Thisproductcomplieswiththefollowing:47 CFRParts2and15,CSA C108.8,89/336/EEC,EN 55022,EN55024,EN 61000‐3‐2,
EN 61000‐3‐3,AS/NZSCISPR22,andVCCIV‐3.
Compatibilidad Electromágnetica (EMC)
EsteproductodeEnterasyscumpleconlosiguiente:47CFRPartes2y15,CSAC108.8,89/336/EEC,EN 55022,EN 55024,
EN 61000‐3‐2,EN 61000‐3‐3,AS/NZSCISPR22,VCCI V‐3.
Elektro- magnetische Kompatibilität ( EMC )
DiesesProduktentsprichtdenfolgendenRichtlinien:47CFRParts2and15,CSAC108.8,89/336/EEC,EN55022,EN 55024,
EN 61000‐3‐2,EN61000‐3‐3,AS/NZSCISPR22,VCCIV‐3.
European Waste Electrical and Electronic Equipment (WEEE) Notice
ThisisaclassAproductbasedonthestandardoftheVoluntaryControlCouncilforInterferencebyInformationTechnol og y
Equipment(VCCI)V‐3.Ifthisequipmentisusedinadomesticenvironment,radiodisturbancemayarise.Whensuchtrouble
occurs,theusermayberequiredtotakecorrectiveactions.
Contents of the Guide ................................................................................................................................... xxvii
Conventions Used in This Guide ..................................................................................................................xxviii
Getting Help .................................................................................................................................................... xxx
Chapter 1: Overview
Chapter 2: Managing the XSR
Utilizing the Command Line Interface ............................................................................................................. 2-1
Connecting via the Console Port on XSR Series ..................................................................................... 2-1
Using the Console Port for Dial Backup on the XSR 1800 Series...................................................... 2-1
Using the Console Port to Remotely Control the XSR ....................................................................... 2-2
Connecting a Serial Interface to a Modem ......................................................................................... 2-2
Connecting via Telnet .............................................................................................................................. 2-3
Connecting via SSH ................................................................................................................................. 2-3
Accessing the Initial Prompt ..................................................................................................................... 2-4
Synchronizing the Clock ........................................................................................................................... 2-4
Managing the Session .............................................................................................................................. 2-5
Remote Auto Install .................................................................................................................................. 2-5
RAI Features and Requirements ........................................................................................................ 2-5
RAI Requirements on the XSR ........................................................................................................... 2-7
How RAI Components Work............................................................................................................... 2-7
Overview of LAN Interfaces ............................................................................................................................ 3-1
LAN Features ................................................................................................................................................. 3-1
Configuring the LAN ....................................................................................................................................... 3-2
Overview of WAN Interfaces .......................................................................................................................... 3-3
WAN Features ................................................................................................................................................ 3-3
Configuring the WAN ...................................................................................................................................... 3-4
Features ......................................................................................................................................................... 4-1
T3 Mode ................................................................................................................................................... 4-2
General IP Features ....................................................................................................................................... 5-1
ARP and Proxy ARP ................................................................................................................................ 5-4
Proxy DNS ............................................................................................................................................... 5-4
Trivial File Transfer Protocol (TFTP) ........................................................................................................ 5-7
IP Interface ............................................................................................................................................... 5-7
xiii
Secondary IP ............................................................................................................................................ 5-7
IP Routing Protocols ..................................................................................................................................... 5-10
RIPv1 and v2 .......................................................................................................................................... 5-11
Forwarding VLAN, PPPoE over VLAN ............................................................................................. 5-19
VLAN Processing Over the XSR’s Ethernet Interfaces .................................................................... 5-20
VLAN Processing: VLAN-enabled Ethernet to Standard LAN Interfaces ......................................... 5-20
VLAN Processing: VLAN-enabled Ethernet to WAN Interfaces ....................................................... 5-21
VLAN Processing: WAN Interface to a VLAN-enabled Ethernet Interface ....................................... 5-21
QoS with VLAN................................................................................................................................. 5-22
Policy Based Routing ............................................................................................................................. 5-22
Accessing the Global Routing Policy Table ...................................................................................... 5-22
Match Clauses.................................................................................................................................. 5-23
Set Clauses ...................................................................................................................................... 5-23
Router ID ................................................................................................................................................ 5-24
Real Time Protocol (RTP) Header Compression ................................................................................... 5-25
Features ........................................................................................................................................... 5-26
How the VRRP Works ...................................................................................................................... 5-29
Different States of a VRRP Router ................................................................................................... 5-29
VRRP Features ...................................................................................................................................... 5-30
Multiple Virtual IP Addresses per VR ............................................................................................... 5-30
