This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in any fashion by any
entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or licensing, without the express
written consent of Lucent Technologies. For permis sion to reproduce or distribute, please em ai l your request to
Notice
techpubs@ascend.com.
Every effort was mad e to en sur e that the information in this document was complete and ac cu ra te at the time of printing, bu t inf ormation is subject to change.
Safety, Compliance, and Warranty Information
Before handling any Luc ent A ccess N etwor ks hard ware prod uct, rea d the Access Networks Safety and Compliance Guide included in your product package.
See that guide also to determine how products comply with the electromagnetic interference (EMI) and network compatibility requirements of your country.
See the warranty card include d in your product package for the limit ed warranty that Lucent Technologies provides for its products.
Security Statement
In rare instances, unauthoriz ed individuals make connecti ons t o the te lecommunications network through the use of access features.
Trademarks
4ESS, 5ESS, A Network of Expertise, AnyMedia, AqueView, AUDIX, B-STDX 8000, B-STDX 9000, ...Beyond Compare, CaseView, Cajun, CajunDocs,
CAJUNVIEW, Callmaster, CallVisor, CBX500, CellPipe, ChoiceNet, ClearReach, ComOS, cvMAX, DACScan, Dacsmate, Datakit, DEFINITY,
Definity One, DSLMAX, DSLTerminator, DSLPipe, DSLTNT, Elemedia, Elemedia Enhanced, EMMI, End to End Solutions, EPAC, ESS, EVEREST,
Gigabit-scaled campus netwo r king, Globalv iew, GRF, GX250, GX 550, HyperPATH, Inferno, InfernoSpaces, Intr agy, I ntragyAccess, IntragyCentral, Intu ity,
IP Navigator, IPWorX, LineReach, LinkReach, MAX, MAXENT, MAX TNT, Multiband, Multiband PLUS, MultibandRPM, MultiDSL, MultiVoice,
MultiVPN, Navis, NavisAccess, NavisConnect, NavisCore, NavisRadius, NavisXtend, NetCare, NetLight, NetPartner, OneVision,
Open Systems Innovations, OpenTrunk, P550, PacketStar, PathStar, Pinnacle, Pipeline, PMVision, PortMaster, SecureConnect, Selectools, Series56,
SmoothConnect, Stinger, SYSTIMAX, True Access, WaveLAN, WaveMANAGER, WaveMODEM, WebXtend, and Where Network Solutions Never End
are trademarks of Lucent Technologies. Advantage Pak, Advantage Services, AnyMedia, ...Beyond Compare, End to End Solutions, Inter.NetWorking,
MAXENT, and NetWork Knowledge Sol utions are service marks of Lucent Technologies. Other trademarks, service marks, and tra de names mentioned in
this publication belong to th ei r respective owners.
Copyrights for Third-Party Software Included in Lucent Access Networks Software Products
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Ordering Information
You can order the most up-to-dat e product information and compu te r-based t r ai ni ng online at http://www.lucent.com/ins/bookstore.
Feedback
Lucent Technologies appreciates your co mm e nts, either positive or negative , abou t th is manual. Please send them to techpubs@ascend.com.
Lucent Technologies
Customer Service
Customer Service provides a variety of options for obtaining information about Lucent
products and services, software upgrades, and technical assistance.
Finding information and software on the Internet
Visit the Web site at http://www.lucent.com/ins for technical information, product
information, and descriptions of available services.
Visit the FTP site at ftp://ftp.ascend.com for software upgrades, release notes, and
addenda.
Obtaining technical assistance
You can obtain technical assistance by telephone, email, fax, modem, or regular mail, as well
as over the Internet.
Gathering information you will need
If you need to contact Lucent for help with a problem, make sure that you have the following
information when you call or that you include it in your correspondence:
•Product name and model
•Software and hardware options
•Software version
•If supplied by your carrier, Service Profile Identifiers (SPIDs) associated with your line
•Your local telephone company’s switch type and operating mode, such as AT&T 5ESS
Custom or Northern Telecom National ISDN-1
•Whether you are routing or bridging with your Lucent product
•Type of computer you are using
•Description of the problem
Calling Lucent from within the United States
In the U.S., you can take advantage of Priority Technical Assistance or an Advantage service
contract, or you can call to request assistance.
