Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
All other trademarks appearing in this guide are the exclusive property of their
respective owners.
Hardware Notice
WARNING: Before working on this equipment, be aware of good safety practices
and the hazards involved with electrical circuits.
WARNING: To reduce risk of injury, fire hazard, and electric shock, do not install
the unit near a damp location.
CAUTION: Do not connect the FXS port (labeled PHONE) to the central office line.
CAUTION: To reduce the risk of fire, use only number 26 AWG or larger UL Listed
or CSA Certified telecommunication line cord for all network and
telecommunication connections.
2BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
18 Main Page...................................................................... 379
19 log on Window................................................................ 381
20 Menu Bar....................................................................... 384
Page 22
22BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 23
A
BOUT
This preface describes the intended audience for this guide, how this guide is
organized, its conventions, and access to customer support.
T
HIS
G
UIDE
Audience
This document provides guidelines for configuring and monitoring the BSGX4e
Business Gateway device. It is designed for network managers, administrators, and
technicians who are responsible for the management of networking equipment in
enterprise and service provider environments. Knowledge of telecommunication
technologies and standards, including telephony and Internet protocols, is assumed.
For installation information, see the BSGX4e Business Gateway Installation Guide
(see “Documentation” (page 26)).
Organization
The following table describes the content and organization of this guide.
Table 1. User Guide Organization
ChapterTitleContent
Part I: BSGX4e Use
1Connecting to
the Device
2Initial SetupHow to set the time, restart timer and Domain
3User
Management
4Command
Interface
5WAN Interface
Configuration
6LAN Switch
Configuration
Device overview and the means of remote access to
the unit.
Name Service (DNS) server, and a list of initial
configuration settings.
How to create, modify, remove, and monitor user
access to the device.
How to use commands, including accessing online
help, command syntax, showing and saving
configurations, and defining autorun commands.
Part II: Interfaces and Switch Ports
How to configure the Wide Area Network (WAN)
interface.
How to configure the Local Area Network (LAN)
switch ports and the LAN interface. Topics include
Address Resolution Logic (ARL) and layer 2 Quality
of Service (QoS).
7VLAN
Configuration
How to configure virtual LANs (VLANs).
Page 24
Table 1. User Guide Organization (continued)
ChapterTitleContent
8Routing
Configuration
9Security
Configuration
10VPN
Configuration
11GoS
Configuration
12SIP
Configuration
13MGCP
Configuration
14VoIP
Configuration
How to manage an Address Resolution Protocol
(ARP) table, configure static routes, and start the
Routing Information Protocol (RIP) daemon.
Part III: Traffic Protection
Security topics, including the firewall, Network
Address Translation (NAT), Application Layer
Gateway (ALG), and Intrusion Detection System
(IDS).
How to configure Virtual Private Networks (VPN)
using IP security (IPsec) and Internet Key Exchange
(IKE).
How to configure Nortel’s layer 3 QoS feature,
Guarantee of Service (GoS).
Part IV: VoIP
How to configure the Source Internet Protocol (SIP)
session controller and user agent.
How to configure the Media Gateway Control
Protocol (MGCP) session controller and user agent.
Voice over Internet Protocol (VoIP) topics common
to both SIP and MGCP.
15Local Call
Routing
16VoIP Services
How phone service is maintained by local call
routing.
Services available to LAN devices.
and Relays
Part V:System Management
17MonitoringDisplays and statistics for monitoring the system.
18Monitoring
Tools
19Software
Upgrades
Tools including port mirroring and protocol
monitoring.
The file system and how to install upgrades of the
device software.
Appendices
AWeb User
Interface
BThird Party
Software
CSSH
Functionality
DTCPdump
Expressions
Introduces the Web User Interface that provides a
graphic user interface for the unit.
Lists contact information for third-party software
applications referenced in this guide.
How Secure Shell (SSH) can secure the remote
management of the unit.
Lists the primitives that determine which packets
are dumped by a tcpdump command.
24BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 25
Table 1. User Guide Organization (continued)
ChapterTitleContent
About This Guide
EStandards
Compliance
FRule
Compliance
GCopyright
Information
Lists the data and voice standards to which the
device complies.
Describes how the device complies with U.S.
Federal Communications Commission (FCC) and
Canadian telecommunication rules.
Lists copyright acknowledgements and restrictions.
Conventions
The following conventions are used throughout the guide.
Command Prompt Convention
This guide assumes that the Command Line Interface (CLI) is the user’s primary
method of interaction with the device. When using the CLI, the user enters each
command on a command line following the command prompt. The command prompt
consists of a string followed by the > character. The string can be easily changed, by
convention, so this guide shows the command prompt as the greater than (>) symbol
only.
Text Font Conventions
This guide uses the following text font conventions:
Table 2. Text Conventions
FontPurpose
NOTE:
IMPORTANT:
CAUTION:
WARNING:
italic emphasisShows book titles, special terms, or emphasis.
bold emphasisShows strong emphasis.
courier fontShows a screen capture: what is displayed on the monitor.
blue screen font Emphasizes selected items in a screen capture.
italic screen
font
boldface screen
font
Emphasizes information to improve product use.
Indicates important information or instructions that must
be followed.
Indicates how to avoid equipment damage or faulty
application.
Issues warnings to avoid personal injury.
Indicates a parameter placeholder in command examples.
Shows commands that you enter or keyboard keys that you
press.
BSGX4e Business Gateway User Guide25
Release 01.01NN47928-102
Page 26
Documentation
The documentation for the unit is on the CD-ROM, titled Nortel BSGX4e
Documentation, that is shipped with the unit. PDF files on the CD contain the
following guides:
BSGX4e Business Gateway Installation Guide
BSGX4e Business Gateway User Guide
To view PDF files, use Adobe Acrobat® Reader® 5.0, or later, from your workstation.
If Adobe Acrobat Reader is not installed on your system, you can obtain it free from
the Adobe website: www.adobe.co
m
How to get help
This section explains how to get help for Nortel products and services.
Getting Help from the Nortel Web site
The best way to get technical support for Nortel products is from the Nortel
Technical Support Web site:
www.nortel.com/support
This site provides quick access to software, documentation, bulletins, and tools to
address issues with Nortel products. More specifically, the site enables you to:
download software, documentation, and product bulletins
search the Technical Support Web site and the Nortel Knowledge Base for
answers to technical issues
sign up for automatic notification of new software and documentation for Nortel
equipment
open and manage technical support cases
Getting Help over the phone from a Nortel Solutions Center
If you do not find the information you require on the Nortel Technical Support Web
site, and have a Nortel support contract, you can also get help over the phone from
a Nortel Solutions Center.
In North America, call 1-800-4NORTEL (1-800-466-7835).
Outside North America, go to the following Web site to obtain the phone number for
your region:
www.nortel.com/callus
26BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 27
About This Guide
Getting Help from a specialist by using an Express Routing Code
To access some Nortel Technical Solutions Centers, you can use an Express Routing
Code (ERC) to quickly route your call to a specialist in your Nortel product or
service. To locate the ERC for your product or service, go to:
www.nortel.com/erc
Getting Help through a Nortel distributor or reseller
If you purchased a service contract for your Nortel product from a distributor or
authorized reseller, contact the technical support staff for that distributor or
reseller.
BSGX4e Business Gateway User Guide27
Release 01.01NN47928-102
Page 28
28BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 29
1
C
ONNECTING TO THE
This chapter describes the features of the BSGX4e device and its role in an IP
network. It also describes how to connect to the device and how to set up remote
administrative services.
The BSGX4e is an integrated device, that contains a broad set of networking
functionality for voice and data in a single unit:
It acts as a full-featured router with VoIP, QoS, and advanced security
capabilities.
It slots into the existing network, connected by an Ethernet cable to the WAN
access router.
It enables the effective provisioning of converged VoIP and data services.
It provides session control and service monitoring of VoIP devices on the LAN,
protects against malicious packet attacks, and provides call admission control.
The BSGX4e includes an Foreign Exchange Station (FXS) port that can provide an
analog device with access to VoIP service.
D
EVICE
The BSGX4e includes an Foreign Exchange Office (FXO) port that can provide
backup access to the Public Switched Telephone Network (PSTN).
Network Role
Figure 1 shows a possible IP network layout with an BSGX4e unit that connects a LAN
to the WAN. The figure illustrates the following:
The BSGX4e unit can reference servers on the WAN for the devices on its LAN.
LAN devices can include VoIP phones using SIP or MGCP protocols.
Through its FXO port, you can connect the BSGX4e device to a CO line (PSTN) that
acts as a lifeline if VoIP service is not available.
The unit can provide a VoIP connection for an analog device (such as a phone or
fax machine).
Use a console to locally configure and monitor the unit.
Page 30
Administrative
Servers
VoIP Call
Servers
ICAD40
Central Office
Line
Analog Phone
Figure 1. BSGX4e Connectivity
VoIP Phones
Device Features
An BSGX4e unit provides the following services:
VoIP Session Controller
The BSGX4e unit acts as the session controller for up to 1000 VoIP phones. It can
use the SIP or MGCP protocol and can control up to 500 concurrent calls.
When the WAN is down, the unit provides VoIP survivability. It can place calls
between LAN endpoints and, with its intelligent lifeline, it can switch calls to the
PSTN through the emergency backup FXO line.
Integrated VoIP Gateway (User Agent)
An BSGX4e unit also acts as User Agent (UA) for VoIP phones. It provides a VoIP
endpoint within the network, performing signaling, media control, and conversion
from traditional interfaces to VoIP.
30BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 31
Connecting to the Device
An BSGX4e unit provides two telephony interfaces: one FXS port for connectivity
of analog phones or fax machines and one FXO port to act as a backup lifeline to
the PSTN.
Security
To provide network security, an BSGX4e unit includes a firewall, an advanced
Intrusion Detection System (IDS), Application Layer Gateway (ALG), and support
for network address translation (NAT) and virtual private networks (VPNs).
Multi-Service QoS
The BSGX4e unit includes an advanced QoS mechanism called Guarantee of
Service (GoS). This easy-to-configure mechanism ensures the optimal priority and
bandwidth allocation for multiple classes of critical traffic. It is compatible with
DiffServ with support for Terms of Service (ToS) field remarking.
LAN Switch
An BSGX4e unit includes a 4-port switch, with support for Layer 2 QoS and VLAN
segmenting.
Monitoring
An BSGX4e unit dynamically monitors and provides statistics for both data and
voice flows (such as Mean Opinion Score (MOS) scores gathered per call).
Management
Perform configuration and monitoring by entering commands or by selecting
options from a Web browser interface. The management system assures secure
remote access with SSH and Hypertext Transfer P rotoc ol over Secure Sock et Layer
(HTTPS).
BSGX4e Business Gateway User Guide31
Release 01.01NN47928-102
Page 32
Connecting to the Unit
This user guide assumes that the BSGX4e unit is installed in a working IP network.
