Nways Multiprotocol Routing Services
Software User’s Guide
Version 3.2
IBM
SC30-3681-08
Nways Multiprotocol Routing Services
Software User’s Guide
Version 3.2
IBM
SC30-3681-08
Note
Before using this document, read the general information under “Notices” on page xxiii.
Ninth Edition (November 1998)
This edition applies to Version 3.2 of the IBM Nways Multiprotocol Routing Services and to all subsequent releases
and modifications until otherwise indicated in new editions or technical newsletters.
Order publications through your IBM representative or the IBM branch office serving your locality. Publications are
not stocked at the address below.
IBM welcomes your comments. A form for readers’ comments is provided at the back of this publication. If the form
has been removed, you may address your comments to:
Department CGF
Design & Information Development
IBM Corporation
P.O. Box 12195
RESEARCH TRIANGLE PARK NC 27709
USA
When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any
way it believes appropriate without incurring any obligation to you.
© Copyright International Business Machines Corporation 1994, 1998. All rights reserved.
Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is
subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
Contents
Figures ...........................xix
Tables ...........................xxi
Notices ...........................xxiii
Notice to Users of Online Versions of This Book ...........xxv
Trademarks .........................xxvii
Preface ...........................xxix
Who Should Read This Manual ..................xxix
About the Software .......................xxix
Conventions Used in This Manual .................xxx
IBM 2210 Nways Multiprotocol Router Publications ...........xxx
Summary of Changes for the IBM 2210 Software Library .........xxxii
Editorial Changes ......................xxxiv
Part 1. Understanding and Using the Software ................ 1
Chapter 1. Getting Started.................... 3
Before You Begin ....................... 3
Migrating to the Current Release ................. 3
Accessing the Software Using Local and Remote Consoles ........ 3
Local Consoles ....................... 4
Remote Consoles ...................... 5
Logging In Remotely or Locally ................. 5
Reloading or Restarting the Router ................ 6
Exiting the Router ...................... 6
Discussing the User Interface System ................ 7
Understanding the First-Level User Interface ............ 7
Chapter 2. Using the Software .................. 9
Entering Commands ...................... 9
Connecting to a Process ..................... 9
Identifying Prompts ......................10
Getting Help ........................10
Exiting a Lower Level Environment ................11
Getting Back to OPCON ....................11
Some Configuration Suggestions ..................11
Creating a First Configuration ..................11
Basing a Configuration on an Existing Configuration..........12
Accessing the Second-Level Processes ...............13
Accessing the Configuration Process, CONFIG (Talk 6) ........14
Accessing the Operating/Monitoring Process, GWCON (Talk 5)......15
Accessing the Third-Level Processes ................15
Accessing Network Interface Configuration and Operating Processes . . . 15
Accessing Feature Configuration and Operating Processes .......19
Accessing Protocol Configuration and Operating Processes .......19
Command History for GWCON and CONFIG Command Line .......21
Repeating a Command in the Command History ...........21
Repeating a Series of Commands in the Command History .......22
© Copyright IBM Corp. 1994, 1998 iii
Chapter 3. The OPCON Process .................25
Chapter 4. Using OPCON ....................27
Accessing the OPCON Process ..................27
OPCON Commands ......................27
Breakpoint .........................28
Divert ...........................28
Flush ...........................29
Halt............................29
Intercept ..........................30
Logout ..........................30
Memory ..........................30
Pause (EasyStart only) ....................31
Reload ..........................32
Restart ..........................32
Status...........................32
Stop (EasyStart only) .....................33
Talk............................34
Telnet ...........................34
Part 2. Understanding, Configuring, and Using Base Services .........37
Chapter 5. The Configuration Process (CONFIG - Talk 6) and Commands .39
What is CONFIG? .......................39
Using EasyStart ........................40
Config-Only Mode .......................41
Automatic Entry Into Config-Only Mode ..............41
Manual Entry Into Config-Only Mode ...............41
Quick Configuration .......................42
Automatic Entry Into Quick Config Mode ..............43
Manual Entry Into Quick Config Mode ...............43
Exiting from Quick Config Mode .................43
Configuring User Access .....................44
Technical Support Access ...................44
Configuring Spare Interfaces ...................44
Restrictions for Spare Interfaces .................45
Resetting Interfaces.......................47
Restrictions for Resetting Interfaces ................48
Chapter 6. Configuring and Monitoring the CONFIG Process ......51
Entering and Exiting CONFIG ...................51
CONFIG Commands ......................51
Add............................52
Boot ...........................59
Change ..........................59
Clear ...........................61
Delete...........................63
Disable ..........................64
Enable ..........................64
Environment ........................66
Event ...........................67
Feature ..........................68
List ............................68
Network ..........................72
Patch ...........................72
Performance ........................74
iv MRS V3.2 Software User’s Guide
Protocol ..........................74
Qconfig ..........................75
Set............................75
Time...........................79
Unpatch ..........................80
Update ..........................80
Chapter 7. The Boot CONFIG Process ...............83
What is Boot CONFIG? .....................83