Priority Technical Assistance
If you need to talk to an engineer right away, call (900) 555-2763 to reach the Priority Call
queue. The charge of $2.95 per minute does not begin to accrue until you are connected to an
engineer. Average wait times are less than 3 minutes.
Advantage Services
Advantage Services is a comprehensive selection of services. Installation services help get
your Lucent Wide Area Network (WAN) off to the right start. Ongoing maintenance and
85x11 Book Template (Preliminary)iii
support services provide hardware and software solutions to keep your network operating at
peak performance. For more information, call (800) 272-3634.
Other telephone numbers
For a menu of Lucent’s services, call (800) 272-3634. Or call (510) 769-6001 for an operator.
Calling Lucent from outside the United States
You can contact Lucent by telephone from outside the United States at one of the following
numbers:
Telephone outside the United States (510) 769-8027
Austria/Germany/Switzerland
Benelux
France
Italy
Japan
Middle East/Africa
Scandinavia
Spain/Portugal
UK
For the Asia-Pacific region, you can find additional support resources at
http://www.lucent.com/ins/international/apac/.
Obtaining assistance through correspondence
Send your technical support questions to one of the following email addresses, or correspond
by fax, BBS, or regular mail with Customer Service in Lucent’s U.S. offices in Alameda, CA:
•Email from within the U.S.—support@ascend.com
•Email from Europe, the Middle East, or Africa—EMEAsupport@ascend.com
•Email from the Asia-Pacific region—apac.support@ascend.com
•Configuring T1, E1, DS3, and other network slot cards
•Configuring the unit in a Signaling System 7 (SS7) network
•Configuring call routing
•Provisioning the switch
Note: This manual describes the f ull set of f eatures fo r APX 8000, MAX TNT, and DSLTNT
!
units running True Access™ Operating System (TAOS) software version 8.0.2 or later. Some
features might not be available with earlier versions or specialty loads of the software.
This manual hereafter refers to your product as a TAO S unit except when referring to features
specific to a particular unit.
multiservice access concentrator:
!
Warning: Before installing your TAOS u nit, be sure to read the safety instructions in the
Access Networks Safety and Compliance Guide. For information specific to your unit, see the
“Safety-Related Electrical, Physical, and Environmental Information” appendix in your unit’s
hardware installation guide.
What you should know
This guide is for the person who installs, configures, and maintains a TAOS unit. T o co nfigure
a unit, you need to understand the following:
•Wide Area Network (WAN) concepts
•Local Area Network (LAN) concepts
•Dial-in LAN connections such as Point-to-Point Protocol (PPP) and Multilink PPP (MP)
•Connection cost management and accounting
•Modems
•Frame Relay
•Asynchronous Transfer Mode (ATM)
•IP routing
APX 8000/MAX TNT/DSLTNT Physical Interface Configuration Guide xvii
Documentation conventions
•Network security
Documentation conventions
Following are all the special characters and typographical conventions used in this manual:
ConventionMeaning
Monospace text Represents text that appears on your computer’s screen, or that could
appear on your computer’s screen.
Boldface monospace text
ItalicsRepresent variable information. Do not enter the words themselves in
[ ]Square brackets indicate an optional argument you might add to a
|Separates command choices that are mutually exclusive.