The installation procedures are described in the BSGX4eBusiness Gateway Installation Guide.
Configure and monitor this unit by using commands or by using its Web user
interface. This user guide describes command use; the Web user interface is
introduced in “Web User Interface” (page 379).
The “Remote Administration Services” (page 33) describes the servers that can
provide remote access to the BSGX4e unit. Remote access requires the IP address of
the unit. If the IP address is unknown, you can determine the IP address during a
console session as described in the following section.
Finding an IP Address using a Console Session
This procedure assumes the following:
A workstation is connected to the CONSOLE port of the BSGX4e through a serial
port cable.
The workstation is running Tera Term Pro or a similar terminal emulator.
Note: This procedure uses Tera Term Pro (see “Third Party Software” (page
399)).
1.Connect to the BSGX4e through the terminal emulator:
a Select File, and then, New Connection from the menu bar.
A window opens titled Tera Term: New Connection.
b Select the Serial button.
c Select the appropriate COM Port.
d Click OK.
Figure 2. Connect to the Console Port
2. Enter a user name, such as nnadmin, after the prompt:
User:
32BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 33
Connecting to the Device
3. Enter the password for the user account.
Password:
The initial password is PlsChgMe!; it may have been changed during
installation.
4.System information is displayed, ending with the command prompt that ends
with the greater than (>) symbol.
5. After the command prompt, enter the following command:
> show interface ip
A display similar to the following appears:
"eth0" info:
Interface eth0
Flags (A843) < UP BROADCAST RUNNING SIMPLEX LINKUP MULTICAST
IP Address/Mask 172.16.1.217/255.255.255.0
MTU 1500
DHCP off
Lease obtained N/A
Lease expires N/A
MAC Address 00:15:93:FF:00:F8
Speed FULL100
Configured speed AUTONEG
"eth1" info:
Interface eth1
Flags (A843) < UP BROADCAST RUNNING SIMPLEX LINKUP MULTICAST
IP Address/Mask 192.168.1.1/255.255.255.0
MTU 1500
DHCP off
Lease obtained N/A
Lease expires N/A
MAC Address 00:15:93:FF:00:F9
Speed N/A
Configured Speed N/A
6.Find the IP address on the IP Address/Mask line for the interface to be used:
If connecting to the BSGX4e through the WAN, use the eth0 address.
If connecting to the BSGX4e through a LAN port, use the eth1 address.
Remote Administration Services
This section describes how to configure servers that allow for remote administration
of the BSGX4e unit. These servers are:
Telnet server
Secure Shell (SSH) server
Web server
Secure Socket Layer (SSL) server
BSGX4e Business Gateway User Guide33
Release 01.01NN47928-102
Page 34
The Telnet server in the unit is initially disabled, you must open a connection to the
unit from a Telnet session on a workstation. For more information, see “Telnet
Access” (page 34).
The SSH server in the unit is also initially enabled. It provides a means of secure,
remote access. For more information, see “SSH Server” (page 36).
The Web server is initially enabled to allow the use of the Web user interface.
Access to the Web server is described in “Web Server” (page 38).
Show Remote Connections
The maintenance command whoison shows the users that are currently using
remote access to the unit. An example follows:
> whoison
User Source IP Type
-----------------------------------------------------------admin Unknown Terminal
user 10.0.1.2 Web
The Type field indicates how the user is connected to the unit: Terminal (console
port), SSH, Telnet, or Web.
Telnet Access
Telnet allows access to the BSGX4e unit through a remote terminal session. Telnet
access requires the following:
The workstation on the WAN or LAN must provide a Telnet client (for example,
Tera Term Pro, Windows telnet client, or Linux telnet client).
As initially configured, the Telnet server in the unit is enabled, and the firewall
allows Telnet access from the WAN.
If the initial unit configuration is changed, the following reconfiguration can be
required:
For Telnet access from the WAN, the firewall must allow Telnet traffic
terminating at the BSGX4e device. This requires a security policy for TCP traffic
to the Telnet port (The default Telnet port is port 23). For more information
about security policies, see “Firewall Security Policies” (page 130).
The Telnet server on the unit must be configured and enabled as described in the
following section “Telnet Configuration Command” (page 34).
Telnet Configuration Command
To change the Telnet configuration, enter the following command:
> config service telnet
Table 3 describes the parameters for config service telnet.
34BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 35
Connecting to the Device
Table 3. Telnet Server Configuration Parameters
ParameterDescription
enabledEnables the Telnet server (Boolean). Initially, Telnet is
enabled.
portTelnet server port number. The default is 23.
Telnet Configuration Example
The following example disables the Telnet server on port 23.
> config service telnet no enabled
*> save
Show Telnet Configuration
To verify the Telnet configuration, enter the following command:
> show service telnet
Telnet Service:
Enabled no
Port 23
Telnet Client Command
To start a Telnet session, enter the following command:
> telnet
Table 4 describes the parameters for the maintenance command telnet.
Table 4. Telnet Parameters
ParameterDescription
ip addressIP address of the BSGX4e device.
-pOptional Telnet port number.
Telnet Session Example
The following example starts a Telnet session on the device at IP address
192.168.134.217:
> telnet 192.168.134.217
Trying 192.168.134.217
Connected to 192.168.134.217
Escape character is '^]'.
User:
BSGX4e Business Gateway User Guide35
Release 01.01NN47928-102
Page 36
SSH Server
This section describes how to configure the Secure Shell (SSH) server. The SSH server
enables secure remote access to the BSGX4e device over an insecure network, such
as the Internet. SSH version 2 is supported.
SSH use requires the following:
The workstation on the WAN or LAN must provide an SSH client (for example,
PuTTY or SSH secure shell).
As initially configured, the SSH server in the unit is enabled, and the firewall
allows SSH access from the WAN.
If the initial unit configuration is changed, the following reconfiguration can be
required:
For SSH access from the WAN, the firewall must allow SSH traffic terminating at
the BSGX4e device. This requires a security policy for TCP traffic to the SSH port.
(The default SSH port is port 22). For more information about security policies,
see “Firewall Security Policies” (page 130).
The SSH server on the unit must be configured and enabled as described in the
section “SSH Configuration Command” (page 36).
Digital Signature Algorithm (DSA) Host Keys
The SSH server uses a set of 640-bit DSA host keys (one public, one private) for data
encryption. It stores one set of keys on the file system (/cf0sys/ssh). A randomly
seeded algorithm generates an initial set of host keys the first time that the BSGX4e
device is started. The SSH server uses this set of host keys to identify itself when an
SSH client connects. Regenerate new host keys by using the parameter hostkeys on
the config service ssh command.
After a secure connection is established between the SSH server and a client, the
client attempts authentication. The SSH server supports password, keyboard, and
publickey authentication.
When both password and keyboard authentication are requested, the user
must supply a username and password.
To use publickey authentication, upload files containing the public key of the
SSH client must be to the device in the directory:
/cf0sys/id_<username>.pub.
After the SSH client is authenticated, it requests an SSH secure remote log on.
SSH Configuration Command
To change the SSH configuration, enter the following command:
> config service ssh
Table 5 describes the parameters for config service ssh.
36BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 37
Connecting to the Device
Table 5. SSH Configuration Parameters
ParameterDescription
enabledEnables the SSH server (Boolean). The initial setting is
enabled.
portSSH server port number. The default is 22.
hostkeysHost keys that the SSH server uses to authenticate itself (none
| 640bit). The default is 640bit.
To regenerate the SSH keys, set HostKeys to none, and then
The key regeneration can take several seconds. During this period, the value of the
parameter HostKeys is generating....
Upload Public Key
To upload the public key of an SSH client, use a Simple File T r ansfer Protocol (SFTP)
session.
The following example uploads the key of client fred to the BSGX4e device, IP
address 192.168.134.217.
1.Start the SFTP session:
fred@cygnus ~ $ sftp admin@192.168.134.217
Connecting to 192.168.134.217...
The authenticity of host '192.168.134.217 (192.168.134.217)'
can't be established.
DSA key fingerprint is
9a:1f:34:52:f1:78:d7:6c:56:5b:9d:73:f0:da:1f:c0.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.134.217' (DSA) to the
list of known hosts.
User: nnadmin
Password:
sftp> cd /cf0sys
sftp> put id_fred.pub
Uploading id_fred.pub to /cf0sys/id_fred.pub
2.To view the contents of the directory, enter the following command:
sftp> ls
flash id_fred.pub ssh ssl
Web Server
This section describes how to configure the Web server. The Web server enables the
remote administration of the BSGX4e device using the W eb User Interface (see “Web
User Interface” (page 379)).
The Web server supports access through Hypertext Transfer Protocol (HTTP) and
HTTPS (HTTP over SSL). For more information on SSL configuration, see “SSL” (page
40).
Web server use requires the following:
38BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 39
Connecting to the Device
The workstation on the WAN or LAN must provide a Web browser (Microsoft
Internet Explorer or Mozilla Firefox).
As initially configured, the Web server in the unit is enabled, and the firewall
allows HTTP or HTTPS traffic from the W AN terminating at the BSGX4e.
NOTE: The initial unit configuration enables the Web server and configures a
security policy to allow Web access from the WAN to the unit.
If the initial unit configuration is changed, the following reconfiguration can be
required:
For Web access from the WAN to the unit, the firewall must allow Web traffic
terminating at the BSGX4e device. This requires access for TCP traffic to the Web
and Web User Interface (UI) ports. (The default Web UI port is port 443; the
default Web port is 80.) For more information about the firewall, see “Firewall
Security Policies” (page 130).
Configure and enable the Web server in the unit as described in the following
section “Web Server Configuration Command” (page 39).
Web Server Configuration Command
To change the Web server configuration, enter the following command:
> config service web
Table 6 describes the parameters for config service web.
Table 6. Web Server Configuration Parameters
ParameterDescription
enabled Enables the Web server (Boolean). Initially, the Web server is
enabled.
httpport HTTP port number for the Web server. The default is 80.
httpsport HTTPS port address for the Web server. The default is 443.
Disable Web Server Example
The following example disables the Web server.
> config service web no enabled
*> save
Show Web Server Configuration
To verify the configuration, enter the following command:
> show service web
Web Server:
Enabled yes
BSGX4e Business Gateway User Guide39
Release 01.01NN47928-102
Page 40
HTTP Port 80
HTTPS Port 443
Show Web Server Statistics
To display the statistics of the Web server, enter the following command:
> stats service web
Web Stats:
Redirects 0 Errors 0
Access Err 0 Timeouts 0
Form Hits 0 Local Hits 0
Table 7 describes the Web server statistics.
Table 7. Web Server Statistics
StatisticDescription
Redirects Number of redirections from the Web server.
Errors Number of Web server errors.
Access Err Number of security violations from the Web server.
Timeouts Number of timeouts from the Web server.
Form Hits Number of form requests.
Local Hits Number of local hits for access.