Multiple VRs Per Router ................................................................................................................... 5-30
Configuring Unnumbered IP Serial Interface Example ................................................................................. 5-37
Configuring OSPF Example ......................................................................................................................... 5-37
Multiple NAT Pools within an Interface .................................................................................................. 5-41
Static NAT within an Interface ................................................................................................................ 5-42
NAT Port Forwarding ............................................................................................................................. 5-44
Configuring Policy Based Routing Example ................................................................................................. 5-44
Configuring VRRP Example ......................................................................................................................... 5-45
Chapter 6: Configuring the Border Gateway Protocol
Features ......................................................................................................................................................... 6-1
AS Path .............................................................................................................................................. 6-4
Next Hop............................................................................................................................................. 6-5
Local Preference ................................................................................................................................ 6-5
Community ......................................................................................................................................... 6-9
BGP Path Selection Process ................................................................................................................. 6-11
TCP MD5 Authentication for BGP Example ........................................................................................... 6-25
Configuring BGP Peer Groups ..................................................................................................................... 6-25
IBGP Peer Group Example .................................................................................................................... 6-25
EBGP Peer Group Example ................................................................................................................... 6-26
BGP Community with Route Maps Examples ........................................................................................ 6-26
Chapter 7: Configuring PIM-SM and IGMP
Features ......................................................................................................................................................... 7-1
Differences with Industry-Standard Approach .......................................................................................... 7-1
IP Multicast Overview ..................................................................................................................................... 7-2
Defining Multicast Group Addressing ....................................................................................................... 7-2
PPP Features ................................................................................................................................................. 8-1
Link Control Protocol (LCP) ..................................................................................................................... 8-2
Network Control Protocol (NCP) .............................................................................................................. 8-2
Configuring PPP with a Dialed Backup Line ................................................................................................. 8-10
Configuring a Synchronous Serial Interface ................................................................................................. 8-10
Configuring a Dialed Backup Line ................................................................................................................ 8-11
Configuring the Dialer Interface ............................................................................................................. 8-11
Configuring the Physical Interface for the Dialer Interface ..................................................................... 8-11
Configuring the Interface as the Backup Dialer Interface .......................................................................8-12
Configuring MLPPP on a Multilink/Dialer interface ....................................................................................... 8-13
Multilink Example ................................................................................................................................... 8-13
Dialer Example ....................................................................................................................................... 8-13
Frame Relay Features .................................................................................................................................... 9-3
Reports and Alarms ................................................................................................................................. 9-9
Multi-point to Point-to-Point Example ..................................................................................................... 9-11
Chapter 10: Configuring Dialer Services
Overview of Dial Services ............................................................................................................................. 10-1
Dial Services Features ........................................................................................................................... 10-1
Asynchronous and Synchronous Support .................................................................................................... 10-2
AT Commands on Asynchronous Ports ................................................................................................. 10-2
V.25bis over Synchronous Interfaces .................................................................................................... 10-2
DTR Dialing for Synchronous Interfaces ................................................................................................ 10-3
Time of Day feature ................................................................................................................................ 10-3
Typical Use for Dial Services ................................................................................................................. 10-3
Dialer Pool .............................................................................................................................................. 10-5
Point-to-Point with Matched Calling/Called Numbers ..................................................................... 10-12
Point-to-Point with Different Calling/Called Numbers ..................................................................... 10-12
Point-to-Multipoint with One Neighbor............................................................................................ 10-12
Point-to-Multipoint with Multiple Neighbors .................................................................................... 10-12
Overview of Dial Backup ............................................................................................................................ 10-13
Dial Backup Features ........................................................................................................................... 10-13
Sequence of Backup Events ...................................................................................................................... 10-13
Link Failure Backup Example ..................................................................................................................... 10-14
Configuring a Dialed Backup Line .............................................................................................................. 10-14