>Points to the next level in the path to a parameter or menu item. The
Key1-Key2Represents a combination keystroke. To enter a combination key-
Press EnterMeans press the Enter, or Return, key or its equivalent on your com-
Note:
Represents characters that you enter exactly as shown (unless the characters are also in italics—see Italics, below). If you could enter
the characters but are not specifically instructed to, they do not appear
in boldface.
the command. Enter the information they represent. In ordinary text,
italics are used for titles of publications, for some terms that would
otherwise be in quotation marks, and to show emphasis.
command. To include such an argument, type only the information
inside the brackets. Do not type the brackets unless they appear in bold
type.
item that follows the angle bracket is one of the options that appears
when you select the item that precedes the angle bracket.
stroke, press the first key and hold it down while you press one or
more other keys. Release all the keys at the same time. (For example,
Ctrl-H means hold down the Control key and press the H key.)
puter.
Introduces important additional information.
!
Caution:
!
Warning:
Warning:
xviii APX 8000/MAX TNT/DSLTNT Physical Interface Configuration Guide
W arns that a failure to follow the recom mended procedur e could result
in loss of data or damage to equipment.
Warns that a failure to take appropriate safety precautions could resu lt
in physical injury.
Warns of danger of electric shock.
Documentation set
The APX 8000/MAX TNT/D SLTNT documentation set consists of the following manuals.
•Read me first:
–Access Networks Safety and Compliance Guide
Contains important safety instructions and country-specific compliance information
that you must read before installing a TAOS unit.
–TAOS Command-Line Interface Guide
Introduces the TAOS command-line environment and shows how to use the
command-line interface effectively. This manual describes keyboard shortcuts and
introduces commands, security levels, profile structure, and parameter types.
•Installation and basic configuration:
–APX 8000 Hardware Inst allation Gui de
Shows how to install APX 8000 hardware and includes APX 8000 technical
interfaces. It includes information about ATM direct and ATM-Frame Relay circuits.
–APX 8000/MAX TNT/DSLTNT Frame Relay Configuration Guide
Describes how to configure Frame Relay operations on a TAOS unit. This guide
explains physical layer configuration and restrictions and how to create permanent
virtual circuit (PVC) and switched virtual circuit (SVC) interfaces. It includes
information about Multilink Frame Relay (MFR) and link management, as well as
Frame Relay and Frame Relay direct circuits.
–APX 8000/MAX TNT/DSLTNT WAN, Routing, and Tunneling Configuration Guide
Shows how to configure LAN and WAN routing for analog and digital dial-in
connections on a TAOS unit. This guide includes information about IP routing, Open
Shortest Path First (OSPF) routing, Internet Group Management Protocol (IGMP)
routing, multiprotocol routers, Virtual Routers (VRouters), and tunneling protocols.
–MultiVo ice™ for MAX TNT Configuration Guide
Shows how to configure the MultiVoice applicatio n to run on a MAX TNT unit in
both Signaling System 7 (SS7) and H.323 Voice over IP (VoIP) configurations.
APX 8000/MAX TNT/DSLTNT Physical Interface Configuration Guide xix
Documentation set
•RADIUS: TAOS RADIUS Guide and Reference
Describes how to set up a TAOS unit to use the Remote Authentication Dial-In User
Service (RADIUS) server and contains a complete reference to RADIUS attributes.
•Administration and troubleshooting: APX 8000/MAX TNT/DSLTNT Administration
Guide
Describes how to administer a TAOS unit, including how to monitor the system and cards,
troubleshoot the unit, and configure the unit to use the Simple Network Management
Protocol (SNMP).
•Reference:
–APX 8000/MAX TNT/DSLTNT Reference
An alphabetic reference to all commands, profiles, and parameters supported on
TAOS units.
–T AOS Glossary
Defines terms used in documentation for TAOS units.
xx APX 8000/MAX TNT/DSLTNT Physical Interface Configuration Guide
Table 1-1 lists the sections describing the tasks you must perform for the TAOS unit basic
configuration. The table includes a brief description of each task and lists the commands and
parameters you will use.
For information about more advanced configuration of your TAOS unit, see the following
configuration guide:
To communicate with a new TAOS unit, you must assign an IP address to the shelf controller.
Once this is done, you can perform further configuration over a LAN using Telnet.
Use the following procedures to connect a new TAOS unit, if you have not already done so,
and assign an Ethernet IP address.