SSL
This section describes how to configure the Secure Socket Layer (SSL). SSL enables
secure remote access to the BSGX4e device over an insecure network, such as the
Internet.
The steps required to configure SSL are:
1.Generate a new SSL key if the existing key has been deleted or compromised.
2.Generate a new SSL certificate signing request (CSR).
3.Generate or import the SSL certificate.
SSL Key
The system administrator can use the SSL key to manage a private Rivest Shamir
Adleman (RSA) key, which the SSL server requires to encrypt data. The first time the
BSGX4e device is started, a randomly-seeded, 1024-bit RSA key is generated and
saved. Normally, a new private key does not need to be generated unless the
security of the private key has been compromised. The RSA key is stored in the file
/cf0sys/ssl/rsakey.dat.
40BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 41
Connecting to the Device
NOTE: If the SSL key is deleted, new SSL connections cannot be created. To see
the status of the SSL key, enter show ssl key.
A new SSL key can be generated. The number of bits is constrained to 512, 768,
1024, or 2048. When the SSL key record is created or modified, a key generation task
is started. Key generation can take several minutes, depending on the size of the
key. When key generation starts, the key used by the SSL server is deleted; new SSL
connections cannot be created until a new key is available. When key generation
completes, the RSA key used by the SSL server is set to the newly generated key;
new SSL connections can then be created.
SSL Key Command
To generate a new SSL key, enter the following command:
> config ssl key
Table 8 describes the parameters for config ssl key.
Table 8. SSL Key Configuration Parameters
ParameterDescription
[type]Type of encryption key (RSA).
bitsNumber of bits in key (512 | 768 | 1024 | 2048).
SSL CSR
A system administrator can use the SSL Certificate Signing R equest (CSR) to generate
an X509 certificate, which can be self-signed by the SSL module or signed by an
external certificate authority (CA).
A single X509 CSR can be generated. Generating a CSR requires an SSL key. To see
the status of the SSL key, enter show ssl key.
NOTE: If the SSL CSR is deleted, new SSL connections cannot be created.
SSL CSR Command
To generate an SSL CSR, enter the following command:
> config ssl csr
Table 9 describes the parameters for config ssl csr.
Table 9. SSL CSR Configuration Parameters
ParameterDescription
[type]Certificate signing request type (x509).
country Two-letter country code. The default is US for the United
States; to see the most recent list, go to www.iso.org
state Full name of state or province (such as, California).
BSGX4e Business Gateway User Guide41
Release 01.01NN47928-102
locality Locality or city name (such as, Fremont).
orgname Company name (such as, NewCo).
orgunit Organizational unit (such as, Engineering).
commonname Domain name (such as, www.example.com).
email E-mail address (such as, webadmin@example.com).
Upload SSL CSR
Use SFTP to upload an SSL CSR. The recommended directory for the uploaded CSR
file is /cf0sys/ssl. An example follows.
1.Upload the SSL CSR file:
fred@cygnus ~ $ sftp admin@192.168.134.217
Connecting to 192.168.134.217...
The authenticity of host '192.168.134.217 (192.168.134.217)'
can't be established.
DSA key fingerprint is
9a:1f:34:52:f1:78:d7:6c:56:5b:9d:73:f0:da:1f:c0.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.134.217' (DSA) to the
list of known hosts.
User: nnadmin
Password:
2.Set the current directory and store the CSR file in it:
sftp> cd /cf0sys/ssl
sftp> put csr.pem
Uploading csr.pem to /cf0sys/ssl/csr.pem
3.Ensure that the CSR file is in the current directory:
sftp> ls
rsakey.dat csr.pem
At this point, use the imported CSR to generate the SSL certificate as described in
the next section “SSL Certificate” (page 42).
>config ssl certificate x509 import /cf0sys/ssl/csr.pem
*> save
SSL Certificate
A system administrator can use the SSL certificate to configure an X509 certificate
used by the SSL server. Two methods exist to configure the X509 certificate: either
the SSL CSR record is self-signed, or the SSL CSR is signed by an external certificate
authority and an X509 certificate is imported into the SSL certificate.
42BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 43
Connecting to the Device
A single X509 certificate can be generated. When self-signed, the certificate is
derived from the current CSR record and key record.
NOTE: A self-signed certificate can be generated only i f an SSL key record and an
SSL CSR record exist.
Alternately, you can import an SSL certificate using a file containing a certificate
signed by an external certificate authority (CA). The certificate must be in Privacy
Enhanced Mail (PEM) format with no header before the “----- BEGIN CERTIFICATE
-----” text. When a CA-signed certificate is imported, the certificate is checked to
ensure that it is in the correct PEM format. If the format is incorrect, the certificate
is not imported.
NOTE: If the SSL certificate is deleted, new SSL connections cannot be created.
SSL Certificate Command
To generate the SSL certificate, enter the following command:
> config ssl certificate
Table 10 describes the parameters for config ssl certificate.
[type]Certificate type (x509).
signed Self-signs the current CSR (self | null).
import PEM format file from which to import the certificate.
SSL Configuration Example
This example generates an RSA key of 768 bits. It then generates an SSL CSR for the
Sells unit of the company EiffelGroup in Paris, France. Finally it generates a
self-signed SSL certificate.
> config ssl key rsa bits 768
*> config ssl csr x509 country FR no state locality Paris
The Status field shows the status of the CSR, as follows:
no keyThere is no SSL key.
waiting forThe certificate request is being generated.
key generator…
okGeneration is complete; an SSL key is available, and the
PEMData field shows the actual CSR in the standard PEM
format.
> show ssl certificate
SSL Certificate:
Type x509
Country FR
State
Locality Paris
OrgName EiffelGroup
OrgUnit Sells
CommonName www.eiffelgroup.com
Sha1FingerPrint 69 1F 98 DC BC 11 6 D AB 06 5C BF 81 A6 C6
82 EF 7A D6 3A BC
44BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 45
Connecting to the Device
Status ok
The Sha1FingerPrint field displays the Secure Hash Algorithm-One (SHA1)
fingerprint of the certificate.
The Statusfield indicates the status of a self-signed certificate:
no keyNo SSL key record exists; generate a new key.
no csrNo SSL CSR exists; generate a new CSR key.
waiting forThe certificate is being generated.
key generator…
okCertificate generation is complete.
BSGX4e Business Gateway User Guide45
Release 01.01NN47928-102
Page 46
46BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 47
I
NITIAL
This chapter describes the initial setup of the BSGX4e device, including:
system time and SNTP server configuration
watchdog reset timer
DNS server configuration
default configuration settings
For information about customizing the command line, see “Customizing the
Command Session” (page 78).
S
ETUP
Setting the Time
Two methods exist for setting the system time for the BSGX4e unit.
Acquire the time from the IP network through the SNTP protocol.
Specify up to four SNTP servers.
2
Set the local time manually.
NOTE: If DHCP is enabled and a DHCP server is available, the DHCP server can
provide SNTP server information to the BSGX4e. To see the current SNTP
configuration, enter show system sntp.
Show the Current Time
To display the current time, enter the following command:
> time
FRI NOV 10 8:10:02 2006
Setting the Time Manually
To set the time for the unit, enter the time command specifying the desired time
and date values, as follows:
Specify the time as: -t hh:mm:ss
Specify the date as: -d dd:mm:yyyy
Time Setting Example
To set the time to 2:05 PM on 10 November 2006,enter the following command:
> time -t 14:05:00 -d 10:11:2006
NOTE: The time is changed immediately; you do not need to enter save.
Page 48
Setting the Time through an SNTP Server
The unit can automatically synchronize its internal time to the time provided by an
SNTP server. For automatic time synchronization:
The SNTP client configuration must specify at least one SNTP server and the
appropriate time zone offset.
The SNTP client must be enabled.
NOTE: To change an SNTP server, the SNTP client must be disabled.
SNTP Configuration Command
To configure the SNTP service, enter the following command:
> config system sntp
Table 11 describes the parameters for config system sntp.
Table 11. SNTP Server Configuration Parameters
ParameterDescription
enabledEnables the SNTP client (Boolean) To enable, specify enabled. To
disable, specify no enabled. The client is initially disabled.
server1IP address or Fully Qualified Domain Name (FQDN) of an SNTP server.
server2IP address or FQDN of an SNTP server.
server3IP address or FQDN of an SNTP server.
server4IP address or FQDN of an SNTP server.
gmtoffsetTime zone offset from Greenwich Mean Time (GMT) ([+|-]hh:mm,
hours and minutes, positive or negative).
syncInterval for resynchronization of the internal clock to the network
time (external clock) (in days,1—31). The default value is seven.
SNTP Client Example
This example enables the SNTP client and specifies the name of the SNTP server and
the time zone offset.
FQDN of SNTP server : ntpserver.wan.com
GMT offset: one hour forward (+1)
> config system sntp enabled server1 ntpserver.wan.com
gmtoffset +1
*> save
Show SNTP Configuration
To see the SNTP client configuration, enter the following command:
> show system sntp
48BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 49
Initial Setup
SNTP:
Enabled on
Server 1 ntpserver.wan.com
Server 2 0.0.0.0
Server 3 0.0.0.0
Server 4 0.0.0.0
Gmt Offset +01:00
Sync Interval 7 days
Last Sync FRI FEB 17 15:53:25 2006
Next Sync FRI FEB 24 15:53:25 2006
Changing SNTP Servers
To change the SNTP servers, disable the SNTP client first. The following command
sequence clears the second SNTP server:
> config system sntp no enabled
*> config system sntp no server2
*> config system sntp enabled
*> save
Watchdog Reset Timer
The watchdog reset timer allows the BSGX4e unit to automatically restart after a
software failure. This timer is required because such a failure could possibly
“freeze” the unit so that no traffic can be routed through it. The automatic reset
allows the unit to recover from that state and restores it to normal operation.
NOTE: It is recommended that the initial watchdog configuration remain
unchanged. The initial configuration enables the reset timer and sets its
value to seven seconds.
Watchdog Timer Command
To configure the watchdog timer, enter the following command:
> config system watchdog
Table 12 describes the parameters for config system watchdog.
Table 12. System Watchdog Configuration Parameters
ParameterDescription
enabledEnables the watchdog timer (Boolean). Initially, the timer is enabled.
refreshRefresh interval for the timer (in seconds). The default is seven
seconds.
BSGX4e Business Gateway User Guide49
Release 01.01NN47928-102
Page 50
Watchdog Timer Example
The following example enables the watchdog and sets its refresh interval to five
seconds.
> config system watchdog enabled refresh 5
*> save
Show Watchdog Configuration
To show the current watchdog configuration, enter the following command:
The Domain Name Service (DNS) client in the unit sends requests to a DNS server on
the WAN. The DNS requests get IP addresses required by the BSGX4e, such as the IP
address of a SIP server specified by FQDN. Two DNS servers can be configured: one
primary, the other as a secondary, backup server.
The DNS client determines the DNS configuration to use based on the current value
of its source parameter:
User: The DNS client uses the latest DNS configuration provided by the user.
