especially in the aspect of
authentication and privacy. SNMPv1 defines only a type of community
representing a group of managed devices. Each NMS controls access to the
devices via the community name list. However, agents do not verify whether the
community names used by the senders are authorized, and they even do not
check the IDs of administrators. Additionally, transmission of SNMP messages
without encryption, which exposes the community name, brings potential threats
to security. Even though some security mechanisms, like digest authentication,
timestamp authentication, encryption and authorization, have been considered at
the early stage of proposing SNMPv2c, only the “community name” similar to
SNMPv1 is used in the final criterion of RFC 1901 through 1908. SNMPv2c is only
a transitional version between SNMPv1 and SNMPv3. To avoid the lack of security
in SNMPv1 and SNMPv2c, IETF develops the SNMPv3 protocol, which is described
in RFC2271 through 2275 and RFC2570 through RFC2575 in details.
RFC2570 through RFC2575 supplements and subdivides SNMPv3 on the basis of
RFC2271 through RFC2275, giving a complete and exact description of the
processing of abnormal errors and the message processing procedure. The
SNMPv3 framework thus defined has become a feasible standard.
Security of SNMPv3 is mostly represented by data security and access control.
■ Data security features provided in SNMPv3
Message-level data security provided in SNMPv3 includes the following three
aspects:
■Data integrity. It ensures that data will not be tampered with by means of
unauthorized modes and the data sequence will only be changed within the
permitted range.
■Data origin authentication. It confirms whic h user the re ceived data is fr om.
Security defined in SNMPv3 is user-based. Hence, it authenticates the users
that generate messages instead of the particular applications that are used
to generate the messages.
■Data confidentiality. Whenever an NMS or agent receives a message, it will
verify when the message is generated. If the difference between the
generating time of message and the current system time exceeds the
specified time range, the message will be rejected. Thereby, it ensures that
the message has not been tampered with in-transit on the network and
prevents processing of received malicious messages.
■ Access control in SNMPv3
As a security measure, access control defined in SNMPv3 implements a security
check on the basis of protocol operations, thereby to controlling access to the
managed objects.
MIB accessible to a SNMP entity is defined by the particular context. For
security reasons, different gr oups and corresponding authorities probably need
to be defined on one entity. The authorities are specified by the MIB view. A
MIB view specifies a collection of managed object types in the context. The MIB
view takes the form of a “view sub-tree” to define objects because MIB adopts
the tree structure. If the flag of the object to be accessed belongs to the MIB
SNMP Overview75
sub-tree, the network administrator can access the device with read or write
authority. Other wise, the operations will be rejected.
SNMP architecture
An SNMP entity comprises one SNMP engine and multiple SNMP applications. The
SNMP engine is the core of the SNMP entity. It transceives and authenticates
SNMP messages, extracts PDU (Protocol Data Unit), reassembles messages, and
communicates with the SNMP applications. SNMP applications process PDUs,
implement protocol operations, and stores/gets MIB.
The SNMP engine comprises the scheduler, message processing sub-system,
security sub-system, and access control sub-system. SNMP applications include the
command generator, command responder, indication generator, indication
receiver, and proxy transponder. The SNMP entity that owns the command
generator or indication receiver is called the SNMP manager, and the SNMP entity
that owns the command responder, indication generator or proxy transponder is
called the SNMP agent. Nevertheless, an SNMP entity can have functions of both
manager and agent.
SNMP-supported MIB
T o uniquely identify the equipment management variables in SNMP packets, SNMP
identifies the managed objects by using the hierarchical structure to name them.
The hierarchical structure is like a tree, in which, the nodes of the tree represent
the managed objects. As shown in the following figure, it can use a path starting
from the root to identify an object unambiguously.
Figure 35 MIB tree structure
1
1
5
1
1
B
6
2
2
2
A
As shown in the above figure, the managed object B can be uniquely specified by
a digit string {1.2.1.1}, which is the object identifier of the managed object.
Consisting of collections of standard variable definitions of monitored network
equipment, MIB describes the hierarchical structure of the tree
SNMP agents in the 3Com Router series support standard network management
versions SNMPv1, SNMPv2c, and SNMPv3. MIBs that are compatible with the
agents are shown in the following table.
