All rights reserved. October 2001.
The information in this document is subject to change without notice. The statements, configurations, technical data,
and recommendations in this document are believed to be accurate and reliable, but are presented without express or
implied warranty. Users must take full responsibility for their applications of any products specified in this document.
The information in this document is proprietary to Nortel Networks Inc.
The software described in this document is furnished under a license agreement and may only be used in accordance
with the terms of that license. The software license agreement is included in this document.
Trademarks
Nortel Networks, the Nortel Networks logo, the Globemark, Unified Networks, ASN, BayRS, BCC, FRE, and System
5000 are trademarks of Nortel Networks.
Adobe and Acrobat Reader are trademarks of Adobe Systems Incorporated.
Hewlett-Packard is a trademark of Hewlett-Packard Company.
Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation.
The asterisk after a name denotes a trademarked item.
Restricted Rights Legend
Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer
software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth in
the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, Nortel Networks Inc. reserves the
right to make changes to the products described in this document without notice.
Nortel Networks Inc. does not assume any liability that may occur due to the use or application of the product(s) or
circuit layout(s) described herein.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
In addition, the program and information contained herein are licensed only pursuant to a license agreement that
contains restrictions on use and disclosure (that may incorporate by reference certain limitations and notices imposed
by third parties).
ii
308627-15.1 Rev 00
Nortel Networks Inc. Software License Agreement
This Software License Agreement (“License Agreement”) is between you, the end-user (“Customer”) and Nortel
Networks Corporation and its subsidiaries and affiliates (“Nortel Networks”). PLEASE READ THE FOLLOWING
CAREFULLY. YOU MUST ACCEPT THESE LICENSE TERMS IN ORDER TO DOWNLOAD AND/OR USE
THE SOFTWARE. USE OF THE SOFTWARE CONSTITUTES YOUR ACCEPTANCE OF THIS LICENSE
AGREEMENT. If you do not accept these terms and conditions, return the Software, unused and in the original
shipping container, within 30 days of purchase to obtain a credit for the full purchase price.
“Software” is owned or licensed by Nortel Networks, its parent or one of its subsidiaries or affiliates, and is
copyrighted and licensed, not sold. Software consists of machine-readable instructions, its components, data,
audio-visual content (such as images, text, recordings or pictures) and related licensed materials including all whole or
partial copies. Nortel Networks grants you a license to use the Software only in the country where you acquired the
Software. You obtain no rights other than those granted to you under this License Agreement. You are responsible for
the selection of the Software and for the installation of, use of, and results obtained from the Software.
1.Licensed Use of Software. Nortel Networks grants Customer a nonexclusive license to use a copy of the
Software on only one machine at any one time or to the extent of the activation or authorized usage level, whichever is
applicable. To the extent Software is furnished for use with designated hardware or Customer furnished equipment
(“CFE”), Customer is granted a nonexclusive license to use Software only on such hardware or CFE, as applicable.
Software contains trade secrets and Customer agrees to treat Software as confidential information using the same care
and discretion Customer uses with its own similar information that it does not wish to disclose, publish or disseminate.
Customer will ensure that anyone who uses the Software does so only in compliance with the terms of this Agreement.
Customer shall not a) use, copy, modify, transfer or distribute the Software except as expressly authorized; b) reverse
assemble, reverse compile, reverse engineer or otherwise translate the Software; c) create derivative works or
modifications unless expressly authorized; or d) sublicense, rent or lease the Software. Licensors of intellectual
property to Nortel Networks are beneficiaries of this provision. Upon termination or breach of the license by
Customer or in the event designated hardware or CFE is no longer in use, Customer will promptly return the Software
to Nortel Networks or certify its destruction. Nortel Networks may audit by remote polling or other reasonable means
to determine Customer’s Software activation or usage levels. If suppliers of third party software included in Software
require Nortel Networks to include additional or different terms, Customer agrees to abide by such terms provided by
Nortel Networks with respect to such third party software.
2.Warranty. Except as may be otherwise expressly agreed to in writing between Nortel Networks and Customer,
Software is provided “AS IS” without any warranties (conditions) of any kind. NORTEL NETWORKS DISCLAIMS
ALL WARRANTIES (CONDITIONS) FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING,
BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE AND ANY WARRANTY OF NON-INFRINGEMENT. Nortel Networks is not obligated
to provide support of any kind for the Software. Some jurisdictions do not allow exclusion of implied warranties, and,
in such event, the above exclusions may not apply.