Configuring the Dialer Interface ........................................................................................................... 10-14
Configuring the Physical Interface for the Dialer Interface ................................................................... 10-15
Configuring Interface as the Backup Dialer Interface ...........................................................................10-15
Backup Using ISDN ............................................................................................................................. 10-37
Node A (Backed-up Node) Configuration ....................................................................................... 10-37
Node C (Called Node) Configuration ..............................................................................................10-38
Configuration for Backup with MLPPP Bundle .....................................................................................10-39
Node A (Backed-up Node) Configuration ....................................................................................... 10-39
Node C (Called Node) Configuration ..............................................................................................10-40
Configuration for Ethernet Failover ...................................................................................................... 10-40
Configuration for Frame Relay Encapsulation ..................................................................................... 10-41
Chapter 11: Configuring Integrated Services Digital Network
ISDN Features .............................................................................................................................................. 11-1
BRI Features .......................................................................................................................................... 11-2
PRI Features .......................................................................................................................................... 11-2
BRI (Switched) Configuration Model .................................................................................................... 11-10
PRI Configuration Model ...................................................................................................................... 11-12
Leased-Line Configuration Model ........................................................................................................ 11-14
More Configuration Examples .................................................................................................................... 11-15
T1 PRI .................................................................................................................................................. 11-15
E1 PRI .................................................................................................................................................. 11-15
BRI Leased Line ................................................................................................................................... 11-16
Traffic Shaping per Policy-Map .............................................................................................................. 12-8
Differences Between Traffic Policing and Traffic Shaping ..................................................................... 12-9
Traffic Shaping and Queue Limit ............................................................................................................ 12-9
Congestion Control & Avoidance ......................................................................................................... 12-10
Describing Queue Size Control (Drop Tail) .................................................................................... 12-10
Describing Random Early Detection...............................................................................................12-10
Describing Weighted Random Early Detection .............................................................................. 12-11
Configuration per Interface ................................................................................................................... 12-12
Suggestions for Using QoS on the XSR .............................................................................................. 12-13
QoS and Link Fragmentation and Interleaving (LFI) .................................................................................. 12-13
Configuring QoS with MLPPP Multi-Class ........................................................................................... 12-13
Configuring QoS with FRF.12 .............................................................................................................. 12-14
QoS with VLAN ........................................................................................................................................... 12-14
VLAN Packet with Priority Routed out a Fast/GigabitEthernet Interface ........................................ 12-15
VLAN Packet with Priority Routed out a Serial Interface ................................................................ 12-15
Non-VLAN IP Packet Routed Out a Fast/GigabitEthernet Interface............................................... 12-16
QoS with VLAN Configuration Process ................................................................................................ 12-16
QoS on Input .............................................................................................................................................. 12-17
QoS on VPN ............................................................................................................................................... 12-17
QoS over VPN Features ...................................................................................................................... 12-18
Configuring QoS on a Physical Interface ............................................................................................. 12-18
Configuring QoS on a Virtual Tunnel Interface .................................................................................... 12-18
QoS on a Virtual Interface Example ............................................................................................... 12-19
QoS and VPN Interaction ..................................................................................................................... 12-22
Configuring the Shaper on the VPN Interface ................................................................................ 12-23
Features ....................................................................................................................................................... 13-1
NIM Card .......................................................................................................................................... 13-5
ADSL on the Motherboard................................................................................................................ 13-6
ADSL Data Framing ............................................................................................................................... 13-6
ATM Support .......................................................................................................................................... 13-6
Internet Security Issues .......................................................................................................................... 14-1
How a Virtual Private Network Works .................................................................................................... 14-2
Ensuring VPN Security with IPSec/IKE/GRE ............................................................................................... 14-2
GRE over IPSec ..................................................................................................................................... 14-4
Digital Signatures ................................................................................................................................... 14-5
Machine Certificates for the XSR ........................................................................................................... 14-6