■ Configure the network management agent on a router
■ Configure the information of router administrator
■ Configure the SNMP version
■ Configure the trap
■ Adjust the maximum size of SNMP packets
1 Configure network management agent on a router
Perform the following configurations in system view.
Table 57 Configure network management agent on a router
OperationCommand
Enable SNMP servicesnmp--agent
Disable SNMP serviceundo snmp-agent
Set an engine ID for the equipmentsnmp-agent local-engineid
Set the engine ID of equipment to the default
value
By default, the system disables SNMP service.
Engine ID is the unique ID of individual routers on the overall network. It is a string
of 5 to 32 bytes in hexadecimal format. By default, the SNMP engine ID is
engineid
undo snmp-agent local-engineid
SNMP Overview77
“Corporation code of 3Com Corporation. (800007DB) + Equipment information”.
Equipment information can be the IP address, MAC address or self-defined
hexadecimal digit string.
Y ou can skip these two operations when you begin to configure SNMP for a router
because SNMP service will be enabled once you configure any related SNMP
commands (except for the
snmp-agent command. Furthermore, the default engine ID can generally ensure
display commands). It is equivalent to configuring the
the uniqueness of the router on the network.
2 Configure SNMP version and related tasks
The 3Com Router series support SNMPv1, SNMPv2c and SNMPv3.
SNMPv1 and SNMPv2c adopt a community name for authentication, and the
SNMP packets that are not compliant with the community name authorized by the
equipment will be discarded. Different groups can have either the read-only or
read-write access authority. A group with the read-only authority can only query
equipment information, whereas a group with read-write authority can configure
the equipment. The authorities are specified by MIB views.
Security defined in SNMPv3 is user-based hence an SNMP user inherits the
authority of the SNMP group to which it belongs. Different NMS have different
access authority. An SNMP group can have read-only, read-write or notifying
authority. The autho rities of the SNMP group are also determined by MIB views.
Perform the following configurations in system view.
Table 58 Configure SNMP version and related tasks
OperationCommand
Select an SNMP version for NMS snmp-agent sys-info version { v1 | v2c |
v3 | all }
Define the SNMP version(s) that
NMS are not permitted to use
Create or update view
information
Delete a viewundo snmp-agent mib-view view-name
Set name and access authority
for a community
Remove the previous community
name
Set an SNMP groupsnmp-server group { v1 groupname | v2c
Delete an SNMP groupundo snmp-agent group { v1 groupname | v2c
Add a new user to an SNMP
group and specify the SNMP
version as well as the
authentication/encryption mode
undo snmp-agent sys-info version { v1 |
v2c | v3 | all }
snmp-agent mib-view { included | excluded
} viewname subtree subtree
snmp-agent community { read | write }
community_name [ mib-view view-name ] [
acl number ]
By default, SNMPv3 is used. The default view name in the system is ViewDefault,
and OID of which is 1.3.6.1. SNMP group has only the read-only authority by
default.
If SNMPv1/SNMPv2c is used, the community name or SNMPv1/SNMPv2c groups
and users should be configured. If SNMPv3 is used, SNMPv3 groups and users
should be configured.
Before configuring an SNMP group, you should first define the view , which will be
used for configuring the SNMP group. When configuring the community name,
however, specifying a view is optional.
3 Configure information of router administrator
You should correctly configure information describing location and management
of the local equipment so that the network administrator can contact the
equipment administrator.
Perform the following configurations in system view.
Table 59 Configure information of router administrator
OperationCommand
Set the administrator ID and the contact method snmp-agent sys-info contact
string
Restore the default administrator ID and the
contact method
Set router location informationsnmp-agent sys-info location
Restore the default router locationundo snmp-agent sys-info
undo snmp-agent sys-info
contact
string
location
4 Configure traps to be sent by the router
Traps are unsolicited messages that a managed device sends to an NMS for
reporting some urgent and significant events. When a router works as a managed
device, you should configure the destination and source addresses of the trap that
it will send. The destination address is the IP address of the NMS receiving the trap
packet, and the source address is the address of the local router, that is, the
address of an interface on the local router.
Perform the following configurations in system view.
Table 60 Configure the traps to be sent by the router
OperationCommand
Enable the router to send trapssnmp-agent trap enable [ trap-type ]
Disable the router to send trapsundo snmp-agent trap enable
Specify the interface whose address
is bound as the source address in
the trap messages
Remove the interface whose
address is bound as the source
address in the trap messages
Example 1: Configure Network Management of SNMPv1
I. Networking Requirements
In the following diagram the NMS and a router are connected via the Ethernet.