DHCP: The DNS client uses the DNS configuration provided by the DHCP server.
PPP: The DNS client uses the DNS configuration provided by the PPP server.
NOTE: The command show system dns shows the DNS configuration currently in
use.
DNS Client Configuration Command
To configure the DNS client, enter the following command:
> config system dns
This command can:
Specify the source of the DNS configuration the client is to use (DHCP, or user).
The default is DHCP.
Specify a user-provided DNS configuration. This configuration is always stored,
but it is used only when the source parameter value is set to user.
Specify an optional domain name that is appended to every DNS request.
Table 13 describes the parameters of config system dns.
50BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 51
Initial Setup
Table 13. DNS Client Configuration Parameters
ParameterDescription
dns1IP address of the primary DNS server.
dns2IP address of an optional, secondary DNS server.
domainDomain name for the unit. For a name that is not an FQDN, the DNS
client adds the domain to the host before querying the DNS server.
Example: If the specified name is host and the specified domain is
domain.com, the query is for host.domain.com.
sourceSource of the DNS configuration (user | dhcp | ppp). The default is
dhcp.
userUse the latest user-provided configuration.
dhcpUse the configuration provided by the DHCP server . If DHCP
is disabled, dns1 is set to 0.0.0.0 and dns2 and domain
are cleared.
pppUse the configuration provided by the PPP server. If no PPP
interface is active, dns1 is set to 0.0.0.0 and dns2 and domain are cleared.
DNS Client Configuration Example
This example shows how the configuration used by the DNS client can change.
1. Assume that DHCP is running and the DNS client uses the default DNS server
2.Enter a fixed, user-provided DNS server configuration. The source parameter is
not changed to userso the new, user-provided configuration is stored, but not
used.
> config system dns dns1 192.168.1.2
> show system dns
After the configuration is complete, ensure that the DNS server is accessible. To do
this, ping a device by name. The ping command references the DNS server to
translate the name to an IP address.
In the following example, assume that the domain is configured as wan.com. The
example pings a SIP server on the LAN named sipserver.
> ping sipserver
Pinging sipserver.wan.com (192.168.134.162): 56 data bytes
Reply from 192.168.134.162: bytes=56 icmp_seq=0 time<1ms
Reply from 192.168.134.162: bytes=56 icmp_seq=1 time<1ms
Reply from 192.168.134.162: bytes=56 icmp_seq=2 time=5ms
Reply from 192.168.134.162: bytes=56 icmp_seq=3 time<1ms
jitter buffer type:ADAPTIVE
threshold:0
gain:Tx -3 Rx -3
Telephony port is set for U.S.A. telephones.
Real-time Transport Protocol (RTP)
13000 - 14999
Default range for source User Datagram
Protocol (UDP) port values of RTP traffic is bridged by the unit.
LAN to LAN communications are bridged
through the unit.
500 calls are allowed.
All LAN SIP or MGCP endpoints are
allowed to originate and receive calls.
Remote module logging (udplog and
syslog): disabled.
“Audit Logging” (page 324)
and “Module Logging”
(page 325).
Local module logging: enabled (show
logging internal)
Watchdog
reset timer
SNTP
client
Enabled.“Watchdog Reset Timer”
(page 49)
Enabled because of DHCP.“Setting the Time through
an SNTP Server” (page 48)
DNS clientEnabled because of DHCP.“DNS Client” (page 50)
SNMPEnabled.“SNMP Agent” (page 347)
NATEnabled on the WAN interface (eth0).“Configuring NAT” (page
134)
ALGEnabled.“ALG Configuration” (page
140)
IDSEnabled.“IDS” (page 140)
DHCP serverEnabled. Configured on the eth1 inter-
“DHCP Server” (page 309)
face, when a LAN device requests an IP
address, the server can assign an
address from its address pool
BSGX4e Business Gateway User Guide55
Release 01.01NN47928-102
Page 56
Table 14. Initial Settings (continued)
VLANDisabled.“VLAN Configuration”
(page 111)
Netflow agent Disabled.“Netflow Exporter” (page
343)
PMON agentDisabled.“Protocol Monitoring
(PMON)” (page 340)
56BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 57
3
U
SER
This chapter describes how to control access to the BSGX4e unit:
password entry
adding and removing users
setting up groups
assigning permission to users and to groups
authentication using a Radius server or a TACACS+ server
IMPORTANT: The security of the BSGX4e unit depends on password security. To
ensure secure access to the unit, change passwords regularly and
keep them secure.
NOTE: To perform user management functions that change the user
management database, you must log on with a user ID that has both read
and write access. The pre-defined user ID nnadmin has all access rights.
M
ANAGEMENT
User Management Features
The user management functions determine who can access the BSGX4e unit and
whether the user can change the configuration of the unit or just display
information stored in it.
User access is controlled both at logon and after log on:
At log on, user access is determined by the user ID and password:
n The user ID determines if the access method is allowed (for example, remote
access can be denied to the user).
nThe password must be authenticated (either internally or externally) before
access is allowed.
After log on, the user's access rights limit what the user can do.
You can perform user management functions through a console directly connected to
the unit or remotely by using Telnet or SSH. In both cases, you must log on with a
valid user account. You can also perform user management functions by using the
Command Line Interface (CLI) or the Web user interface (Web UI). For information
about using Web UI, see “Web User Interface” (page 379).
The following is a summary of user management functions:
Requires log on with a valid user ID and password:
Page 58
nAuthenticates the entered password by using either strong password hashing
(SHA) or external authentication through a Radius server.
nNever stores passwords in clear text.
Tracks log on attempts:
nLocks out the console port after three failed log on attempts.
nKeeps a log of all failed log on attempts and logouts.
Can limit user accounts to specific access methods, including CLI, Web UI,
Telnet, SSH, and/or File Transfer Protocol (FTP).
Lists who is currently logged in to the system:
nUser list includes their access methods and their IP addresses, if any.
nMultiple users can log on simultaneously.
Supports management of users by user groups:
nUsers can belong to more than one group.
nEach user management element (user accounts, user groups, and associated
rights records) can be added, edited, and deleted independently.
nCan assign rights to read and/or write access by user account and by user
group.
nEnforces who has access to which modules in the system, using specified
access methods and under what conditions.
Provides an audit log that records:
nAccount activities.
nLogins and logouts.
nAll failed log on attempts.
Password Entry
All access to the BSGX4e unit requires the entry of a valid user ID and password. The
factory settings for the unit define two user IDs:
nnadmin with initial password PlsChgMe!
user with initial password netcat
The installation procedure recommends that these passwords be changed
immediately.
NOTE: For security reasons, it is recommended that all passwords be changed
on a regular basis.
Failed log on Attempts
A user can attempt to log on from the console port three times. If the user log on
fails all three times, the console is locked out, and no one can log on to the console
port for the next fifteen minutes or until the unit is restarted by a power recycle.
When attempting to log on remotely through Telnet or SSH, the user is given three
log on attempts, and then the session is ended.
58BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 59
User Management
All invalid log on attempts are recorded in the audit log. For more information about
the audit log, see “Audit Logging” (page 324).
Changing a Password
Changing a password depends on whether the user account uses internal or external
authentication (as determined by its auth parameter; see “User Accounts” (page
61)) If a user account uses internal authentication, the password for the account can
be changed while logged on to the account.
NOTE: If a user account uses external authentication, the external
authentication server controls the password for the account. Although
the user, while logged on, can change the password stored for the user
account, this password is not used for authentication and so the
effective password is not changed.
NOTE: The administrator (that is, the user logged in with user ID nnadmin) can
change the password used for internal authentication for any user
account. This is done using the config user account command described
on page 61.
While logged on, all users can change their own passwords. To change your
password, use this procedure:
To change the password while logged on, use this procedure:
1. Enter the command password:
> password
2.Enter the old password:
Old Password: ******
3.Enter the new password:
New Password: **********
4.Reenter the new password:
Verify Password: **********
If the new password is reentered correctly, the unit responds with the
following message and the user ID (in this case, nnadmin):
Changed password for 'nnadmin'
5.To save the password change, enter:
*> save
BSGX4e Business Gateway User Guide59
Release 01.01NN47928-102
Page 60
Showing Active Users
To see which users are currently logged in to the unit, use the maintenance
command whoison; its display shows the source IP address of the user and the type
of access in effect. An example follows:
> whoison
User Source IP Type
-----------------------------------------------------------admin Unknown Terminal
user 10.0.1.2 Web
The Type field indicates how the user is connected to the unit: Terminal (console
port), SSH, Telnet, or Web.
60BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 61
User Management
User Accounts, Groups and Rights
User access to an BSGX4e unit is managed by using user accounts, user groups, and
user rights settings. The initial factory settings for the unit define the following:
Two user groups—one for administrators (admins) and one for other users
(users). The admins user group is granted all access modes, and the other user
group is granted only Web and CLI access.
Two user accounts—one for administrators (admin) and one for other users
(user). The admin user is granted all access modes and all access rights; the
other user account is granted only Web and CLI access, and its access rights are
restricted. The admin account belongs to both predefined user groups (admins
and users); the other user account belongs only to the users user group.
Three rights settings—one for the admins user group and the other two for the
users user group. All rights are granted to admins; the two rights settings for the
users user group grant read-only access to some objects and read and write
access to other objects.
NOTE: You cannot delete or rename the predefined user management
configuration. You cannot delete or rename the two user groups (admins
and users), the two user accounts (admin and user), or the three user
rights settings (admin, useradv, and userbasic).
User Configuration Commands
Table 15 lists the three user configuration commands.
Table 15. Config User Commands
CommandConfigures:
config user account A user account.
config user groups A user group.
config user rights A rights record (grants to a group read
and/or write access to certain objects).
User Accounts
Before you add a new user account or change an existing user account, display the
current user accounts and user groups by entering the following commands:
> show user accounts
> show user groups
Then, to add or change an account, use the following command:
> config user account
NOTE: The maximum number of user accounts that you can define for the
BSGX4e unit is 20.
BSGX4e Business Gateway User Guide61
Release 01.01NN47928-102
Page 62
Table 16 describes the parameters for config user account.
Table 16. User Account Configuration Parameters
Parameter Description
[name]Name of the existing account to be changed or the new account to be
added. This parameter is required.
If an existing account is specified, only the specified parameter
values are changed; all other existing values remain unchanged.
accessAccess methods allowed to this user. The default is none.
You can specify that two or more of the following methods are to be
connected by using plus (+) symbols.
ssh Secure Shell (SSH) access allowed.
WebWeb User Interface (Web UI) access allowed.
cliCommand Line Interface (CLI) access allowed.
telnet Remote access through a Telnet session allowed.
ftpFile Transfer Protocol (FTP) access allowed.
authInternal or external password authentication. The default is internal
Strong Password Hashing (SHA).