CA Hierarchies ....................................................................................................................................... 14-7
RA Mode ................................................................................................................................................ 14-8
Renewing and Revoking Certificates ..................................................................................................... 14-9
DF Bit Functionality ...................................................................................................................................... 14-9
Configuring OSPF Over Site-to-Central Site in Client Mode .......................................................... 14-14
Configuring OSPF over Site-to-Central Site in Network Extension Mode ...................................... 14-16
Server ............................................................................................................................................. 14-17
Configuring OSPF with Fail Over (Redundancy) ............................................................................ 14-17
xxii
Server 1 .......................................................................................................................................... 14-17
Server 2 .......................................................................................................................................... 14-18
XSR VPN Features ..................................................................................................................................... 14-18
Interoperability Profile for the XSR ............................................................................................................. 14-46
Scenario 1: Gateway-to-Gateway with Pre-Shared Secrets ................................................................ 14-46
Scenario 2: Gateway-to-Gateway with Certificates .............................................................................. 14-49
Chapter 15: Configuring DHCP
Overview of DHCP ....................................................................................................................................... 15-1
Features ....................................................................................................................................................... 15-1
DHCP Server Standards ........................................................................................................................ 15-2
How DHCP Works ........................................................................................................................................ 15-2
DHCP Set Up Overview ............................................................................................................................... 15-9
Features ....................................................................................................................................................... 16-1
Access Control Lists ............................................................................................................................... 16-1
LANd Attack ........................................................................................................................................... 16-2
Large ICMP Packets......................................................................................................................... 16-4
Ping of Death Attack......................................................................................................................... 16-4
Spurious State Transition ....................................................................................................................... 16-4
General Security Precautions ....................................................................................................................... 16-4
Connecting Remotely via SSH or Telnet with AAA Service ................................................................... 16-6
Firewall Feature Set Overview ..................................................................................................................... 16-9
Reasons for Installing a Firewall ............................................................................................................ 16-9
Types of Firewalls ................................................................................................................................ 16-10
ACL and Packet Filter Firewalls ..................................................................................................... 16-10
ALG and Proxy Firewalls ................................................................................................................ 16-11
Pre-configuring the Firewall ........................................................................................................................ 16-23
Steps to Configure the Firewall .................................................................................................................. 16-23
XSR with Firewall ................................................................................................................................. 16-24
XSR with Firewall, PPPoE and DHCP ................................................................................................. 16-26
XSR with Firewall and VPN .................................................................................................................. 16-27
Firewall Configuration for VRRP .......................................................................................................... 16-33
Firewall Configuration for RADIUS Authentication and Accounting ..................................................... 16-33
Appendix A: Alarms/Events, System Limits, and Standard ASCII Table
Recommended System Limits ........................................................................................................................ A-1
System Alarms and Events ............................................................................................................................ A-3
Firewall and NAT Alarms and Reports .........................................................................................................A-14
Standard ASCII Character Table ..................................................................................................................A-19
Appendix B: XSR SNMP Proprietary and Associated Standard MIBs
Service Level Reporting MIB Tables ..............................................................................................................B-1
This guide provides a general overview of the XSR hardware and software features. It describes
how to configure and maintain the router. Refer to the XSR CLI Reference Guide and the XSR Getting Started Guide for information not contained in this document.
This guide is written for administrators who want to configure the XSR or experienced users who
are knowledgeable of basic networking principles.
Contents of the Guide
Information in this guide is arranged as follows:
•Chapter 1,Overview, introduces key features of the XSR.
•Chapter 2,Managing the XSR, describes the three methods of managing the router along with
the control commands and tools available to accomplish that task including Remote Auto
Install (RAI) and memory management.
•Chapter 3, Managing LAN/WAN Interfaces, describes system FastEthernet/GigabitEthernet and
High Speed Serial features, how to configure them, and MIB-II statistics collected for LAN
interfaces.
•Chapter 4, Configuring T1/E1 & T3/E3 Interfaces, outlines XSR controller features, including the
Drop and Insert NIM, and how to configure and troubleshoot them.
Preface
•Chapter 5, Configuring IP, outlines a host of XSR IP protocol suite features, including Secondary
IP, VRRP, Proxy DNS, VLAN and Policy Based routing, Route Preference, multiple static
routes, CIDR, and their associated configuration.
•Chapter 6, Configuring the Border Gateway Protocol, describes XSR-supported BGP-4 features
including MIB tables defined in RFC-1657, BGP SNMP traps, protection of sessions,
capabilities advertisement, route reflection, communities, route refresh, route flap
dampening, AS confederations, and debug capability.