Configuring Booting ......................83
Using a Device as a Boot Server .................84
How the BOOTP Forwarding Process Works .............84
A Device as a BOOTP Client ..................84
A Device as a BOOTP Relay Agent ................85
Enabling/Disabling BOOTP Forwarding ..............85
Configuring a BOOTP Server ..................85
Using the Trivial File Transfer Protocol (TFTP) .............86
Accessing Configuration Files From a Remote Host or Router ......87
Filename Definitions for IBD...................87
IBD Considerations When Transferring a File ............88
Validating the Configuration Load..................88
Loading an Image at a Specific Time ................89
Configuring Dumping ......................89
Dump Files .........................89
TFTP Server, Boot and Dump Directories..............89
Installing Software/Code .....................90
Chapter 8. Configuring Boot CONFIG ...............93
Entering and Exiting Boot CONFIG .................93
Boot CONFIG Commands ....................93
Add............................94
Change ..........................96
Copy ...........................98
Delete...........................99
Describe ..........................100
Disable ..........................100
Enable ..........................101
Erase ...........................101
List ............................102
Load ...........................104
Store ...........................105
Timedload .........................106
TFTP ...........................107
Chapter 9. Boot Options ....................111
Before you Begin........................111
Booting From the Integrated Boot Device Using a Console Terminal ....111
BOOTP Using a Console Terminal ................112
Booting from a TFTP host server using a console terminal .......113
Boot Options Available......................113
Accessing the Boot Options...................113
Boot Option Prompts ......................114
B (Boot) ..........................116
BC (Boot in Config-only Mode)..................116
BM (Boot using console queries) .................117
BN (Boot, But Do Not Run, Using Console Queries) ..........119
Contents v
BP (Boot using BOOTP) ....................119
D (Dump using stored configuration) ...............120
DIAG (Execute IBM Extended Diagnostic Program) ..........120
DM (Dump using Console Queries) ................121
UB (Display TFTP Boot Configuration) ...............121
UC (Display Hardware Configuration) ...............122
UG (Go execute at address in RAM) ...............122
LC (Load Configuration Memory) .................123
CC (Clear Configuration Memory) ................124
ZB (ZModem Boot) ......................124
ZC (ZModem configuration memory load)..............124
Configuring the 2210 ......................125
Chapter 10. The Operating/Monitoring Process (GWCON - Talk 5) and
Commands.........................127
What is GWCON? .......................127
Entering and Exiting GWCON ...................127
GWCON Commands ......................127
Activate ..........................128
Boot ...........................128
Buffer...........................129
Clear ...........................130
Configuration ........................130
Disable ..........................133
Environment ........................133
Error ...........................134
Event ...........................135
Fault ...........................135
Feature ..........................135
Interface ..........................136
Log............................136
Memory ..........................137
Network ..........................138
Performance ........................139
Protocol ..........................139
Queue...........................140
Reset ...........................141
Statistics ..........................141
Test ...........................142
Uptime ..........................142
Chapter 11. The Messaging (MONITR - Talk 2) Process ........145
What is Messaging (MONITR)? ..................145
Commands Affecting Messaging ..................145
Entering and Exiting the Messaging (MONITR) Process .........145
Receiving Messages ......................145
Chapter 12. Using the Event Logging System (ELS) ..........147
What is ELS? .........................147
Entering and Exiting the ELS Configuration Environment .........148
Event Logging Concepts .....................148
Causes of Events ......................148
Interpreting a Message ....................149
Using ELS ..........................151
Managing ELS Message Rotation ................152
Capturing ELS Output Using a Telnet Connection on a UNIX Host ....152
vi MRS V3.2 Software User’s Guide
Configuring ELS So Event Messages Are Sent In SNMP Traps......153
Using ELS to Troubleshoot a Problem ................153
ELS Example 1 .......................153
ELS Example 2 .......................154
ELS Example 3 .......................154
Using and Configuring ELS Remote Logging .............155
Syslog Facility and Level ....................155
Remote Workstation Configuration ................155
Configuring the 2210 for Remote Logging..............157
Remote Logging Output ....................159
Additional Considerations....................162
Using ELS Message Buffering ...................163
Chapter 13. Configuring and Monitoring the Event Logging System (ELS) . 167
Accessing the ELS Configuration Environment .............167
ELS Configuration Commands ...................167
Add............................168
Advanced .........................168
Clear ...........................168
Default ..........................169
Delete...........................169
Display ..........................169
Filter ...........................170
List ............................170
Nodisplay .........................172
Noremote .........................172
Notrace ..........................174
Notrap...........................174
Remote ..........................175
Set............................177
Trace ...........................180
Trap...........................181
ELS Net Filter Configuration Commands ..............181
ELS Message Buffering Configuration Commands ..........184
Entering and Exiting the ELS Operating Environment ..........187
ELS Monitoring Commands ....................188
Advanced .........................188