To require external authentication, specify RADIUS or TACACS and
configure an authentication record for this user account. Fore more
information , see “Radius Authentication” (page 68).
group1Required first group to which the user belongs. A user must belong to
at least one group and can belong to up to five user groups. The
predefined user groups are admins and users. If another user group is
configured, you can assign the user account to that group.
To remove the user from a group, specify the group parameter with
the value none.
group2
Optional additional user groups to which the user account is assigned.
group3
group4
group5
passwordThe password assigned to the user. This parameter is required.
The password for the user account. Entry of this parameter is
required at logon if internal authentication is used. (If external
authentication is used, the password entered at logon must be the
one defined by the external server.)
inheritWhether the user account inherits access rights from the groups to
which it belongs. The default is yes.
enabledWhether the user account is enabled. The default value is yes.
62BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 63
User Management
Add User Account Example
This example assumes that the user is given read and write access to the unit, but
only while connected directly to its console port or to the W eb interface—no remote
access is allowed:
name of user account: user1
access methods allowed: Web + cli
group membership: admins
assigned password: test123
NOTE: This example is shown in interactive mode. For more information, see
You can specify that two or more of the following methods are
to be connected by using plus (+) symbols.
ssh Secure Shell (SSH) access allowed.
WebWeb User Interface (Web UI) access allowed.
cliCommand Line Interface (CLI) access allowed.
telnet Remote access through a Telnet session allowed.
ftpFile Transfer Protocol (FTP) access allowed.
64BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 65
User Management
Table 17. User Group Configuration Parameters (continued)
Parameter Description
authInternal or external password authentication. The default is
internal Strong Password Hashing (SHA).
To require external authentication, specify RADIUS or TACACS
and configure an authentication record for this user account.
For more information, see “Radius Authentication” (page 68).
allIndicates whether all access is given to the group. The default
is no, meaning that enforcement is in place to check the
access rights of the users in the group. If yes is specified for a
group (such as for the admins group), access checks are not
enforced.
Add User Group Example
This example adds a new user group as follows:
name: dev
access: all (ssh, web, cli, telnet, ftp)
all access: yes (allowed)
To add the new group, enter the following commands:
> config user group dev access all all yes
*> save
Show a User Group
To show the settings for group dev, enter the following command:
To delete a user group, specify the name of the group by using the command delete
user group.
NOTE: You cannot delete the predefined user groups named users and admins.
For example, to delete a user group named dev, enter the following commands:
> del user group dev
*> save
BSGX4e Business Gateway User Guide65
Release 01.01NN47928-102
Page 66
User Rights
This section describes how to configure a record that defines the access of a group
to certain objects. The available access rights are read, write, and execute. Read
allows the viewing of data; write allows the writing of data; execute is not currently
used.
A group can have more than one rights record defined for it. For example, the
predefined rights records useradv and userbasic are both defined for the same user
group: the user group users. In this case, two rights records are defined so that the
user group can be granted different access to different objects in the system, as
follows:
The useradv record applies to objects that belong to Admins; it grants only read
access.
The userbasic record applies to objects that belong to Users; it grants both read
and write access.
NOTE: In most cases, the default user rights records should suffice; do not
change them unless the effects of authority and object ownership are
clearly understood.
Command Authority
Commands are objects that belong to either Admins or Users. When you list the
online help for a command (by entering the command followed by a question mark
(?) or tab key), you see a line for Authority, for example:
> ping?
Command: ping
Desc: Ping another device on the network
Authority: Users
If the Authority is Users, the command is an object that belongs to Users, and the
right to use that command is governed by the rights record that grants access to
objects belonging to Users.
In general, commands that require write access, such as config commands, have
Admins authority. Commands that only display data, such as show and stats, have
Users authority. Similarly , maintenance commands that require write access have
Admins authority.
The notable exception is the save command that saves configuration changes; it has
Users authority so it is available to all users belonging to groups admins or users.
Configuration Requirements
You must configure the user group before you can configure a rights record for it.
For more information, see “User Groups” (page 64).
NOTE: In most cases, the default settings provide the appropriate permissions
per user level. It is recommended not to change the settings unless
66BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 67
User Management
deemed necessary and only when the effects of authority and object
ownership are clearly understood.
Configuration Command
Before adding a new rights record or changing an existing rights record, review the
current records by entering the following command:
> show user rights
Then, to add or change a rights record, use the following command:
> config user rights
Table 18 describes the parameters for config user rights.
Table 18. User Rights Parameters
ParameterDescription
[id]Identifier of the new or existing rights record. This parameter is
required.
If you edit an existing rights record, only the values specified on
this command are changed; all other values in the record remain
unchanged.
accessRights granted by this record.
allRead, write, and execute.
noneNo rights granted.
You can specify that two or more of the following methods are
to be connected by using plus (+) symbols.
readRead permission.
writeWrite permission.
execute Execute permission.
gnameName of the user group granted the rights in this record.
objectObjects to which this record applies (Admins | Users).
Objects can belong to Admins or to Users. For example, if the
help description for a command lists its Authority as Admins,
then a rights record for Admins determines if the group can use
that command. For more information, see “Command
Authority” (page 66).
Add User Rights Example
This example defines a new rights record. The new record applies to the user group
users; it grants read access to objects belonging to Users, as follows:
id: user (user being configured)
access modes allowed: read
group name: users
object name: Users
BSGX4e Business Gateway User Guide67
Release 01.01NN47928-102
Page 68
Enter the following commands:
> config use r rights user access read gname users object Users
*> save
Show User Rights Record
To show the rights record named user, enter the following command:
> show user rights user
The display is similar to the following:
Access Rights:
Identifier Access mode Group name Object name
To delete a user rights record, specify the name of the record on the command
delete user rights.
NOTE: You cannot rename or delete the predefined rights records named
admin, useradv, and userbasic.
For example, to remove a user rights record named user, enter the following
command:
> del user rights user
*> save
Radius Authentication
To provide additional security for user logins to the BSGX4e device, you can require
an external authentication of passwords. When a password is externally
authenticated, a client in the device sends the password to an external server for
authentication.
The Radius client:
NOTE: When external authentication is used for a user account, the external
server defines the password required for logon using the account. The
password command can change the internal password stored for the
account, but this password is not used for authentication and so the
effective password is not changed.
The Radius client in the BSGX4e device:
is compatible with standard Radius servers
maps Radius authentication records to users by their user account name
can reference up to twenty Radius authentication records
68BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 69
User Management
provides legacy authentication, which enables the BSGX4e to function as a
Network Access Server (NAS)
NOTE: The password of a user account is externally authenticated by a Radius
server only if its auth parameter value is Radius. This value can be
specified for the user account or for a user group to which the user
account belongs. User account configuration is described on page 61 and
user group configuration is described on page 64.
Configuration Requirements
For a user account to use Radius authentication, the following requirements must be
met:
1. The authentication (auth) value for the user account must be RADIUS. (User
account configuration is described on page 61.)
2. The Radius client must have an authentication record for the user account.
3. The user account and its password must be defined on the external Radius server.
Configuration Steps
To configure a user account to use Radius authentication, perform these steps:
1. Change the authentication (auth) value for the user account to Radius.
(User account configuration is described in “User Accounts” (page 61))
2. Configure a Radius authentication record for the user account.
3. Configure the user account and its password on the external server.
NOTE: Disabling its authentication record suspends Radius authentication for a
user account. This prevents logons by the user account until either its
authentication record is reenabled or its authentication method (auth
value) is changed.
Radius Authentication Records
After you configure a user account to use Radius authentication, you must configure
a Radius authentication record for that user account. Every user account that uses
Radius password authentication must have its own Radius authentication record.
NOTE: You must configure the user account before you configure the
corresponding Radius authentication record. For more information, see
“User Accounts” (page 61).
Each user account that is to use Radius password authentication must have its own
Radius authentication record. If the same Radius server is referenced by every user
account, the same values are specified in every authentication record.
NOTE: Deleting the user account also deletes its authentication record.
The Radius authentication record specifies:
BSGX4e Business Gateway User Guide69
Release 01.01NN47928-102
Page 70
the name or address of the Radius server (authserver)
the secret that the client shares with the server (secret)
how the Radius server accesses the Radius client:
nIf DHCP is enabled, specify that the client automatically binds to an interface
(auto yes) and specify the interface (interface).
nIf DHCP is disabled, specify the binding IP address of the client (bindaddr).
To configure a Radius authentication record, enter the following command:
> config radius client
Table 19 describes the parameters for config radius client.
Table 19. Radius Authentication Record Parameters
ParameterDescription
[user]Name of the user account to which the authentication record
applies. The user account must specify Radius authentication.
enabledIndicates whether the Radius client is enabled for the user. The
default is yes.
autoIndicates whether the client automatically binds to the interface
specified by the interface parameter. Specify yes if DHCP is in use.
The default is no.
authserver FQDN or IP address of the Radius authorization server that the
client references.
secretShared secret for the client as determined by the server.
bindaddrBinding IP address for the client. It is the IP address of the
interface that the server references (typically, the IP address of
the WAN interface.) Specify this value only if DHCP is not in use.
interface
Physical interface through which Radius communicates if the auto
parameter is yes. This is typically the WAN interface (eth0). To
clear the parameter, specify none.
Example of Configuring a Radius Authentication Record
This example creates an authentication record for user account RadiusUser. It
assumes the following:
The user account RadiusUser is configured and specifies Radius as its
authentication method.
DHCP is in enabled for the unit:
User account name: RadiusUser
FQDN of Radius server: radius.wan.com
Shared secret: Radsecret
Interface that the server references: eth0
1. Enter the following command:
70BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
The following display shows two authentication records: one for user account
RadiusUser and the other for user account RadiusUser2. Both records reference the
same Radius server through the same interface (eth0).
Radius Client:
User Enabled Auth Bind Interface Automatic Secre t
-------------------------------------------------------------------------RadiusUser yes 172.16.1.72 0.0.0.0 eth0 yes Rad secret
RadiusUser2 yes 172.16.1.72 0.0.0.0 eth0 ye s Rad secret
Radius Activity Logs
Radius client activity is reported in the system log.
To see the system log entries, enter the following command:
> show logging internal
The following display shows log entries for a failed Radius authentication:
To provide additional security for user logins to the BSGX4e device, you can require
external authentication of user logins. When a login is externally authenticated, a
client in the device sends the login information to an external server for
authentication.
BSGX4e Business Gateway User Guide71
Release 01.01NN47928-102
Page 72
One external authentication method uses the TACACS+ protocol. This protocol
provides authentication, authorization, and accounting services. Normal operation
fully encrypts the body of the packet for secure communication. It uses TCP port 49.
The TACACS+ client:
Is compatible with standard TACACS+ servers.
Maps TACACS+ authentication records to users by their user account name.
Can reference up to twenty TACACS+ authentication records.
Provides legacy authentication, enabling the BSGX4e to function as a Network
Access Server (NAS).