The IP addresses of NMS and the Ethernet interface on the router are respectively
129.102.149.23 and 129.102.0.1.
II. Networking Diagram
Figure 3-3Configure SNMP
e 0
129.102.0.1
NMS
Router
129.102.149.23
Ethernet
III. Configuration Procedure
1 Enable the router to support SNMP and select an SNMP version.
[Router] snmp-agent
[Router] snmp-agent sys-info version v1
2 Set the community name and access authority.
[Router] snmp-agent community public read
[Router] snmp-agent community private write
3 Set the ID of administrator, contact method and physical location of the router.
securityname public
[Router] snmp-agent trap source ethernet 0
5 Configure an IP address for the Ethernet interface ethernet 0.
[Router] interface ethernet 0
[Router-Ethernet0] ip address 129.102.0.1 255.255.0.0
Example 2: Configure Network Management of SNMPv3
I. Networking Requirements
■ According to the networking of Example 1, NMS is connected to the router via
the Ethernet, and their IP addresses are respectively 129.102.149.23 and
129.102.0.1.
■ SNMPv3 is required. Three SNMP groups will be configured and respectively
authorized with read-only, writing, and notifying rights. Three SNMP users
belong to the three groups respectively, and three MIB views are used as read,
write and notify views respectively.
■ Information of the network administrator is required to be configured.
RMON Overview81
■ Required if traps are to be sent — the IP address of the interface ethernet 0 is
the source address of the traps, and the address of the NMS is the destination
address.
II. Networking Diagram
Refer to the networking diagram of Example 1.
III. Configuration Procedure
1 Enable the router to support SNMP and select an SNMP version.
[Router] snmp-agent
2 Set SNMP groups, users and views.
[Router] snmp-agent mib-view included read_view subtree 1.3.6.1
[Router] snmp-agent mib-view included write_view subtree 1.3.6.1.5
[Router] snmp-agent mib-view excluded notify_view subtree 1.3.6.2
[Router] snmp-agent group v3 group_read noauthentication read-view
read_view
[Router] snmp-agent group v3 group_write privacy write-view
write_view
[Router] snmp-agent group v3 group_notify authentication read-view
notify_view
5 Configure an IP address for the Ethernet interfa ce ethernet 0
[Router] interface ethernet 0
[Router-Ethernet0] ip address 129.102.0.1 255.255.0.0
RMON OverviewRMON (Remote Monitor) is a MIB defined by IETF and is the most important
enhancement for the MIB II standard. It mainly monitors the data flow in a
network segment or on the entire network. It is implemented on the basis of the
SNMP architecture (one of its strengths), including NMS and Agent running on
network equipment.
RMON Agent performs statistics of diversified flow information on the network
segments connected to the ports, such as the total messages on a network
segment within a certain period or the total of correct messages sent to a host. It
enables SNMP to monitor remote network devices more efficiently and more
actively and provides an efficient method to monitor sub-network running. This
method can help reduce communication flows between the NMS and the Agent,
82CHAPTER 5: CONFIGURING NETWORK MANAGEMENT
thus managing large-scale interconnection networks easily and effectively. RMON
also allows several monitors and can collect data in two ways: one is to collect
with the RMON probe — NMS directly obtains management data from an RMON
probe and controls network resources. In this way, all RMON MIB data can be
obtained. The other way is by the RMON Agent directly implanted in network
equipment (router, switch and HUB) which will become network facilities with
RMON probe function. NMS exchanges data information with them and collects
network management information through SNMP basic commands. However,
limited by equipment resources, not all RMON MIB data can be obtained this way.
In most cases, only four groups of information can be collected. Currently, the
3Com Router 1.x implements RMON in the second way.