Clear ...........................188
Display ..........................189
Files ...........................189
Filter ...........................190
List ............................190
Nodisplay .........................192
Noremote .........................193
Notrace ..........................194
Notrap...........................194
Packet Trace ........................195
Remote ..........................195
Remove ..........................197
Restore ..........................197
Retrieve ..........................197
Save ...........................198
Set............................198
Statistics ..........................201
Trace ...........................203
Trap...........................204
Contents vii
View...........................204
Packet-trace Monitoring Commands................205
ELS Net Filter Monitoring Commands ...............207
ELS Message Buffering Monitoring Commands ...........210
Chapter 14. Configuring and Monitoring Performance .........215
Performance Overview......................215
Performance Reporting Accuracy ..................215
Accessing the Performance Configuration Environment..........215
Performance Configuration Commands ...............216
Disable ..........................216
Enable ..........................216
List ............................216
Set............................217
Accessing the Performance Monitoring Environment...........217
Performance Monitoring Commands.................217
Disable ..........................218
Enable ..........................218
List ............................218
Report...........................218
Set............................218
Part 3. Understanding, Configuring and Operating Interfaces..........221
Chapter 15. Getting Started with Network Interfaces .........223
Before You Continue ......................223
Network Interfaces and the GWCON Interface Command .........223
Accessing Network Interface Configuration and Console Processes .....223
Accessing Link Layer Protocol Configuration and Console Processes ....224
Defining Spare Interfaces.....................224
Chapter 16. Configuring IEEE 802.5 Token-Ring Network Interfaces ...225
Accessing the Token-Ring Interface Configuration Process ........225
Token-Ring Configuration Commands ................225
List ............................225
LLC ...........................226
Packet-Size.........................226
Set............................227
Source-routing........................227
Speed...........................228
Accessing the Interface Monitoring Process ..............228
Token-Ring Interface Monitoring Commands..............229
Dump ...........................229
LLC ...........................230
Token-Ring Interfaces and the GWCON Interface Command........230
Statistics Displayed for 802.5 Token-Ring Interfaces ..........230
Chapter 17. Configuring and Monitoring LLC Interfaces ........235
Accessing the Interface Configuration Process .............235
LLC Configuration Commands ...................235
List ............................236
Set............................237
Accessing the Interface Monitoring Process ..............238
LLC Monitoring Commands ....................239
Clear-Counters .......................239
List ............................239
viii MRS V3.2 Software User’s Guide
Set............................244
Chapter 18. Using the Ethernet Network Interface ..........247
Displaying Ethernet Statistics through the Interface Command .......247
Chapter 19. Configuring and Monitoring the Ethernet Network Interface . . 251
Accessing the Ethernet Interface Configuration Process .........251
Ethernet Configuration Commands .................251
Connector-Type .......................252
IP-Encapsulation .......................252
List ............................252
Physical-Address.......................252
Accessing the Ethernet Interface Operating Process...........253
Ethernet Interface Monitoring Commands...............253
Collisions .........................253
Chapter 20. Overview of LAN Emulation ..............255
LAN Emulation Benefits .....................255
LAN Emulation Components ...................256
Addressing in ATM .......................257
ESI............................258
ATM Addresses of LAN Emulation Components ............258
Overview of Related ILMI Functions.................259
Manual Configuration of the Signaling Version ............259
Locating the LECS Using ILMI..................259
Overview of the LECS Function ..................260
Sample Situations for Use of the LECS Assignment Policies.......262
More Information About TLVs ..................263
Connecting to the LES......................264
Address Registration ......................265
Address Resolution .......................265
Connecting to the BUS .....................265
BUS Functions ........................266
Establishing Data Direct VCCs...................267
Overview of Extensions for LAN Emulation ..............267
Broadcast Manager .......................267
BCM Support for IP......................268
BCM Support for IPX .....................268
BCM Support for NetBIOS ...................269
BCM Support for Source Route Bridging ..............269
LAN Emulation Reliability.....................270
LAN Emulation Security .....................271
Key Configuration Parameters for LAN Emulation............272
Chapter 21. Using ATM .....................273
ATM and LAN Emulation .....................273
How to Enter Addresses .....................273
ATM-LLC Multiplexing ......................274
ATM Virtual Interface Concepts ..................274
Advantages of Using ATM Virtual Interfaces .............274
Disadvantages of using ATM Virtual Interfaces ............275
Chapter 22. Configuring and Monitoring ATM ............277
Accessing the ATM Interface Configuration Process ...........277
ATM Configuration Commands...................278
ATM Interface Configuration Commands ...............278
Contents ix
Add............................279
List ............................279
QoS Configuration ......................280
Remove ..........................280
Set............................280
Enable ..........................284
Disable ..........................284
Accessing the Virtual ATM Interface Configuration Process ........285