Mode (PIM-SM) and Internet Group Management Protocol (IGMP) configuration with these
features and how to configure them: IGMP versions 1, 2 and 3 (on LAN interface only), PIMSM version 2, Static IGMP group membership, Dynamic and Static RP, Register and Assert
Mechanism, Rendezvous Point Tree (RPT) Build-up, Shortest Path Tree (SPT) Build-up, RPT
to SPT Switch, Join/Prune Mechanism, and Source Specific Multicast (SSM) Support.
•Chapter 8, Configuring PPP, details XSR support for the PPP and Multi-link PPP protocols,
Multi-Class MLPPP, peer entity authentication, Bandwidth on Command (BAP), and how to
configure these features.
•Chapter 9, Configuring Frame Relay, details how to set up Frame Relay networks on the XSR,
including using rate enforcement (CIR) and congestion control (FECN and BECN), Discard
Eligibility, Frame Relay Inverse ARP, LMI support, and FRF.12 fragmentation.
•Chapter 10, Configuring Dial Services and Back Up, details background information about Dial
Services and Dial Backup across a PSTN, Ethernet failover, Dial on Demand (DoD) and
Bandwidth on Demand (BoD), Multi-link PPP, dialer interface spoofing, Dialer Watch, ISDN
callback, and the commands to configure these features.
XSR User’s Guide xxvii
Conventions Used in This Guide
•Chapter 11, Configuring ISDN, outlines how to set up the Integrated Services Digital Network
protocol on the XSR for BRI, PRI and leased line applications. ISDN protocol tracing and
partial decoding of Q921 and Q931 frames is also described.
•Chapter 12, Configuring Quality of Service, describes XSR support for QoS, including Random
Early Detection (RED), Weighted Random Early Detection (WRED), tail-drop, DSCP, IP
precedence, traffic policing and shaping, priority and CBWFQ queuing, and class-based traffic
shaping.
•Chapter 13, Configuring ADSL, details ADSL line operation over POTS and ISDN circuits,
ADSL data framing format ATM Frame UNI, OAM cell behavior, PDU encapsulation choices:
PPP over ATM (PPPoA), PPP over Ethernet (PPPoE), and Routed IP over ATM (IPoA).
•Chapter 14, Configuring the Virtual Private Network, outlines XSR support for Site-to-Site, Site-
to-Central-Site, and Remote Access VPN applications. Other supported functionality includes
RADIUS authentication, PKI authentication, NAT traversal, IP address management,
dynamic routing over VPN (remote access only), digital signature and certificate support,
GRE over IPSec, and AAA.
•Chapter 15,Configuring DHCP, details the router’s support for the Dynamic Host
Configuration Protocol including dynamic and manual IP address allocation, persistent
storage of client values, temporary or permanent network address allocation, and nested
scopes.
•Chapter 16, Configuring Security on the XSR, describes methods to protect the router against
hacker attacks and install strong security including ACLs, AAA service, firewall, and how to
configure these features.
•Appendix A, Alarms/Events and System Limits, lists the high, medium and low severity alarms
and events captured by the XSR as well as system limits for various XSR functions as a
function of installed memory.
•Appendix B, SNMP Proprietary and Associated Standard MIBs, lists and describes XSR-supported
SNMP tables and objects for the following standard (partial listing) and proprietary MIBS.
Conventions Used in This Guide
The following conventions are used in this guide
Note: Calls the reader’s attention to any item of information that may be of special importance.
Nota: Llama la atencion del lector a cierta información que puede ser de especial importancia.
Caution: Contains information essential to avoid damage to the equipment.
Precaución: Contiene información esencial para prevenir dañar el equipo.
Achtung: Verweißt auf wichtige Informationen zum Schutz gegen Beschädigungen.
Electrical Hazard: Warns against an action that could result in personal injury or death due to an
electrical hazard.
Riesgo Electrico: Advierte contra una acción que pudiera resultar en lesión corporal o la muerte
debido a un riesgo eléctrico.
Elektrischer Gefahrenhinweis: Installationen sollten nur durch ausgebildetes und qualifiziertes.
Personal vorgenommen werden.
xxviii Preface
Loading...
+ 436 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.