New APX 8000 unit
Use the following procedure to initially set up an APX 8000 unit:
1Connect a PC terminal or workstation to the serial port on the shelf controller (s ee the APX
8000 Hardware Installation Guide). If the APX 8000 is equipped with redundant shelf
controllers, connect to the serial port on the primary controller.
2Connect an Ethernet cable between the network and the Ethernet port on the shelf
controller (see the APX 8000 Hardware Installation Guide). If the APX 8000 is equipped
with redundant shelf controllers, connect to the Ethernet port on the primary controller.
3Configure an IP address and network mask in the ip-interface profile.
Performing Basic Configuration
Connecting to a new unit
–For an APX 8000 unit with one shelf controller, see “Configuring the shelf-controller
IP address on a nonredundant unit” on page 1-4.
–For an APX 8000 unit with redundant shelf controllers, see “Assigning an Et hernet IP
address” on page 2-4.
4Verify that the connection and IP address are correct by pinging any device on the
network.
5If redundant controllers are used, set the secondary and soft IP addresses (see “Assigning
an Ethernet IP address” on page 2-4 and “Defining the soft IP interface for fault toler ance”
on page 2-5 for details).
6Exit the terminal or workstation.
7T e lnet fro m a workstat ion on t he LAN. The syst em will pro mpt you for the usernam e and
password.
User: admin
Password: Ascend
8Complete the configuration.
New MAX TNT or DSLT NT unit
Use the following procedure to initially set up a MAX TNT or DSLTNT unit:
1Connect a PC terminal or workstation to the serial port on the shelf controller (see the
MAX TNT/DSLTNT Hardware Installation Guide). Ensure that the speed is set to
9600 bps.
2Connect an Ethernet cable to the network and to the Ethernet port on the shelf controller
(see the MAX TNT/DSLTNT Hardware Installation Guide).
3Configure an IP address and network mask in the ip-interface profile (see
“Configuring the shelf-controller IP address on a nonredundant unit” on page 1-4).
Configuring the shelf-controller IP address on a nonredundant unit
4Verify that the connection and the IP address are correct by pinging any device on the
network.
admin> ping 10.10.10.1
64 bytes from 10.10.10.1: icmp_seq=0 ttl=255 time=0 ms
5Exit the terminal or workstation.
6Telnet to the MAX TNT or DSLTNT using a workstation on the LAN. The system will
prompt you for a username and passwor d.
User: admin
Password: Ascend
7Complete the configuration.
Configuring the shelf-controller IP address on a
nonredundant unit
See “Assigning an Ethernet IP address” on page 2-4 for details about IP address configuration
for an APX 8000 unit with redundant shelf controllers.
All TAOS units have an Ethernet port on the shelf cont roller. This Ethernet port is designed for
out-of-band management and light traffic loads. It is not intended to be the primary Ethernet
interface for the system. If your unit will be routing heavy Ethernet traffic, use an Ethernet
card.
T o assign an IP address to the Ethernet interface of the shelf controller on a nonr edundant APX
8000 or a MAX TNT or DSLTNT, use the R ead and Li st commands to display the control ler’s
IP-Interface profile, then set the IP-Address parameter. For example:
After you assign the unit’s hostname and IP address, you might need to modify the host
information on your local Domain Name System (DNS) server to include the TAOS unit.
If the system date displayed on your screen is incorrect, set the correct date and time with the
Date command. For example, to set the date and time to October 22, 2000, 8:50 in the
morning:
admin> date 0010220850
The format for setting the date and time is ymmddhhmm. Enter the hour in military (24-hour)
time.
Setting the system name
You can assign the TAOS unit a system name of up to 24 characters. Because the system name
is used for authenticating connections, keep it relatively simple and use only standard
characters.