ATM Virtual Interface Configuration Commands ............285
Add............................285
List ............................285
Remove ..........................286
Accessing the ATM Monitoring Process ...............286
ATM Monitoring Commands....................286
Interface ..........................287
ATM-LLC..........................287
ATM Interface Monitoring Commands (ATM INTERFACE+ Prompt) .....287
List ............................287
Trace ...........................288
Wrap...........................289
ATM-LLC Monitoring Commands ..................290
List ............................290
ATM Virtual Interface Monitoring Commands .............290
Chapter 23. Using LAN Emulation Clients ..............291
LAN Emulation Client Overview ..................291
Chapter 24. Configuring and Monitoring LAN Emulation Clients .....293
Configuring LAN Emulation Clients .................293
Add............................293
Config...........................294
List ............................294
Remove ..........................294
Configuring an ATM Forum-Compliant LE Client ............295
ARP Configuration ......................295
RIF-Timer (for Token-Ring Forum-compliant LEC only) .........297
Source-Routing (for Token-Ring Forum-Compliant LEC only).......297
IP-Encapsulation (for Ethernet ATM Forum-Compliant LEC only) .....298
List ............................298
QoS...........................298
Set............................298
Accessing the LEC Monitoring Environment ..............308
LEC Monitoring Commands ....................309
List ............................309
MIB............................313
QoS Information .......................316
Chapter 25. Configuring Serial Line Interfaces ............317
Accessing the Interface Configuration Process .............317
Clocking and Cable Type....................317
Network Interfaces and the GWCON Interface Command .........318
Chapter 26. Using the X.25 Network Interface ............319
Basic Configuration Procedures ..................319
Setting the National Personality .................320
Understanding the X.25 Defaults .................320
x MRS V3.2 Software User’s Guide
X.25 Support Over ISDN BRI D-Channel (X.31) ............322
Null Encapsulation .......................322
Limitations .........................322
Configuration Changes ....................322
Configuring Null Encapsulation and Closed User Groups (CUG) .....322
Understanding Closed User Groups .................324
Bilateral Closed User Groups ..................324
Types of Extended Closed User Groups ..............324
Establishing X.25 Circuits with Closed User Groups on a Device .....324
Configuring X.25 Closed User Groups ...............325
Chapter 27. Configuring and Monitoring the X.25 Network Interface ...327
X.25 Configuration Commands...................327
Set............................328
Enable ..........................332
Disable ..........................332
National Enable .......................333
National Disable .......................335
National Set ........................336
National Restore .......................340
Add............................341
Change ..........................348
Delete...........................349
List ............................350
Accessing the Interface Monitoring Process ..............353
X.25 Monitoring Commands....................353
List ............................354
Parameters .........................354
Statistics ..........................355
X.25 Network Interfaces and the GWCON Interface Command .......356
Statistics Displayed for X.25 Interfaces...............356
Chapter 28. Using XTP .....................361
The X.25 Transport Protocol ...................361
Configuration Information....................362
DTE Address Wildcards .....................363
XTP Backup Peer Function ....................364
Searching for a Remote DTE ..................364
Connection Request Timer ...................365
Local XTP ..........................365
XTP and Closed User Groups ...................365
Configuring XTP ........................366
Configuration Procedures.....................366
Setting the Data Link .....................367
Configuring the IP Interface ...................367
Configuring X.25 .......................367
Setting the National Personality .................369
Defining the IP Address ....................369
Setting the Internal IP Address..................369
Configuring XTP .......................369
Sample Configuration of Remote Routers..............371
Chapter 29. Configuring and Monitoring XTP ............375
XTP Configuring Commands ...................375
Add............................375
Change ..........................378
Contents xi
Delete...........................378
Enable ..........................380
Disable ..........................380
Set............................380
List ............................380
XTP Monitoring Commands ....................382
Add............................382
Delete...........................383
List ............................383
Chapter 30. Using Frame Relay Interfaces .............387
Frame Relay Overview .....................387
Frame Relay Network .....................388
Frame Relay Switched Virtual Circuits ...............389
Frame Relay Interface Initialization ................389
Orphan Circuits .......................390
Configuring PVC States to Affect the Frame Relay Interface State.....391
Frame Relay Frame......................392
Frame Forwarding over the Frame Relay Network ..........394
Protocol Addresses ......................394
Multicast Emulation and Protocol Broadcast .............394
Frame Relay Network Management .................395
Management Status Reporting..................395
Full Status Report ......................395
Link Integrity Verification Report .................396
Consolidated Link Layer Management (CLLM) ............396
Frame Relay Data Rates .....................396
Committed Information Rate (CIR) ................396
Orphan Permanent Virtual Circuit CIR ...............397
Committed Burst (Bc) Size ...................397
Excess Burst (Be) Size ....................397
Line Speed .........................398
Minimum Information Rate ...................398