3.Limitation of Remedies. IN NO EVENT SHALL NORTEL NETWORKS OR ITS AGENTS OR SUPPLIERS
BE LIABLE FOR ANY OF THE FOLLOWING: a) DAMAGES BASED ON ANY THIRD PARTY CLAIM; b)
LOSS OF, OR DAMAGE TO, CUSTOMER’S RECORDS, FILES OR DATA; OR c) DIRECT, INDIRECT,
SPECIAL, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS OR
SAVINGS), WHETHER IN CONTRACT, TORT OR OTHERWISE (INCLUDING NEGLIGENCE) ARISING OUT
OF YOUR USE OF THE SOFTWARE, EVEN IF NORTEL NETWORKS, ITS AGENTS OR SUPPLIERS HAVE
BEEN ADVISED OF THEIR POSSIBILITY. The forgoing limitations of remedies also apply to any developer and/or
supplier of the Software. Such developer and/or supplier is an intended beneficiary of this Section. Some jurisdictions
do not allow these limitations or exclusions and, in such event, they may not apply.
308627-15.1 Rev 00
iii
4.General
a.If Customer is the United States Government, the following paragraph shall apply: All Nortel Networks
Software available under this License Agreement is commercial computer software and commercial
computer software documentation and, in the event Software is licensed for or on behalf of the United States
Government, the respective rights to the software and software documentation are governed by Nortel
Networks standard commercial license in accordance with U.S. Federal Regulations at 48 C.F.R. Sections
12.212 (for non-DoD entities) and 48 C.F.R. 227.7202 (for DoD entities).
b.Customer may terminate the license at any time. Nortel Networks may terminate the license if Customer
fails to comply with the terms and conditions of this license. In either event, upon termination, Customer
must either return the Software to Nortel Networks or certify its destruction.
c.Customer is responsible for payment of any taxes, including personal property taxes, resulting from
Customer’s use of the Software. Customer agrees to comply with all applicable laws including all applicable
export and import laws and regulations.
d.Neither party may bring an action, regardless of form, more than two years after the cause of the action
arose.
e.The terms and conditions of this License Agreement form the complete and exclusive agreement between
Customer and Nortel Networks.
f.This License Agreement is governed by the laws of the country in which Customer acquires the Software. If
the Software is acquired in the United States, then this License Agreement is governed by the laws of the
state of New York.
iv
308627-15.1 Rev 00
Contents
Preface
Before You Begin ............................................................................................................ xvii
Text Conventions ........................................................................................................... xviii
This guide describes Internet Protocol (IP) services and what you do to start and
customize IP services on a Nortel Networks* router.
You can use the Bay Command Console (BCC*) or Site Manager to configure IP
services on a router. In this guide, you will find instructions for using both the
BCC and Site Manager.
Before You Begin
Before using this guide, you must complete the following procedures. For a new
router:
Preface
•Install the router (see the installation guide that came with your router).
•Connect the router to the network and create a pilot configuration file (see
Make sure that you are running the latest version of Nortel Networks BayRS* and
Site Manager software. For information about upgrading BayRS and Site
Manager, see the upgrading guide for your version of BayRS.
308627-15.1 Rev 00
Quick-Starting Routers, Configuring BayStack Remote Access, or Connecting
ASN Routers to a Network).
xvii
Configuring IP, ARP, RARP, RIP, and OSPF Services
Text Conventions
This guide uses the following text conventions:
angle brackets (< >)Indicate that you choose the text to enter based on the
description inside the brackets. Do not type the
brackets when entering the command.
Example: If the command syntax is:
ping
<ip_address>
ping 192.32.10.12
, you enter:
bold text
Indicates command names and options and text that
you need to enter.
Example: Enter
Example: Use the
show ip {alerts | routes
dinfo
command.
}.
braces ({})Indicate required elements in syntax descriptions
where there is more than one option. You must choose
only one of the options. Do not type the braces when
entering the command.
Example: If the command syntax is:
show ip {alerts | routes
show ip alerts or show ip routes
}
, you must enter either:
, but not both.
brackets ([ ])Indicate optional elements in syntax descriptions. Do
not type the brackets when entering the command.
Example: If the command syntax is:
show ip interfaces [-alerts
show ip interfaces
or
]
, you can enter either:
show ip interfaces -alerts
.
ellipsis points (. . . )Indicate that you repeat the last element of the
command as needed.
xviii
Example: If the command syntax is:
ethernet/2/1
ethernet/2/1
[<parameter> <value>]
and as many parameter-value pairs as
needed.
. . .
, you enter
308627-15.1 Rev 00
Preface
italic textIndicates new terms, book titles, and variables in
command syntax descriptions. Where a variable is two
or more words, the words are connected by an
underscore.