Here is an example of how to set the TAOS unit system name:
Performing Basic Configuration
Setting the system date
admin> read system
SYSTEM read
admin> list
name = ""
system-rmt-mgmt = no
use-trunk-groups = no
idle-logout = 0
parallel-dialing = 5
single-file-incoming = yes
admin> set name = apx01
admin> write
Setting the log level
While you are configuring the TAOS unit, you might want to increase the log level to display
messages that can help you debug configuration settings. First display the current settings, then
enter a new log level.
To display the system-wide event-logging parameters, use the Read and List commands:
admin> read log
LOG read
admin> list
save-level = info
save-number = 100
syslog-enabled = no
host = 0.0.0.0
facility = local0
To change the log level, specify an option for the Save-Level parameter:
admin> set save-level = [none|emergency|alert|critical|error|warning|notice|info|debug]admin> write
If your local network supports a Syslog server, you can configure the server’s IP address and
the Syslog facility number by setting the Host and Facility parameters in this profile.
Configuring a default gateway
If the TAOS unit does not have a route for the destination address of a packet, it forwards the
packet to the default router. Most sites use the default router (such as a GRF® router or a
UNIX host running the route daemon ) to dist ri b ute routi n g tas ks among devices. If you do not
configure a default route, the TAOS unit drops packets for which it has no route.
You configure the default route in the IP-Route profile. The name of the default IP-Route
profile is always Default, and its destination is always 0.0.0.0.
To configure the default route, first use the Read and List commands to display the default
IP-Route profile, and then set the Gateway-Address parameter. For example:
admin> read ip-route default
IP-ROUTE/default read
admin> list
name* = default
dest-address = 0.0.0.0/0
gateway-address = 0.0.0.0
metric =1
cost =1
preference = 100
third-party = no
ase-type = type-1
ase-tag = c0:00:00:00
private-route = no
active-route = no
admin> set gateway-address = 10.2.3.17
admin> set active-route=yes
admin> write
IP-ROUTE/default written
Configuring basic DNS information
The example in this section uses the domain name abc.com and sets the IP address of the
primary Domain Name System (DNS) server on the local network. Setting this basic
information enables you to access IP hosts by name instead of by IP address.
Here is an example that shows how to configure the DNS information:
After you configure the T AOS unit for IP network access, go to an IP host on the local network
and use the Ping command to verify that the unit can communicate on the network. For
example:
host-1% ping10.2.3.4
In addition, you can verify that the TAOS unit is integrated into your DNS system. For
example:
host-1% pingapx01
Recommended basic security measures
The TAOS unit is shipped from the factory with all its security features set to defaults that
enable you to configure and set up the unit without any restrictions. Before you make the
TAOS unit generally accessible, you must change the default security settings to protect the
configured unit from unauthorized access.
Before bringing the TAOS unit online, Lucent recommends performing the following
important security measures:
•“Changing the Admin password” on page 1-8
•“Securing the serial port” on page 1-8
•“Assigning a Telnet password” on page 1-8
•“Requiring acceptance of the pool address” on page 1-9
•“Ignoring ICMP redirects” on page 1-9
•“Disabling directed broadcasts” on page 1-9
•“Configuring SNMP access to the unit” on page 1-10
For additional security measures, see the APX 8000/MAX TNT/DSLTNT WAN, Routing and
Tunneling Configuration Guide.
A user who knows the password to the Admin level can perform any operation on the
TAOS unit, including changing the configuration. The Admin password is set to Ascend by
default. Lucent recommends that you assign a secret password immediately to prevent
unauthorized users from gaining access to the unit by means of the default password.
Following is an example of changing the Admin password:
default> auth admin
Password: Ascend
admin> read user admin
USER/admin read
admin> set password = secret
admin>
USER/admin written
Note that the Allow-Password permission is set to No in the Admin login. Although this
setting protects the unit’s passwords, it also prevents the Save command from storing
passwords in a configuration file. To save passwords in a configuration file, you can set
Allow-Password to Yes in the Admin profile, or you can create another User profile for the
purpose of backing up the unit and set Allow-Password to Yes in that profile.
write
Securing the serial port
By default, when users connect to the serial po rt on the shelf cont roller, they are logged in with
the Admin User profile. To secure the serial port with a username and password, proceed as
follows:
1Read the Serial profile:
admin> read serial { 1 17 2}
2Set the User profile to null:
admin> set user =
3Set Auto-Logout to Yes:
admin> set auto-logout = yes
This setting automatically logs out the current User profile if the Data Terminal Ready
signal (DTR) is lost on the serial port.