Maximum Information Rate ...................398
Variable Information Rate....................399
Circuit Congestion .......................399
CIR Monitoring .......................399
Congestion Monitoring .....................400
Congestion Notification and Avoidance...............400
Bandwidth Reservation over Frame Relay ..............402
Displaying the Frame Relay Configuration Prompt ...........402
Frame Relay Basic Configuration Procedure..............402
Enabling Frame Relay PVC Management...............403
Enabling Frame Relay SVC Management...............404
Chapter 31. Configuring and Monitoring Frame Relay Interfaces .....405
Frame Relay Configuration Commands ...............405
Add............................406
Change ..........................412
Disable ..........................413
Enable ..........................415
List ............................419
LLC ...........................425
Remove ..........................426
Set............................427
Accessing the Frame Relay Monitoring Prompt.............432
xii MRS V3.2 Software User’s Guide
Frame Relay Monitoring Commands.................432
Clear ...........................433
Disable ..........................433
Enable ..........................433
List ............................434
LLC ...........................442
Notrace ..........................442
Set............................443
Trace ...........................444
Frame Relay Interfaces and the GWCON Interface Command .......445
Statistics Displayed For Frame Relay Interfaces ...........445
Chapter 32. Using Point-to-Point Protocol Interfaces .........449
PPP Overview.........................449
PPP Data Link Layer Frame Structure ...............450
The PPP Link Control Protocol (LCP) ................451
LCP Packets ........................453
Link Establishment Packets ...................454
Link Termination Packets ....................455
Link Maintenance Packets ...................455
PPP Authentication Protocols ...................455
Password Authentication Protocol (PAP) ..............456
Challenge-Handshake Authentication Protocol (CHAP) .........457
Microsoft PPP CHAP Authentication (MS-CHAP) ...........457
Shiva Password Authentication Protocol (SPAP) ...........457
Configuring PPP Authentication .................458
Configuring PPP Callback ...................459
Using AAA with PPP ......................460
The PPP Network Control Protocols.................460
AppleTalk Control Protocol ...................461
Banyan VINES Control Protocol .................461
Bridging Protocols ......................461
Callback Control Protocol....................461
DECnet IV Control Protocol ...................461
IP Control Protocol ......................462
IPv6 Control Protocol .....................462
IPX Control Protocol .....................463
OSI Control Protocol .....................463
APPN HPR Control Protocol ..................463
APPN ISR Control Protocol ...................463
Using and Configuring Virtual Connections ..............463
VC Considerations ......................463
Configuring a VC.......................464
Chapter 33. Configuring and Monitoring Point-to-Point Protocol Interfaces 465
Accessing the Interface Configuration Process .............465
Accessing the PPP Interface Configuration Prompt ..........466
Point-to-Point Configuration Commands ...............466
Disable ..........................466
Enable ..........................467
List ............................470
LLC ...........................474
Set............................474
Accessing the Interface Monitoring Process ..............483
Point-to-Point Monitoring Commands ................483
Clear ...........................483
Contents xiii
List ............................484
LLC ...........................506
Point-to-Point Protocol Interfaces and the GWCON Interface Command . . . 506
Chapter 34. Using the Multilink PPP Protocol ............509
MP Considerations .......................510
Multi-Chassis MP .......................511
Configuring a Multilink PPP Interface ................511
Configuring MP on PPP Dial Circuits ...............511
Configuring MP on PPP Serial Links ...............512
Configuring MP on Layer-2-Tunneling Nets .............512
Configuring Multi-Chassis MP ..................513
Chapter 35. Configuring and Monitoring Multilink PPP Protocol (MP) ...515
Accessing the MP Configuration Prompt ...............515
MP Configuration Commands for Multilink PPP Interfaces.........515
Disable ..........................515
Enable ..........................516
Encapsulator ........................516
List ............................516
Set............................517
Monitoring MP Interface Status ..................519
Accessing the MP Monitoring Commands...............519
Multilink PPP Protocol Monitoring Commands .............519
List ............................519
Chapter 36. Configuring SDLC Relay ...............525
Basic Configuration Procedure...................525
Accessing the SDLC Relay Configuration Environment ..........525
SDLC Relay Configuration Commands................526
Add............................526
Delete...........................527
Disable ..........................527
Enable ..........................528
List (for network SRLY) ....................528
List (for protocol SDLC) ....................529
Set............................530
Accessing the SDLC Relay Monitoring Environment ...........532
SDLC Relay Monitoring Commands .................532
Clear-Port-Statistics......................533
Disable ..........................533
Enable ..........................533
List ............................534
SDLC Relay Interfaces and the GWCON Interface Command .......535
Chapter 37. Using SDLC Interfaces ................537
Basic Configuration Procedure...................537
Configuring Switched SDLC Call-In Interfaces .............537
SDLC Configuration Requirements .................538
Chapter 38. Configuring and Monitoring SDLC Interfaces .......539
Accessing the SDLC Configuration Environment ............539
SDLC Configuration Commands ..................540
Add............................540
Delete...........................541
Disable ..........................541