RMON-MIB is composed of a group of statistics data, analysis data and diagnosis
data. Standard MIB not only provides a lot of the original port data of the
managed object, but it provides statistics data and calculation results of a network
segment. By running SNMP Agent supporting RMON on the network monitor,
NMS can obtain the overall flow, error statistics, and performance statistics of the
network segment, that connects the interfaces of managed network equipment
so as to fulfill network management. An RMON application example is shown
below:
Configure RMON on the
Router
Figure 36 Schematic diagram of RMON application
Console with RMON
Router
FDDI
Backbone
Internet
Bridge
With RMON function
Router
Bridge
Ethernet
Router
Ethernet
PC with RMON
Ethernet
The value includes three managed objects. With enhanced RMON alarm group
function, if a sample is found to cross the threshold, which has been configured,
RMON Agent will report to NMS so as to avoid a lot of query messages of the
NMS.
To configure RMON after SNMP, first configure RMON command lines on the
3Com Router series. Then enable RMON statistics before NMS can be used to
monitor network traffic and perform network management.
RMON configuration includes:
RMON Overview83
■ Enable RMON statistics of Ethernet interface
1 Enable RMON statistics of Ethernet interface
After enabling RMON statistics of an Ethernet interface, the router will perform
the statistics of the packet incoming and outgoing through this interface. After
disabling it, the router will not perform the statistics of the packet incoming and
outgoing through this interface.
Perform the following task in Ethernet interface view.
Table 63 Enable RMON statistics of an Ethernet interface
OperationCommand
Enable RMON statistics of an Ethernet interfacermon promiscuous
Disable RMON statistics of an Ethernet interfaceundo rmon promiscuous
RMON statistics is disabled by default.
This command cannot be used in Sub-interface view.
RMON Configuration
Examples
Enable RMON statistics
I. Networking Requirement
To ensure that the router can detect the packet whose destination is another
router from the Ethernet interface, the interface should be added in the DLSw
bridge set. Otherwise, the router only performs statistics for frames with this
router as the destination.
II. Networking Diagram:
Figure 37 Enable RMON statistics
Ethernet
host1
129.1.1.111/24
host2
129.1.1.112/24
129.1.1.100/
24
A(tested rout er)
202.38.165.1/24
202.38.165.2/24
129.2.2.200/
B
24
host3
129.2.2.222/24
III. Configuration Procedure
Configure the 3Com Router
1 Configure address and route of host1, host2, host3, routerA and routerB. Make
sure they can ping through each other. Specific operation is omitted here.
2 Add Ethernet interface Ethernet 0 to DLSw bridge set.
This chapter includes information on the following topics:
■ Display Command Set
■ Debugging Command Set
■ Test Tool of Network Connection
■ Log Function
Display Command SetWith display commands, the system status and system information can be
viewed.
functionality:
■ The command to display system configuration information
■ The command to display system running status
display commands can be divided as follows according to the
■ The command to display system statistic information
The following commands can be used to display related information of the whole
system in all views. Please see related chapters in this manual for specific
display
commands.
Table 64 Commands to display information of the whole system
OperationCommand
Display current terminal user.display client
Display the system clockdisplay clock
Display the current memory type display configfile
Display states of various debugging switchesdisplay debugging
Display the history record of input commanddisplay history-command
Display the router namedisplay systname
Display current configuration information of the
system
Display initial configuration information of the system
stored in router Flash
Display primary system configuration informationdisplay tech-support [ page
Display registered terminal userdisplay user
Display version information of system display version
display
current-configuration
display saved-configuration
]
Debugging Command
Set
The command line interface of the 3Com Router 1.x provides abundant
debugging commands, almost corresponding to all the protocols supported by the
router, helping the user to diagnose and eliminate network faults.
86CHAPTER 6: DISPLAYAND DEBUGGING TOOLS
Two switches control the output of the debugging information:
■ Debugging switch, which controls whether to test a certain
function/module/protocol.
■ Syslog output direction switch, which controls outputting the debugging
information to the control console, Telnet terminal or internal buffer or log
host.
The following is part of the common debugging commands. For more specific
debugging commands related to various protocols, please see related chapters in
this manual and the 3Com Router Command Reference Guide.
The 3Com Router provides a shortcut Ctrl+D to close the huge amount of
debugging information output by the terminal, which functions the same as the
command
Examples are omitted here. Please see relevant chapters in the 3Com Router Command Reference Guide.
In addition, when any terminal user enables or disables the debugging, the
debugging information output on other user terminals will be affected.
undo debugging all.
Test Tool of Network
Connection
Ping CommandThe ping command is mainly used to check the connection of the network, i.e.
As for all link layer protocols, the debugging can be controlled according to
interfaces, so that the interference of a huge amount of redundant information
can be avoided effectively and it makes troubleshooting more convenient.