Example: If the command syntax is:
show at
valid_route
<valid_route>
is one variable and you substitute one value
for it.
screen textIndicates system output, for example, prompts and
system messages.
Acronyms
Example:
Set Trap Monitor Filters
separator ( > )Shows menu paths.
Example: Protocols > IP identifies the IP option on the
Protocols menu.
vertical line (
)Separates choices for command keywords and
|
arguments. Enter only one of the choices. Do not type
the vertical line when entering the command.
Example: If the command syntax is:
show ip {alerts | routes
show ip alerts
or
}
show ip routes
This guide uses the following acronyms:
AREall routes explorer
ARPAddress Resolution Protocol
ASautonomous system
, you enter either:
, but not both.
308627-15.1 Rev 00
ASBall-subnet broadcast
ASBRAS boundary router
ASEautonomous system external
ATMasynchronous transfer mode
xix
Configuring IP, ARP, RARP, RIP, and OSPF Services
BGPBorder Gateway Protocol
BootPBootstrap Protocol
BRborder router
CIDRclassless interdomain routing
DVMRPDistance Vector Multicast Routing Protocol
ECMPequal-cost multipath
EGPExterior Gateway Protocol
FDDIFiber Distributed Data Interface
FIFOfirst in first out
ICMPInternet Control Message Protocol
IGPinterior gateway protocol
IPInternet Protocol
ISPInternet service provider
LISlogical IP subnet
LSAlink state advertisement
xx
LSDBlink state database
MACmedia access control
MOSPFMulticasting Open Shortest Path First
MTUmaximum transmission unit
NBMAnonbroadcast multi-access
NICNetwork Information Center
NSSAnot-so-stubby area
OSPFOpen Shortest Path First
PPPPoint-to-Point Protocol
RARPReverse Address Resolution Protocol
RFCRequest for Comments
RIFrouting information field
RIPRouting Information Protocol
SMDSSwitched Multimegabit Data Service
308627-15.1 Rev 00
SNMPSimple Network Management Protocol
SRRsource record route
STEspanning tree explorer
TTLtime to live
UDPUser Datagram Protocol
VCvirtual circuit
WANwide area network
Related Publications
For more information about IP services, refer to the following publications:
•Reference for BCC IP show Commands (part number 308603-14.20 Rev 00)
Provides descriptions of all
commands that display IP, ARP, RIP, and OSPF configuration and statistical
data.
show
commands for IP services, including the
Preface
•Configuring IP Exterior Gateway Protocols (BGP and EGP) (part number
•Configuring GRE, NAT, RIPSO, and BFE Services (part number
You can print selected technical manuals and release notes free, directly from the
Internet. Go to the www.nortelnetworks.com/documentation URL. Find the
product for which you need documentation. Then locate the specific category and
model or version for your hardware or software product. Use Adobe* Acrobat
Reader* to open the manuals and release notes, search for the sections you need,
and print them on most standard printers. Go to Adobe Systems at the
www.adobe.com URL to download a free copy of the Adobe Acrobat Reader.
308627-15.1 Rev 00
308628-15.0 Rev 00)
Provides a description of Border Gateway Protocol (BGP) and Exterior
Gateway Protocol (EGP) services and instructions for configuring them.
308625-14.20 Rev 00)
Provides a description of Generic Routing Encapsulation (GRE), Network
Address Translation (NAT), Revised IP Security Option (RIPSO), and Blacker
front-end services and instructions for configuring them.
xxi
Configuring IP, ARP, RARP, RIP, and OSPF Services
You can purchase selected documentation sets, CDs, and technical publications
through the Internet at the www1.fatbrain.com/documentation/nortel/ URL.
How to Get Help
If you purchased a service contract for your Nortel Networks product from a
distributor or authorized reseller, contact the technical support staff for that
distributor or reseller for assistance.
If you purchased a Nortel Networks service program, contact one of the following
Nortel Networks Technical Solutions Centers:
Technical Solutions CenterTelephone
Europe, Middle East, and Africa(33) (4) 92-966-968
North America(800) 4NORTEL or (800) 466-7835
Asia Pacific(61) (2) 9927-8800
China(800) 810-5000
xxii
An Express Routing Code (ERC) is available for many Nortel Networks products
and services. When you use an ERC, your call is routed to a technical support
person who specializes in supporting that product or service. To locate an ERC for
your product or service, go to the http://www130.nortelnetworks.com/cgi-bin/
eserv/common/essContactUs.jsp
URL.
308627-15.1 Rev 00
Chapter 1
IP Concepts, Terminology, and Features
This chapter introduces concepts and terminology used in this guide.