xiv MRS V3.2 Software User’s Guide
Enable ..........................541
List ............................542
Set............................544
Accessing the SDLC Monitoring Environment .............549
SDLC Monitoring Commands ...................550
Add............................550
Clear ...........................550
Delete...........................551
Disable ..........................551
Enable ..........................551
List ............................551
Set............................554
Test ...........................557
SDLC Interfaces and the GWCON Interface Command..........557
Statistics Displayed for SDLC Interfaces ..............557
Chapter 39. Using Binary Synchronous Relay (BRLY) .........561
BRLY Overview ........................561
Sample BRLY Configuration...................562
BRLY Considerations ......................564
Chapter 40. Configuring and Monitoring BSC Relay ..........567
Basic Configuration Procedure...................567
BSC Relay Configuration Commands ................567
Add............................568
Delete...........................570
Disable ..........................570
Enable ..........................571
List (for network BSC) .....................571
List (for protocol BRLY) ....................572
Set............................573
Accessing the BSC Relay Monitoring Environment ...........574
BSC Relay Monitoring Commands .................575
Clear ...........................575
Disable ..........................576
Enable ..........................576
List ............................577
BSC Relay Interfaces and the GWCON Interface Command........578
Chapter 41. Using the V.25bis Network Interface ...........579
Before You Begin .......................579
Configuration Procedures.....................579
Adding V.25bis Addresses ...................579
Configuring the V.25bis Interface .................580
Adding Dial Circuits ......................581
Configuring Dial Circuits ....................581
Chapter 42. Configuring and Monitoring the V.25bis Network Interface . . 583
Accessing the Interface Configuration Process .............583
V.25bis Configuration Commands..................583
List ............................584
Set............................585
Accessing the Interface Monitoring Process ..............587
V.25bis Monitoring Commands...................587
Calls ...........................588
Circuits ..........................589
Contents xv
Parameters .........................589
Statistics ..........................590
V.25bis and the GWCON Commands ................592
Statistics for V.25bis Interfaces and Dial Circuits ...........592
Chapter 43. Using the V.34 Network Interface ............595
Before You Begin .......................595
Configuration Procedures.....................595
Adding V.34 Addresses ....................595
Configuring the V.34 Interface ..................596
Adding Dial Circuits ......................597
Configuring Dial Circuits ....................597
Chapter 44. Configuring and Monitoring the V.34 Network Interface ...599
Accessing the Interface Configuration Process .............599
V.34 Configuration Commands...................599
List ............................600
Set............................601
Accessing the Interface Monitoring Process ..............602
V.34 Monitoring Commands ....................603
Calls ...........................603
Circuits ..........................604
Parameters .........................605
Statistics ..........................606
V.34 and the GWCON Commands .................607
Statistics for V.34 Interfaces and Dial Circuits ............607
Chapter 45. Using the ISDN Interface ...............611
ISDN Overview ........................611
ISDN Adapters and Interfaces ..................611
Dial Circuits.........................612
Addressing .........................613
Oversubscribing and Circuit Contention ..............613
Cost Control Over Demand Circuits ................614
Caller ID and LIDS ......................614
ISDN Cause Codes .......................614
Sample ISDN Configurations ...................616
Frame Relay over ISDN Configuration ...............616
WAN Restoral Configuration ..................617
Channelized T1/E1 .......................617
Requirements and Restrictions for ISDN Interfaces ...........618
Router...........................618
Switches/Services Supported ..................618
ISDN Interface Restrictions ...................619
Dial Circuit Configuration Requirements ..............619
Before You Begin .......................619
Configuration Procedures.....................619
Adding ISDN Addresses ....................619
Configuring ISDN Parameters ..................620
Configuring the ISDN Interface..................622
Adding Dial Circuits ......................622
Configuring Dial Circuits ....................623
ISDN I.430 and I.431 Switch Variants ................625
Native I.430 Support .....................625
Native I.431 Support .....................625
X.31 Support .........................626
xvi MRS V3.2 Software User’s Guide
Chapter 46. Configuring and Monitoring the ISDN Interface.......627
ISDN Configuration Commands ..................627
Block-Calls .........................627
Disable ..........................628
Enable ..........................628
List ............................628
Remove ..........................629
Set............................629
Cause Code ........................634
Accessing the Interface Monitoring Process ..............635
ISDN Monitoring Commands ...................635
Block-Calls .........................635
Calls ...........................636
Channels..........................636
Circuits ..........................637
Dial-dump .........................638
L2_Counters ........................638
L3_Counters ........................638
TEI............................638
Parameters .........................638
Statistics ..........................639
ISDN and the GWCON Commands .................641
Interface — Statistics for ISDN Interfaces and Dial Circuits .......641
Configuration - Information on Router Hardware and Software ......642
Chapter 47. Configuring and Monitoring Dial Circuits .........643
Dial Circuit Configuration Commands ................643