On the 3Com Router, Syslog (log system) manages the output of debugging
information and other prompt information. Before obtaining the debugging
information, you need to open the related Syslog switch. Firstly, you must use the
info-center enable command to enable Syslog function, then you can use the
info-center console or info-center monitor command to enable debugging
according to the different type of terminal, or use the
debugging
debugging
command on the Console terminal, or use info-center monitor
on the telnet terminal or dumb terminal. Refer to subsequent sections
info-center console
for introduction and detailed descriptions and commands of Syslog.
Since the output of the debugging information will affect the running efficiency of
the router, please do not turn on any debugging switches unless necessary,
especially the
debugging all command. After completing debugging, please turn
off all debugging switches.
whether the host is accessible. Ping sends Internet Control Message Packets
(ICMP) echo packets to another computer connected on the network to see
whether it echoes back. Ping is a useful command to test the connectivity of the
network and details about the journey.
Please see relevant chapters in the 3Com Router Command Reference Guide for
detailed meanings of various options and parameters.
Ping supporting IP protocol
■ For each ping message sent, if the response message has not been received
when the waiting time crosses the threshold, then
Request time out is
output.
■ Otherwise, the data byte number, message sequence number, TTL, and
response time in the response message will be displayed.
■ Finally, the statistic information will be output, including the sent message
number, received response message number, percentage of messages
unresponded, and the minimum, maximum, and average values of the
response time.
Examples:
[Router]ping 202.38.160.244
The system displays:
ping 202.38.160.244 : 56 data bytes, press CTRL_C to break
Reply from 202.38.160.244 : bytes=56 sequence=1 ttl=255 time = 1ms
Reply from 202.38.160.244 : bytes=56 sequence=2 ttl=255 time = 2ms
Reply from 202.38.160.244 : bytes=56 sequence=3 ttl=255 time = 1ms
Reply from 202.38.160.244 : bytes=56 sequence=4 ttl=255 time = 3ms
Reply from 202.38.160.244 : bytes=56 sequence=5 ttl=255 time = 2ms
--202.38.160.244 ping statistics- 5 packets transmitted
5 packets received
0% packet loss
round-trip min/avg/max = 1/2/3 ms
Ping supporting IPX protocol
■ For each Ping message sent, the response information is output. “!” indicates
the response message is received, while “.” indicates not received.
■ Finally, the statistic information is output, including sent message number,
received response message number, percentage of messages unresponded,
and the minimum, maximum, and average values of the response time.
Examples:
[Router]ping ipx 2.0.0c91.f61f
The system displays:
Press CTRL_C to break
Sending 5, 100-byte IPX Echoes to 2.0.0c91.f61f, timeout is 2
seconds
88CHAPTER 6: DISPLAYAND DEBUGGING TOOLS
!!!!!
--2.0.0c91.f61f IPX ping statistics- 5 packets transmitted
5 packets received
0% packet loss
round-trip min/avg/max = 1/2/3 ms
tracert command (Trace
Route Command)
The trace route command helps to trace the current network path to a
destination. With
tracert command, all gateways by which the test packet
passes from the source address to the dest ination address can be displayed. It can
be used to check network connection and locate fault.
The tracert command is executed as follows: first, send a packet with TTL 1, and
the first hop returns an ICMP error message, indicating that this packet cannot be
sent (for TTL timeout). Then, this packet is re-sent with TTL added by 1 (namely 2).
Similarly , the next hop r eturns TTL timeout. In this way, the procedure continues till
the destination is reached. The purpose of these procedures is to record the source
address of each ICMP TTL timeout message, so as to provide the path by which an
IP packet has to pass to reach the destination address.
The following command can be executed in any command modes:
Table 66 tracert command
OperationCommand
Display the path from the source
address to the destination
address
Please see relevant chapters in the 3Com Router Command Reference Guide for
detailed meanings of various options and parameters.
Described below are two examples to analyze the network connection with
tracert command. In the former example, network connection is correct, while in
the latter, network connection is faulty.