Configuration Steps
To configure a user account to use TACACS+ authentication, perform these steps:
1. Change the authentication (auth) value for the user account to TACACS+. This
value can be specified for the user account or for a user group to which the user
account belongs. (User account configuration is described in “User Accounts”
(page 61) and user group configuration is described in “User Groups” (page 64).)
2. Configure a TACACS+ authentication record for the user account.
NOTE: Disabling its authentication record suspends TACACS+ authentication
for a user account. This prevents logins by the user account until either
its authentication record is re-enabled or its authentication method
(auth) is changed.
TACACS+ Authentication Records
After a user account is configured to use TACACS+ authentication, a TACACS+
authentication record must be configured for that user account.
NOTE: The user account must be configured before the corresponding TACACS+
authentication record is configured (see “User Accounts” (page 61)).
Each user account that is to use T ACACS+ password authentication must have its own
TACACS+ authentication record. If the same TACACS+ server is referenced by every
user account, the same values are specified in every authentication record.
The TACACS+ authentication record specifies:
the name or address of the TACACS+ server (server).
the key that the client shares with the server (key).
To configure a TACACS+ authentication record, enter the command:
> config tacplus client
Table 19 describes the parameters for config tacplus client.
72BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 73
User Management
Table 20. TACACS+ Authentication Record Parameters
ParameterDescription
[user]Name of the user account to which the authentication record
applies. The user account must specify TACACS+ authentication.
enabledWhether the TACACS+ client is enabled for the user. The default is
yes.
serverIP address of the TACACS+ server that the client references.
keyShared key for the client as determined by the server.
Example of Configuring a TACACS+ Authentication Record
This example creates an authentication record for user account TACuser. It assumes
that the user account TACuser has been configured and TACACS+ has been specified
as its authentication method.
User account name: TACuser
IP address of TACACS+ server: 172.16.249.52
Shared key: tacacskey
TAB to cycle parameter options
tacplus-cl-user#> enabled yes
tacplus-cl-user#> server 172.16.249.52
tacplus-cl-user#> key tacacskey
tacplus-cl-user#> exit
*> save
Show TACACS+ Authentication Records
To list the TACACS+ authentication records, enter:
>show tacplus client
The following display shows two authentication records, one for user account
TACuser and the other for user account root. Both records reference the same
TACACS+ server.
BSGX4e Business Gateway User Guide73
Release 01.01NN47928-102
Page 74
TACACS+ Activity Logs
TACACS+ client activity is reported in the system log. Log entries indicate whether
authentication attempts are successful or not.
To see the system log entries, enter the following command:
> show logging internal
The following display shows log entries for a failed TACACS+ authentication:
(I)22:16:24: User root is attempting to logon at THU FEB 08 22:16:24 2007
(I)22:16:24: Verify TACACS+ user root at THU FEB 08 22:16:24 2007
(I)22:16:24: User root cannot be found
(C)22:16:24: Cannot authenticate Tacacs+ user: root
(W)22:16:24: root INVALID LOGON at THU FEB 08 22:16:24 2007
TACACS+ Authentication
To provide additional security for user logins to the BSGX4e device, you can require
external authentication of user logins. When a login is externally authenticated, a
client in the device sends the login information to an external server for
authentication.
NOTE: When external authentication is used for a user account, the external
server defines the password required for logon using the account. The
password command can change the internal password stored for the
account, but this password is not used for authentication and so the
effective password is not changed.
One external authentication method uses the TACACS+ protocol to provide
authentication services. Normal operation fully encrypts the body of the packet for
secure communication. It uses TCP port 49.
The TACACS+ client in the BSGX4e device:
Is compatible with standard TACACS+ servers.
Maps TACACS+ authentication records to users by their user account name.
Can reference up to twenty TACACS+ authentication records.
Provides ASCII login authentication, enabling the BSGX4e to function as a Network
Access Server (NAS).
Configuration Requirements
For a user account to use TACACS+ authentication, the following requirements must
be met:
1. The authentication (auth) value for the user account must be TACACS+. (User
account configuration is described on page 61.)
2. The TACACS+ client must have an authentication record for the user account.
74BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 75
User Management
3. The user account and its password must be defined on the external TACACS+
server.
NOTE: Disabling its authentication record suspends TACACS+ authentication
for a user account. This prevents logins by the user account until either
its authentication record is re-enabled or its aut h entication method
(auth value) is changed.
TACACS+ Authentication Records
For each user account configured to use TACACS+ authentication, a TACACS+
authentication record must be configured. The authentication record for a user
account serves two purposes:
It specifies the TACACS+ server that authenticates the account by providing:
nthe name or address of the TACACS+ server (server).
nthe key that the client shares with the server (key).
It enables or disables TACACS+ authentication for the account.
NOTE: Deleting the user account also deletes its authentication record.
Every authentication record that references the same TACACS+ server specifies the
same server and key values.
To configure a TACACS+ authentication record, enter the command:
> config tacplus client
Table 21 describes the parameters for config tacplus client.
Table 21. TACACS+ Authentication Record Parameters
ParameterDescription
[user]Name of the user account to which the authentication record
applies. To use the authentication record, the user account must
specify TACACS+ authentication.
enabledWhether the TACACS+ client is enabled for the user. The default is
no.
serverIP address or FQDN of the TACACS+ server that the client
references.
keyShared key for the client as determined by the server. If the key
includes a space character, enclose the key value in double-quote
characters(“ “)
Example of Configuring a TACACS+ Authentication Record
This example creates an authentication record for user account TACuser. It assumes
that the user account TACuser has been configured and TACACS+ has been specified
as its authentication method, as shown in the following display:
BSGX4e Business Gateway User Guide75
Release 01.01NN47928-102
76BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 77
4
C
OMMAND
This chapter describes the Command Line Interface (CLI) for the BSGX4e device. The
CLI provides commands for every function of the device. It also provides online help
and an interactive mode for easier command entry.
For an introduction to the other user interface, the Web User Interface, see “Web
User Interface” (page 379).
This chapter discusses these topics:
Command entry.
Logging out.
Customizing the command session.
Saving configuration changes across restarts.
Defining commands that are automatically run at restart.
Getting online help.
This chapter assumes that the BSGX4e device is installed in a working network as
described in the BSGX4e Installation Guide. It also assumes that you can log on to
the device from a terminal session at your workstation or a console.
After you log on to the BSGX4e unit from a terminal session, you see a command
prompt. The command prompt consists of a string followed by the greater than (>)
symbol. You can customize the string as described in the next section. Therefore,
the convention in this guide is to show the command prompt as just the > symbol:
>
You can enter any command in response to this prompt. However, if you logged in
with a user ID that does not have authority to execute the command, the unit
responds as in the following example:
> reboot
Invalid access for user ‘user’!
Page 78
For more information about the authority granted to user accounts, see “User
Accounts, Groups and Rights” (page 61).
The Command Line Interpreter executes a command as soon as it receives it.
If the entire command is entered on one line, the command is executed
immediately after the <enter> key is typed.
If the command is entered in interactive mode (see “Interactive Mode” (page
82)), the command is executed as soon as its entry is complete (after entry of
exit or <cntrl-z>).
NOTE: Although config commands change the current configuration
immediately, the changes can be lost if the unit restarts. To save the
changes to permanent memory, enter a save command.
Logging Off
A session begins with a logon using a valid user account and password. The session
ends when:
An exit command is entered, or
The session inactivity timer expires. By default, a session expires after five
minutes of inactivity (see “Customizing the Command Session” (page 78)).
Exit Command
The exit command ends the session without saving configuration changes to
nonvolatile memory. Assuming the unit does not restart, the configuration remains
the same at the next logon, including the changes that were not saved by the last
session.
In the following example, asterisks in a command prompt indicate that changes have
not been saved. The exit command ends the current session; the logon starts a new
session. The command prompt in the new session still has asterisks, showing that
configuration changes have not been saved:
*BSGX4e*> exit
Logging off
User logout. Goodbye!
User: nnadmin
Password:
*BSGX4e*>
Customizing the Command Session
You can change any of the following terminal settings:
78BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
To see the current terminal settings, enter the following command:
> show shell terminal
Terminal Settings:
Width 80
Prompt BSG
Timeout 60 (min)
Changing the Terminal Settings
To change the terminal settings, use the following command:
> config shell terminal
Table 22 lists the terminals parameters:
Command Interface
Table 22. Terminal Session Parameters
ParameterDescription
widthNumber of characters in a terminal line. The initial
value is 80 characters.
promptCharacter string used in the command prompt. The
initial value is BSGX4e.
timeoutNumber of minutes before the terminal session
automatically logs out. The default is five minutes.
Example of a Command Prompt Change
The following command changes the command prompt from BSGX4e to BSG:
BSGX4e> config shell terminal prompt BSG
*BSG*> save
BSG>
Saving Configuration Changes
The Command Line Interpreter executes each command immediately after it is
entered. A change specified by a configuration command is applied immediately to
the current configuration. However, the change is not made to the configuration
stored in nonvolatile memory. Thus, unstored configuration changes are lost if the
unit restarts.
To save the current configuration (and any unstored changes) to nonvolatile memory ,
enter a save command.
BSGX4e Business Gateway User Guide79
Release 01.01NN47928-102
Page 80
To remind you that configuration changes are pending, the command prompt
changes so it contains asterisks. For example, the default command prompt changes
from BSGX4e> to *BSGX4e*>. The asterisks indicate that, although received and
applied, the entered changes are not yet stored in nonvolatile memory.
By convention, this guide shows the command prompt with asterisks as just *>. For
example, the save command is entered after a *> prompt:
Note that the example shows the prompt changing from *> to >.
Showing the Configuration
To list the current configuration of the BSGX4e, enter either:
> dump
or
> show running
The configuration listed is the current configuration for the unit. If changes are
pending, the listed configuration does not match the configuration stored in
nonvolatile memory.
To see an example of a configuration listing, see “Configuration Example” (page
388).
Defining Auto Run Commands
Commands can be set to run automatically each time the BSGX4e restarts. To define
an autorun command, use this command:
> config system startup
Table 23 lists its parameters.
Table 23. Autorun Command Parameters
ParameterDescription
[index]Command index. The first command has index 0.
commandCommand enclosed in double-quotes (“).
80BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 81
Command Interface
For example, the following commands cause the unit to display its system
information immediately after each restart:
> config system startup 0 command “show system info”
*> save
Online Help
To get online help with commands while logged in to the device, use the command
help.
General Help
To list general information about the CLI, type the word help after a command
prompt and press the enter key:
> help
A long list is displayed. First, all commands are listed under the following headings:
Maintenance Commands:
Debug Commands:
Command Groups (CLI commands):
Then, there is a description of how to get more specific command help for
maintenance and debug commands:
Maintenance Commands:
Type the name of any of the maintenance commands to execute
it. You can also use the '?' to bring up help at any time.
This will display context help or help on the various
parameters. For example, 'cp ?' to display help information
for the 'cp' maintenance command.