Delete...........................644
Encapsulator ........................644
List ............................645
Set............................646
Dial Circuit Monitoring Commands .................650
Callback ..........................650
Appendix A. Quick Configuration Reference .............651
Quick Configuration Tips .....................651
Making Selections ......................651
Integrated Modems ......................651
Exiting and Restarting .....................651
When You’re Done ......................651
Starting the Quick Configuration Program...............651
Configuring LAN Emulation ....................652
Configuring Interfaces ......................653
Ethernet ..........................653
Token-Ring .........................654
Configuring Multilink PPP (MP) Interfaces...............655
Configuring Dial-Circuits .....................657
Configuring Dial-in Access to LANs (DIALs) Interfaces and DIALs Server
Information .........................658
Configuring Bridging ......................662
Configuring Protocols ......................663
Configuring IP ........................664
Configuring IPX .......................665
Configuring DECnet (DNA) ...................668
Configuring Booting .......................670
TFTP Boot .........................671
Contents xvii
BOOTP Boot ........................671
IBD Boot ..........................672
Enabling Console Modem-Control .................672
Restarting the Router ......................672
Appendix B. X.25 National Personalities ..............675
GTE-Telenet .........................675
DDN............................675
Appendix C. Making a Router Load File from Multiple Disks ......677
Assembling a Load File Under DOS.................677
Assembling a Load File Under UNIX ................677
Disassembling a Load File Under DOS ...............678
Disassembling a Load File Under UNIX ...............679
List of Abbreviations ......................681
Glossary ..........................691
Index ............................715
Readers’ Comments — We’d Like to Hear from You..........733
xviii MRS V3.2 Software User’s Guide
Figures
1. Multiprotocol Routing Services ................. 7
2. Relationship of Processes and Commands ............ 8
3. Memory Utilization .....................31
4. Message Generated by an Event ................149
5. Syslog Message Description..................155
6. syslog.conf Configuration File .................157
7. Configuring the 2210 for Remote Logging .............158
8. Configuring Subsystems and Events for Remote Logging .......159
9. Sample Contents from Syslog News Info File ...........160
10. Output from Talk 2 .....................161
11. Sample Contents from
12. Example of Setting Up a Static ARP Entry.............162
13. Example of Recurring Sequence Numbers in Syslog Output ......163
14. Physical and Logical Views of a Simple LAN Emulation Network ....256
15. Default Connections Between LE Clients and the LES ........264
16. Default Connection Between LE Clients (LECs) and BUS .......266
17. LAN Emulation Redundancy..................270
18. Closed User Group Null Encapsulation ..............323
19. Configuration Before and After XTP ...............362
20. Sample XTP Configuration ..................366
21. DLCIs in Frame Relay Network.................388
22. DLCIs in Frame Relay Network.................390
23. Orphan Circuit .......................391
24. Frame-Relay Frame Format ..................392
25. Congestion Notification and Throttle Down ............401
26. Examples of Point-to-Point Links ................450
27. PPP Frame Structure ....................451
28. LCP Frame Structure (in PPP Information Field) ..........453
29. Multichassis MP ......................513
30. Physical BSC Relay Configurations ...............561
31. Virtual BSC Relay Multipoint Configuration ............562
32. Combination Virtual and Physical BRLY Multipoint Configuration ....562
33. BRLY Configuration for Router A (Commands entered at Router A) . . . 563
34. BRLY Configuration for Router B (Commands entered at Router B) . . . 564
35. BRLY Configuration for Router C (Commands entered at Router C) . . . 564
36. Frame Relay over ISDN Configuration ..............616
37. Using ISDN for WAN Restoral .................617
38. X.31 Support .......................626
Syslog_user_alert
File ...........161
© Copyright IBM Corp. 1994, 1998 xix
xx MRS V3.2 Software User’s Guide
Tables
1. Processes, Their Purpose, and Commands to Access ........10
2. Network Architecture and the Supported Interfaces .........17
3. OPCON Commands.....................27
4. CONFIG Command Summary .................51
5. Access Permission .....................58
6. Environment Command Summary................66
7. IBM 2210 Feature Numbers and Names .............68
8. Additional Functions Provided by the Set Prompt Level Command....78
9. Default and Maximum Settings for Interfaces............79
10. Conventions for File Name Extensions ..............88
11. Boot CONFIG Commands ..................93
12. Add Boot Entry Parameters ..................95
13. Description of Boot Methods..................111
14. Boot Options .......................114
15. Boot Option Prompts ....................114
16. GWCON Command Summary .................127
17. Logging Levels.......................149
18. Packet Completion Codes (Error Codes) .............150
19. ELS Configuration Command Summary .............167
20. ELS Net Filter Configuration Commands .............182
21. ELS Message Buffering Configuration Commands..........184
22. ELS Monitoring Command Summary ..............188
23. Packet Trace Monitoring Command Summary ...........205
24. ELS Net Filter Monitoring Commands ..............207
25. ELS Message Buffering Monitoring Commands ...........210
26. PERF Configuration Command Summary .............216
27. PERF Monitoring Command Summary ..............217
28. Token-Ring Configuration Command Summary ...........225
29. Token-Ring 4/16 Valid Packet Sizes ...............227
30. Token-Ring Monitoring Command Summary ............229
31. LLC Configuration Command Summary .............235
32. LLC Monitoring Command Summary...............239
33. Ethernet Configuration Command Summary ............251