[Router]tracert 35.1.1.48
Trace route to nis.nsf.net (35.1.1.48), 30 hops max, 56 byte packet
1 helios.ee.lbl.gov (128.3.112.1) 19 ms 19 ms 0 ms
2 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 39 ms 19 ms
3 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 39 ms 40 ms 39 ms
4 ccn-nerif22.Berkeley.EDU (128.32.168.22) 39 ms 39 ms 39 ms
5 128.32.197.4 (128.32.197.4) 40 ms 59 ms 59 ms
6 131.119.2.5 (131.119.2.5) 59 ms 59 ms 59 ms
7 129.140.70.13 (129.140.70.13) 99 ms 99 ms 80 ms
8 129.140.71.6 (129.140.71.6) 139 ms 239 ms 319 ms
9 129.140.81.7 (129.140.81.7) 220 ms 199 ms 199 ms
10 nic.merit.edu (35.1.1.48) 239 ms 239 ms 239 ms
The above results indicate which gateways (1~9) are passed from the source
address to the destination address. That is very useful to network analysis.
[Router]tracert 18.26.0.115
traceroute to allspice.lcs.mit.edu (18.26.0.115), 30 hops max
1 helios.ee.lbl.gov (128.3.112.1) 0 ms 0 ms 0 ms
2 lilac-dmc.Berkeley.EDU (128.32.216.1) 19 ms 19 ms 19 ms
Log Function89
3 lilac-dmc.Berkeley.EDU (128.32.216.1) 39 ms 19 ms 19 ms
4 ccngw-ner-cc.Berkeley.EDU (128.32.136.23) 19 ms 39 ms 39 ms
5 ccn-nerif22.Berkeley.EDU (128.32.168.22) 20 ms 39 ms 39 ms
6 128.32.197.4 (128.32.197.4) 59 ms 119 ms 39 ms
7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 39 ms
8 129.140.70.13 (129.140.70.13) 80 ms 79 ms 99 ms
9 129.140.71.6 (129.140.71.6) 139 ms 139 ms 159 ms
10 129.140.81.7 (129.140.81.7) 199 ms 180 ms 300 ms
11 129.140.72.17 (129.140.72.17) 300 ms 239 ms 239 ms
12 * * *
13 128.121.54.72 (128.121.54.72) 259 ms 499 ms 279 ms
14 * * *
15 * * *
16 * * *
17 * * *
18 ALLSPICE.LCS.MIT.EDU (18.26.0.115) 339 ms 279 ms 279 ms
The above results indi cate which ga teways (1~17) ar e passed fr om the source host
to the destination host, and which gateways are faulty (12, 14, 15, 16 and 17).
Log FunctionThis section describes the various attributes that form the log function and how to
configure on the router.
Syslog OverviewThe 3Com Router 1.x is configured with Syslog (log system). As an indispensable
part of the 3Com Router 1.x, Syslog serves as the information junction of the
3Com Router 1.x system software module. The log system is responsible for most
of the information output and can perform detailed classification so as to filter
information effectively. In combination with the
debugging command, the system
provides powerful support for the network administrator and development staff to
monitor the network running state and diagnose the network faults.
The Syslog of the 3Com Router 1.x features the following:
■ Support log output in four directions, i.e. to the control console (Console), to
the telnet terminal and the dumb terminal (Monitor), to the internal buffer
(Buffer), and to the log host (Loghost).
■ Log information is divided into eight levels according to the importance and
filter based on the levels.
■ Information is classified according to the source modules and filter based on
the modules.
■ Information can be output in Chinese or English.
Configure Syslog The configuration tasks of Syslog include:
■ Set the direction of Syslog outputting log information
■ Set the Severity of log information
■ Set the Filter of log information
■ Turn on/off Syslog
90CHAPTER 6: DISPLAYAND DEBUGGING TOOLS
Set the direction of syslog outputting log information
As described before, Syslog of the 3Com Router 1.x can output various lo g
information in four directions:
■ Output log information to local control console via Console port
■ Output log information to remote Telnet terminal or dumb terminal. This
function is helpful to remote maintenance.
■ Allocate proper router buffer to record log information.
■ By configuring the log host, log information is directly sent by Syslog to the log
host and then saved as file for later view.
Please enter the following commands in system view.