Debug Commands:
The debug commands become available by entering 'debug
enable.' (They are disabled by default.) Once enabled, type
the name of the debug command to execute it. You can also use
the '?' to bring up help on the debug commands. For example,
'emac ?' to display help information for the 'emac' debug
command.
Finally, a description of the CLI command syntax and how to get custom help
appears:
Prefixes:
Variables:
Specific Help
For specific information about a command, you can either:
Specify the command by using the help command.
Enter part of the command followed by the Tab key or the question mark (?) key.
BSGX4e Business Gateway User Guide81
Release 01.01NN47928-102
Page 82
An example follows:
For information a bout the command to configure an IP i nterface, enter any of
the following:
> helpconfig interface ip
or
> config interface ip ?
or
> config interface ip <TAB>
In response to any of those entries, the online help display lists the parameters
for config interface ip, as follows:
[if]
ip
mtu
Interface to change behaviour of (eth0 | eth1)
IP address and mask of interface
The Maximum Transmission Unit (MTU) of the
You can use the interactive mode to enter a command on one line or split the
command between two or more lines. With a single line entry, type the command
with all its parameters before you press <enter>. In interactive mode, enter the
command on one line, but enter its parameters on one or more following lines.
Interactive mode is provided for most CLI commands. Some commands require that
you enter the command and its primary key on the first line. The primary key is the
object of the command, such as a user account name. In the parameter lists in this
guide, a primary key parameter is shown in brackets.
To get help while in the interactive mode, enter a question mark (?).
In the following example, the command config security nat policy and its primary
key new is entered on the first line, and then its parameters are entered on
following lines:
> configsecurity nat policy new
Entering interactive mode: ctrl^z | 'exit', ctrl^c | 'quit'
TAB to cycle parameter options
nat-pol-new#> type port
nat-pol-new#> address 10.0.1.130
nat-pol-new#> port 2600
nat-pol-new#> exit
82BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 83
Command Interface
NOTE: The command prompt changes while in the interactive mode.
NOTE: To leave the interactive mode, enter exit or the key combination ctrl-z
to execute the command, or enter quit or the key combination ctrl-c to
cancel the command.
NOTE: Square brackets ([ ]) indicate one or no occurrence, and braces ({ })
indicate one or more occurrences.
The command prefixes are:
configConfigure an object's variables.
displayDisplay the current configuration of an element.
delDelete an element.
showShow the current active information about an element.
statsShow statistics about an element.
clearClear statistics for an element.
If you enter a command prefix followed by a ?, all command groups are listed. For
example, if you enter config?, one of the command groups listed is ids.
Some command groups have command sub-groups. To see a list of its sub-groups,
enter the prefix and the command group following by a ?. For example, to see the
sub-groups for config ids, enter:
Finally, to see the parameters for a command, enter the command sub-group
followed by a ?.
> config ids spoof?
[name] Name of the interface (eth1)
type Whether its a trusted or untrusted
interface (trusted | untrusted)
> config ids spoof
BSGX4e Business Gateway User Guide83
Release 01.01NN47928-102
Page 84
Notice that the first parameter, [name], is bracketed, indicating that it is a primary
key.
Parameter Values
In general, a parameter is specified by its name followed by its value. For example,
port 2600 specifies the value 2600 for the port parameter.
The following list describes exceptions for specifying parameter values:
Primary Key
If the first parameter for a command is listed in brackets (such as [name]), it is a
primary key parameter and specifies the object of the command. The primary
key value is specified without its parameter name.
For example, the first parameter of the command config ids spoof is listed
as [name] and the second parameter as type. When you enter the command,
specify just the value for the first parameter, but both the name and its value for
the second parameter.
> config ids spoof eth1 type trusted
Booleans
Boolean parameters are parameters with just two states (on/off or yes/no). To
specify the on/yes state, specify only the parameter name and omit any value. To
specify the off/no state, specify the keyword no followed by the parameter
name.
For example, the following command specifies the on/yes state for the enabled
parameter:
> config user account user1 enabled
To specify the off/no state for the enabled parameter, specify:
> config user account user1 no enabled
IP address ranges
When you specify an IP address range, use a hyphen between the first and last
addresses of the range (192.16.1.20-192.16.1.25) or use a subnet mask suffix
(192.168.1.1/24).
Numeric offsets
Certain numeric parameters use a plus (+) or a minus (-) symbol before the
numeric value to indicate an offset. For example, to configure a gain of -5, use:
> config voice parameters gain -5
Command Keyword NO
The keyword no is used to turn off a Boolean parameter or to clear string
parameters (to fill the string value with blanks).
NOTE: You must enter the no keyword before the parameter identifier.
84BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 85
Command Interface
For example, the following command turns off the Netflow agent by turning off the
Boolean parameter enabled:
> config netflow agent no enabled
As an example of using no to clear a string parameter, the following command clears
the name of the unit. (The default unit name is MyUnit.)
System Type40BSGX4e
Memory97/128 MB
MAC 000:22:11:44:33:04
MAC 100:22:11:44:33:05
SerialA628000003
CountryUnited States of America (US)
TempUnsupported
Up time0y 0d 4h 33m 20s
Command Keyword ALL
Use the keyword all to perform the command on all entries. The command action
can be modification, deletion, clearing of statistics, or display.
NOTE: You must enter the all keyword before all parameters.
For example, the following command changes the specified parameter for all QoS
Quality Groups. (It changes the iptos parameter value to 248.)
> config qos group all iptos 248
To see the result, enter:
*> show qos group all
QoS Quality Groups:
Name Link QG Type Committed Burst IPToS COS
------------------------------------------------------------Management eth0 A2 car 1000000 100000000 248 no
VoIP eth0 A1 policed 89000000 0 248 no
As another example, the following command deletes all QoS Quality Groups:
> del qos group all
BSGX4e Business Gateway User Guide85
Release 01.01NN47928-102
Page 86
Maintenance Commands
To see a list of available maintenance commands, enter the help command. The
maintenance commands are also listed at the end of this section.
Maintenance Command Syntax
Maintenance commands have the following syntax:
<maintenance command> {[<parameter>] [<value>]}
NOTE: Square brackets ([ ]) indicate one or no occurrence, and braces ({ })
indicate one or more occurrences.
Maintenance Command Help
For information about a specific maintenance command, enter the command,
followed by a question mark (?)or the tab key.
For example, the following command lists information about the ping command:
> ping?
Command: ping
Desc: Ping another device on the network
Authority: Users
-c count number of ping requests to send, '-c' means
non-stop
-t timeout total time (sec) before ending ping
requests. '-t' means nonstop
-i interval time interval (msec) between ping requests
-l preload initial number of ping requests to send
-f flood ping
-p pattern pattern to use
-s bytes number of data bytes to send
-q completely quiet during ping
List of Maintenance Commands
The following list of maintenance commands is divided into two lists:
The first list is for commands that require only Users authority so that anyone can
use them.
The second list is for commands that require Admins authority. To use these
commands, log on with a user ID that has administrator authority (such as
nnadmin).
86BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 87
Command Interface
Commands that Require Only Users Authority
Command
Purpose
arpShow or flush the ARP table, or set/delete static
arp entries
catDisplay files
cdChange to another directory
clsClear the terminal screen
cpCopy a file
cpuShow details on CPU and AP usage
dumpDump the current configuration as a re-entryable
script
logoffLog off the system
lsList the file system
mkdirMake directories
netstatList current networking connections and
listening ports
passwordChange the specified user's password
pingPing another device on the network
pwdPrint name of current/working directory
rmRemove files/directories
routeModify/display the static IP routing table
saveSave the current configuration to permanent
storage
summaryProvide summary of current system performance
and state
tech-support Display system information useful to technical
support staff
timeDisplay / set the system time
tracerouteTrace the route to another device on the network
uptimeDisplay the uptime of the system
Commands that Require Admins Authority
Command
Purpose
debugEnable additional debug commands for diagnosing
faults
dosfsManage the DOS file system
eraseErase the current configuration from permanent
storage
rebootRestart the system
reloadReload the system
tcpdumpDisplay network traffic
telnetUser interface to remote host using TELNET
protocol
whoisonDisplay who is on and where they are from
BSGX4e Business Gateway User Guide87
Release 01.01NN47928-102
Page 88
Debug Commands
A set of debug commands provides access to additional information for debugging
purposes.
NOTE: All debug commands (and the command that enables debug mode)
require Admins authority. To access debugging information, you must
log on with a user ID that has administrator authority (such as nnadmin).
To see a list of available debug commands, enter the help command. The debug
commands are also listed at the end of this section.
Debug commands are available in debug mode only. To begin debug mode, enter:
> debug enable
To end debug mode, enter:
> debug disable
NOTE: Debug mode can slow operations. Remember to exit debug mode as soon
as possible.
Debug Command Syntax
Debug commands have the following syntax:
<debug command> {[<parameter>] [<value>]}
NOTE: Square brackets ([ ]) indicate one or no occurrence, and braces ({ })
indicate one or more occurrences.
Debug Command Help
For information about a specific debug command, enter the command followed by
the tab key or question mark (?). An example follows.
For example, the following command lists information about the basemac
command:
>
basemac?
Command: basemac
Desc: Set up the base MAC address for Ethernet controllers
Authority: Admins
Usage: basemac AA:BB:CC:11:22:33
List of Debug Commands
NOTE: All debug commands (and the command that enables debug mode)
require Admins authority. To access debugging information, you must
log on with a user ID that has administrator authority (such as nnadmin).
Command
apreadRead from the AP memory
Purpose
88BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 89
Command Interface
apgosDebugging information about AP GoS
apidsDisplay information about AP-IDS
aplookupLook up symbol in AP DMEM symbol table
apmodeConfigures AP0 as eth0apreadRead from the AP
memory
apregsDisplay the current AP registers
apwriteWrite to the AP memory
basemacSet up the base MAC address for Ethernet
controllers
bcmchipPrint the broadcom switch chip revision
collisionDisplay collisions in RFT table
connectionsDisplay firewall connection information
devsDisplay information about devices
dspreadRead from the DSP memory
dsptestStart and stop test actions on a DSP channel
dsptoneToggle tones on a particular channel
dspwriteWrite to the DSP memory
dumpcmdDisplay all commands available in system
emacDisplay debug emac stats
flashFormat the compact flash
fxoFXO testing code
fxsFXS testing code
gosstatsTest gos stats for Web
i2cscanScan the I2C bus for devices
initfuncDisplays the function at the n’th dot from the
boot sequence
jbshowShow new jitter buffer stats
ledflashFlashes the LED on the front of the unit
memoryDisplays information about the memory/buffers
mibDisplays or extracts the built in autogenerated
MIBs
miiRead/write MII registers
nfsmountMount a remote NFS volume
scanblockedDisplay IP addresses blocked by IDS
stackCurrent running tasks stack information and
state
tasksDisplay currently running tasks and change their
priorities
tempRead/write temperature sensor registers
thrashRun the bus thrashing tests
trustedlistDisplay IDS Trusted List Table
ttDisplay stack trace - can't be applied to the
task itself
vqmtSend vqm trap
BSGX4e Business Gateway User Guide89
Release 01.01NN47928-102
Page 90
90BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 91
5
WAN I
C
ONFIGURATION
This chapter describes how to configure the data interface that connects the
BSGX4e unit to an external network, or W AN. The WAN interface in the BSGX4e is an
Ethernet interface referenced as eth0. It provides a bandwidth of 100 Mbps.