34. Ethernet monitoring command Summary .............253
35. ATM Configuration Command Summary .............278
36. ATM INTERFACE Configuration Command Summary ........278
37. ATM Virtual Interface Configuration Command Summary .......285
38. ATM monitoring command Summary...............286
39. ATM INTERFACE monitoring command Summary..........287
40. ATM LLC Configuration Command Summary ...........290
41. LAN EMULATION Client Configuration Commands Summary .....293
42. LAN Emulation Client Configuration Commands Summary.......295
43. ATM LAN Emulation Client ARP Configuration Commands Summary. . . 295
44. ATM LAN Emulation Client ARP Config Commands Summary .....296
45. LE Config monitoring command Summary.............309
46. Set Command .......................320
47. National Enable Parameters ..................321
48. National Set Parameters ...................321
49. Establishing Incoming X.25 Circuits for Closed User Groups ......325
50. X.25 Configuration Commands Summary .............327
51. Example VC Definitions ...................331
52. X.25 Monitoring Command Summary ..............353
53. XTP Configuration Commands Summary .............375
© Copyright IBM Corp. 1994, 1998 xxi
54. XTP Monitoring Commands Summary ..............382
55. Protocol Address Mapping ..................394
56. Frame Relay Management Options ...............403
57. Frame Relay Configuration Commands Summary ..........405
58. Frame Relay Management Options ...............431
59. Transmit Delay Units and Range for the 2210 Serial Interface .....432
60. Frame Relay Monitoring Commands Summary ...........432
61. LCP Packet Codes .....................453
62. Point-to-Point Configuration Command Summary ..........466
63. Point-to-Point Monitoring Command Summary ...........483
64. MP Configuration Commands .................515
65. MP Monitoring Commands ..................519
66. SDLC Relay Configuration Commands Summary ..........526
67. Valid Values for Frame Size in Set Frame-Size Command .......531
68. SDLC Relay Monitoring Commands Summary ...........532
69. SDLC Configuration Commands Summary ............540
70. Valid Values for Frame Size in Link Frame-Size Command ......545
71. SDLC Monitoring Commands Summary .............550
72. BSC Relay Configuration Commands Summary ..........568
73. Valid Values for Frame Size in Set Frame-Size Command .......574
74. BSC Relay Monitoring Commands Summary............575
75. V.25bis Configuration Commands Summary ............583
76. V.25bis Monitoring Command Summary .............587
77. V.34 Configuration Commands Summary .............599
78. V.34 Monitoring Command Summary ..............603
79. ISDN Q.931 Cause Codes ..................615
80. ISDN Configuration Command Summary .............627
81. ISDN Cause Codes Command Summary .............634
82. ISDN Monitoring Command Summary ..............635
83. Dial Circuit Configuration Commands Summary...........643
84. Dial Circuit Configuration Commands Summary...........650
xxii MRS V3.2 Software User’s Guide
Notices
References in this publication to IBM products, programs, or services do not imply
that IBM intends to make these available in all countries in which IBM operates. Any
reference to an IBM product, program, or service is not intended to state or imply
that only IBM’s product, program, or service may be used. Any functionally
equivalent product, program, or service that does not infringe any of IBM’s
intellectual property rights may be used instead of the IBM product, program, or
service. Evaluation and verification of operation in conjunction with other products,
except those expressly designated by IBM, are the user’s responsibility.
|
|
|
|
IBM may have patents or pending patent applications covering subject matter in this
document. The furnishing of this document does not give you any license to these
patents. You can send license inquiries, in writing, to the IBM Director of Licensing,
IBM Corporation, North Castle Drive, Armonk, NY 10504-1785, U.S.A.
The licensed program described in this document and all licensed material available
for it are provided by IBM under terms of the IBM Customer Agreement.
This document is not intended for production use and is furnished as is without any
warranty of any kind, and all warranties are hereby disclaimed including the
|
warranties of merchantability and fitness for a particular purpose.
© Copyright IBM Corp. 1994, 1998 xxiii
xxiv MRS V3.2 Software User’s Guide
|
|
Notice to Users of Online Versions of This Book
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For online versions of this book, you are authorized to:
v Copy, modify, and print the documentation contained on the media, for use within
your enterprise, provided you reproduce the copyright notice, all warning
statements, and other required statements on each copy or partial copy.
v Transfer the original unaltered copy of the documentation when you transfer the
related IBM product (which may be either machines you own, or programs, if the
program’s license terms permit a transfer). You must, at the same time, destroy
all other copies of the documentation.
You are responsible for payment of any taxes, including personal property taxes,
resulting from this authorization.
THERE ARE NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
Some jurisdictions do not allow the exclusion of implied warranties, so the above
exclusion may not apply to you.
Your failure to comply with the terms above terminates this authorization. Upon
termination, you must destroy your machine-readable documentation.
© Copyright IBM Corp. 1994, 1998 xxv
xxvi MRS V3.2 Software User’s Guide
Trademarks
The following terms are trademarks of the IBM Corporation in the United States or
other countries or both:
Advanced Peer-to-Peer Networking IBM PS/2
AIX Micro Channel RS/6000
AIXwindows NetView System/370
APPN AS/400 Nways
VTAM BookManager
UNIX is a registered trademark in the United States and other countries licensed
exclusively through X/Open Company Limited.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks or
registered trademarks of Microsoft Corporation.
Other company, product, and service names may be trademarks or service marks
of others.
© Copyright IBM Corp. 1994, 1998 xxvii
xxviii MRS V3.2 Software User’s Guide