4Write the profile:
admin> write
Now users connecting to the serial port must supply a valid us ername an d p assword for access
to the TAOS unit through the serial port.
Assigning a Telnet password
Lucent recommends that you assign a Telnet password, which can be up to 21 characters in
length, to prevent unauthorized Telnet sessions. A user who opens a Telnet session to the
TAOS unit is prompted to supply this password.
Following is an example of assigning a Telnet password:
admin> readip-global
IP-GLOBAL read
admin> set telnet-password = SDwiw87
admin> write
IP-GLOBAL written
All users attempting to access the TAOS unit unit via Telnet are prompted for the Telnet
password. They are allowed three tries, each with a 60-second time limit, to enter the correct
password. If all three tries fail, the connection attempt times out.
Requiring acceptance of the pool address
During PPP negotiation, a caller can reject the IP address of fered by the TAOS unit and present
its own IP address for consideration. For security reasons, you might want to set the
Must-Accept-Address-Assign parameter to Yes to ensure that the TAOS unit terminates such a
call:
admin> readip-global
IP-GLOBAL read
admin>
admin> write
IP-GLOBAL written
set must-accept-address-assign = yes
Performing Basic Configuration
Recommended basic security measures
If you enforce acceptance of the assigned address, the Answer-Defaults profile must enable
dynamic assignment, the caller’s configured profile must specify dy namic assignment, and the
caller’s PPP dial-in software must be configured to acquire its IP address dynamically. For
more details, see the APX 8000/MAX TNT/DSLTNT WAN, Routing and Tunneling Configuration Guide.
Ignoring ICMP redirects
The Internet Message Control Protocol (ICMP) was d esigned to find the most ef ficient IP route
to a destination. ICMP redirect packets are one of the oldest route-discovery methods on the
Internet. They are also one of the least secure, because ICMP redirects can be counterfeited to
change the way a device routes packets. The following commands configure the TAOS unit to
ignore ICMP redirect packets:
admin> read ip-global
IP-GLOBAL read
admin>
admin> write
IP-GLOBAL written
set ignore-icmp-redirects = yes
Disabling directed broadcasts
Denial-of-service attacks known as “smurf” attacks typically use ICMP Echo Request packets
with a spoofed source address to direct packets to IP broadcast addresses. These attacks are
intended to degrade network performance, possibly to the point that the network becomes
unusable.
To prevent the TAOS unit router from being used as an intermediary in this type of
denial-of-service attack laun ched from another network, you must dis able the TAOS unit from
forwarding the directed broadcasts it receives from another network. The following example
shows how to disable directed broadcasts that are not generated locally on all IP interfaces of a
TAOS unit with a four-port Ethernet card in shelf 1, slot 12:
IP-INTERFACE/{ { shelf-1 slot-12 4 } 0 } read
admin> set directed-broadcast-allowed = no
admin> write
IP-INTERFACE/{ { shelf-1 slot-12 4 } 0 } written
Configuring SNMP access to the unit
For Simple Network Management Protocol (SNMP) access, an SNMP manager must be
running on a host on the local IP network, and the TAOS unit must be able to find that host by
means of either a static route or RIP . In addition to these restrictions, the TAOS unit has its own
SNMP password security (community strings), which you must set up to protect the TAOS unit
from being reconfigured from an unauthorized SNMP station.
Overview of SNMP security
The SNMP profile contains SNMP-readable information about the un it and its SNMP security.
There are two levels of security:
•Community strings limit access to the TAOS unit to the community of SNMP managers
who know the strings.
•Address security excludes SNMP access unless it is initiated from a specified IP address.