Figure 38 Set the direction of syslog output log information
OperationCommand
Enable to output log information to local control
console
Disable to output log information to local control
console
Enable to output log information to the terminal info-center monitor
Disable to output log information to the terminal undo info-center monitor
Enable to output log information to internal
buffer
Disable to output log information to internal
buffer
Define the size of internal buffer of output log
information
Enable to output log information to the log host info-center loghost
Disable to output log information to the log host undo info-center loghost
Change the language mode (Chinese | English) of
output log information
info-center console
undo info-center console
info-center logbuffer
undo info-center logbuffer
info-center logbuffer size
info-center { console | monitor
| logbuffer | loghost}{
chinese | english }
Here, Console and Monitor stand for default output directions.
The setting of output direction of the log information will be effective only if
Syslog is turned on.
The settings of the output log information in four directions are independent. The
shutdown of an output in any direction will not affect the output in other
directions.
When there are multiple telnet users or dumb terminal users simultaneously,
various users share the same configuration parameters, which include the filtering
setting based on the module, Chinese/English selection and severity threshold.
When a user changes the values of these parameters, other user terminals will also
be affected. At this time, the
undo info-center monitor command can only turn
off the log information output on the respective terminal. Therefore, to turn off
the log information outputs of all telnet terminals and dumb terminals, please use
undo info-center monitor all command.
the
Log Function91
Set Severity of Log Information
Syslog is divided into 8 levels according to the Severity (or priority) of the
information. The rule to filter the log information according to the level is: the
more urgent the log information is, the less severe it will be. The log information
with severity higher than the set threshold is forbidden to be output. Only the log
information with severity no higher than this threshold can be output.
Perform the following task in system view.
Table 67 Enable to output log information with priority
OperationCommand
Enable to output log information
with priority to local control
console
Enable to output log information
with priority to the terminal
Enable to output log information
with priority to internal buffer
Enable to output log information
with priority to the log host
Disable to output log information
with priority to the log host.
Emergencies (0)Most severe/emergent fault
Alerts (1)Fault needs to be corrected immediately
Critical (2)Major fault
Errors (3)Noticeable but not major fault
Warnings (4)Cautions, it is possible there may be a fault
Notifications (5) Information needs to pay attention to
Informational (6)Ordinary prompt information:
Debugging (7)Debugging information
Set Filter of Log Information
In different output modes, the Filter can be set according to the source of log
information. Only the log information complying with the Filter definition can be
output.
Please enter the following commands in system view.
Table 69 Set filter of the log information
OperationCommand
Set Filter of the control console info-center console filter module
Delete Filter of the control console undo info-center console filter
92CHAPTER 6: DISPLAYAND DEBUGGING TOOLS
Set terminal Filterinfo-center monitor filter module
Delete terminal Filter undo info-center monitor filter
Set Filter of internal buffer info-center logbuffer filter module
Delete Filter of terminal buffer undo info-center logbuffer filter
Set Filter of log hostinfo-center loghost <0-9> { local<0-7>
Delete Filter of log host undo info-center loghost <0-9>{
Here, module stands for the module name. Only the log information related to a
specified module can be filtered and output.
Turn on/turn off syslog
Please enter the following commands in system view.
Table 70 Turn on/turn off syslog
OperationCommand
Turn on Sysloginfo-center enable
Turn off Syslogundo info-center enable
| ip-address } filter module
local<0-7> | ip-address } filter
Display and Debug
Syslog
Typical Syslog
Configuration Example
When Syslog is turned on, the performance of the system will be affected due to
the information classification and output - especially when processing a large
amount of information.
Perform the following configuration in all views.
Table 71 Display and debug syslog
OperationCommand
Display basic configuration information of Syslog display info-center
Display internal buffer information of Syslogdisplay info-center logbuffer
Configuration of Log Host
The configuration, implemented on SunOS 4.0, is almost the same as that
performed on the Unix operating system of other manufacturers.
When editing /etc/syslog.conf, note the following:
■ The comments can only be in separate lines, beginning with character #.
■ The selector/action pairs must be separated with one Tab instead of a space.
■ There must not be redundant spaces behind the file name.
Log Function93
3 When log files like config and security are created and /etc/syslog.conf file is
modified, an HUP will be sent to the system daemon, Syslogd, by executing the
following commands to make Syslogd re-read its configuration file
/etc/syslog.conf.
#ps -ae | grep syslogd
147
#kill -HUP 147
After the above operations, the router can record information in relevant log files.
Configure Facility (facility name), Severity (severity threshold), Filter, and
syslog.conf file to make a detailed classification of information, so as to filter the
information.