TopicPage
IP Addresses
Autonomous Systems1-8
Addresses and Variable-Length Masks1-10
Address Resolution Protocol (ARP)1-10
Reverse Address Resolution Protocol (RARP)1-13
Routing Information Protocol (RIP)1-14
Open Shortest Path First (OSPF) Protocol1-14
Router Discovery Protocol1-20
Route Preferences1-21
Route Weights1-22
IP Routing Policies and Filters1-23
IP Traffic Filters1-28
1-2
308627-15.1 Rev 00
1-1
Configuring IP, ARP, RARP, RIP, and OSPF Services
IP Addresses
An IP address consists of 32 bits that have the form network.host. The network
portion is a network number ranging from 8 to 24 bits. The host portion is the
remaining 8 to 24 bits identifying a specific host on the network. The Internet
Network Information Center (NIC) assigns the network portion of the IP address.
Your network administrator assigns the host portion.
NIC recognizes three primary classes of networks: A, B, and C. In addition, NIC
has recently identified two other classes: Class D for networks that support
multicasting, which allows an IP datagram to be transmitted to a single multicast
group consisting of hosts spread across separate physical networks; and Class E
for experimental networks. The IP router does not fully support Class D or Class E
networks.
Based on the size of the network, NIC classifies a network as Class A, B, or C (the
most common). The network class determines the number of bits assigned to the
network and host portions of the IP address (Tab le 1- 1
Table 1-1.Network Classes and IP Addresses
).
1-2
Network SizeClass Network Portion Host Portion
More than 65,533 hostsA8 bits24 bits
254 to 65,533 hostsB16 bits16 bits
Fewer than 254 hostsC24 bits8 bits
The position of the first bit set to 0 (whether it is the first, second, third, or fourth
bit) in the first octet of an IP address indicates the network class (A, B, C, or D). If
no bit is set to 0, it is a Class E network. Figure 1-1
shows the placement of the
first bit set to 0 for Class A, B, and C networks. The figure also shows how a
network’s class affects the network and host portions of the IP address.
308627-15.1 Rev 00
IP Concepts, Terminology, and Features
8162431
Class A
Class B
Class C
Class A
Class B
Class C
0
8162431
0
1
8162431
101
First OctetNetwork Host
0
10
110
Network portion
Range
1-127
128-191
192-223
Host portion
Example
25.0.0.1
140.250.0.1
192.2.3.1
25
140.250
192.2.3
Figure 1-1.Network and Host Portions of IP Addresses
1
1
1
IP0005A
You specify IP addresses in dotted-decimal notation. To express an IP address in
dotted-decimal notation, you convert each 8-bit octet of the IP address to a
decimal number and separate the numbers by decimal points.
For example, you specify the 32-bit IP address 10000000 00100000 00001010
10100111 in dotted-decimal notation as 128.32.10.167. The most significant 2
bits (10) in the first octet indicate that the network is Class B; therefore, the first
16 bits compose the NIC-assigned network portion field. The third octet
(00001010) and fourth octet (10100111) compose the host field.
308627-15.1 Rev 00
1-3
Configuring IP, ARP, RARP, RIP, and OSPF Services
Subnet Addressing
The concept of subnetworks (or subnets) extends the IP addressing scheme.
Subnets are two or more physical networks that share a common
network-identification field (the NIC-assigned network portion of the 32-bit IP
address). Subnets allow an IP router to hide the complexity of multiple LANs
from the rest of the internetwork.
Using subnets, you partition the host portion of an IP address into a subnet
number and a “real” host number on that subnet. The IP address is then defined by network.subnet.host. Routers outside the network do not interpret the subnet and
host portions of the IP address separately.
Routers within a network containing subnets use a 32-bit subnet mask that
identifies the extension bits. In network.subnet.host, the subnet.host portion (or
the local portion) contains an arbitrary number of bits. The network administrator
allocates bits within the local portion to subnet and host, and then assigns values
to subnet and host.
For example, the following is the IP address of a network that contains
subnets: 10000000 00100000 00001010 10100111. You specify this address in
dotted-decimal notation as 128.32.10.167.
1-4
The second bit of the first octet is set to 0, indicating that the network is a Class B
network. Therefore, the NIC-assigned network portion contains 16 bits and the
locally assigned local portion contains 16 bits.
The network administrator allocates the 16 bits in the local portion field as
follows:
•Upper 8 bits (00001010) with a value of 10 to the subnet portion
•Lower 8 bits (10100111) with a value of 167 to the host portion
In other words, the 16-bit local portion field, together with the 16-bit network
field, specify host 167 on subnet 10 of network 128.32.