NTERFACE
Ethernet WAN Port and Interface
The Ethernet WAN settings include both speed and duplex mode for the WAN port,
and IP address settings for the WAN interface. To initialize network communication
during the installation of the unit, the WAN port and interface may already be
configured. To see the current configuration settings for the WAN port and interface,
enter the following command:
> show interface ip eth0
The display is similar to the following:
"eth0" info:
Interface eth0
Flags (8843) < UP BROADCAST RUNNING SIMPLEX MULTICAST >
IP Address/Mask 0.0.0.0/255.0.0.0
MTU 1500
DHCP on
Lease obtained N/A
Lease expires N/A
MAC Address 00:19:09:74:00:00
Speed FULL100
Configured Speed AUTONEG
WAN Ports
The Ethernet interface actually provides two ports to the WAN, identified as follows:
mii0: uplink to the IP host
eth0: front WAN port
You cannot configure the uplink port (mii0). It always operates at 100 Mbps, full
duplex mode, flow control disabled.
You can configure the eth0 port as follows:
Its speed can be 10Base-T, 100Base-T, or autonegotiated. The default is
autonegotiated.
Page 92
Its duplex mode can be half duplex, full duplex, or autonegotiated. The default
is autonegotiated.
NOTE: You cannot configure the eth0 flow control setting; it is always disabled.
WAN Interface (eth0)
For traffic to be routed to the W AN interf ace (eth0), you must assign an IP address to
it. The IP address is assigned automatically by a DHCP server if the DHCP service is
enabled for the eth0 interface. Otherwise, you must assign an IP address manually.
NOTE: Initially, the eth0 interface is configured with DHCP enabled. To see the
current eth0 configuration, enter the command show interface ip eth0.
eth0 Configuration Command
To change the settings for the eth0 interface, enter the following command:
> config interface ip eth0
Table 24 describes the parameters for config interface ip eth0.
Table 24. eth0 Parameters
Parameter Description
ipIP address and mask of the eth0 interface. Specify an address
only if DHCP is disabled.
The address and mask can be specified with dotted-decimal or
CIDR notation (for example, 192.168.15.3.3/255.255.255.0 or
192.168.15.33/24).
mtuMaximum Transmission Unit (MTU) of the interface (in bytes).
The default is 1500 bytes.
dhcpIndicates whether DHCP is enabled for the interface. DHCP is
initially enabled (on).
statusIndicates whether the eth0 interface is enabled or disabled (up
| down). The default is up.
speedIndicates whether the speed and duplex mode for eth0 is
autonegotiated or explicitly specified. For autonegotiation,
specify auto; otherwise, specify 10 or 100 Mbps and half or full
duplex (auto | 10Half | 10Full | 100Half | 100Full). The
default is auto.
92BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 93
WAN Interface Configuration
Configure eth0 Example
This section provides configuration examples for the WAN front port.
Example 1
The following example shows how to configure DHCP service for the eth0 interface.
> config interface ip eth0 dhcp
*> save
> show interface ip eth0
"eth0" info:
Interface eth0
Flags (A843) < UP BROADCAST RUNNING SIMPLEX LINKUP MULTICAST >
IP Address/Mask 172.29.0.124/255.255.0.0
MTU 1500
DHCP on
Lease obtained WED MAR 28 09:12:18 2007
Lease expires WED MAR 28 10:12:18 2007
MAC Address 00:15:93:00:02:B2
Speed FULL100
Configured Speed AUTONEG
Example 2
The following example configures a static IP address for the WAN interface and
disables DHCP service.
> config interface ip eth0 ip 172.29.19.10/16 dhcp off
> show interface ip eth0
"eth0" info:
Interface eth0
Flags (A843) < UP BROADCAST RUNNING SIMPLEX LINKUP MULTICAST >
IP Address/Mask 172.29.19.10/255.255.0.0
MTU 1500
DHCP off
Lease obtained N/A
Lease expires N/A
MAC Address 00:15:93:00:02:B2
Speed FULL100
Configured Speed AUTONEG
Example 3
The following example disables the WAN interface, preventing all communication
with the external network. The eth0 display then shows that the interface is down
by the DOWN indicator on the Flags line.
> config interface ip eth0 status down
*> show interface ip eth0
"eth0" info:
Interface eth0
Flags (A842) < DOWN BROADCAST RUNNING SIMPLEX LINKUP MULTICAST>
IP Address/Mask 172.29.19.10/255.255.0.0
MTU 1500
DHCP off
Lease obtained N/A
BSGX4e Business Gateway User Guide93
Release 01.01NN47928-102
To show the eth0 configuration, enter the following command:
> show interface ip eth0
The display is similar to the following:
"eth0" info:
Interface eth0
Flags (8843) < UP BROADCAST RUNNING SIMPLEX MULTICAST >
IP Address/Mask 0.0.0.0/255.0.0.0
MTU 1500
DHCPon
Lease obtained N/A
Lease expires N/A
MAC Address 00:19:09:74:00:00
Speed FULL100
Configured Speed AUTONEG
Notice the following in the preceding display:
The Flags line indicates whether the status of the interface is UP or DOWN.
The DHCP line indicates whether DHCP is on or off.
The Lease obtained and Lease expires lines display N/A if DHCP is off or
DHCP has not assigned an IP address to eth0. Otherwise, the lines describe the
DHCP lease for the IP address assigned.
The Speed reports the current negotiated speed:
nFULL100100 Mbps, full duplex mode
nHALF100100 Mbps, half duplex mode
nFULL1010 Mbps, full duplex mode
nHALF1010 Mbps, half duplex mode
The Configured Speed line reports the speed setting in the eth0
configuration: either AUTONEG (autonegotiation enabled) or a specific speed and
duplex mode (FULL100, HALF100, FULL10, or HALF10).
eth0 Statistics
The device keeps statistics on the packets received and transmitted through the
eth0 interface. To see the statistics, enter the following command:
> stats interface ip eth0
The following is an example of the statistics display that is provided:
The following command clears the statistics kept for the eth0 interface:
> clear interface ip eth0
BSGX4e Business Gateway User Guide95
Release 01.01NN47928-102
Page 96
96BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Page 97
6
LAN S
This chapter describes how to configure the following features of the BSGX4e
device:
the ports of the LAN switch
the Ethernet interface (eth1) to the LAN switch
Address Resolution Logic (ARL) (see “ARL Configuration” (page 104))
layer 2 QoS (see “Layer 2 QoS” (page 106))
The LAN switch also allows for monitoring of port traffic as described in “Port
Mirroring” (page 339).
WITCH
C
ONFIGURATION
Introduction
The LAN switch in the unit implements a nonblocking switch fabric, which enables
packet switching at wire speed over all ports. The LAN switch contains the
following:
The switch provides four LAN ports.
Within the BSGX4e device, the switch passes traffic to the LAN Ethernet interface
called eth1. Traffic destined for the WAN is then routed to the WAN interface.
LAN configuration requires the configuration of both the LAN ports and the LAN
Ethernet interface. Configuration of the LAN interface is described in “LAN Interface
(eth1)” (page 102).
LAN Switch Ports
The LAN switch provides four LAN front ports (ports 1 through 4).
The switch also has an uplink port (port 0 or MII). Network traffic from the switch is
sent through port 0 to the host for processing. The uplink port cannot be configured.
It always operates at 100 Mbps, full duplex mode, flow control disabled.
Speed and Duplex Mode
You can configure each front port with a specific speed and duplex mode or you can
configure the port to automatically negotiate the appropriate speed and duplex
mode. The possible speeds are either 10Base-T, or 100Base-T and either half or full
duplex mode.
The initial configuration for each LAN port specifies autonegotiation for speed and
duplex mode.
Page 98
Flow Control
You can disable or configure flow control for a port to provide either back pressure
(forced collision) for half duplex mode or pause frames for full duplex mode.
The initial configuration for each LAN port disables flow control.
NOTE: You cannot enable flow control if layer 2 QoS is enabled (see “Layer 2
QoS” (page 106)).
LAN Port Configuration Command
To change the configuration of a port, specify the port number on the following
command:
> config switch port
Table 25 describes the parameters of config switch port.
Table 25. LAN Port Parameters
Parameter Description
[port]
speed
flow
enabled
Port to configure (1 to 4).
Select autonegotiation or specify a speed (10Base-T or
100Base-T) and a duplex mode (half or full) (Auto | 10Half |
10Full | 100Half | 100Full). The default is Auto.
Enable flow control (back pressure [forced collision] for half
duplex mode or pause frames for full duplex mode) (yes | no).
The default is no.
Indicates whether the port is enabled (yes | no). The default is
yes.
LAN Port Configuration Examples
This section provides examples for configuring LAN front ports.
Example 1
This example enables port 2 and changes its speed setting to autonegotiation:
> config switch port 2 speed auto enabled yes
*> save
Example 2
This example enables port 3 and changes its configuration, as follows:
0-0 UP 100Full None
0-1 UP 100Full Yes-Both
0-2 UP 100Full No-Local
0-3 UP 100Full Yes-Both
0-4 UP 100Full No-Local
The field Flow Ctrl shows the current flow control status of the port:
Flow control cannot be enabled on the uplink port (0-0) so its value is always
None.
BSGX4e Business Gateway User Guide99
Release 01.01NN47928-102
Page 100
The possible Flow Ctrl values are:
NoneNo flow control by either the BSGX4e or its partner.
No-LocalFlow control by the BSGX4e, but not by its partner.
No-PartnerFlow control by the its partner, but not by the BSGX4e.
Yes-BothFlow control by both the BSGX4e and its partner.
Show Port Statistics
The device keeps packet statistics for the LAN switch ports. You can display the
statistics as a summary of statistics for all LAN ports or as detailed statistics for a
specific port.
Summary of Port Statistics
To list a statistics summary for all LAN ports, enter the following command:
> stats switch summary
Switch Stats:
Port Rx Frames In Good Octets Undersize In Bad Octets
Tx Frames Out Octets Oversize Align Err
Port unit and number. (Port 0-0 is the uplink [MII] port of the switch.)
Total valid received frames.
Total transmitted frames.
Total data octets of received frames with valid Frame Check Sequence
(FCS) (preamble not included). This count includes undersized and
oversized frames.
Out
Octets
100BSGX4e Business Gateway User Guide
NN47928-102Release 01.01
Total data octets transmitted, including valid FCS (preamble not
included).
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.