Syslog Configuration Example
■ Configure log information output of the control console.
1 Turn on the log system
[Router]info-center enable
2 Configure the log information output of the control console, severity ranging
between emergencies ~ debugging, and do not filter the log information output
of PPP module.
2 Use the host with IP address of 10.110.12.119 as the log host, set the severity
threshold to informational, and choose English as the output language.
[Router]info-center loghost 10.110.12.119 language english
Please see “Configuration of log host” for the host-side configuration.
94CHAPTER 6: DISPLAYAND DEBUGGING TOOLS
7
POS TERMINAL ACCESS SERVICE
This chapter contains information on the following topics:
■ POS Access Service Overview
■ POS Access Service Configuration
■ Display and Debug POS Access
■ Typical Configuration Example of POS Access Se rvice
POS Access Service
Overview
Point of Sale (POS) service is a type of smart card service widely used in shopping
malls, gas stations, and so on. It links the POS terminal device at the commercial
client (located in shopping mall or gas station) to the bank card accounting system
to provide service.
The POS terminal device is widely used in the fields of commerce, finance,
taxation, and so on. The earlier POS terminal devices worked independently in
different b anks, and t hey could n ot communicat e with each ot her. The technology
based on a shared POS access service has solved this problem and makes it
possible to use different bank cards on the same POS.
The POS terminal is connected to the transaction center in two ways, namely,
through dial-up POS access and POS network access.
Dial-up POS Access
In the dial-up POS access mode, after responding to the smart card, the POS
terminal device will synchronously or asynchr onously di al up with the built-in
modem. Thus the POS terminal device at the commercial client accesses the bank
card accounting system. In this case, the 3Com Router series providing POS access
service can be placed at the commercial client side. The routers can be connected
to the front end processor via the WAN. They can also be connected to the front
end processor of the bank via the asynchronous interface or Ethernet port.
The following figure shows the networking diagram of the typical dial-up POS
access.
Figure 39 Dial-up access when the POS access router is located at the FEP side
Serial port
Ethernet
interface
UNIX FEP
POS terminal
PSTN
FCM
Router
Quidway
96CHAPTER 7: POS TERMINAL ACCESS SERVICE
Figure 40 Dial-up access when the POS access router is located at the commercial client
side
POS terminal
POS terminal
POS terminal
Due to the way POS access service usually operates, that is, low speed, high
frequency and small traffic, it is rather sensitive to the dial-up connection time and
requires the interface board for fast dial-up function. However, the present
common PC modem cannot meet the response time requirements of 10 to 20
seconds. At present, most POS equipment manufacturers use the special modem
chip that supports fast connection to implement the function. The FCM card of
the 3Com Router series is a fast handshaking modem specially designed for POS
dial-up access service.
POS Network Access
In the POS network access mode, the router providing POS access service is
located at the commercial client end and helps all the POS terminals access the
3Com Router series. The router located at the FEP side can be any router and
communicates with the 3Com Router series through X.25, FR, DDN, ISDN or
modem.
PSTN/
PBX
FCM
Router
Quidway
PSTN/ISDN
X.25/FR/DDN
Router
Router
UNIX FEP
The following figure shows the netw or king of typical POS network access.
Figure 41 Access mode when the POS access router located at the commercial client end
RS-232
RS-232
Long line
drive
Router
Quidway
PSTN, ISDN
X.25,FR,DDN
Router
Serial
port
Ethernet
interface
UNIX FEP
POS1
POS2
RS-485
POS
POS
concentrator
In the POS network access mode, 3Com Router series can be connected to the
POS terminal in the following two ways:
■ Directly connect the POS RS-232 connector with the asynchronous interface
(including the asynchronous mode of the synchronous/asynchronous interface)
of the 3Com Router series. If the distance between them exceeds 15 meters, it
will be necessary to install a long-line-driver at each end of the connection line.
The valid connection distance of a pair of passive long-line-drivers is about
1200 meters.
■ Set up an RS-485 network with the POS terminal device and POS concentrator,
then connect the RS-232 connector of the POS concentrator with the
asynchronous interface of the 3Com Router series. The 3Com Router series
communicate on the egress port in the same way as the first connection
method. Access in this way can save the router interface source greatly.
The advantages of POS network access are as follows:
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.