You now need a subnet mask to identify those bits in the 32-bit IP address that
specify the network field and those bits that specify the subnet field. Like the IP
address, you specify the subnet mask in dotted-decimal notation.
308627-15.1 Rev 00
IP Concepts, Terminology, and Features
You construct a subnet mask as follows:
•Assign a value of 1 to each of the 8, 16, or 24 bits in the network field.
•Assign a value of 1 to each bit in the subnet field.
•Assign a value of 0 to each bit in the host field.
•Convert the resulting 32-bit string to dotted-decimal notation.
For example, to construct a subnet mask for the IP address 10000000 00100000
00001010 10100111, do the following:
1. Assign a value of 1 to each bit in the network field.
The position of the first bit set to 0 in the first octet of the IP address indicates
that the network is Class B; therefore, the network field contains 16 bits:
11111111 11111111.
2. Assign a value of 1 to each bit in the subnet field.
Allocate the upper 8 bits of the local portion field to the subnet portion, as
follows: 11111111.
3. Assign a value of 0 to each bit in the host field.
4. Convert the resulting 32-bit string (11111111 11111111 11111111 00000000)
308627-15.1 Rev 00
Allocate the lower 8 bits of the local portion field to the host identification, as
follows: 00000000.
to dotted-decimal notation, as follows: 255.255.255.0.
1-5
Configuring IP, ARP, RARP, RIP, and OSPF Services
Tabl e 1-2 lists the range of possible subnet masks for Class B and Class C
addresses, along with the number of bits that the mask allocates for a subnet
address, the number of recommended subnets associated with the mask, and the
number of hosts per subnet.
Table 1-2.Subnet Masks for Class B and Class C Addresses
Number of Subnets
Number of BitsSubnet Mask
Class B
2255.255.192.0216,382
3255.255.224.068190
4255.255.240.0144094
5255.255.248.0302046
6255.255.252.0621022
7255.255.254.0126510
8255.255.255.0254254
9255.255.255.128510126
10255.255.255.1921,02262
11255.255.255.2242,04630
12255.255.255.2404,09414
13255.255.255.2488,1906
14255.255.255.25216,3822
Class C
2255.255.255.192262
3255.255.255.224630
4255.255.255.2401414
5255.255.255.248306
6255.255.255.252622
(Recommended)
Number of Hosts
per Subnet
1-6
308627-15.1 Rev 00
Supernet Addressing
A supernet is a group of networks identified by contiguous network addresses.
Internet service providers (ISPs) can assign customers blocks of contiguous
addresses to define supernets as needed.
Each supernet has a unique supernet address that consists of the upper bits shared
by all addresses in the contiguous block. For example, Figure 1-2
block of contiguous 32-bit addresses (192.32.0.0 through 192.32.7.0 in
dotted-decimal notation).
The supernet address for this block is 11000000 00100000 00000, the 21 upper
bits shared by the 32-bit addresses.
A complete supernet address consists of an address/mask pair:
•address is the first 32-bit IP address in the contiguous block. In this example,
•mask is a 32-bit string containing a set bit for each bit position in the supernet
The complete supernet address in this example is 192.32.0.0/255.255.248.0.
308627-15.1 Rev 00
IP0007A
the address is 11000000 00100000 00000000 00000000 (192.32.0.0 in
dotted-decimal notation).
part of the address. The mask for the supernet address in this example is
11111111 11111111 11111000 00000000 (255.255.248.0 in dotted-decimal
notation).
1-7
Configuring IP, ARP, RARP, RIP, and OSPF Services
Classless Interdomain Routing
Classless interdomain routing (CIDR) is an addressing scheme that employs
supernet addresses to represent multiple IP destinations. Rather than advertise a
separate route for each destination in a supernet, a router can use a supernet
address to advertise a single route — called an aggregate route — that represents
all of the destinations. CIDR reduces the size of the routing tables used to store
advertised IP routes.
OSPF supports classless routing within a domain.
Autonomous Systems
LANs and WANs interconnected by IP routers form a group of networks called an
internetwork. For administrative purposes, an internetwork is divided into
autonomous systems. An autonomous system (AS) is simply a collection of
routers (called gateways in IP terminology) and hosts run by a single technical
administrator that has a single, clearly defined routing policy. Each autonomous
system has its own unique AS number assigned by the appropriate Internet
Registry entity. Figure 1-3
autonomous systems.
depicts a sample internetwork segmented into three
1-8
308627-15.1 Rev 00
Loading...
+ 366 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.